CN114898483A - Vehicle unlocking method, device, equipment and medium - Google Patents

Vehicle unlocking method, device, equipment and medium Download PDF

Info

Publication number
CN114898483A
CN114898483A CN202210462227.2A CN202210462227A CN114898483A CN 114898483 A CN114898483 A CN 114898483A CN 202210462227 A CN202210462227 A CN 202210462227A CN 114898483 A CN114898483 A CN 114898483A
Authority
CN
China
Prior art keywords
vehicle
target vehicle
identifier
user terminal
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210462227.2A
Other languages
Chinese (zh)
Inventor
薛晶锦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Automotive Research Institute Co Ltd
Original Assignee
Beijing Automotive Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Automotive Research Institute Co Ltd filed Critical Beijing Automotive Research Institute Co Ltd
Priority to CN202210462227.2A priority Critical patent/CN114898483A/en
Publication of CN114898483A publication Critical patent/CN114898483A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72412User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The application discloses a vehicle unlocking method, a vehicle unlocking device, equipment and a medium, and relates to the technical field of vehicle control, in particular to the technical field of vehicle unlocking. The method comprises the following steps: receiving an announcement message broadcasted by a target vehicle; the notification message comprises a first identification of the target vehicle and a second identification of the target vehicle; the first identification is used for representing the type of the target vehicle, and the second identification is used for representing the number of the target vehicle; performing authentication processing on the target vehicle according to the first identifier and the second identifier; the result of the authentication processing is used for representing whether the target vehicle is matched with the user terminal; and determining whether to send a vehicle unlocking instruction to the target vehicle according to the authentication processing result. The vehicle unlocking device has the advantages that the vehicle can be unlocked in an imperceptible mode when a user approaches the vehicle, the user does not need to perform any unlocking operation, complex user unlocking operation is avoided, and vehicle unlocking efficiency is improved.

Description

Vehicle unlocking method, device, equipment and medium
Technical Field
The present disclosure relates generally to the field of vehicle control technologies, and in particular, to a vehicle unlocking technology, and more particularly, to a method, an apparatus, a device, and a medium for unlocking a vehicle.
Background
Along with the development of the vehicle industry technology, the vehicle intelligence degree is higher and higher, and a vehicle intelligent key is appeared, so that a user can remotely unlock a vehicle door in the sensing range of the vehicle.
In the prior art, a user may install a bluetooth key APP (Application) through a mobile phone APP store. When the user unlocks the vehicle, need be close to the vehicle and manually click the cell-phone screen for bluetooth key APP starts, further clicks "vehicle unblock" function button on bluetooth key APP's operation interface, sends vehicle unlocking instruction to mobile unit, and mobile unit responds to vehicle unlocking instruction, unlocks the vehicle.
The existing vehicle remote unlocking scheme needs a user to operate a mobile phone, log in a Bluetooth key APP and trigger a vehicle unlocking function button, so that vehicle unlocking can be realized, the whole unlocking process and operation are complex, and the vehicle unlocking efficiency is low.
Disclosure of Invention
In view of the above, it is necessary to provide a vehicle unlocking method, apparatus, device and medium capable of improving unlocking efficiency in view of the above technical problems.
In a first aspect, a vehicle unlocking method is provided, which is applied to a user terminal, and includes:
receiving an announcement message broadcasted by a target vehicle; the notification message comprises a first identification of the target vehicle and a second identification of the target vehicle; the first identification is used for representing the type of the target vehicle, and the second identification is used for representing the number of the target vehicle;
performing authentication processing on the target vehicle according to the first identifier and the second identifier; the result of the authentication processing is used for representing whether the target vehicle is matched with the user terminal;
and determining whether to send a vehicle unlocking instruction to the target vehicle according to the authentication processing result.
In a second aspect, a vehicle unlocking method is provided, which is applied to a target vehicle, and comprises the following steps:
determining a first identification of a target vehicle and a second identification of the target vehicle, and generating an announcement message according to the first identification and the second identification; the first identification is used for expressing the type of the target vehicle, and the second identification is used for representing the number of the target vehicle;
sending an announcement message; the notification message comprises a first identifier and a second identifier, so that the user terminal receiving the notification message performs authentication processing on the target vehicle according to the first identifier and the second identifier, and the result of the authentication processing is used for the user terminal to determine whether to send a vehicle unlocking instruction to the target vehicle.
In a third aspect, a vehicle unlocking device is provided, which is applied to a user terminal, and comprises:
the receiving unit is used for receiving the announcement message broadcasted by the target vehicle; the notification message comprises a first identification of the target vehicle and a second identification of the target vehicle; the first identification is used for representing the type of the target vehicle, and the second identification is used for representing the number of the target vehicle;
and the authentication unit is used for determining whether to send a vehicle unlocking instruction to the target vehicle according to the result of the authentication processing.
And the sending unit is used for determining whether to send a vehicle unlocking instruction to the target vehicle according to the authentication processing result.
In a fourth aspect, there is provided a vehicle unlocking apparatus applied to a target vehicle, the apparatus including:
the generating unit is used for determining a first identifier of the target vehicle and a second identifier of the target vehicle and generating an announcement message according to the first identifier and the second identifier; the first identification is used for representing the type of the target vehicle, and the second identification is used for representing the number of the target vehicle;
a sending unit, configured to send an announcement message; the notification message comprises a first identifier and a second identifier, so that the user terminal receiving the notification message performs authentication processing on the target vehicle according to the first identifier and the second identifier, and the authentication processing result is used for the user terminal to determine whether to send an unlocking instruction to the target vehicle.
In a fifth aspect, a computer device is provided, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and is characterized in that the processor executes the program to implement the steps of the method according to the first aspect and any one of the possible implementation manners of the first aspect, and the steps of the method according to any one of the possible implementation manners of the second aspect.
A sixth aspect provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method of the first aspect and any one of the possible implementations of the first aspect, and the steps of the method of the second aspect and any one of the possible implementations of the second aspect.
In a seventh aspect, a computer program product is provided, which comprises instructions that, when executed, implement the steps of the method according to the first aspect and any one of the possible implementations of the first aspect, and the steps of the method according to any one of the possible implementations of the second aspect and the second aspect.
In the application, the user terminal can receive the announcement message broadcasted by the target vehicle; the notification message comprises a first identification of the target vehicle and a second identification of the target vehicle; the first identification is used for representing the type of the target vehicle, and the second identification is used for representing the number of the target vehicle; performing authentication processing on the target vehicle according to the first identifier and the second identifier; the result of the authentication processing is used for representing whether the target vehicle is matched with the user terminal; and determining whether to send a vehicle unlocking instruction to the target vehicle according to the authentication processing result. By adopting the unlocking method, when the user approaches the vehicle, the user terminal can monitor and analyze the broadcast message sent by the vehicle-mounted equipment, the type and the number of the target vehicle are identified based on the information in the broadcast message, if the target vehicle is identified to be matched with the user terminal, the target vehicle is the vehicle of the user, and at the moment, a vehicle unlocking instruction is sent to the target vehicle. Therefore, the method and the device avoid some user operations required by the existing vehicle unlocking scheme, such as operating a mobile phone, logging in a Bluetooth key APP, triggering a vehicle unlocking function button and the like, namely, the user is not required to operate, the vehicle can be remotely unlocked under the condition that the user feels nothing, and the vehicle unlocking efficiency is effectively improved.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
fig. 1 is a schematic view of a vehicle unlocking system provided in an embodiment of the present application;
fig. 2 is a schematic flowchart of a vehicle unlocking method provided in an embodiment of the present application;
fig. 3 is another schematic flow chart of a vehicle unlocking method provided in the embodiment of the present application;
FIG. 4 is another schematic flow chart diagram of a vehicle unlocking method provided by the embodiment of the application;
fig. 5 is a schematic view of a vehicle information configuration interface of a vehicle unlocking method according to an embodiment of the present application;
FIG. 6 is another schematic flow chart of a vehicle unlocking method provided by the embodiment of the application;
FIG. 7 is another schematic flow chart diagram of a vehicle unlocking method provided by the embodiment of the application;
FIG. 8 is a schematic diagram of a user registration interface provided by an embodiment of the present application;
FIG. 9 is a schematic diagram of a user interface provided by an embodiment of the present application;
fig. 10 is another schematic flow chart of a vehicle unlocking method provided in the embodiment of the present application;
fig. 11 is another schematic flow chart of a vehicle unlocking method provided in the embodiment of the present application;
fig. 12 is another schematic flow chart of a vehicle unlocking method provided in the embodiment of the present application;
fig. 13 is a schematic structural diagram of a vehicle unlocking device provided in an embodiment of the present application;
fig. 14 is another schematic structural diagram of a vehicle unlocking device provided in the embodiment of the present application;
fig. 15 is a block diagram of a computer device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The vehicle unlocking method provided by the application can be applied to a vehicle unlocking system shown in fig. 1. Referring to fig. 1, the system may include an in-vehicle device 10 and a user terminal 20, the in-vehicle device 10 being provided in a vehicle of a user. The in-vehicle apparatus 10 may establish a communication connection with the user terminal 20, and remotely control the in-vehicle apparatus 10 through the communication connection. The in-vehicle device 10 may control the vehicle in response to a remote control instruction sent by the user terminal 20, for example, control the vehicle to unlock, open a trunk, open windows, and the like.
In the concrete realization, user terminal 20 can install bluetooth key APP, carries out remote control to the mobile unit through bluetooth key APP. For example, at the vehicle control interface of bluetooth key APP, the vehicle is unlocked by triggering the vehicle unlock button.
Fig. 2 is a schematic flowchart of a vehicle unlocking method according to an embodiment of the present application, and is suitable for the user terminal 20 shown in fig. 1. As shown in fig. 2, the method comprises the steps of:
step 201, receiving an announcement message broadcasted by a target vehicle; the notification message comprises a first identification of the target vehicle and a second identification of the target vehicle; the first identification is used for representing the type of the target vehicle, and the second identification is used for representing the number of the target vehicle;
the embodiment of the application provides a scheme for unlocking a vehicle, when a user is close to the vehicle, the user is not required to carry out any operation on a user terminal or a Bluetooth key APP, the user terminal can trigger a vehicle unlocking process after monitoring a specific message sent by vehicle-mounted equipment, the whole process is imperceptible to the user, and noninductive unlocking can be realized. For example, in step 201, the user terminal may receive an announcement message broadcasted by the target vehicle, so as to authenticate the vehicle-mounted device according to information carried in the announcement message, so as to determine whether to unlock the vehicle.
Specifically, the first identifier is used to characterize the type of the target vehicle. In the embodiment of the present application, the type of the vehicle may be any one of a vehicle brand, a vehicle series, and a vehicle model. For example, in the first identifier, the vehicle brand may be X, the vehicle family may be a6, and the vehicle model may be "2022 style 2.4 comfort. The second identifier is a number that characterizes the target vehicle. Illustratively, the Number of the target Vehicle may be a VIN code (Vehicle Identification Number), for example, LFV5A24F8B 3014901.
In one possible implementation, the announcement message broadcast by the target vehicle may include a first identifier, such as XA6 "2.4 comfortable model 2022". A second identification, such as the VIN code LFV5a24F8B3014901, may also be included.
202, performing authentication processing on the target vehicle according to the first identifier and the second identifier; the result of the authentication processing is used for representing whether the target vehicle is matched with the user terminal;
specifically, the authentication processing is intended to determine whether the target vehicle is a vehicle of the user or not, or whether the target vehicle and the user terminal correspond to the same user, using the first identifier and the second identifier. For example, the first identifier may be a vehicle type and the second identifier may be a vehicle number. The first identification can be compared with the vehicle type of the user, the second identification can be compared with the vehicle number of the user, and whether the target vehicle is matched with the user terminal or not can be determined according to the comparison result, namely whether the target vehicle is the vehicle of the user or not.
For example, the first identifier XA6 "2022 style 2.4 comfort type" and the second identifier VIN code LFV5a24F8B3014901 are described in conjunction with the examples.
In a specific implementation, whether the first identification XA6 of the target vehicle is "2022 style 2.4 comfortable type" is the same as the vehicle type of the user is compared, and whether the second identification VIN code LFV5A24F8B3014901 of the target vehicle is the same as the vehicle number of the user is compared. And if not, determining that the target vehicle is not the vehicle of the user.
In one possible implementation, if the vehicle type of the user is XA8L, "2022 style 30 exclusive type", the vehicle number of the user is LFV5a24F8B 3014902. The first identification of the target vehicle XA6 "2022 type 2.4 comfortable" and the user's vehicle type XA8L "2022 type 30 exclusive" are compared, as well as the second identification of the target vehicle VIN code LFV5a24F8B3014901 and the user's vehicle number LFV5a24F8B 3014902. Since XA6 "2022 model 2.4 comfortable" and XA8L "2022 model 30 exclusive" are not the same, LFV5A24F8B3014901 and LFV5A24F8B3014902 are not the same, indicating that the target vehicle is not the user's vehicle.
And step 203, determining whether to send a vehicle unlocking instruction to the target vehicle according to the authentication processing result.
Specifically, the result of the authentication processing may be that the target vehicle and the user terminal are not matched, or that the target vehicle and the user terminal are matched.
In specific implementation, if the target vehicle is not matched with the user terminal, the target vehicle is not the vehicle of the user; and if the target vehicle is matched with the user terminal, indicating that the target vehicle is the vehicle of the user.
In one possible implementation, if the target vehicle is not the user's vehicle, the target vehicle is prohibited from sending a vehicle unlock command; and if the target vehicle is the vehicle of the user, sending a vehicle unlocking instruction to the target vehicle.
In the vehicle unlocking method, the user terminal receives an announcement message broadcasted by a target vehicle; the notification message comprises a first identification of the target vehicle and a second identification of the target vehicle; the first identification is used for representing the type of the target vehicle, and the second identification is used for representing the number of the target vehicle; performing authentication processing on the target vehicle according to the first identifier and the second identifier; the result of the authentication processing is used for representing whether the target vehicle is matched with the user terminal; and determining whether to send a vehicle unlocking instruction to the target vehicle according to the authentication processing result. By the unlocking method, the vehicle can be unlocked in a non-sensing manner under the condition that the user does not sense when the user approaches the vehicle. When a user approaches a vehicle, the user terminal can monitor and analyze an announcement message of the target vehicle, wherein the announcement message comprises the vehicle type and the vehicle number of the target vehicle; comparing the vehicle type of the target vehicle with the vehicle type of the user vehicle, and the vehicle number of the target vehicle with the vehicle number of the user vehicle; if the vehicle type of the target vehicle is the same as that of the user vehicle, and the vehicle number of the target vehicle is the same as that of the user vehicle, the target vehicle is indicated to be the user vehicle, and a vehicle unlocking instruction is sent to the target vehicle at the moment. Therefore, the method and the device avoid some user operations required by the existing vehicle unlocking scheme, such as operating a mobile phone, logging in a Bluetooth key APP, triggering a vehicle unlocking function button and the like, namely, the user is not required to operate, the vehicle can be remotely unlocked under the condition that the user feels nothing, and the vehicle unlocking efficiency is effectively improved.
In the foregoing embodiments, a technical solution is introduced that obtains an authentication processing result for a target vehicle according to a first identifier and a second identifier of the target vehicle, and determines whether to send a vehicle unlocking instruction to the target vehicle according to the authentication result. In another embodiment of the present application, whether to send the vehicle unlocking instruction to the target vehicle may be determined by a matching result of the target vehicle and the user terminal. For example, the specific implementation steps referred to above for "determining whether to send a vehicle unlock instruction to the target vehicle according to the result of the authentication processing" include the steps of fig. 3:
step 301, if the target vehicle is matched with the user terminal, executing a vehicle unlocking instruction;
specifically, the first identifier matched to characterize the target vehicle is the same as the vehicle type of the user, or the second identifier of the target vehicle is the same as the vehicle number of the user.
The case where the vehicle unlocking instruction is executed is described below with reference to an example.
If the first identification of the target vehicle is XA8L "2022 model 30 exclusive type", the second identification of the target vehicle is LFV5A24F8B3014902, the vehicle type of the user vehicle is XA8L "2022 model 30 exclusive type", and the number of the user vehicle is LFV5A24F8B 3014902.
In a specific implementation, the first identifier of the target vehicle is XA8L "2022 model 30 exclusive type" and the vehicle type of the user vehicle is XA8L "2022 model 30 exclusive type", the second identifier of the target vehicle is LFV5a24F8B3014902 and the number of the user vehicle is LFV5a24F8B3014902 are compared. The first identifier of the target vehicle is XA8L "2022 type 30 exclusive type" is the same as the vehicle type of the user vehicle is XA8L "2022 type 30 exclusive type", and the second identifier of the target vehicle is LFV5A24F8B3014902 is the same as the number of the user vehicle is LFV5A24F8B3014902, then the vehicle unlock instruction is executed.
And step 302, if the vehicle unlocking instruction is not matched, the vehicle unlocking instruction is forbidden to be executed.
Specifically, the first identifier used for representing the target vehicle and the vehicle type of the user are not matched, or the second identifier of the target vehicle and the vehicle number of the user are not matched.
The following describes, with reference to an example, a case where execution of the vehicle unlock instruction is prohibited.
If the first identification of the target vehicle is XA6 "2022 model 2.4 comfortable type", the second identification of the target vehicle is VIN code LFV5A24F8B3014901, the vehicle type of the user is XA8L "2022 model 30 exclusive type", and the vehicle number of the user is LFV5A24F8B 3014902.
In a specific implementation, if the first identifier of the target vehicle is XA6 "2022 model 2.4 comfortable type" is different from the vehicle type of the user is XA8L "2022 model 30 exclusive type", and the second identifier of the target vehicle is the VIN code LFV5a24F8B3014901 is different from the vehicle number LFV5a24F8B3014902 of the user, execution of the vehicle unlocking instruction is prohibited.
The prohibition of executing the vehicle unlocking instruction may be to discard the notification message, to prohibit the notification message from being responded, or to prohibit the vehicle unlocking instruction from being sent to the vehicle-mounted device.
In the foregoing embodiments, a technical solution for determining whether to send a vehicle unlocking instruction to a target vehicle according to a result of the authentication processing is described. In another embodiment of the present application, the target vehicle may be authenticated according to vehicle type information and vehicle number pre-stored in the user terminal, and the first identifier and the second identifier of the target vehicle. For example, the specific implementation of "performing an authentication process on a target vehicle according to a first identifier and a second identifier" related to the previous steps includes the steps of fig. 4:
step 401, obtaining pre-stored vehicle type information and pre-stored vehicle numbers; the vehicle type information is used for representing the type of a matched vehicle of the user terminal, and the vehicle number is used for representing the number of the matched vehicle of the user terminal;
specifically, the vehicle type information is used to characterize the type of the matching vehicle of the user terminal. For example, the type of the matching vehicle of the user terminal may be XA8L "30-exclusive-type 2022", and the vehicle number is used to characterize the number of the matching vehicle of the user terminal. Illustratively, the number of the matching vehicle of the user terminal may be LFV5a24F8B 3014902.
How to acquire the pre-stored vehicle type information and the pre-stored vehicle number is described below with reference to fig. 5, where fig. 5 is a schematic diagram of a vehicle information configuration interface of a vehicle unlocking method provided in an embodiment of the present application.
Referring to fig. 5, the vehicle information configuration interface includes a plurality of information to be filled and a first configuration item corresponding to each information to be filled. For example, the configuration item t1 corresponding to the information to be filled, the configuration item t2 corresponding to the information to be filled, the vehicle series, the configuration item t3 corresponding to the information to be filled, the vehicle type, the information to be filled, the vehicle number, the configuration item t4 corresponding to the vehicle number, and the configuration item corresponding to the information to be filled are used for filling the information to be filled.
In the concrete implementation, after a user logs in the Bluetooth key APP for the first time, vehicle information configuration is required. For example, if the configuration items t1 and t2 are filled, the manually filled configuration information is "vehicle brand" and "vehicle series", and the "save" button of the vehicle configuration interface is clicked to complete the configuration of the vehicle information.
It should be noted that the first configuration item in fig. 5 is an input box, but the embodiment of the present application does not limit the specific form of the first configuration item, and may be a check item or another configuration item that receives manual configuration information. In addition, the first operation instruction is not limited, and the first operation instruction is related to the specific form of the first configuration item, so that the filling instruction of the corresponding feature of the configuration item can be realized. For example, the first configuration item is a fill item, and the first operation instruction may be an input instruction.
And 402, performing authentication processing on the target vehicle according to the first identifier, the second identifier, the vehicle type information and the vehicle number.
Specifically, the first identifier may be XA6 "2022 version 2.4 comfortable type", or XA8L "2022 version 30 exclusive type", and the second identifier may be VIN code LFV5a24F8B3014901, or VIN code LFV5a24F8B 3014902. The vehicle type information may be XA8L "2022 model 30 exclusive type", and the vehicle number may be LFV5a24F8B 3014902.
How to perform the authentication processing on the target vehicle according to the first identifier, the second identifier, the vehicle type information, and the vehicle number is described below with reference to examples.
In a specific implementation, whether the first identifier XA6 "2.4 comfortable type 2022", XA8L "30 exclusive type 2022", and the vehicle type information XA8L "30 exclusive type 2022" are the same or whether the second identifier VIN code LFV5a24F8B3014901, the VIN code LFV5a24F8B3014902, and the vehicle number LFV5a24F8B3014902 are the same is compared.
In one possible implementation, comparing the first identifier XA6 "2022 type 2.4 comfort type" with the vehicle type information XA8L "2022 type 30 exclusive type" indicates that the target vehicle is not the user's vehicle.
In a possible implementation manner, comparing the second identification VIN code LFV5a24F8B3014901 with the vehicle number LFV5a24F8B3014902, if the second identification and the vehicle number are not the same, it indicates that the target vehicle is not the vehicle of the user.
In one possible implementation, the comparison of the first identification XA8L "2022 style 30 exclusive" and the vehicle type information XA8L "2022 style 30 exclusive" indicates that the target vehicle and the user are of the same vehicle type, but not necessarily the user's vehicle.
In a possible implementation manner, comparing the second identification VIN code LFV5a24F8B3014902 with the vehicle number VIN code LFV5a24F8B3014902, if the second identification and the vehicle number are the same, it indicates that the vehicle number of the target vehicle is the same as that of the user, and indicates that the target vehicle may be the vehicle of the user.
In the foregoing embodiments, a technical solution for performing an authentication process on a target vehicle according to a first identifier, a second identifier, pre-stored vehicle type information, and a pre-stored vehicle number is introduced. In another embodiment of the present application, it is described that the authentication process is performed based on the first identifier, the second identifier, the vehicle type information, and the vehicle number to determine whether the target vehicle and the user terminal are matched. For example, the specific implementation of "performing the authentication processing on the target vehicle according to the first identifier, the second identifier, the vehicle type information, and the vehicle number" referred to above includes the steps of fig. 6:
601, if the first identifier is the same as the vehicle type information and the second identifier is the same as the vehicle number, determining that the result of the authentication processing is that the target vehicle is matched with the user terminal;
specifically, the first identifier may be XA8L "2022 type 30 exclusive", and the second identifier may be VIN code LFV5a24F8B 3014902. The vehicle type information may be XA8L "2022 model 30 exclusive type", and the vehicle number may be LFV5a24F8B 3014902.
How to determine the result of the authentication process as the target vehicle matches the user terminal is described below with reference to examples.
In a specific implementation, the comparison between the first identifier XA8L "2022 type 30 exclusive type" and the vehicle type information may be XA8L "2022 type 30 exclusive type", and the second identifier VIN code LFV5a24F8B3014902 and the vehicle number LFV5a24F8B 3014902. The first identification is the same as the vehicle type information, and the second identification is the same as the vehicle number, which indicates that the target vehicle is matched with the user terminal, namely that the target vehicle is the vehicle of the user.
Step 602, if the first identifier is the same as the vehicle type information, but the second identifier is different from the vehicle number, determining that the result of the authentication processing is that the target vehicle is not matched with the user terminal;
specifically, the first identifier may be XA8L "2022 type 30 exclusive", and the second identifier may be VIN code LFV5a24F8B 3014901. The vehicle type information may be XA8L "2022 model 30 exclusive type", and the vehicle number may be LFV5a24F8B 3014902.
How to determine that the result of the authentication process is that the target vehicle does not match the user terminal is described below with reference to examples.
In a specific implementation, the comparison between the first identifier XA8L "2022 type 30 exclusive type" and the vehicle type information may be XA8L "2022 type 30 exclusive type", and the second identifier VIN code LFV5a24F8B3014901 and the vehicle number LFV5a24F8B 3014902. The first identification is the same as the vehicle type information, but the second identification is different from the vehicle number, which indicates that the target vehicle is not matched with the user terminal, i.e. the target vehicle is not the vehicle of the user.
Step 603, if the first identifier is different from the vehicle type information, but the second identifier is the same as the vehicle number, determining that the result of the authentication processing is that the target vehicle is not matched with the user terminal;
specifically, the first identifier may be XA6 "2.4 comfortable model 2022", and the second identifier may be VIN code LFV5a24F8B 3014902. The vehicle type information may be XA8L "2022 model 30 exclusive type", and the vehicle number may be LFV5a24F8B 3014902.
How to determine that the result of the authentication process is that the target vehicle does not match the user terminal is described below with reference to examples.
In a specific implementation, the comparison between the first identifier XA6 "2022 type 2.4 comfortable type" and the vehicle type information may be XA8L "2022 type 30 exclusive type", and the second identifier VIN code LFV5a24F8B3014902 and the vehicle number LFV5a24F8B 3014902. The first identification is different from the vehicle type information, but the second identification is the same as the vehicle number, so that the target vehicle is not matched with the user terminal, namely the target vehicle is not the vehicle of the user.
And step 604, if the first identifier is different from the vehicle type information and the second identifier is different from the vehicle number, determining that the result of the authentication processing is that the target vehicle is not matched with the user terminal.
Specifically, the first identifier may be XA6 "2022 style 2.4 comfortable type", and the second identifier may be VIN code LFV5a24F8B 3014901. The vehicle type information may be XA8L "2022 model 30 exclusive type", and the vehicle number may be LFV5a24F8B 3014902.
How to determine that the result of the authentication process is that the target vehicle does not match the user terminal is described below with reference to examples.
In a specific implementation, the comparison between the first identifier XA6 "2022 type 2.4 comfortable type" and the vehicle type information may be XA8L "2022 type 30 exclusive type", and the second identifier VIN code LFV5a24F8B3014901 and the vehicle number LFV5a24F8B 3014902. The first identification is different from the vehicle type information, and the second identification is different from the vehicle number, so that the target vehicle is not matched with the user terminal, namely the target vehicle is not the vehicle of the user.
In the foregoing embodiments, a technical solution for performing an authentication process on a target vehicle according to a first identifier, a second identifier, vehicle type information, and a vehicle number is introduced. In another embodiment of the present application, a bluetooth key application may be automatically run to obtain a vehicle number. For example, the specific implementation of "obtaining a pre-stored vehicle number" referred to in the preceding steps includes the steps of FIG. 7:
step 701, running a Bluetooth key application program of the user terminal;
specifically, the bluetooth key application is a bluetooth key APP installed in the user terminal. And if the first identification is the same as the vehicle type of the user, operating the Bluetooth key APP.
In one possible implementation, the first identifier XA8L "2022 type 30 exclusive type", the prestored type of vehicle is XA8L "2022 type 30 exclusive type", the first identifier XA8L "2022 type 30 exclusive type" is the same as the prestored vehicle type information XA8L "2022 type 30 exclusive type", and the bluetooth key APP is operated.
Step 702, calling the bluetooth key application to obtain the vehicle number.
Specifically, the vehicle number is a number that matches the target vehicle number registered in the user terminal. For example, the vehicle number may be the VIN code LFV5a24F8B 3014902.
In the specific implementation, the mode of calling the bluetooth key application program (equivalent to the bluetooth key APP in the embodiments of the present application) is that the user interface of the bluetooth key application APP is paired with the vehicle-mounted device, a bluetooth channel between the target terminal and the bluetooth key APP is established after the pairing, the target vehicle and the bluetooth key exchange certificates with each other, and the bluetooth key APP acquires the digital key of the target vehicle, that is, the vehicle number.
In the foregoing embodiments, a technical solution for acquiring a pre-stored vehicle number is described. In another embodiment of the present application, the vehicle number may be determined according to a vehicle number configuration item displayed when the user logs in for identity information registration for the first time. For example, the specific implementation of "running bluetooth key application of user terminal" referred to in the previous steps includes the steps of fig. 8:
step 801, presenting vehicle configuration items in response to receiving a user registration request of a bluetooth key application;
specifically, the user registration request is used to characterize that the user needs to register the identity information when the terminal logs in for the first time. For example, the user registration request may be to request registration by an authentication code after the user inputs an account number and a password. The vehicle configuration items are used to characterize binding of vehicle information. For example, the vehicle configuration item may be a vehicle number input box or a vehicle number selection box.
According to a possible implementation mode, a user terminal receives an account and a password input in a vehicle configuration item when a user logs in for the first time, and requests to register through a verification code. Referring to fig. 9, fig. 9 is a schematic view of a user interface provided in the embodiment of the present application.
Referring to fig. 9, the user interface includes a plurality of information to be filled, and a first configuration item corresponding to each information to be filled. For example, the configuration item t1 corresponding to the information "user name" and "user name" to be filled, the configuration item t2 corresponding to the information "verification code" and "verification code" to be filled, the configuration item t3 corresponding to the information "password" to be filled and "password" to be filled, the configuration item t4 corresponding to the information "password" to be filled and "password confirmation" to be filled, and the configuration item corresponding to the information to be filled are used for filling in the information to be filled.
In the concrete implementation, when a user logs in the bluetooth key APP for the first time, the registration of identity information is required. For example, if the configuration items t1 and t2 are filled, the manually filled configuration information is "user name" and "verification code", and the "register" button of the vehicle configuration interface is clicked to complete the configuration of the vehicle information.
It should be noted that the first configuration item in fig. 9 is an input box, but the embodiment of the present application does not limit the specific form of the first configuration item, and may be a check item or another configuration item that receives manual configuration information. In addition, the first operation instruction is not limited, and the first operation instruction is related to the specific form of the first configuration item, so that the filling instruction of the corresponding feature of the configuration item can be realized. For example, the first configuration item is a fill item, and the first operation instruction may be an input instruction.
And step 802, receiving an operation instruction of the vehicle number configuration item, and determining the vehicle number according to the operation instruction.
Referring to fig. 5, the vehicle information configuration interface includes a plurality of information to be filled and a first configuration item corresponding to each information to be filled. For example, the configuration item t4 corresponding to the "vehicle number" and the configuration item corresponding to the to-be-filled information are used for filling in the to-be-filled information.
In the concrete implementation, after a user logs in the Bluetooth key APP for the first time, vehicle information configuration is required. For example, if the configuration item t4 is filled, the manually filled configuration information is "vehicle number", and the "save" button of the vehicle configuration interface is clicked to determine the vehicle number.
As shown in fig. 5, a possible implementation manner is that a user terminal receives an operation instruction of vehicle number configuration, registers a vehicle number as a VIN code LFV5a24F8B3014902 in the user terminal, and stores the vehicle number in a storage space corresponding to a bluetooth key APP after the registration is completed.
In the foregoing embodiments, a technical solution for operating a bluetooth key application of a user terminal to determine a vehicle number through a vehicle number configuration item is described. In another embodiment of the present application, determining vehicle type information that matches a listening range based on broadcast message ranges of a first identifier and a second identifier is presented. For example, the foregoing steps relate to "acquiring pre-stored vehicle type information" including:
setting a monitoring range of the notification message, and setting vehicle type information matched with the monitoring range.
Specifically, the monitoring range of the notification packet is used to represent a range in which the user terminal can receive the notification packet. For example, the monitoring range of the notification message may be, but is not limited to, 6-8m, and the vehicle type information matched with the monitoring range is used to characterize the vehicle type information that the user terminal wants to monitor on the premise that the notification message can be received. For example, the vehicle type information matched with the listening range may be "2022 model 2.4 comfort type".
According to a possible implementation mode, the range of the notification message sent by the vehicle-mounted equipment can be monitored to be 6-8m by the user terminal, and the vehicle type information matched with the range of 6-8m is set to be '2022 model 2.4 comfortable type'.
The embodiment of the present application further provides some execution codes related to the vehicle unlocking method described above, which are specifically as follows:
(1) before monitoring the notification message, the user terminal can set the monitoring range of the notification message by the vehicle-mounted equipment. In order to support the setting of the monitoring range by the vehicle-mounted device, whether the vehicle-mounted device has the authority of acquiring the positioning can be verified. For example, the listening range may be set based on CoreLocation Manager (core location Manager), and the partial execution code is as follows:
creating a CLLocation manager (CoreLocation Location manager: core location manager) object;
Figure BDA0003619939390000131
(2) the user terminal may set vehicle type information matching the monitoring range, for example, register a UUID matching the monitoring range. The part of the execution code that sets the vehicle type information is as follows:
Figure BDA0003619939390000132
Figure BDA0003619939390000141
fig. 10 is a schematic flowchart of a vehicle unlocking method provided in an embodiment of the present application, and is suitable for the vehicle-mounted device 10 shown in fig. 1. As shown in fig. 10, the method comprises the steps of:
1001, determining a first identification of a target vehicle and a second identification of the target vehicle, and generating an announcement message according to the first identification and the second identification; the first identification is used for expressing the type of the target vehicle, and the second identification is used for representing the number of the target vehicle;
the embodiment of the application provides a scheme for unlocking a vehicle, when a user is close to the vehicle, the user is not required to carry out any operation on a user terminal or a Bluetooth key APP, the user terminal can trigger a vehicle unlocking process after monitoring a specific message sent by vehicle-mounted equipment, the whole process is imperceptible to the user, and noninductive unlocking and unlocking of the vehicle are achieved. For example, in step 1001, the in-vehicle device may generate a broadcast notification message, so that the notification message may be subsequently transmitted to the user terminal for parsing to determine whether to unlock the vehicle.
Specifically, the first identifier is used to characterize the type of the target vehicle. In the embodiment of the present application, the type of the vehicle may be any one of a vehicle brand, a vehicle series, and a vehicle model. For example, in the first identifier, the vehicle brand may be X, the vehicle family may be a6, and the vehicle model may be "2022 style 2.4 comfort. The second identifier is a number that characterizes the target vehicle. Illustratively, the Number of the target Vehicle may be a VIN code (Vehicle Identification Number), such as LFV5A24F8B 3014901.
In a specific implementation, the notification message is generated according to the first identifier XA6, "2022 model 2.4 comfortable type" and the second identifier VIN code LFV5a24F8B 3014901. The notification message is generated according to the second identification VIN code LFV5a24F8B3014901, whether the vehicle-mounted device obtains the positioning authority needs to be verified, and the first identification XA6 "2022 model 2.4 comfortable type" that the vehicle-mounted device needs to generate is set.
Step 1002, sending an announcement message; the notification message comprises a first identifier and a second identifier, so that the user terminal receiving the notification message performs authentication processing on the target vehicle according to the first identifier and the second identifier, and the result of the authentication processing is used for the user terminal to determine whether to send a vehicle unlocking instruction to the target vehicle.
Specifically, the result of the authentication processing is to determine whether to send a vehicle unlocking instruction to the target vehicle based on the first identifier and the second identifier. For example, the first identifier may be a vehicle type XA6 "2022 type 2.4 comfort type" or XA8L "2022 type 30 exclusive type", and the second identifier may be a vehicle number VIN code LFV5a24F8B3014901 or VIN code LFV5a24F8B 3014902. The user's vehicle type may be XA8L "2022 model 30 exclusive type", and the user's vehicle number may be LFV5a24F8B 3014902.
In a specific implementation, whether the first identifier "2022 type 2.4 comfortable type" or XA8L "2022 type 30 exclusive type" is the same as the user's vehicle type XA8L "2022 type 30 exclusive type" or not is compared, whether the second identifier VIN code LFV5a24F8B3014901 or VIN code LFV5a24F8B3014902 is the same as the user's vehicle number LFV5a24F8B3014902 or not is compared, and whether a vehicle unlocking instruction is sent to the target vehicle is determined according to whether the comparison result is the same.
In one possible implementation, if the first identifier XA8L is "2022 type 30 exclusive type", the user's vehicle type XA8L is "2022 type 30 exclusive type", the second identifier VIN code LFV5a24F8B3014902, and the user's vehicle number LFV5a24F8B 3014902. Comparing the first identifier XA8L '2022 type 30 exclusive type' with the user's vehicle type XA 8L' 2022 type 30 exclusive type ', the first identifier is the same as the vehicle type of the user's vehicle, and the second identifier is the same as the vehicle number of the user, a vehicle unlock instruction is sent to the target vehicle.
In the vehicle unlocking method, the vehicle-mounted terminal determines a first identifier of a target vehicle and a second identifier of the target vehicle, and generates a notification message according to the first identifier and the second identifier; the first identification is used for expressing the type of the target vehicle, and the second identification is used for representing the number of the target vehicle; sending an announcement message; the notification message comprises a first identifier and a second identifier, so that the user terminal receiving the notification message performs authentication processing on the target vehicle according to the first identifier and the second identifier, and the result of the authentication processing is used for the user terminal to determine whether to send a vehicle unlocking instruction to the target vehicle. By the unlocking method, the vehicle can be unlocked in a non-sensing manner under the condition that a user does not sense the unlocking condition. When a user approaches a vehicle, the user terminal automatically receives an announcement message generated and sent by the vehicle-mounted equipment, wherein the announcement message comprises a vehicle type and a vehicle number. The vehicle type of the target vehicle and the vehicle type of the user vehicle are compared, and the vehicle number of the target vehicle and the vehicle number of the user vehicle are compared. If the vehicle type of the target vehicle is the same as that of the user vehicle, and the vehicle number of the target vehicle is the same as that of the user vehicle, the target vehicle is indicated to be the user vehicle, and a vehicle unlocking instruction is sent to the target vehicle at the moment. Therefore, the method and the device avoid some user operations required by the existing vehicle unlocking scheme, such as operating a mobile phone, logging in a Bluetooth key APP, triggering a vehicle unlocking function button and the like, namely, the user is not required to operate, the vehicle can be remotely unlocked under the condition that the user feels nothing, and the vehicle unlocking efficiency is effectively improved.
In the foregoing embodiment, a technical solution is introduced, in which a notification message is generated according to a first identifier and a second identifier of a vehicle-mounted device, the notification message is sent to a user terminal, and the user terminal determines whether to send a vehicle unlocking instruction to a target vehicle through authentication processing. In another embodiment of the application, whether the target vehicle receives the vehicle unlocking instruction sent by the user terminal may be determined according to whether the target vehicle and the user terminal are matched. For example, the previous steps refer to the "result of the authentication process" including the target vehicle matching the user terminal, or the target vehicle user terminal not matching.
Specifically, matching is used to characterize the target vehicle as the user's vehicle. The mismatch is used to characterize the target vehicle as not being the user's vehicle.
In specific implementation, the first identification of the target vehicle is compared with the vehicle type of the user, the second identification of the target vehicle is compared with the vehicle number of the user. If the first identification is the same as the vehicle type of the user and the second identification is the same as the vehicle number of the user, determining that the target vehicle is the vehicle of the user, namely the target vehicle is matched with the user terminal; and if the first identification is different from the vehicle type of the user and the second identification is different from the vehicle number of the user, determining that the target vehicle is not the vehicle of the user, namely the target vehicle is not matched with the user terminal.
In the foregoing embodiments, a technical solution of a result of the authentication processing is introduced. In another embodiment of the application, whether to receive the vehicle unlocking instruction sent by the user terminal may be determined according to whether the target vehicle is matched with the user terminal. For example, the specific implementation of "responding to a vehicle unlock command" referred to in the preceding steps includes the steps of fig. 11:
step 1101, responding to a vehicle unlocking instruction sent by a user terminal when a target vehicle is matched with the user terminal;
specifically, the first identifier matched to characterize the target vehicle is the same type as the user vehicle, or the second identifier of the target vehicle is the same vehicle number as the user vehicle.
Whether to receive a vehicle unlocking instruction sent by a user terminal is described below with an example.
If the first identification of the target vehicle is XA8L "2022 model 30 exclusive type", the second identification of the target vehicle is LFV5A24F8B3014902, the vehicle type of the user vehicle is XA8L "2022 model 30 exclusive type", and the number of the user vehicle is LFV5A24F8B 3014902.
In a specific implementation, the first identifier of the target vehicle is XA8L "2022 model 30 exclusive type" and the vehicle type of the user vehicle is XA8L "2022 model 30 exclusive type", and the second identifier of the target vehicle is LFV5A24F8B3014902 and the number of the user vehicle is LFV5A24F8B 3014902. The first identification of the target vehicle is XA8L '2022 model 30 exclusive type' and the vehicle type of the user vehicle is XA8L '2022 model 30 exclusive type', the second identification of the target vehicle is LFV5A24F8B3014902 and the number of the user vehicle is LFV5A24F8B3014902, which indicates that the vehicle of the user is the target vehicle, and then the vehicle unlocking instruction sent by the user terminal is received.
Step 1102, when the target vehicle is not matched with the user terminal, prohibiting responding to a vehicle unlocking instruction sent by the user terminal.
Specifically, the first identifier used for representing the target vehicle and the vehicle type information of the user terminal are not matched, or the second identifier of the target vehicle and the vehicle number of the user terminal are not matched.
The prohibition of responding to the vehicle unlocking instruction transmitted by the user terminal is described below with reference to an example.
If the first identifier of the target vehicle is XA6 "2022 model 2.4 comfortable type", the second identifier of the target vehicle is VIN code LFV5A24F8B3014901, the vehicle type of the user vehicle is XA8L "2022 model 30 exclusive type", and the number of the user vehicle is LFV5A24F8B 3014902.
In a specific implementation, the first identifier XA6 "2022 model 2.4 comfortable type" of the target vehicle is different from the vehicle type XA8L "2022 model 30 exclusive type" of the user vehicle, and the second identifier VIN code LFV5a24F8B3014901 of the target vehicle is different from the number LFV5a24F8B3014902 of the user vehicle, which indicates that the target vehicle is not the user vehicle, and then the response to the vehicle unlocking instruction sent by the user terminal is prohibited.
In the foregoing embodiments, a technical solution of a result of the authentication processing is introduced. In another embodiment of the present application, whether to unlock the vehicle may be determined by the target vehicle according to a distance between the target vehicle and the user terminal. For example, the preceding steps referred to as "after responding to a vehicle unlock command" include:
and responding to a vehicle unlocking instruction if the target vehicle is matched with the user terminal and the distance between the target vehicle and the user terminal meets the unlocking threshold value.
Specifically, the unlock threshold is used to characterize a maximum distance to unlock the vehicle. Illustratively, the unlock threshold may be, but is not limited to, 2 m.
In one possible implementation, if the distance between the target vehicle and the user terminal is 2m, the vehicle unlocking instruction is responded.
In the foregoing embodiments, a technical solution for determining whether to unlock a vehicle according to whether a distance between a target vehicle and a user terminal satisfies an unlocking threshold is introduced. In another embodiment of the present application, the distance between the target vehicle and the user terminal may be determined based on a reference signal received by the target vehicle. For example, the specific implementation after "responding to the vehicle unlocking command" related to the foregoing embodiments includes:
and receiving a reference signal transmitted by the target vehicle based on the communication connection between the target vehicle and the user terminal, and determining the distance between the target vehicle and the terminal equipment according to the receiving strength of the reference signal.
In particular, the reference signal is used to characterize the distance between the target vehicle and the user terminal. The stronger the intensity of the reference signal is, the closer the distance between the target vehicle and the user terminal is; conversely, the farther the distance between the target vehicle and the user terminal. In a possible implementation, if the intensity value of the reference signal approaches 0 but is not equal to 0, it indicates that the distance between the target vehicle and the user terminal is within 1 m; if the intensity value of the reference signal is equal to 0, it indicates that the distance between the target vehicle and the user terminal is greater than 1 m.
In the foregoing embodiments, a technical solution for determining the distance between a target vehicle and a user terminal according to the strength of a reference signal received by the target vehicle is described. In another embodiment of the application, the method includes that the user terminal performs authentication processing according to the first identifier and the second identifier, whether a vehicle unlocking instruction is sent to the vehicle or not is determined according to the authentication processing result, and then vehicle-mounted equipment of the vehicle judges whether the distance between the target vehicle and the user terminal meets a certain threshold value or not, so that whether the vehicle is unlocked or not is determined. The steps as shown in fig. 12 are specifically implemented:
it should be noted that the vehicle-mounted BLE device is equivalent to the vehicle-mounted device in the foregoing embodiment of the present application, the ibeacon broadcast message is equivalent to the notification message in the foregoing embodiment of the present application, the UUID is equivalent to the vehicle type information in the foregoing embodiment of the present application, and the VIN is equivalent to the vehicle number in the foregoing embodiment of the present application.
S1, the vehicle-mounted BLE (Bluetooth Low Energy) device continuously sends an ibeacon (a micro positioning technology) broadcast packet, where the ibeacon broadcast packet includes a UUID (universal Unique Identifier) and a VIN.
And S2, the mobile phone receives and analyzes the ibeacon broadcast message.
It should be noted that Ranging (Ranging, a monitoring method) may be used to monitor all ibeacon (beacon, which is equivalent to the first Identifier of the notification packet in the foregoing embodiment of the present application) around the ibeacon that conforms to the UUID (Universally Unique Identifier). Part of the execution code for monitoring the ibeacon broadcast message is as follows:
Figure BDA0003619939390000181
Figure BDA0003619939390000191
before receiving the notification message, it needs to detect whether the ue supports the ibeacon function (which is equivalent to receiving the notification message in the foregoing embodiment of the present application), and part of the detected codes are as follows:
-(void)scanBeacon{
// determining whether the device supports monitoring of the specified area.
BOOL availableMonitor=[CLLocationManager isMonitoringAvailableForClass:[CLBeaconRegion class]];
if(availableMonitor){
// returning the status of the application's current authorization
CLAuthorizationStatus authorizationStatus=[CLLocationManager authorizationStatus];
switch(authorizationStatus){
Location service authorization status is that the user has not decided whether to use the location service
case kCLAuthorizationStatusNotDetermined:
{
NSLog (@ "this device can detect the surrounding beacon");
[self.locationManager requestAlwaysAuthorization];
}
break;
the location service authorization status is restricted
case kCLAuthorizationStatusRestricted:
The location service authorization status has been explicitly disabled by the user or turned off in the location service in the setting.
case kCLAuthorizationStatusDenied:
NSLog (@ "restricted or denied");
break;
the location service authorization status has been allowed by the user to obtain location information in any state. Including monitoring areas, visiting areas, or when there is a significant change in location
case kCLAuthorizationStatusAuthorizedAlways:
The location service authorization status is only allowed when the application is in use.
case kCLAuthorizationStatusAuthorizedWhenInUse:
I/authorize System to begin listening to ibeacon beacons
[self startMonitoring];
break;
}
}else{
NSLog (@ "the device does not support clbeacon region detection");
}
v/user saving surrounding searched beacons
self.beaconArray=[[NSMutableArray alloc]init];
}
-(void)startMonitoring{
The authorization system may be used to monitor all iBeacons in a region
[self.locationManager startRangingBeaconsInRegion:self.beaconRegion];
}
S3, judging that the UUID is consistent with the vehicle type information registered and stored when the Bluetooth key APP is logged in for the first time, if not, executing S4, and forbidding starting of the Bluetooth key APP; if yes, S5 is executed, the Bluetooth key APP is started automatically, and a Bluetooth channel between the mobile phone Bluetooth key APP and the vehicle-mounted BLE device is established.
S6, judging whether the VIN is consistent with the vehicle number registered and stored in the mobile phone, if not, executing S7, and forbidding sending of a vehicle unlocking command to the vehicle-mounted BLE equipment; if yes, S8 is executed, and the mobile phone sends a vehicle unlocking instruction to the vehicle-mounted BLE device.
S9, judging whether the distance between the mobile phone and the vehicle-mounted BLE equipment meets an unlocking threshold value or not, if not, executing S10, and prohibiting unlocking of the vehicle by the vehicle-mounted BLE equipment; if yes, S11 is executed, and the vehicle-mounted BLE device unlocks the vehicle.
In the foregoing embodiment, when the user logs in the bluetooth key APP for the first time, identity information needs to be registered and vehicle type information needs to be bound, and a vehicle number of the vehicle when the vehicle leaves a factory is registered in a mobile phone of the user. Later when the user is close to the vehicle, need not do any operation to the cell-phone, the ibeacon broadcast message that on-vehicle BLE equipment sent can be monitored and analyzed to the user's cell-phone, and when the UUID who analyzes and the vehicle type information of registering the saving when logging in bluetooth key APP for the first time are unanimous, cell-phone automatic operation bluetooth key APP establishes the bluetooth passageway between cell-phone bluetooth key APP and the on-vehicle BLE equipment through password pairing. When the analyzed VIN is consistent with the vehicle number registered and stored in the mobile phone, the mobile phone sends a vehicle unlocking instruction to the vehicle-mounted BLE equipment, the vehicle-mounted BLE equipment judges the distance between the vehicle and the mobile phone, and whether the vehicle is unlocked or not is determined according to the distance. The problem that the complex unlocking process and operation of vehicle unlocking can be realized only by the existing vehicle remote unlocking scheme that a user operates a mobile phone, logs in a Bluetooth key APP and triggers a vehicle unlocking function button is solved. Therefore, the vehicle unlocking method can effectively improve the vehicle unlocking efficiency.
It should be noted that the fields of the notification message may be UUID and VIN, or may be Company ID (Company identifier), Data type (Data type), Data length (Data length), Major (Major value), Minor (Minor value), Measured power at 1meter (power Measured at 1 meter).
The field format of the announcement message is as follows: the field format of Company ID (Company identification) may be 2 bits, the field format of Data type may be 1 bit, the field format of Data length may be 1 bit, the field format of Major may be 2 bits, the field format of Minor may be 2 bits, the field format of Measured power at 1meter may be 1 bit.
In one embodiment, as shown in fig. 13, there is provided a vehicle unlocking apparatus applied to a user terminal, including: a receiving unit 1301, an authentication unit 1302, and a sending unit 1303. Wherein:
a receiving unit 1301, configured to receive an announcement message broadcasted by a target vehicle; the notification message comprises a first identification of the target vehicle and a second identification of the target vehicle; the first identification is used for representing the type of the target vehicle, and the second identification is used for representing the number of the target vehicle;
an authentication unit 1302, configured to perform authentication processing on the target vehicle according to the first identifier and the second identifier; the result of the authentication processing is used for representing whether the target vehicle is matched with the user terminal;
and the sending unit 1303 is used for determining whether to send a vehicle unlocking instruction to the target vehicle according to the result of the authentication processing.
In one embodiment, the sending unit 1303 is configured to execute a vehicle unlocking instruction if the target vehicle matches the user terminal; and if not, prohibiting the vehicle unlocking instruction from being executed.
In one embodiment, the authentication unit 1302 is configured to obtain pre-stored vehicle type information and pre-stored vehicle number; the vehicle type information is used for representing the type of a matched vehicle of the user terminal, and the vehicle number is used for representing the number of the matched vehicle of the user terminal; and carrying out authentication processing on the target vehicle according to the first identifier, the second identifier, the vehicle type information and the vehicle number.
In one embodiment, the method includes determining that the target vehicle matches the user terminal as a result of the authentication process if the first identifier is the same as the vehicle type information and the second identifier is the same as the vehicle number; if the first identification is the same as the vehicle type information, but the second identification is different from the vehicle number, determining that the result of the authentication processing is that the target vehicle is not matched with the user terminal; if the first identification is different from the vehicle type information, but the second identification is the same as the vehicle number, determining that the result of the authentication processing is that the target vehicle is not matched with the user terminal; and if the first identification is different from the vehicle type information and the second identification is different from the vehicle number, determining that the result of the authentication processing is that the target vehicle is not matched with the user terminal.
In one embodiment, a bluetooth key application for running a user terminal; and calling a Bluetooth key application program to acquire the vehicle number.
In one embodiment, the method includes presenting a vehicle number configuration item in response to receiving a user registration request for a bluetooth key application; and receiving an operation instruction of the vehicle number configuration item, and determining the vehicle number according to the operation instruction.
In one embodiment, the method is used for setting the monitoring range of the notification message and setting the vehicle type information matched with the monitoring range.
In one embodiment, as shown in fig. 14, there is provided a vehicle unlocking apparatus applied to an in-vehicle device, including: generation section 1401, and transmission section 1402. Wherein:
a generating unit 1401, configured to determine a first identifier of a target vehicle and a second identifier of the target vehicle, and generate an announcement message according to the first identifier and the second identifier; the first identification is used for expressing the type of the target vehicle, and the second identification is used for representing the number of the target vehicle;
a sending unit 1402, configured to send an announcement message; the notification message comprises a first identifier and a second identifier, so that the user terminal receiving the notification message performs authentication processing on the target vehicle according to the first identifier and the second identifier, and the authentication processing result is used for the user terminal to determine whether to send an unlocking instruction to the target vehicle.
In one embodiment, the result of the authentication process includes that the target vehicle matches the user terminal, or that the target vehicle does not match the user terminal.
In one embodiment, the system is used for responding to a vehicle unlocking instruction sent by the user terminal when the target vehicle is matched with the user terminal; and when the target vehicle is not matched with the user terminal, forbidding to respond to the vehicle unlocking instruction sent by the user terminal.
In one embodiment, the method includes responding to the vehicle unlock command if the target vehicle matches the user terminal and the distance between the target vehicle and the user terminal satisfies the unlock threshold.
In one embodiment, the distance determining device is used for receiving a reference signal transmitted by a target vehicle based on a communication connection between the target vehicle and a user terminal, and determining the distance between the target vehicle and the user terminal according to the receiving strength of the reference signal.
For specific limitations of the vehicle unlocking device, reference may be made to the above limitations of the vehicle unlocking method, which are not described herein again. The various modules of the vehicle unlocking device described above may be implemented in whole or in part by software, hardware, and combinations thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory of the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device applied to a user terminal is provided, and includes a memory and a processor, wherein the memory stores a computer program, and the processor implements the following steps when executing the computer program:
receiving an announcement message broadcasted by a target vehicle; the notification message comprises a first identification of the target vehicle and a second identification of the target vehicle; the first identification is used for representing the type of the target vehicle, and the second identification is used for representing the number of the target vehicle;
performing authentication processing on the target vehicle according to the first identifier and the second identifier; the result of the authentication processing is used for representing whether the target vehicle is matched with the user terminal;
and determining whether to send a vehicle unlocking instruction to the target vehicle according to the authentication processing result.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
if the target vehicle is matched with the user terminal, executing a vehicle unlocking instruction;
and if not, prohibiting the vehicle unlocking instruction from being executed.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
acquiring pre-stored vehicle type information and pre-stored vehicle numbers; the vehicle type information is used for representing the type of a matched vehicle of the user terminal, and the vehicle number is used for representing the number of the matched vehicle of the user terminal;
and carrying out authentication processing on the target vehicle according to the first identifier, the second identifier, the vehicle type information and the vehicle number.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
if the first identification is the same as the vehicle type information and the second identification is the same as the vehicle number, determining that the result of the authentication processing is that the target vehicle is matched with the user terminal;
if the first identification is the same as the vehicle type information, but the second identification is different from the vehicle number, determining that the result of the authentication processing is that the target vehicle is not matched with the user terminal;
if the first identification is different from the vehicle type information, but the second identification is the same as the vehicle number, determining that the result of the authentication processing is that the target vehicle is not matched with the user terminal;
and if the first identification is different from the vehicle type information and the second identification is the same as the vehicle number, determining that the result of the authentication processing is that the target vehicle is not matched with the user terminal.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
operating a Bluetooth key application program of the user terminal;
and calling a Bluetooth key application program to acquire the vehicle number.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
presenting a vehicle number configuration item in response to receiving a user registration request of a bluetooth key application;
and receiving an operation instruction of the vehicle number configuration item, and determining the vehicle number according to the operation instruction.
In one embodiment, the processor when executing the computer program further performs the steps of:
setting a monitoring range of the notification message, and setting vehicle type information matched with the monitoring range.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware related to instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
In one embodiment, a computer device is provided for a target vehicle, comprising a memory having a computer program stored therein and a processor that when executed implements the steps of:
sending an announcement message; the notification message comprises a first identification of the target vehicle and a second identification of the target vehicle, so that the user terminal receiving the notification message performs authentication processing on the target vehicle according to the first identification and the second identification, and the result of the authentication processing is used for the user terminal to determine whether to send a vehicle unlocking instruction to the target vehicle; the first identification is used for representing the type of the target vehicle, and the second identification is used for representing the number of the target vehicle.
In one embodiment, the processor when executing the computer program further performs the steps of:
the result of the authentication process includes that the target vehicle matches the user terminal, or that the target vehicle does not match the user terminal.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
when the target vehicle is matched with the user terminal, responding to a vehicle unlocking instruction sent by the user terminal;
and when the target vehicle is not matched with the user terminal, prohibiting responding to a vehicle unlocking instruction sent by the user terminal.
In one embodiment, the processor when executing the computer program further performs the steps of:
and responding to a vehicle unlocking instruction if the target vehicle is matched with the user terminal and the distance between the target vehicle and the user terminal meets the unlocking threshold value.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
and receiving the reference signal transmitted by the target vehicle based on the communication connection between the target vehicle and the user terminal, and determining the distance between the target vehicle and the terminal equipment according to the receiving strength of the reference signal.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware related to instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
Embodiments of the present application provide a computer program product comprising instructions that, when executed, cause a method as described in embodiments of the present application to be performed. For example, the steps of the picture recognition method shown in fig. 2 may be performed.
Embodiments of the present application provide a computer program product comprising instructions that, when executed, cause a method as described in embodiments of the present application to be performed. For example, the steps of the picture recognition method shown in fig. 8 may be performed.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above examples only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (17)

1. A vehicle unlocking method is applied to a user terminal, and is characterized by comprising the following steps:
receiving an announcement message broadcasted by a target vehicle; the notification message comprises a first identification of the target vehicle and a second identification of the target vehicle; the first identification is used for representing the type of the target vehicle, and the second identification is used for representing the number of the target vehicle;
carrying out authentication processing on the target vehicle according to the first identification and the second identification; the result of the authentication processing is used for representing whether the target vehicle is matched with the user terminal;
and determining whether to send a vehicle unlocking instruction to the target vehicle according to the authentication processing result.
2. The method of claim 1, wherein the determining whether to send a vehicle unlock command to the target vehicle based on the result of the authentication process comprises:
if the target vehicle is matched with the user terminal, executing a vehicle unlocking instruction;
and if not, prohibiting the vehicle unlocking instruction from being executed.
3. The method of claim 1, wherein the authenticating the target vehicle based on the first identifier and the second identifier comprises:
acquiring pre-stored vehicle type information and a pre-stored vehicle number; the vehicle type information is used for representing the type of a matched vehicle of the user terminal, and the vehicle number is used for representing the number of the matched vehicle of the user terminal;
and carrying out authentication processing on the target vehicle according to the first identifier, the second identifier, the vehicle type information and the vehicle number.
4. The method of claim 3, wherein the authenticating the target vehicle based on the first identifier, the second identifier, the vehicle type information, and the vehicle number comprises:
if the first identifier is the same as the vehicle type information and the second identifier is the same as the vehicle number, determining that the result of the authentication processing is that the target vehicle is matched with the user terminal;
if the first identifier is the same as the vehicle type information, but the second identifier is different from the vehicle number, determining that the result of the authentication processing is that the target vehicle is not matched with the user terminal;
if the first identifier is different from the vehicle type information, but the second identifier is the same as the vehicle number, determining that the result of the authentication processing is that the target vehicle is not matched with the user terminal;
and if the first identification is different from the vehicle type information and the second identification is different from the vehicle number, determining that the result of the authentication processing is that the target vehicle is not matched with the user terminal.
5. The method of claim 3, wherein said obtaining a pre-stored vehicle number comprises:
running a Bluetooth key application program of the user terminal;
and calling the Bluetooth key application program to acquire the vehicle number.
6. The method of claim 5, wherein the running the Bluetooth Key application of the terminal comprises:
presenting a vehicle number configuration item in response to receiving a user registration request of the bluetooth key application;
and receiving an operation instruction of the vehicle number configuration item, and determining the vehicle number according to the operation instruction.
7. The method of claim 3, wherein said obtaining pre-stored vehicle type information comprises:
and setting a monitoring range of the notification message, and setting the vehicle type information matched with the monitoring range.
8. A vehicle unlocking method is applied to a target vehicle, and is characterized by comprising the following steps:
determining a first identification of a target vehicle and a second identification of the target vehicle, and generating an announcement message according to the first identification and the second identification; wherein the first identifier is used for expressing the type of the target vehicle, and the second identifier is used for characterizing the number of the target vehicle;
sending the notification message; the notification message comprises the first identifier and the second identifier, so that a user terminal receiving the notification message performs authentication processing on the target vehicle according to the first identifier and the second identifier, and the result of the authentication processing is used for the user terminal to determine whether to send a vehicle unlocking instruction to the target vehicle.
9. The method of claim 8, wherein the result of the authentication process comprises the target vehicle matching the user terminal or the target vehicle not matching the user terminal.
10. The method of claim 9, further comprising:
responding to the vehicle unlocking instruction when the target vehicle is matched with the user terminal;
and when the target vehicle is not matched with the user terminal, forbidding to respond to the vehicle unlocking instruction.
11. The method of claim 10, wherein responding to the vehicle unlock instruction when the target vehicle is matched with the user terminal comprises:
and responding to the vehicle unlocking instruction if the target vehicle is matched with the user terminal and the distance between the target vehicle and the user terminal meets an unlocking threshold value.
12. The method of claim 11, further comprising:
and receiving a reference signal sent by the target vehicle based on the communication connection between the target vehicle and the user terminal, and determining the distance between the target vehicle and the user terminal according to the receiving strength of the reference signal.
13. A vehicle unlocking device, characterized in that the device comprises:
the receiving unit is used for receiving the notification message broadcasted by the target vehicle; the notification message comprises a first identification of a target vehicle and a second identification of the target vehicle; the first identification is used for representing the type of the target vehicle, and the second identification is used for representing the number of the target vehicle;
the authentication unit is used for performing authentication processing on the target vehicle according to the first identifier and the second identifier; the result of the authentication processing is used for representing whether the target vehicle is matched with the user terminal;
and the sending unit is used for determining whether to send a vehicle unlocking instruction to the target vehicle according to the authentication processing result.
14. A vehicle unlocking device, characterized in that the device comprises:
the generating unit is used for determining a first identifier of a target vehicle and a second identifier of the target vehicle and generating an announcement message according to the first identifier and the second identifier; wherein the first identifier is used for characterizing the type of the target vehicle, and the second identifier is used for characterizing the number of the target vehicle;
a sending unit, configured to send the notification packet; the notification message comprises the first identifier and the second identifier, so that the user terminal receiving the notification message performs authentication processing on the target vehicle according to the first identifier and the second identifier, and the result of the authentication processing is used for the user terminal to determine whether to send an unlocking instruction to the target vehicle.
15. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor, when executing the program, implements the vehicle unlocking method according to any one of claims 1 to 12.
16. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out a method for unlocking a vehicle according to any one of claims 1 to 12.
17. A computer program product, characterized in that it comprises instructions which, when executed, cause the method according to any of claims 1 to 12 to be performed.
CN202210462227.2A 2022-04-27 2022-04-27 Vehicle unlocking method, device, equipment and medium Pending CN114898483A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210462227.2A CN114898483A (en) 2022-04-27 2022-04-27 Vehicle unlocking method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210462227.2A CN114898483A (en) 2022-04-27 2022-04-27 Vehicle unlocking method, device, equipment and medium

Publications (1)

Publication Number Publication Date
CN114898483A true CN114898483A (en) 2022-08-12

Family

ID=82718609

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210462227.2A Pending CN114898483A (en) 2022-04-27 2022-04-27 Vehicle unlocking method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN114898483A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106127890A (en) * 2016-06-17 2016-11-16 北京千丁互联科技有限公司 Control of bluetooth access equipment, Bluetooth terminal, control of bluetooth access management system and method
CN107403492A (en) * 2017-07-24 2017-11-28 众海汇智(长沙)智能制造有限责任公司深圳分公司 Unlocking terminal, shared bicycle, intelligent bicycle lock and its controller
CN107888559A (en) * 2016-09-30 2018-04-06 大众汽车有限公司 Method for the Access Management Access of vehicle
CN110009771A (en) * 2017-12-28 2019-07-12 丰田自动车株式会社 Information processing system, information processing unit, the information processing method of information processing system, recording medium and car portion shared system
CN110363894A (en) * 2019-07-17 2019-10-22 上海银基信息安全技术股份有限公司 A kind of number key awakening method, wakeup unit and a kind of permission terminal
CN111314400A (en) * 2018-12-11 2020-06-19 中兴通讯股份有限公司 Vehicle data processing method and device, computer equipment and storage medium
CN111951438A (en) * 2020-08-14 2020-11-17 北京骑胜科技有限公司 Vehicle unlocking method, device, equipment, vehicle and server
CN111970646A (en) * 2020-07-08 2020-11-20 深圳市昇润科技有限公司 Intelligent Bluetooth operation switch method and system based on beacon broadcast
CN112562135A (en) * 2020-12-07 2021-03-26 中国第一汽车股份有限公司 Vehicle control method and device, vehicle and storage medium
CN112995948A (en) * 2021-02-03 2021-06-18 北京小米移动软件有限公司 Vehicle function control method, vehicle function control device, and storage medium
CN113066202A (en) * 2019-12-13 2021-07-02 纳恩博(北京)科技有限公司 Vehicle unlocking method and device

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106127890A (en) * 2016-06-17 2016-11-16 北京千丁互联科技有限公司 Control of bluetooth access equipment, Bluetooth terminal, control of bluetooth access management system and method
CN107888559A (en) * 2016-09-30 2018-04-06 大众汽车有限公司 Method for the Access Management Access of vehicle
CN107403492A (en) * 2017-07-24 2017-11-28 众海汇智(长沙)智能制造有限责任公司深圳分公司 Unlocking terminal, shared bicycle, intelligent bicycle lock and its controller
CN110009771A (en) * 2017-12-28 2019-07-12 丰田自动车株式会社 Information processing system, information processing unit, the information processing method of information processing system, recording medium and car portion shared system
CN111314400A (en) * 2018-12-11 2020-06-19 中兴通讯股份有限公司 Vehicle data processing method and device, computer equipment and storage medium
CN110363894A (en) * 2019-07-17 2019-10-22 上海银基信息安全技术股份有限公司 A kind of number key awakening method, wakeup unit and a kind of permission terminal
CN113066202A (en) * 2019-12-13 2021-07-02 纳恩博(北京)科技有限公司 Vehicle unlocking method and device
CN111970646A (en) * 2020-07-08 2020-11-20 深圳市昇润科技有限公司 Intelligent Bluetooth operation switch method and system based on beacon broadcast
CN111951438A (en) * 2020-08-14 2020-11-17 北京骑胜科技有限公司 Vehicle unlocking method, device, equipment, vehicle and server
CN112562135A (en) * 2020-12-07 2021-03-26 中国第一汽车股份有限公司 Vehicle control method and device, vehicle and storage medium
CN112995948A (en) * 2021-02-03 2021-06-18 北京小米移动软件有限公司 Vehicle function control method, vehicle function control device, and storage medium

Similar Documents

Publication Publication Date Title
US11038879B2 (en) Identity authentication method and apparatus, and user equipment
CN109920114B (en) Door lock control method and system based on geographic position
JP5247124B2 (en) Authentication device, in-vehicle device, and authentication system
AU2018307212A1 (en) Remote access authentication and authorization
US20120075062A1 (en) Method and system for access to secure resources
CN105427416A (en) Two-dimension code unlocking method and system
CN104537291A (en) Screen interface unlocking method and screen interface unlocking device
US20190276273A1 (en) Elevator service request and offline authentication of the elevator service request
CN113038451B (en) Machine-card binding method and device, communication module and storage medium
CN106154997B (en) Vehicle-mounted control device, terminal device, and vehicle control program updating method and system
CN109872440B (en) Mobile face recognition intelligent lock control system and method
CN110086799B (en) Identity verification method and device
CN106550383B (en) Network connection method and intelligent device
CN113487779A (en) Access control method, access terminal and storage medium
CN108377500B (en) Wifi network connection method, device and equipment
WO2017181846A1 (en) Vehicle monitoring method, device and storage medium
KR101763140B1 (en) Authentification Method by User Terminal Connecting Access Controller, Software therefor, and Program Distributing Server Storing the Software
CN112419543A (en) Unlocking method, mobile terminal, intelligent door lock, unlocking system and storage medium
CN110264602B (en) Unlocking system and method, terminal equipment and door lock server
CN114898483A (en) Vehicle unlocking method, device, equipment and medium
CN113232624B (en) Vehicle control method and device, electronic controller and vehicle
JP2004293148A (en) Locking system and its unlocking method
CN112734993B (en) Communication system and method for anti-theft lock
CN111354109B (en) Security anti-theft monitoring system and method based on big data
CN110843728B (en) Automobile keyless starting method, automobile keyless starting equipment, storage medium and automobile keyless starting device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination