CN114863589A - Multi-key authentication management method, device, system and storage medium - Google Patents

Multi-key authentication management method, device, system and storage medium Download PDF

Info

Publication number
CN114863589A
CN114863589A CN202210395409.2A CN202210395409A CN114863589A CN 114863589 A CN114863589 A CN 114863589A CN 202210395409 A CN202210395409 A CN 202210395409A CN 114863589 A CN114863589 A CN 114863589A
Authority
CN
China
Prior art keywords
key
authentication
preset
request
preset request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210395409.2A
Other languages
Chinese (zh)
Inventor
杨佩君
胡素君
黄国兴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Automobile Group Co Ltd
Original Assignee
Guangzhou Automobile Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Automobile Group Co Ltd filed Critical Guangzhou Automobile Group Co Ltd
Priority to CN202210395409.2A priority Critical patent/CN114863589A/en
Publication of CN114863589A publication Critical patent/CN114863589A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • B60R25/241Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user whereby access privileges are related to the identifiers
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • B60R25/245Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user where the antenna reception area plays a role
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The embodiment of the application provides a multi-key authentication management method and device, electronic equipment and a storage medium, and relates to the technical field of automobile body control. Acquiring configuration states of various keys added to the vehicle by responding to a preset request; acquiring authentication results of various keys based on the configuration state; and sending the type of the key with the authentication result representing successful authentication and the preset request to a system corresponding to the preset request, and indicating the system corresponding to the preset request to execute the preset request according to the type of the key, so that the workload of software change of a control module corresponding to the type of the key is increased or decreased when the subsequent types of the key are increased or decreased, the processing logic of the system is simplified, and the computing cost and the time of the system are saved.

Description

Multi-key authentication management method, device, system and storage medium
Technical Field
The embodiment of the application relates to the technical field of automobile body control, in particular to a multi-key authentication management method, device and system and a storage medium.
Background
With the Wide adoption of Bluetooth Low Energy (BLE), Near Field Communication (NFC), Ultra Wide Band (UWB) Communication and positioning technologies in mobile devices, automobile digital keys by means of the technologies are becoming popular. Compare in traditional car key, adopt digital key, the user need not additionally carry entity intelligence remote control key, and can realize visual and abundant two-way interaction function that traditional key can not realize with the help of mobile device interactive interface, and the people and vehicles are mutual more natural convenient.
At present, although the use of the digital key is popular, the traditional intelligent remote control key still coexists with the digital key due to the problems of vehicle type positioning difference, vehicle configuration difference, digital key precision and the like.
And a Passive Entry Passive Start (PEPS) system for realizing intelligent key authentication and positioning is configured on part of vehicle types. After the vehicle increases the bluetooth key configuration, need add intelligent bluetooth module again to realize bluetooth key's authentication and location. After the vehicle is additionally provided with the NFC key, an NFC authentication module for realizing NFC key authentication needs to be additionally arranged so as to realize the authentication, the positioning and the like of the NFC key. That is, as the types of keys increase, an authentication and location management module corresponding to the type of keys needs to be added, and the logic of the whole system needs to be adjusted greatly, so that the system has large change, functions are dispersed, the integration level is low, the system cost is high, and the development workload is large.
Disclosure of Invention
The embodiment of the application provides a multi-key authentication management method, device, system and storage medium, so as to improve the above problems.
In a first aspect, an embodiment of the present application provides a multi-key authentication management method. The method comprises the following steps: responding to a preset request, and acquiring configuration states of various keys added to the vehicle; acquiring authentication results of various keys based on the configuration state; and sending the type of the key with the authentication result representing successful authentication and the preset request to a system corresponding to the preset request, and indicating the system corresponding to the preset request to execute the preset request according to the type of the key.
In a second aspect, an embodiment of the present application provides a multi-key authentication management device. The device comprises a configuration state acquisition module, an authentication result acquisition module and a sending module. The configuration state acquisition module is used for responding to a preset request and acquiring the configuration states of various keys added to the vehicle. The authentication result acquisition module is used for acquiring the authentication results of various keys based on the configuration state. The sending module is used for sending the type of the key with the authentication result representing successful authentication and the preset request to a system corresponding to the preset request, and indicating the system corresponding to the preset request to execute the preset request according to the type of the key.
In a third aspect, an embodiment of the present application provides a multi-key authentication management system. The system includes a plurality of keys and a controller. Wherein the controller comprises a timer, a memory, one or more processors, and one or more applications. Wherein the one or more application programs are stored in the memory and configured to execute the multi-key authentication management method provided by the embodiment of the application when being called by the one or more processors.
In a fourth aspect, an embodiment of the present application provides a computer-readable storage medium. The computer readable storage medium has stored therein program code configured to, when invoked by a processor, perform the multi-key authentication management method provided by the embodiments of the present application.
The embodiment of the application provides a multi-key authentication management method and device, electronic equipment and a storage medium. Acquiring configuration states of various keys added to the vehicle by responding to a preset request; acquiring authentication results of various keys based on the configuration state; the authentication result represents the type of the key successfully authenticated and the preset request is sent to the system corresponding to the preset request, the system corresponding to the preset request is instructed to execute the preset request according to the type of the key, so that the preset request can be determined according to the configuration state of the added key and the authentication result, the centralized processing of the authentication management of various keys is adopted, the workload of software change of a control module corresponding to the key type is increased or decreased when the subsequent key types are increased or decreased is effectively reduced, the processing logic of the system is simplified, and the calculation cost and the time of the system are saved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic diagram of an application scenario of a multi-key authentication management method according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a multi-key authentication management method according to an embodiment of the present application;
FIG. 3 is a flowchart illustrating a method for managing multiple key certificates according to another embodiment of the present application;
FIG. 4 is a schematic illustration of a preset unlock zone of a vehicle provided by an exemplary embodiment of the present application;
FIG. 5 is a flowchart illustrating a method for managing multiple key certificates according to another embodiment of the present application;
fig. 6 is a schematic flowchart illustrating passive unlocking of a multi-key authentication management system according to an exemplary embodiment of the present application;
FIG. 7 is a schematic flowchart illustrating a multi-key authentication management system initiating authentication according to an exemplary embodiment of the present application;
fig. 8 is a block diagram illustrating a multi-key authentication management apparatus according to an embodiment of the present application;
fig. 9 is a block diagram of a multi-key authentication management system according to an embodiment of the present application;
fig. 10 is a block diagram of a computer-readable storage medium according to an embodiment of the present disclosure.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application.
Referring to fig. 1, fig. 1 is a schematic view illustrating an application scenario of a multi-key authentication management method according to an embodiment of the present application. The application scenario 10 includes a multi-key authentication management system 11, a power supply control system 12, a low-frequency antenna 13, a radio frequency receiving module 14, a door lock control system 15, an information display system 16, a sensor integration module 17, an NFC receiving module 18, and various switches 19. The multi-key authentication management system 11 is respectively connected with the power supply control system 12, the radio frequency receiving module 14, the door lock control system 15, the information display system 16, the sensor integration module 17 and the NFC receiving module 18 through buses. The multi-key authentication management system 11 is connected to the low-frequency antenna 13 and the various switches 19 by hard wires.
The multi-key authentication management system 11 may simultaneously authenticate and locate a plurality of keys in response to the unlocking request/vehicle start-up authentication request, and transmit the key type and unlocking request/vehicle start-up authentication request, which are previously authenticated and located, to the corresponding door lock control system 15/power control system 12 to perform the unlocking/start-up authentication function of the vehicle.
The power supply control system 12 can start the vehicle according to the key when acquiring the key type and the vehicle start authentication request that are successfully authenticated. Similarly, the door lock control system 15 may perform the unlocking operation on the vehicle door according to the key when acquiring the key type and the unlocking request that are successfully authenticated.
The radio frequency receiving module 14 and the low frequency antenna 13 are used for transceiving radio frequency signals. In some embodiments, for example, the physical key, the radio frequency signal may include information such as an Identity (ID) of the key, field strength information, and a random number. The controller in the multi-key authentication management system 11 may acquire the radio frequency signal received by the radio frequency receiving module 14, determine the specific position of the key according to the field strength information obtained by analyzing the radio frequency signal, and implement the legitimacy authentication of the key according to the information such as the ID and the random number of the key obtained by analyzing the radio frequency signal.
The information display system 16 may implement interactive functions with a user through a human-machine interface thereon. For example, when the information display system 16 acquires the prompt information indicating that the key authentication is unsuccessful, which is sent by the multi-key authentication management system 11, the prompt information may be displayed through the human-computer interface.
The sensor integration module 17 may include an in-vehicle bluetooth sensor 171, an out-vehicle bluetooth sensor 172, an in-vehicle UWB sensor 173, and an out-vehicle UWB sensor 174. These sensors are used to transmit and receive corresponding bluetooth signals or UWB signals.
The NFC receiving module 18 may include an in-vehicle NFC receiving module 181 and an off-vehicle NFC receiving module 182. The NFC receiving module 18 is used for transceiving NFC signals.
The various switches 19 may include a brake switch 191, a one-touch start switch 192, a left front door unlock/lock switch 193, a right front door unlock/lock switch 194, a left rear door unlock/lock switch 195, a right rear door unlock/lock switch 196, and a rear door unlock/lock switch 197. The door lock control system 15 can control the opening and closing of these switches to realize the unlocking function for correspondingly activating the vehicle or the vehicle door. The door lock control system 15 may control all the switches to be unlocked simultaneously or control the switches to be unlocked separately, and the embodiment of the present application is not limited in this respect.
Referring to fig. 2, fig. 2 is a flowchart illustrating a multi-key authentication management method according to an embodiment of the present application. The multi-key authentication management method may be applied to the multi-key authentication and location management system 11, and in particular, may be applied to a controller (not shown in fig. 1) in the multi-key authentication and location management system 11. The multi-key authentication management method may include the following steps S110 to S130.
And step S110, responding to the preset request, and acquiring the configuration states of various keys added to the vehicle.
The preset request may be an unlocking request or an initiating authentication request, and according to an actual application, the preset request may also be other requests executed based on a key, except for the unlocking request and the initiating authentication request, and the embodiment of the present application is not limited in particular herein.
The plurality of keys may be the BLE key, the UWB key, the remote control key, and the NFC key mentioned above, or may be other keys that may be developed and added to the vehicle in the future, for example, a biological key, and the specific plurality of keys may be set according to actual needs, and the embodiments of the present application are not specifically limited herein.
The configuration state of the key may be indicative of whether the key is currently enabled, i.e. whether the added key is currently available for use. Acquiring the configured state of the key may ensure that the key is in a usable state, rather than an added but disabled state, due to possible situations such as a new key being added and a previous key being disabled.
In some embodiments, the configuration states of the plurality of types of keys that have been added to the vehicle may be acquired separately in response to a preset request, or the configuration states of the plurality of types of keys that have been added to the vehicle may be acquired sequentially in a preset order (for example, the order of addition order or reverse order of keys). Because the probability that the user uses the recently added key is higher, the added keys which can be used currently can be obtained faster by sequentially obtaining the configuration states of the multiple keys added to the vehicle according to the reverse order of the adding order of the keys, so that the processing speed is increased, and the processing time is saved.
And step S120, acquiring the authentication results of the plurality of keys based on the configuration state.
The authentication result of the key can represent whether the key is successfully authenticated. The authentication result of the key may be determined according to whether the key is legitimate and the position where the key is currently located. The key is legal, which means that the key has been registered in the system of the vehicle, or has been registered and backed up in the system of the vehicle through a mobile terminal connected to the vehicle. There may be a plurality of keys of the same type for one vehicle, for example, in the unit of home, and all persons may have the key of one vehicle, in which case there may be a plurality of keys of the same type registered in one vehicle. In order to limit the use for improving the security, the number of the same type of keys that can be registered in one vehicle may be limited, and the embodiment of the present application is not particularly limited herein.
In some embodiments, the key authentication is determined to be successful if the legitimate key satisfies the preset authentication zone, otherwise, the key authentication is determined to be unsuccessful. The preset authentication area may correspond to the preset request, for example, if the preset request is an unlocking request, the preset authentication area corresponds to a passive unlocking area. The specific preset authentication area range may be set according to actual requirements, and the embodiment of the present application is not specifically limited herein. The preset authentication ranges of each type of key may be the same or different, and the embodiments of the present application are not limited in this respect.
In some embodiments, if the configuration status indicates that the key is currently available, an authentication result for the key may be obtained. If the configuration status indicates that the key is currently unavailable, the authentication result of the key does not need to be obtained.
It should be noted that, due to differences of the keys, the manner of obtaining the authentication result of each key is not completely the same, and the method may be set according to actual requirements, and the embodiment of the present application is not specifically limited herein. Taking the entity key as an example, the embodiment of obtaining the authentication result of the entity key may be as follows: the controller drives the low-frequency antenna to detect the key, and the field intensity information, the key Identity identification number (ID), the random number and other information are sent through radio frequency after the key detects the low-frequency signal. The controller judges the specific position of the key according to the field intensity information, and realizes the legality authentication of the key according to the information such as the ID, the random number and the like of the key.
In some embodiments, since NFC is near field communication, in order to save time, the NFC authentication may be directly performed by obtaining the authentication result of the NFC key, and it may not be determined whether the NFC location is within the preset authentication area. Similarly, if the biometric key is subsequently added, the biometric key may also directly perform related biometric authentication, i.e., determine whether the biometric key is legitimate, for example, unlock is implemented by a fingerprint, and directly verify whether the fingerprint is added to a system of the vehicle to determine whether the biometric key is legitimate. By reserving control modules for the biological keys and the like, the system can be directly used without modifying the system if the biological keys are added subsequently, so that the corresponding biological key control modules are added, and the multi-key authentication and positioning system provided by the embodiment of the application has expansibility.
Step S130, sending the type of the key with the authentication result representing the successful authentication and the preset request to the system corresponding to the preset request, and instructing the system corresponding to the preset request to execute the preset request according to the type of the key.
In some embodiments, before the authentication result represents the type of the key successfully authenticated and the preset request is sent to the system corresponding to the preset request, the type of the key and the preset request may be encrypted, and the encrypted type of the key and the encrypted preset request are sent to the system corresponding to the preset request, so that the use safety of the key is improved.
According to the multi-key authentication management method provided by the embodiment of the application, which key to execute the preset request can be determined according to the configuration state and the authentication result of the added key, and the centralized processing of the authentication management of various keys effectively reduces the workload of increasing and decreasing the software change of the control module corresponding to the key type when the subsequent key type is increased or decreased, simplifies the processing logic of the system, and saves the calculation cost and time of the system. In addition, various keys in the method cover various key types, so that the requirements of different vehicle types can be met, and the method has strong practicability.
Referring to fig. 3, fig. 3 is a flowchart illustrating a multi-key authentication management method according to another embodiment of the present application. The multi-key authentication management method may be applied to the multi-key authentication and location management system 11, and in particular, may be applied to a controller (not shown in fig. 1) in the multi-key authentication and location management system 11. The multi-key authentication management method may include the following steps S210 to S230.
Step S210, responding to the unlocking/locking request, and acquiring the configuration state of various keys added to the vehicle.
The user presses an unlocking key on a handle of the vehicle door, and is considered to acquire the unlocking request, specifically, the unlocking request of the vehicle door may be acquired or the unlocking requests of all the vehicle doors may be determined according to an actual application scenario, which is not specifically limited herein.
Step S220, based on the configuration state, the authentication results of various keys are obtained.
In some embodiments, if the configuration state of the key characterizes key enablement, i.e., characterizes that the key is currently usable, the authentication state and location of the key whose configuration state characterizes key enablement may be obtained. And when the authentication state of the key is legal and the position of the key meets the preset condition, determining that the key authentication with the authentication state of legal and the position meeting the preset condition is successful.
It should be noted that, if the response is an unlocking request, the preset condition may include that the key is located in a preset unlocking area of the vehicle. The preset unlocking area may be specifically set according to an actual requirement for accuracy, and the embodiment of the present application is not specifically limited herein. For example, the preset unlocking region may be defined within 1 meter of the vehicle door, as shown in fig. 4, and a shaded region S in fig. 4 is the preset unlocking region.
Similarly, if the response is a lock request, the preset condition may further include that the key is located in a preset lock area of the vehicle. The preset locking area may also be set according to actual requirements for accuracy, and the preset locking area may be the same as the preset unlocking area or different from the preset unlocking area.
In some embodiments, the authentication states and positions of the keys enabled by the configuration state representation key may be sequentially obtained, and the key with the first authentication state being legal and the position meeting the preset condition may be determined as the key with the authentication result representing successful authentication. Specifically, the authentication state and the position of the key whose configuration state represents key enablement may be sequentially acquired in the order of addition of the keys or in the reverse order. Because the probability that the user uses the recently added key is higher, the authentication state and the position of the key enabled by the configuration state representation key are sequentially obtained according to the reverse order of the adding order of the keys, the authentication state and the position of the key enabled by the configuration state representation key can be obtained more quickly, the processing speed is improved, and the processing time is saved.
And step S230, transmitting the type of the key with the authentication result representing successful authentication and the unlocking/locking request to the door lock control system, and instructing the door lock control system to execute the unlocking/locking request according to the type of the key.
Please refer to steps S110 to S130 for the portions of steps S210 to S230 not described in detail.
The multi-key authentication management method provided by the embodiment of the application can respond to the unlocking/locking request, determine which key to execute the unlocking/locking request according to the configuration state and the authentication result of the added key, and effectively reduce the workload of software change of a control module corresponding to the key type when the subsequent key type is increased or decreased by carrying out centralized processing on the authentication management of multiple keys, thereby simplifying the processing logic of the system and saving the calculation cost and time of the system. In addition, various keys in the method cover various key types, so that the requirements of different vehicle types can be met, and the method has strong practicability.
Referring to fig. 5, fig. 5 is a flowchart illustrating a multi-key authentication management method according to another embodiment of the present application. The multi-key authentication management method may be applied to the multi-key authentication and location management system 11, and in particular, may be applied to a controller (not shown in fig. 1) in the multi-key authentication and location management system 11. The multi-key authentication management method may include the following steps S310 to S330.
Step S310, responding to the starting authentication request, and acquiring the configuration state of various keys added to the vehicle.
The user may be considered to obtain the start authentication request by pressing a brake, or by pressing a key start switch on the vehicle, or by pressing a key start switch on a mobile terminal connected to the vehicle.
Step S320, acquiring authentication results of multiple keys based on the configuration status.
In some embodiments, if the configuration state of the key characterizes key enablement, i.e., characterizes that the key is currently usable, the authentication state and location of the key whose configuration state characterizes key enablement may be obtained. And when the authentication state of the key is legal and the position of the key meets the preset condition, determining that the key authentication with the authentication state of legal and the position meeting the preset condition is successful. The preset condition may be that the key is in a preset starting area, and the preset starting area may be specifically set according to actual requirements for accuracy, which is not specifically limited herein in the embodiments of the present application.
It should be noted that, in the embodiment of the present application, the preset starting area is inside the vehicle, and the preset unlocking area or the preset locking area is generally located outside the vehicle.
In some embodiments, the authentication states and positions of the keys enabled by the configuration state representation key may be sequentially obtained, and the key with the first authentication state being legal and the position meeting the preset condition may be determined as the key with the authentication result representing successful authentication. Specifically, the authentication state and the position of the key, which the configuration state represents the key-enabled, may be acquired sequentially in the order of addition of the keys or in the reverse order. Because the probability that the user uses the recently added key is higher, the authentication state and the position of the key enabled by the configuration state representation key are sequentially obtained according to the reverse order of the adding order of the keys, the authentication state and the position of the key enabled by the configuration state representation key can be obtained more quickly, the processing speed is improved, and the processing time is saved.
And step S330, the authentication result represents the type of the key which is successfully authenticated and the starting authentication request is sent to the power management system, and the power management system is instructed to execute the starting authentication request according to the type of the key.
In some embodiments, the controller includes a timer. The controller can control the timer to start timing and acquire timing duration while sending the authentication result representing the type of the key successfully authenticated and the start authentication request to the power management system. And if the timing duration is greater than or equal to the preset duration, switching the authenticated state of the key with the authentication result representing successful authentication into the non-authenticated state. Wherein, each kind of key can correspond to a timer respectively. The preset duration can be set according to actual requirements, and the application is not particularly limited herein. For example, the preset time period may be set to 30 seconds. Through setting up the time-recorder, can avoid the user to take the key apart from the car in even when a distance apart from the vehicle, the key still can start the vehicle that the vehicle leads to and start the potential safety hazard that causes under the unmanned circumstances in the car to can improve the security that the vehicle used.
For the parts of steps S310 to S330 not described in detail, please refer to steps S110 to S130 and steps S210 to S230, which are not described herein again.
The multi-key authentication management method provided by the embodiment of the application can respond to the starting authentication request, determine which key to execute the starting authentication request according to the configuration state and the authentication result of the added key, and effectively reduce the workload of software change of a control module corresponding to the key type when the subsequent key type is increased or decreased by centralized processing of the authentication management of multiple keys, thereby simplifying the processing logic of the system and saving the calculation cost and time of the system. Through setting up the time-recorder, can avoid the user to take the key apart from the car in even when a distance apart from the vehicle, the key still can start the vehicle that the vehicle leads to and start the potential safety hazard that causes under the unmanned circumstances in the car to can improve the security that the vehicle used. In addition, the multiple keys in the method cover multiple key types, the requirements of different vehicle types can be met, and the method has strong practicability.
Referring to fig. 6, fig. 6 is a schematic flowchart illustrating passive unlocking of a multi-key authentication management system according to an exemplary embodiment of the present application. In the embodiment of the present application, the execution subject may be the multi-key authentication and location management system 11, and specifically, the execution subject may be a controller (not shown in fig. 1) in the multi-key authentication and location management system 11.
In step S410, the controller detects that the vehicle door/tailgate passive unlock switch is pressed.
Step S420, detecting whether the UWB key is enabled.
If the UWB key enabling is detected, go to step S430; otherwise, step S450 is performed.
In step S430, the authentication state of the UWB key is read.
The authentication status of the UWB key may characterize whether a legitimate UWB key is within the passive unlock region. The passive unlocking area is the same as the preset passive unlocking area and located outside the automobile, and the range can be set according to actual requirements.
Step S440, according to the authentication state of the UWB key, determining whether the legal UWB key is in the passive unlocking area.
If the legal UWB key is determined to be in the passive unlocking area, the step S4150 is carried out, and the judgment on other keys is stopped; otherwise, step S450 is performed.
Step S450, whether the BLE key is enabled or not is detected.
If the BLE key is enabled, go to step S460; otherwise, step S480 is executed.
In step S460, the authentication state of the BLE key is read.
The authentication status of the BLE key may characterize whether a legitimate BLE key is within the passive unlock region.
Step S470 is to determine whether the valid BLE key is in the passive unlocking region according to the authentication state of the BLE key.
If the valid BLE key is determined to be in the passive unlocking region, the method proceeds to step S4150, and stops judging other keys; otherwise, step S480 is executed.
Step S480, it is detected whether the key fob is enabled.
If the remote control key is enabled, go to step S490; otherwise, step S4160 is performed.
And step S490, driving a low-frequency antenna to detect the position of the remote control key.
Step S4100 determines whether a valid key is in the passive unlock region according to the remote key position.
If the legal key is in the passive unlocking area, the process goes to step S4150, and the determination of other keys is stopped; otherwise, step S4160 is performed.
Step S4110, the controller detects an NFC signal outside the vehicle.
Step S4120, detecting whether the NFC key is enabled.
If the NFC key is enabled, the process proceeds to step S4130. Otherwise, step S4160 is performed.
Step S4130, perform NFC authentication to obtain an NFC authentication result.
And step S4140, determining whether the external NFC authentication is effective or not according to the NFC authentication result.
If the external NFC authentication is valid, the step S4150 is carried out, and the judgment on other keys is stopped; otherwise, step S4160 is performed.
Step S4150, sending the passive unlock request and the key type to the door lock control system.
In step S4160, the passive unlocking process ends.
In particular, if all the keys fail to be authenticated in the multi-key authentication management system, a message indicating that the key authentication has failed may be transmitted to the user. Specifically, the prompt message may be displayed on a display screen of a mobile terminal (e.g., a smart watch, a smart phone, etc.) connected to the vehicle.
The order of the determination keys is not fixed, and may be adjusted according to actual needs. In practical application, the positions of various keys can be acquired, and corresponding unlocking and locking functions are executed according to the key authentication result received firstly.
For the parts not described in detail above, please refer to the aforementioned steps S110 to S130, steps S210 to S230, and steps S310 to S330, which are not described again.
It should be noted that the passive locking process of the multi-key authentication management system is the same as or substantially the same as the passive locking process of the multi-key authentication management system, and there is only one difference between the two processes, that is, the passive unlocking process of the multi-key authentication management system involves an unlocking request, the preset condition includes that the key is located in a preset unlocking area, and the passive locking process of the multi-key authentication management system involves a locking request, and the preset condition includes that the key is located in a preset locking area.
Referring to fig. 7, fig. 7 is a schematic flowchart illustrating a process of starting authentication of a multi-key authentication management system according to an exemplary embodiment of the present application. In the embodiment of the present application, the execution subject is the multi-key authentication and location management system 11, and specifically, the execution subject may be a controller (not shown in fig. 1) in the multi-key authentication and location management system 11.
In step S510, the controller detects a start authentication request.
In step S520, it is checked whether the timers T1, T2, T3 and T4 all time out.
The T1 timer is a timer of a UWB key. The T2 timer is a timer for BLE keys. The T3 timer is a key fob timer. The T4 timer is the timer of the NFC key.
If all the timers T1, T2, T3 and T4 are overtime, the process goes to step S530; otherwise, step S5160 is executed.
Step S530, detecting whether the UWB key is enabled.
If the UWB key is enabled, proceed to step S540; otherwise, step S560 is performed.
In step S540, the authentication state of the UWB key is read.
Step S550 determines whether a valid UWB key is within the start-up authentication area according to the authentication state of the UWB key.
The starting authentication area is the same as the preset starting area and is located in the vehicle, and the range can be set according to actual requirements.
If the legal UWB key is in the start authentication area, the process proceeds to step S5160, and the determination of other keys is stopped; otherwise, step S560 is performed.
In step S560, it is detected whether the BLE key is enabled.
If the BLE key is enabled, go to step S570; otherwise, step S590 is performed.
In step S570, the authentication state of the BLE key is read.
In step S580, it is determined whether a valid BLE key is within the start-up authentication area according to the authentication state of the BLE key.
If the valid BLE key is within the start authentication area, the process proceeds to step S5160, and the determination of another key is stopped; otherwise, step S590 is performed.
In step S590, it is detected whether the key fob is enabled.
If the remote control key is enabled, the process goes to step S5100; otherwise, step S5120 is performed.
Step S5100, the radio frequency antenna is driven to detect the position of the remote control key.
Step S5110, determining whether the valid key fob is within the start-up authentication area according to the key fob location.
If the legal remote control key is in the start authentication area, the process proceeds to step S5160, and the determination of other keys is stopped; otherwise, step S5120 is performed.
Step S5120, detect whether the NFC key is enabled.
If the NFC key is enabled, the step S5130 is carried out; otherwise, step S5170 is executed.
Step S5130, requesting the in-vehicle NFC receiving module to search for an NFC key.
Step S5140, performing NFC authentication to obtain an authentication result.
Step S5150, determining whether the in-vehicle NFC authentication is valid according to the authentication result.
If the in-vehicle NFC authentication is valid, the step S5160 is carried out; otherwise, step S5170 is executed.
Step S5160, encrypt and send the start-up authentication status, and send the key type to the power control system.
Step S5170, a start authentication failure prompt is issued.
In some embodiments, a prompt may be sent to the user to initiate an authentication failure. Specifically, the prompt message may be displayed on a display screen of a mobile terminal (e.g., a smart watch, a smart phone, etc.) connected to the vehicle, or the prompt message may be directly displayed on a human-computer interaction display interface of the vehicle.
After step S5160 or step S5170 is executed, the process proceeds to step S5180.
In step S5180, the startup authentication process ends.
The order of the determination keys is not fixed, and may be adjusted according to actual needs. In practical application, the positions of various keys can be obtained, and corresponding starting authentication functions are executed according to the key authentication results received firstly.
For the parts not described in detail above, please refer to the aforementioned steps S110 to S130, steps S210 to S230, and steps S310 to S330, which are not described again.
Referring to fig. 8, fig. 8 is a block diagram of a multi-key authentication management device according to an embodiment of the present application. The multi-key authentication management device 600 may be applied to the multi-key authentication and location management system 11, and in particular, may be applied to a controller (not shown in fig. 1) in the multi-key authentication and location management system 11. The multi-key authentication management device 600 includes a configuration status acquisition module 610, an authentication result acquisition module 620, and a transmission module 630. The status acquiring module 610 is configured to acquire configuration statuses of a plurality of keys that have been added to the vehicle in response to a preset request. The authentication result obtaining module 620 is configured to obtain authentication results of a plurality of keys based on the configuration status. The sending module 630 is configured to send the type of the key with the authentication result representing that the authentication is successful and the preset request to the system corresponding to the preset request, and instruct the system corresponding to the preset request to execute the preset request according to the type of the key.
In some embodiments, the authentication result acquisition module 620 includes a first acquisition sub-module and a first determination sub-module. The first obtaining submodule is used for obtaining the authentication state and the position of the key with the configuration state representing key enabling. The first determining submodule is used for determining that the key authentication of which the authentication state and the position meet the preset conditions is successful if the authentication state is legal and the position meets the preset conditions.
In some embodiments, the authentication result obtaining module 620 further includes a second obtaining sub-module and a second determining sub-module. The second obtaining submodule is used for sequentially obtaining the authentication state and the position of the key enabled by the configuration state representation key. The second determining submodule is used for determining the key with the first authentication state being legal and the position meeting the preset condition as the key with the authentication result representing successful authentication.
In some embodiments, the preset request includes an unlocking request, the system corresponding to the unlocking request includes a door lock control system, and the preset condition includes that the key is located in a preset unlocking area of the vehicle.
In some embodiments, the preset request further includes a locking request, the system corresponding to the locking request includes a door lock control system, and the preset condition further includes that the key is located in a preset locking area of the vehicle.
In some embodiments, the preset request includes a start authentication request, the system corresponding to the start authentication request includes a power management system, and the preset condition includes that the key is located in a preset start area of the vehicle.
In some embodiments, the sending module 630 includes a timing sub-module and a switching sub-module. The timing submodule is used for controlling the timer to start timing and acquiring timing duration when the key with the authentication result representing successful authentication and the starting authentication request are sent to the power management system corresponding to the starting authentication request. And the switching submodule is used for switching the authenticated state of the key with the authentication result representing successful authentication into the non-authenticated state if the timing duration is greater than or equal to the preset duration.
It can be clearly understood by those skilled in the art that the multi-key authentication management apparatus 600 provided in the embodiment of the present application can implement the multi-key authentication management method provided in the embodiment of the present application. The specific working processes of the above devices and modules may refer to the processes corresponding to the multi-key authentication management method in the embodiments of the present application, and are not described herein again.
In the embodiments provided in this application, the coupling, direct coupling or communication connection between the modules shown or discussed may be an indirect coupling or communication coupling through some interfaces, devices or modules, and may be in an electrical, mechanical or other form, which is not limited in this application.
In addition, each functional module in the embodiments of the present application may be integrated into one processing module, or each module may exist alone physically, or two or more modules may be integrated into one module. The integrated module may be implemented in a form of hardware, or may be implemented in a form of a functional module of software, which is not limited in this application.
Referring to fig. 9, fig. 9 is a block diagram of a multi-key authentication management system according to an embodiment of the present application. The multi-key authentication management system 700 includes a plurality of keys 710 and a controller 720. The multi-key authentication management system 700 includes the same or similar hardware or software modules as the multi-key authentication and location management system 11.
The plurality of keys 710 may include a bluetooth key 711, a UWB key 712, a remote control key 713, an NFC key 714, a biometric key 715, and the like, and the types of keys may be increased or decreased according to actual needs, and embodiments of the present application are not particularly limited herein.
Controller 720 may include one or more of the following components: a timer 721, a memory 722, one or more processors 723, and one or more applications. The one or more application programs may be stored in the memory 722 and configured to, when invoked by the one or more processors 723, cause the one or more processors 723 to perform the above-described multi-key authentication management methods provided by embodiments of the present application.
The processor 723 may include one or more processing cores. The processor 723 is coupled throughout the various portions of the controller 720 using various interfaces and lines to execute or perform instructions, programs, code sets, or instruction sets stored within the memory 722, and to invoke the execution or execution of data stored within the memory 722, to perform various functions of the controller 720 and to process data. Alternatively, the processor 723 may be implemented in hardware using at least one of Digital Signal Processing (DSP), Field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA). The processor 723 may integrate one or a combination of a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), and a modem. Wherein, the CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for rendering and drawing display content; the modem is used to handle wireless communications. It is understood that the modem may be implemented by a communication chip, instead of being integrated into the processor 723.
The Memory 722 may include a Random Access Memory (RAM) or a Read-Only Memory (ROM). The memory 722 may be used to store instructions, programs, code sets, or instruction sets. The memory 722 may include a program storage area and a data storage area. Wherein the stored program area may store instructions for implementing an operating system, instructions for implementing at least one function, instructions for implementing the various method embodiments described above, and the like. The storage data area may store data created by controller 720 in use, and the like.
Referring to fig. 10, fig. 10 is a block diagram of a computer readable storage medium according to an embodiment of the present disclosure. The computer readable storage medium 800 has stored therein a program code 810, the program code 810 is configured to, when invoked by a processor, cause the processor to execute the multi-key authentication management method provided by the embodiments of the present application.
The computer-readable storage medium 800 may be an electronic Memory such as a flash Memory, an Electrically Erasable-Erasable Programmable Read-Only-Memory (EEPROM), an Erasable Programmable Read-Only-Memory (EPROM), a hard disk, or a ROM. Alternatively, the Computer-Readable Storage Medium 800 includes a Non-volatile Computer-Readable Medium (Non-Transitory Computer-Readable Storage Medium, Non-TCRSM). The computer readable storage medium 800 has storage space for program code 810 for performing any of the method steps described above. The program code 810 can be read from or written to one or more computer program products. The program code 810 may be compressed in a suitable form.
In summary, the embodiments of the present application provide a multi-key authentication management method and apparatus, an electronic device, and a storage medium. Acquiring configuration states of various keys added to the vehicle by responding to a preset request; acquiring authentication results of various keys based on the configuration state; the authentication result represents the type of the key successfully authenticated and the preset request is sent to the system corresponding to the preset request, the system corresponding to the preset request is instructed to execute the preset request according to the type of the key, so that the preset request can be determined according to the configuration state of the added key and the authentication result, the centralized processing of the authentication management of various keys is adopted, the workload of software change of a control module corresponding to the key type is increased or decreased when the subsequent key types are increased or decreased is effectively reduced, the processing logic of the system is simplified, and the calculation cost and the time of the system are saved. In addition, various keys in the method cover various key types, so that the requirements of different vehicle types can be met, and the method has strong practicability.
Finally, it should be noted that: the above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same. Although the present application has been described in detail with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not necessarily depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (10)

1. A multi-key authentication management method is characterized by comprising the following steps:
responding to a preset request, and acquiring configuration states of various keys added to the vehicle;
acquiring authentication results of the plurality of keys based on the configuration state;
and sending the type of the key successfully authenticated by the authentication result representation and the preset request to a system corresponding to the preset request, and instructing the system corresponding to the preset request to execute the preset request according to the type of the key.
2. The method of claim 1, wherein obtaining the authentication results for the plurality of keys based on the configuration status comprises:
acquiring an authentication state and a position of a key of which the configuration state represents key enabling;
and if the authentication state is legal and the position meets the preset condition, determining that the key authentication is successful when the authentication state is legal and the position meets the preset condition.
3. The method of claim 1, wherein obtaining the authentication results of the plurality of keys based on the configuration status comprises:
sequentially acquiring the authentication state and the position of a key with a configuration state representing key enabling;
and determining the key with the first authentication state being legal and the position meeting the preset condition as the key with the authentication result representing successful authentication.
4. The method according to claim 2 or 3, wherein the preset request comprises an unlocking request, the system corresponding to the preset request comprises a door lock control system, and the preset condition comprises that a key is located in a preset unlocking zone of the vehicle.
5. The method of claim 4, wherein the predetermined request further comprises a lock-up request, the system corresponding to the predetermined request comprises the door lock control system, and the predetermined condition further comprises a key being located in a predetermined locked-up zone of the vehicle.
6. The method according to claim 2 or 3, wherein the preset request comprises a start authentication request, the system corresponding to the preset request comprises a power management system, and the preset condition comprises that a key is located in a preset start area of the vehicle.
7. The method according to claim 6, wherein the step of sending the authentication result representing the type of the key successfully authenticated and the preset request to a system corresponding to the preset request comprises:
when the key with the authentication result representing successful authentication and the preset request are sent to a system corresponding to the preset request, controlling a timer to start timing, and acquiring timing duration;
and if the timing duration is greater than or equal to the preset duration, switching the authenticated state of the key with the authentication result representing successful authentication into the non-authenticated state.
8. A multi-key authentication management device, comprising:
the configuration state acquisition module is used for responding to a preset request and acquiring the configuration states of various keys added to the vehicle;
the authentication result acquisition module is used for acquiring the authentication results of the plurality of keys based on the configuration state;
and the sending module is used for sending the authentication result representing the type of the key successfully authenticated and the preset request to a system corresponding to the preset request and indicating the system corresponding to the preset request to execute the preset request according to the type of the key.
9. A multi-key authentication management system, comprising:
a plurality of keys;
a controller comprising a timer, a memory, one or more processors, and one or more applications stored in the memory and configured to, when invoked by the one or more processors, cause the one or more processors to perform the multi-key authentication management method of any one of claims 1 to 7.
10. A computer-readable storage medium having stored therein program code configured to, when invoked by a processor, cause the processor to perform the multi-key authentication management method according to any one of claims 1 to 7.
CN202210395409.2A 2022-04-14 2022-04-14 Multi-key authentication management method, device, system and storage medium Pending CN114863589A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210395409.2A CN114863589A (en) 2022-04-14 2022-04-14 Multi-key authentication management method, device, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210395409.2A CN114863589A (en) 2022-04-14 2022-04-14 Multi-key authentication management method, device, system and storage medium

Publications (1)

Publication Number Publication Date
CN114863589A true CN114863589A (en) 2022-08-05

Family

ID=82631002

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210395409.2A Pending CN114863589A (en) 2022-04-14 2022-04-14 Multi-key authentication management method, device, system and storage medium

Country Status (1)

Country Link
CN (1) CN114863589A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117711099A (en) * 2023-12-15 2024-03-15 小米汽车科技有限公司 NFC car key processing method and device, storage medium and car

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102005033711A1 (en) * 2005-07-19 2006-10-12 Siemens Ag Method of locating position of a vehicle, determines position continuously using navigation system, and transmits it to vehicle key
CN101043750A (en) * 2006-03-23 2007-09-26 欧姆龙株式会社 Radio communication system and method therefor and portable radio communication unit and method therefor
JP2014058817A (en) * 2012-09-18 2014-04-03 Tokai Rika Co Ltd Key authentication device
CN107038773A (en) * 2015-10-29 2017-08-11 福特全球技术公司 The system and method discharged for trigger latch
CN110843728A (en) * 2019-11-29 2020-02-28 安徽江淮汽车集团股份有限公司 Automobile keyless starting method, automobile keyless starting equipment, storage medium and automobile keyless starting device
CN111212413A (en) * 2020-01-13 2020-05-29 北京小米移动软件有限公司 Unlocking communication method and device and computer storage medium
CN112109661A (en) * 2020-03-26 2020-12-22 上汽通用五菱汽车股份有限公司 Vehicle keyless control method, automobile and storage medium
CN112995948A (en) * 2021-02-03 2021-06-18 北京小米移动软件有限公司 Vehicle function control method, vehicle function control device, and storage medium
CN113192243A (en) * 2021-04-26 2021-07-30 远峰科技股份有限公司 Digital vehicle key control system and method for positioning based on signal intensity
WO2021152469A1 (en) * 2020-01-28 2021-08-05 Silca S.P.A. An improved electronic key
CN113306525A (en) * 2021-07-12 2021-08-27 上海瓶钵信息科技有限公司 Automobile NFC digital key implementation system, method and medium and automobile NFC digital key

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102005033711A1 (en) * 2005-07-19 2006-10-12 Siemens Ag Method of locating position of a vehicle, determines position continuously using navigation system, and transmits it to vehicle key
CN101043750A (en) * 2006-03-23 2007-09-26 欧姆龙株式会社 Radio communication system and method therefor and portable radio communication unit and method therefor
JP2014058817A (en) * 2012-09-18 2014-04-03 Tokai Rika Co Ltd Key authentication device
CN107038773A (en) * 2015-10-29 2017-08-11 福特全球技术公司 The system and method discharged for trigger latch
CN110843728A (en) * 2019-11-29 2020-02-28 安徽江淮汽车集团股份有限公司 Automobile keyless starting method, automobile keyless starting equipment, storage medium and automobile keyless starting device
CN111212413A (en) * 2020-01-13 2020-05-29 北京小米移动软件有限公司 Unlocking communication method and device and computer storage medium
WO2021152469A1 (en) * 2020-01-28 2021-08-05 Silca S.P.A. An improved electronic key
CN112109661A (en) * 2020-03-26 2020-12-22 上汽通用五菱汽车股份有限公司 Vehicle keyless control method, automobile and storage medium
CN112995948A (en) * 2021-02-03 2021-06-18 北京小米移动软件有限公司 Vehicle function control method, vehicle function control device, and storage medium
CN113192243A (en) * 2021-04-26 2021-07-30 远峰科技股份有限公司 Digital vehicle key control system and method for positioning based on signal intensity
CN113306525A (en) * 2021-07-12 2021-08-27 上海瓶钵信息科技有限公司 Automobile NFC digital key implementation system, method and medium and automobile NFC digital key

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117711099A (en) * 2023-12-15 2024-03-15 小米汽车科技有限公司 NFC car key processing method and device, storage medium and car

Similar Documents

Publication Publication Date Title
US10984616B2 (en) Car sharing system and car sharing program
US10493953B2 (en) Car sharing system
US20170259786A1 (en) Remote Control of Vehicle Functionalities by Means of a Mobile Terminal
US20170278330A1 (en) Method and apparatus for wireless vehicular access device authentication
CN110723086A (en) Vehicle start control system and method
US10479320B2 (en) Method for controlling access to at least one function of a motor vehicle
US20140365032A1 (en) Apparatus, method, and system for assisting remote parking
CN106553617A (en) Control method for vehicle, sharing method and device
US11704396B2 (en) Vehicle electronic device for performing authentication, mobile device used for vehicle authentication, vehicle authentication system, and vehicle authentication method
US10938829B2 (en) Car sharing system
KR20190029403A (en) Methof for controlling vehicle and computer-readable recording medium containing the same
CN112261612B (en) Vehicle control method and device
US11945403B2 (en) Progressive lockout policy for deviceless vehicle access and remote lockout management interface
CN114863589A (en) Multi-key authentication management method, device, system and storage medium
CN112153640A (en) Vehicle control method, system, user terminal, vehicle and readable storage medium
CN110827449A (en) Intelligent door lock control system and control method
CN110138823B (en) Remote vehicle body control method and system
CN111086482A (en) Vehicle control system, method, device, vehicle and storage medium
CN113232624B (en) Vehicle control method and device, electronic controller and vehicle
CN112261632B (en) Equipment unlocking method, equipment unlocking device, control system and computer readable medium
CN113963465A (en) Vehicle machine login method and device, vehicle and storage medium
KR20220098656A (en) Vehicle authentication system and vehicle authentication method based on bluetooth low energy and fingerprint
JP2022119385A (en) Authentication system, device control method, and detection unit
CN113329369A (en) Vehicle unlocking and locking method, device and system
CN112785752A (en) Vehicle starting method and device, storage medium and vehicle

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20220805

RJ01 Rejection of invention patent application after publication