CN115150823A - Intelligent key authentication method and system and vehicle - Google Patents

Intelligent key authentication method and system and vehicle Download PDF

Info

Publication number
CN115150823A
CN115150823A CN202210772768.5A CN202210772768A CN115150823A CN 115150823 A CN115150823 A CN 115150823A CN 202210772768 A CN202210772768 A CN 202210772768A CN 115150823 A CN115150823 A CN 115150823A
Authority
CN
China
Prior art keywords
identification information
authentication
intelligent key
lifting mechanism
vehicle
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210772768.5A
Other languages
Chinese (zh)
Inventor
程硕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Great Wall Motor Co Ltd
Original Assignee
Great Wall Motor Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Great Wall Motor Co Ltd filed Critical Great Wall Motor Co Ltd
Priority to CN202210772768.5A priority Critical patent/CN115150823A/en
Publication of CN115150823A publication Critical patent/CN115150823A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The application provides an intelligent key authentication method, an intelligent key authentication system and a vehicle. The method comprises the following steps: when the intelligent key is connected with a lifting mechanism on the vehicle, the identification information of the intelligent key is sent to the lifting mechanism; if the identification information of the intelligent key is received for the first time in a first preset period, the lifting mechanism generates a first authentication request based on the identification information of the vehicle and the identification information of the intelligent key and sends the first authentication request to the TSP; the TSP carries out authentication based on the first authentication request, and if the authentication is successful, first authentication success information is sent to the lifting mechanism; if the identification information of the intelligent key is not received for the first time in the first preset period, the lifting mechanism compares the currently received identification information of the intelligent key with the identification information of the intelligent key stored by the lifting mechanism, and if the information is consistent, the authentication is determined to be successful. The communication authentication between intelligent key and elevating system can be realized to this application to can communicate between intelligent key and the elevating system, realize some linkage functions.

Description

Intelligent key authentication method and system and vehicle
Technical Field
The application relates to the technical field of intelligent keys, in particular to an intelligent key authentication method, an intelligent key authentication system and a vehicle.
Background
The traditional vehicle key authentication generally means that the key is matched with the vehicle, when a key end and a vehicle end communicate through high and low frequencies, the vehicle end verifies the validity of the key, and if the key is legal, the key can realize the functions of unlocking, locking and the like of the vehicle.
However, with the development of the state of the art, the vehicle key has an interlocking function realized after communicating with the vehicle-related device in addition to a basic unlocking function, and the vehicle key first needs to be authenticated by communication before communicating with the vehicle-related device, so that the vehicle-related device verifies the validity of the vehicle key. However, the conventional vehicle key authentication method cannot achieve communication authentication between devices related to the vehicle, and the prior art lacks a communication authentication method between a vehicle key and a device related to the vehicle.
Disclosure of Invention
The embodiment of the application provides an intelligent key authentication method, an intelligent key authentication system and a vehicle, and aims to solve the problem that a communication authentication method between a vehicle key and vehicle-related equipment is lacked in the prior art.
In a first aspect, an embodiment of the present application provides a smart key authentication method, including:
when the intelligent key is connected with a lifting mechanism on the vehicle, the intelligent key sends identification information of the intelligent key to the lifting mechanism;
if the lifting mechanism receives the identification information of the intelligent key for the first time in a first preset period, the lifting mechanism acquires the identification information of the vehicle, generates a first authentication request based on the identification information of the vehicle and the identification information of the intelligent key, and sends the first authentication request to the TSP; the TSP carries out authentication based on the first authentication request, and if the authentication is successful, first authentication success information is sent to the lifting mechanism;
if the lifting mechanism does not receive the identification information of the intelligent key for the first time in the first preset period, the lifting mechanism compares the currently received identification information of the intelligent key with the identification information of the intelligent key stored by the lifting mechanism, and if the currently received identification information of the intelligent key is consistent with the identification information of the intelligent key stored by the lifting mechanism, the communication authentication between the intelligent key and the lifting mechanism is determined to be successful.
In one possible implementation manner, if the lifting mechanism receives the identification information of the smart key for the first time within a first preset period, the smart key authentication method further includes:
and after receiving the first authentication success information, the lifting mechanism stores the identification information of the intelligent key which is successfully authenticated at this time.
In one possible implementation manner, the authenticating, by the TSP, based on the first authentication request, and if the authenticating is successful, sending first authentication success information to the elevator mechanism, including:
and the TSP checks the first authentication request with the pre-stored verification information, if the first authentication request is in accordance with the pre-stored verification information, the TSP determines that the communication authentication between the intelligent key and the lifting mechanism is successful, and sends first authentication success information to the lifting mechanism.
In one possible implementation manner, the pre-stored verification information includes pre-stored identification information of the smart key and pre-stored identification information of the vehicle;
the TSP checks the first authentication request and prestored verification information, and if the first authentication request is consistent with the prestored verification information, the TSP determines that the communication authentication between the intelligent key and the lifting mechanism is successful, and the method comprises the following steps:
and the TSP analyzes the first authentication request to obtain the identification information of the intelligent key carried by the first authentication request and the identification information of the vehicle carried by the first authentication request, and if the identification information of the intelligent key carried by the first authentication request is consistent with the pre-stored identification information of the intelligent key and the identification information of the vehicle carried by the first authentication request is consistent with the pre-stored identification information of the vehicle, the communication authentication between the intelligent key and the lifting mechanism is determined to be successful.
In one possible implementation, sending the first authentication request to the TSP includes:
the lifting mechanism sends the first authentication request to a T-BOX of the vehicle;
the T-BOX sends the first authentication request to the TSP.
In one possible implementation, the identification information of the fob includes a MAC of the fob; the identification information of the vehicle includes the VIN of the vehicle.
In one possible implementation manner, the smart key authentication method further includes:
after the intelligent key is connected with the vehicle control mobile terminal, the intelligent key sends identification information of the intelligent key to the vehicle control mobile terminal;
if the vehicle control mobile terminal receives the identification information of the intelligent key for the first time in a second preset period, the vehicle control mobile terminal acquires the identification information of the vehicle bound by the vehicle control mobile terminal, generates a second authentication request based on the identification information of the vehicle bound by the vehicle control mobile terminal and the received identification information of the intelligent key, and sends the second authentication request to the TSP; the TSP carries out authentication based on the second authentication request, and if the authentication is successful, second authentication success information is sent to the vehicle control mobile terminal;
if the vehicle control mobile terminal does not receive the identification information of the intelligent key for the first time in the second preset period, the vehicle control mobile terminal compares the currently received identification information of the intelligent key with the identification information of the intelligent key stored by the vehicle control mobile terminal, and if the currently received identification information of the intelligent key is consistent with the identification information of the intelligent key stored by the vehicle control mobile terminal, the vehicle control mobile terminal determines that the communication authentication between the intelligent key and the vehicle control mobile terminal is successful.
In a second aspect, an embodiment of the present application provides a smart key authentication system, including: a smart key and a lifting mechanism;
the intelligent key is used for sending identification information of the intelligent key to a lifting mechanism after being connected with the lifting mechanism on the vehicle;
the lifting mechanism is used for acquiring the identification information of the vehicle if the identification information of the intelligent key is received for the first time in a first preset period, generating a first authentication request based on the identification information of the vehicle and the identification information of the intelligent key, and sending the first authentication request to the TSP; if the identification information of the intelligent key is not received for the first time in a first preset period, comparing the currently received identification information of the intelligent key with the identification information of the intelligent key stored by the intelligent key, and if the currently received identification information of the intelligent key is consistent with the identification information of the intelligent key stored by the intelligent key, determining that the communication authentication between the intelligent key and the lifting mechanism is successful;
the first authentication request is used for indicating the TSP to perform authentication based on the first authentication request, and if the authentication is successful, first authentication success information is sent to the lifting mechanism.
In one possible implementation manner, the smart key authentication system further includes: T-BOX;
the lifting mechanism sends the first authentication request to the TSP through the T-BOX;
and the TSP sends the first authentication success information to the lifting mechanism through the T-BOX.
In a third aspect, embodiments of the present application provide a vehicle, including the smart key authentication system according to the second aspect or any possible implementation manner of the second aspect.
The embodiment of the application provides an intelligent key authentication method, an intelligent key authentication system and a vehicle, wherein after an intelligent key is connected with a lifting mechanism on the vehicle, the intelligent key sends identification information of the intelligent key to the lifting mechanism, the lifting mechanism performs communication authentication in different modes according to whether the identification information of the intelligent key is received for the first time in a first preset period, if the identification information of the intelligent key is received for the first time in the first preset period, a first authentication request is generated and sent to a TSP (short message service) for authentication through the TSP, and if the identification information of the intelligent key is not received for the first time in the first preset period, the received identification information of the intelligent key is compared with locally stored identification information of the intelligent key to achieve the purpose of authentication, so that the communication authentication between the intelligent key and the lifting mechanism in the vehicle can be realized, the communication between the intelligent key and the lifting mechanism can be facilitated, and some linkage functions can be realized.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a flowchart illustrating an implementation of a smart key authentication method according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a smart key authentication system according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a smart key authentication system according to another embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
To make the objects, technical solutions and advantages of the present application more clear, the following description is made by way of specific embodiments with reference to the accompanying drawings.
The application scenario of the intelligent key authentication method provided by the embodiment of the application includes that the intelligent key and a lifting mechanism arranged in a vehicle. The lifting mechanism is used for placing the intelligent key and interacts with the intelligent key after the intelligent key is successfully authenticated. Intelligent key and elevating system can be fixed through magnetism the mode of inhaling, under the fixed state, intelligent key and elevating system are mutual through 4 metal contact structures, wherein two metal contacts are used for elevating system to charge for intelligent key, two other metal contacts are used for data communication between intelligent key and the elevating system, communication mode can adopt UART (Universal Asynchronous Receiver/Transmitter, general Asynchronous Receiver/Transmitter) serial port communication, communication content includes equipment authentication, vehicle condition data, key accuse car instruction etc..
The lifting mechanism can be arranged around a Head Unit System (HUT) in the vehicle or between two air conditioning ports in the middle of the center console. When the intelligent key is not placed, the lifting mechanism is in a lifting state, and the surface of the lifting mechanism is flush with the inner decoration of the whole vehicle. After placing intelligent key and the two completion communication authentication, elevating system drives the automatic decline of vehicle key, descends to the right place after, intelligent key surface and whole car interior trim parallel and level.
Referring to fig. 1, it shows a flowchart of an implementation of the smart key authentication method provided in the embodiment of the present application, and the method is detailed as follows:
in S101, when the smart key is connected to the elevating mechanism on the vehicle, the smart key transmits its own identification information to the elevating mechanism.
After the intelligent key is connected with the lifting mechanism on the vehicle, the intelligent key and the lifting mechanism need to be communicated for legality authentication, and at the moment, the intelligent key sends identification information of the intelligent key to the lifting mechanism. The identification information of the smart key can distinguish the smart key from other keys or other devices, and the smart key can be uniquely identified through the identification information.
In S102, if the lifting mechanism receives the identification information of the smart key for the first time within a first preset period, the lifting mechanism acquires the identification information of the vehicle, generating a first authentication request based on the identification information of the vehicle and the identification information of the smart key, and sending the first authentication request to a TSP (Telematics Service Provider); and the TSP carries out authentication based on the first authentication request, and if the authentication is successful, first authentication success information is sent to the lifting mechanism.
The duration of the first preset period may be set according to actual requirements, and may be, for example, one day, five days, ten days, one month, and the like, which is not limited herein.
The purpose of setting the first preset period is to: in a first preset period, if the intelligent key and the lifting mechanism are authenticated for the first time, authentication needs to be carried out through the TSP, and after the authentication for the first time is successful, the lifting mechanism can store identification information of the intelligent key, so that in the first preset period, when the intelligent key and the lifting mechanism are authenticated again, the authentication can be completed through the identification information of the intelligent key stored locally in the lifting mechanism, and the operation is convenient and fast. In order to enhance the safety of the vehicle system, when the next first preset period starts, the smart key and the lifting mechanism still need to be authenticated through the TSP when the smart key and the lifting mechanism are authenticated for the first time. The TSP can be a background system of the Internet of vehicles and is the core of the Internet of vehicles.
If the lifting mechanism receives the identification information of the intelligent key for the first time in the first preset period, the lifting mechanism can acquire the identification information of the vehicle through the gateway after receiving the identification information sent by the intelligent key, and generate a first authentication request according to the received identification information of the intelligent key and the acquired identification information of the vehicle. The first authentication request carries identification information of the smart key and identification information of the vehicle. The identification information of the vehicle can distinguish the vehicle from other vehicles and the like, and the vehicle can be uniquely identified through the identification information.
After generating the first authentication request, the lifting mechanism sends the first authentication request to the TSP, so that the TSP can perform authentication based on the first authentication request, if the authentication is successful, first authentication success information is generated, and the first authentication success information is sent to the lifting mechanism to prompt the lifting mechanism that the communication authentication between the lifting mechanism and the intelligent key is successful; if the authentication fails, first authentication failure information is generated and sent to the lifting mechanism to prompt the lifting mechanism that the communication authentication between the lifting mechanism and the intelligent key fails.
In S103, if the lifting mechanism does not receive the identification information of the smart key for the first time within the first preset period, the lifting mechanism compares the currently received identification information of the smart key with the identification information of the smart key stored therein, and if the currently received identification information of the smart key is consistent with the identification information of the smart key stored therein, it is determined that the communication authentication between the smart key and the lifting mechanism is successful.
In this embodiment, in a first preset period, if the lifting mechanism does not receive the identification information of the smart key for the first time, the lifting mechanism may compare the identification information sent by the smart key with the identification information of the smart key stored locally, if the identification information sent by the smart key is consistent with the identification information of the smart key, the authentication is successful, and if the identification information sent by the lifting mechanism is inconsistent with the identification information of the smart key, the authentication is failed.
Since the same vehicle may be bound with a plurality of smart keys, the number of pieces of identification information of the smart keys stored in the elevating mechanism may be plural. When the lifting mechanism compares the currently received identification information of the intelligent key with the identification information of the intelligent key stored by the lifting mechanism, if the currently received identification information of the intelligent key is consistent with one of the identification information of all the intelligent keys stored by the lifting mechanism, the authentication is successful, and if the currently received identification information of the intelligent key is inconsistent with the identification information of all the intelligent keys stored by the lifting mechanism, the authentication is failed.
In the embodiment, in a first preset period, after the first authentication between the intelligent key and the lifting mechanism is successful, when the authentication is performed again, the local authentication is directly performed through the lifting mechanism without performing the authentication through the remote TSP, so that the authentication speed can be increased; and every time the first preset period is passed, when the intelligent key and the lifting mechanism are authenticated, remote authentication needs to be carried out through the TSP, and the safety of the vehicle system can be improved.
After the communication authentication between the intelligent key and the lifting mechanism is successful, the intelligent key and the lifting mechanism can be communicated with each other to realize some linkage functions. For example, after the communication authentication between the intelligent key and the lifting mechanism is successful, the lifting mechanism can be controlled to descend, so that the lifting mechanism performs descending operation, and after the intelligent key and the lifting mechanism descend in place, the surface of the vehicle key is flush with the interior trim, so that the vehicle key is prevented from being mistakenly touched, and the reliable connection between the vehicle key and the lifting mechanism is ensured. After the communication authentication between the intelligent key and the lifting mechanism is successful, the screen of the vehicle can be linked through the lifting mechanism, so that the display screen of the intelligent key and the screen of the vehicle play linked animation, and the technological sense and the attractiveness are increased.
In the embodiment, after the smart key is connected with the lifting mechanism on the vehicle, the smart key sends identification information of the smart key to the lifting mechanism, the lifting mechanism receives the identification information of the smart key for the first time in a first preset period according to whether the identification information of the smart key is received by the lifting mechanism for the first time, communication authentication is performed in different modes, if the identification information of the smart key is received by the lifting mechanism for the first time in the first preset period, a first authentication request is generated and sent to the TSP, authentication is performed through the TSP, if the identification information of the smart key is not received by the lifting mechanism for the first time in the first preset period, the received identification information of the smart key is compared with the locally stored identification information of the smart key, so that the purpose of authentication can be achieved, communication authentication between the smart key and the lifting mechanism in the vehicle can be achieved, communication between the smart key and the lifting mechanism can be facilitated, and some linkage functions can be achieved.
In some embodiments, the S102 may further include:
if the lifting mechanism receives the identification information of the intelligent key for the first time in the first preset period, the lifting mechanism stores the identification information of the intelligent key which is successfully authenticated this time after receiving the first authentication success information.
After receiving the first authentication success information, the lifting mechanism confirms that the first authentication with the intelligent key is successful in a first preset period, stores the identification information of the intelligent key, and can also send the authentication success information to the intelligent key so that the intelligent key can display the authentication success information on a display screen of the intelligent key to prompt a user.
After receiving the first authentication failure information, the lifting mechanism confirms that the communication authentication between the lifting mechanism and the intelligent key fails, and sends the authentication failure information to the intelligent key, so that the intelligent key displays the authentication failure information on a display screen of the intelligent key to prompt a user.
In the embodiment, after the lifting mechanism is successfully communicated with the intelligent key for the first time in the first preset period, the identification information of the intelligent key successfully authenticated at this time is stored, so that when the lifting mechanism is communicated with the intelligent key again for authentication in the first preset period, authentication can be performed according to the locally stored information, and the authentication speed can be increased.
In some embodiments, the "TSP performs authentication based on the first authentication request in S102, and if the authentication is successful, sends the first authentication success information to the elevator mechanism", and may include:
and the TSP checks the first authentication request with the pre-stored verification information, if the first authentication request is in accordance with the pre-stored verification information, the TSP determines that the communication authentication between the intelligent key and the lifting mechanism is successful, and sends first authentication success information to the lifting mechanism.
The authentication information pre-stored in the TSP may include identification information of the vehicle and identification information of the smart key, which are bound to each other. The pre-stored verification information can be that when the vehicle is produced, in the matching process of the vehicle and the intelligent key, the production line data reading equipment binds the identification information of the vehicle and the identification information of the intelligent key and uploads the binding information to the production system server. And the production system server sends the identification information of the bound vehicle and the identification information of the intelligent key to the TSP. The TSP stores the received identification information of the bound vehicle and the identification information of the smart key as the pre-stored authentication information.
And when the first authentication request is verified to be consistent with the prestored verification information, the TSP generates first authentication success information and sends the first authentication success information to the lifting mechanism so as to prompt the lifting mechanism that the communication authentication between the lifting mechanism and the intelligent key is successful. And when the first authentication request is inconsistent with the pre-stored verification information in verification, the TSP generates first authentication failure information and sends the first authentication failure information to the lifting mechanism so as to prompt the lifting mechanism that the communication authentication between the lifting mechanism and the intelligent key fails.
In some embodiments of the present invention, the, the pre-stored verification information comprises pre-stored identification information of the intelligent key and pre-stored identification information of the vehicle;
the TSP checks the first authentication request and prestored verification information, and if the first authentication request is consistent with the prestored verification information, the TSP determines that the communication authentication between the intelligent key and the lifting mechanism is successful, and the method comprises the following steps:
and the TSP analyzes the first authentication request to obtain the identification information of the intelligent key carried by the first authentication request and the identification information of the vehicle carried by the first authentication request, and if the identification information of the intelligent key carried by the first authentication request is consistent with the pre-stored identification information of the intelligent key and the identification information of the vehicle carried by the first authentication request is consistent with the pre-stored identification information of the vehicle, the communication authentication between the intelligent key and the lifting mechanism is determined to be successful.
The pre-stored identification information of the intelligent key and the pre-stored identification information of the vehicle are in a binding relationship.
In this embodiment, the TSP may determine that the communication authentication between the smart key and the lifting mechanism is successful when the identification information of the smart key carried in the first authentication request is consistent with the identification information of the pre-stored smart key, and the identification information of the vehicle carried in the first authentication request is consistent with the identification information of the pre-stored vehicle; and when the identification information of the intelligent key carried by the first authentication request is inconsistent with the pre-stored identification information of the intelligent key, or the identification information of the vehicle carried by the first authentication request is inconsistent with the pre-stored identification information of the vehicle, determining that the communication authentication between the intelligent key and the lifting mechanism fails.
Since the identification information of the same vehicle may be bound to the identification information of a plurality of smart keys, the identification information of the smart key carried by the first authentication request is consistent with the identification information of the pre-stored smart key, and the method may include: the identification information of the smart key carried by the first authentication request is consistent with one of the prestored identification information of all the smart keys bound with the identification information of the vehicle. The inconsistency between the identification information of the smart key carried in the first authentication request and the identification information of the pre-stored smart key may include: the identification information of the intelligent key carried by the first authentication request is inconsistent with the pre-stored identification information of all intelligent keys bound with the identification information of the vehicle.
In some embodiments, sending the first authentication request to the TSP includes:
the lifting mechanism sends the first authentication request to a T-BOX (telematics BOX) of the vehicle;
the T-BOX sends the first authentication request to the TSP.
The T-BOX is used as a vehicle communication module and can be used as a communication tool between the lifting mechanism and the TSP for forwarding communication data between the lifting mechanism and the TSP.
In some embodiments, the identification information of the key fob includes a Media Access Control Address (MAC) of the key fob; the Identification information of the Vehicle includes a Vehicle Identification Number (VIN) of the Vehicle.
The MAC of the smart key is unique and fixed, so that the MAC can be used as identification information of the smart key. Since the VIN of the vehicle is unique and fixed, it can be used as the identification information of the vehicle.
In some embodiments, the smart key authentication method further comprises:
after the intelligent key is connected with the vehicle control mobile terminal, the intelligent key sends identification information of the intelligent key to the vehicle control mobile terminal;
if the vehicle control mobile terminal receives the identification information of the intelligent key for the first time in a second preset period, the vehicle control mobile terminal acquires the identification information of the vehicle bound by the vehicle control mobile terminal, generates a second authentication request based on the identification information of the vehicle bound by the vehicle control mobile terminal and the received identification information of the intelligent key, and sends the second authentication request to the TSP; the TSP carries out authentication based on the second authentication request, and if the authentication is successful, second authentication success information is sent to the vehicle control mobile terminal;
if the vehicle control mobile terminal does not receive the identification information of the intelligent key for the first time in the second preset period, the vehicle control mobile terminal compares the currently received identification information of the intelligent key with the identification information of the intelligent key stored by the vehicle control mobile terminal, and if the currently received identification information of the intelligent key is consistent with the identification information of the intelligent key stored by the vehicle control mobile terminal, the vehicle control mobile terminal determines that the communication authentication between the intelligent key and the vehicle control mobile terminal is successful.
Wherein, install car accuse APP in the car accuse mobile terminal. The user can control the vehicle or check the related information of the vehicle and the like through the vehicle control APP in the vehicle control mobile terminal.
In this embodiment, the smart key can authenticate and communicate with the lifting mechanism in the vehicle, and can also authenticate and communicate with the vehicle control mobile terminal provided with the APP associated with the vehicle, so that the vehicle is controlled by the vehicle control mobile terminal to realize some linkage functions.
The purpose of setting the second preset period is similar to that of setting the first preset period. The purpose of setting the second preset period is that in the second preset period, if the intelligent key and the vehicle control mobile terminal are authenticated for the first time, authentication needs to be performed through TSP, after the authentication for the first time is successful, identification information of the intelligent key can be stored in the vehicle control mobile terminal, so that in the second preset period, when the intelligent key and the vehicle control mobile terminal are authenticated again, the authentication can be completed directly through the identification information of the intelligent key locally stored in the vehicle control mobile terminal, and the operation is convenient and fast. In order to enhance the safety of the vehicle system, when the next second preset period starts, the smart key and the vehicle control mobile terminal still need to be authenticated through the TSP when the smart key and the vehicle control mobile terminal are authenticated for the first time.
The duration of the second preset period may be set according to actual requirements, for example, the duration may be one day, five days, ten days, one month, and the like, which is not limited herein. The duration, the starting time and the ending time of the second preset period and the first preset period can be the same or different.
In this embodiment, after the intelligent key is connected with the car accuse mobile terminal who installs car accuse APP, the intelligent key needs to communicate legitimacy with car accuse mobile terminal and certifies, and at this moment, the intelligent key sends the identification information of self to car accuse mobile terminal.
If the vehicle control mobile terminal receives the identification information of the intelligent key for the first time in the second preset period, the vehicle control mobile terminal can acquire the identification information of the vehicle bound by the login account of the installed vehicle control APP after receiving the identification information sent by the intelligent key, and generates a second authentication request according to the received identification information of the intelligent key and the acquired identification information of the vehicle. The second authentication request carries identification information of the smart key and identification information of the vehicle.
And after the vehicle control mobile terminal generates a second authentication request, the second authentication request is sent to the TSP so as to facilitate information verification of the TSP.
And when the second authentication request is in check consistency with the pre-stored verification information, the TSP generates second authentication success information and sends the second authentication success information to the vehicle control mobile terminal to prompt the vehicle control mobile terminal that the communication authentication between the TSP and the intelligent key is successful, wherein the second authentication success information can be displayed in the vehicle control APP. And when the second authentication request is inconsistent with the pre-stored verification information, the TSP generates second authentication failure information and sends the second authentication failure information to the vehicle control mobile terminal so as to prompt the vehicle control mobile terminal that the communication authentication between the TSP and the intelligent key fails, wherein the second authentication failure information can be displayed in the vehicle control APP.
The process of the TSP verifying the second authentication request and the pre-stored verification information is similar to the process of the first authentication request and the pre-stored verification information, and is not repeated.
After receiving the second authentication success information, the vehicle control mobile terminal confirms that the vehicle control mobile terminal and the intelligent key are successfully authenticated for the first time in a second preset period, stores the identification information of the intelligent key, and can also send the authentication success information to the intelligent key so that the intelligent key can display the authentication success information on a display screen of the intelligent key to prompt a user.
After receiving the second authentication failure information, the vehicle control mobile terminal confirms that the communication authentication between the vehicle control mobile terminal and the intelligent key fails, and sends the authentication failure information to the intelligent key, so that the intelligent key displays the authentication failure information on a display screen of the intelligent key to prompt a user.
In a second preset period, if the vehicle-controlled mobile terminal does not receive the identification information of the smart key for the first time, the vehicle-controlled mobile terminal may compare the identification information sent by the smart key with the identification information of the smart key stored locally, if the two are consistent, the authentication is successful, and if the two are inconsistent, the authentication is failed.
In the embodiment, in a second preset period, after the first authentication between the intelligent key and the vehicle control mobile terminal is successful, when the authentication is performed again, the local authentication is directly performed through the vehicle control mobile terminal, and the authentication is performed without a remote TSP (short range transaction protocol), so that the authentication speed can be increased; and every time a second preset period passes, when the intelligent key is authenticated with the vehicle control mobile terminal, remote authentication needs to be carried out through the TSP, and the safety of the vehicle system can be improved.
The smart key and the vehicle control mobile terminal may be connected through bluetooth, or may be connected through any other implementable manner, which is not limited herein. The vehicle-controlled mobile terminal may be a mobile phone, a tablet computer, or any other terminal that can be implemented, and is not limited herein.
The intelligent key authentication method provided by the embodiment can realize communication authentication between the intelligent key and the lifting mechanism in the vehicle, so that the intelligent key and the lifting mechanism can communicate, some linkage functions are realized, communication authentication between the intelligent key and the vehicle control mobile terminal provided with the vehicle control APP can also be realized, so that the intelligent key and the vehicle control mobile terminal can communicate, and the vehicle is controlled through the vehicle control mobile terminal to realize some linkage functions.
In some possible implementations, the smart key authentication system may further include:
the intelligent key sends identification information of the intelligent key to a door lock controller of the vehicle;
the door lock controller compares the received identification information of the intelligent key with the identification information of the intelligent key stored by the door lock controller, if the received identification information of the intelligent key is consistent with the identification information of the intelligent key stored by the door lock controller, the authentication is successful, third authentication success information is sent to the intelligent key, and if the received identification information of the intelligent key is inconsistent with the identification information of the intelligent key stored by the door lock controller, the authentication is failed, and the third authentication failure information is sent to the intelligent key.
According to the embodiment, the authentication between the intelligent key and the door lock controller can be realized, and after the door lock controller authenticates that the intelligent key is legal, the intelligent key can realize key functions such as unlocking, locking and the like.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
In the following, embodiments of the system of the present application are provided, and for details not described in detail therein, reference may be made to the corresponding method embodiments described above.
Fig. 2 shows a schematic structural diagram of the smart key authentication system provided in the embodiment of the present application, and for convenience of explanation, only the parts related to the embodiment of the present application are shown, which are detailed as follows:
as shown in fig. 2, the smart key authentication system 30 includes: a smart key 31 and a lifting mechanism 32.
The smart key 31 is used for sending identification information of the smart key to the lifting mechanism 32 after being connected with the lifting mechanism 32 on the vehicle;
the lifting mechanism 32 is configured to, if the identification information of the smart key 31 is received for the first time within a first preset period, acquire the identification information of the vehicle, generate a first authentication request based on the identification information of the vehicle and the identification information of the smart key 31, and send the first authentication request to the TSP; if the identification information of the smart key 31 is not received for the first time within the first preset period, comparing the currently received identification information of the smart key 31 with the identification information of the smart key stored by the user, and if the currently received identification information of the smart key 31 is consistent with the identification information of the smart key stored by the user, determining that the communication authentication between the smart key 31 and the lifting mechanism 32 is successful;
the first authentication request is used to instruct the TSP to perform authentication based on the first authentication request, and if the authentication is successful, the first authentication success information is sent to the elevator mechanism 32.
In one possible implementation, as shown in fig. 3, the smart key authentication system further includes: T-BOX33.
The elevating mechanism 32 sends the first authentication request to the TSP through the T-BOX 33;
the TSP transmits first authentication success information to the elevating mechanism 32 through the T-BOX33.
In a possible implementation manner, the lifting mechanism 32 is further configured to, if the identification information of the smart key 31 is received for the first time within a first preset period, store the identification information of the smart key successfully authenticated this time after receiving the first successful authentication information.
In a possible implementation manner, the TSP performs authentication based on the first authentication request, and if the authentication is successful, sends first authentication success information to the elevator mechanism 32, including:
the TSP verifies the first authentication request with the pre-stored verification information, determines that the communication authentication between the smart key 31 and the lifting mechanism 32 is successful if the first authentication request is verified to be consistent with the pre-stored verification information, and sends first authentication success information to the lifting mechanism 32.
In one possible implementation manner, the pre-stored verification information includes pre-stored identification information of the smart key and pre-stored identification information of the vehicle;
the TSP verifies the first authentication request with the pre-stored verification information, and if the first authentication request is consistent with the pre-stored verification information, it is determined that the communication authentication between the smart key 31 and the lifting mechanism 32 is successful, including:
the TSP analyzes the first authentication request to obtain identification information of the smart key 31 carried by the first authentication request and identification information of the vehicle carried by the first authentication request, and if the identification information of the smart key 31 carried by the first authentication request is consistent with the pre-stored identification information of the smart key and the identification information of the vehicle carried by the first authentication request is consistent with the pre-stored identification information of the vehicle, it is determined that the communication authentication between the smart key 31 and the lifting mechanism is successful.
In one possible implementation, the identification information of the fob includes a MAC of the fob; the identification information of the vehicle includes the VIN of the vehicle.
In one possible implementation manner, the smart key authentication system further includes: a vehicle control mobile terminal; the vehicle control mobile terminal is provided with a vehicle control APP related to a vehicle.
The intelligent key 31 is also used for sending identification information of the intelligent key to the vehicle control mobile terminal after being connected with the vehicle control mobile terminal;
the vehicle control mobile terminal is used for acquiring the identification information of the vehicle bound with the vehicle if the identification information of the intelligent key 31 is received for the first time in a second preset period, generating a second authentication request based on the identification information of the vehicle bound with the vehicle and the received identification information of the intelligent key 31, and sending the second authentication request to the TSP; if the identification information of the smart key 31 is not received for the first time in the second preset period, comparing the currently received identification information of the smart key 31 with the identification information of the smart key stored by the smart key, and if the currently received identification information of the smart key 31 is consistent with the identification information of the smart key stored by the smart key, determining that the communication authentication between the smart key 31 and the vehicle control mobile terminal is successful;
and the second authentication request is used for indicating the TSP to perform authentication based on the second authentication request, and if the authentication is successful, second authentication success information is sent to the vehicle-controlled mobile terminal.
Corresponding to the smart key authentication system, the embodiment of the application further provides a vehicle, which comprises the smart key authentication system as described in any one of the above, and has the beneficial effects brought by any one of the above smart key authentication systems.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. For the specific working processes of the units and modules in the system, reference may be made to the corresponding processes in the foregoing method embodiments, which are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
Furthermore, features of the embodiments shown in the drawings of the present application or of the various embodiments mentioned in the present description are not necessarily to be understood as embodiments independent of each other. Rather, each feature described in one example of one embodiment can be combined with one or more other desired features from other embodiments to yield yet further embodiments, which are not described in text or with reference to the accompanying drawings.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (10)

1. A smart key authentication method, comprising:
after the intelligent key is connected with a lifting mechanism on a vehicle, the intelligent key sends identification information of the intelligent key to the lifting mechanism;
if the lifting mechanism receives the identification information of the intelligent key for the first time in a first preset period, the lifting mechanism acquires the identification information of the vehicle, generates a first authentication request based on the identification information of the vehicle and the identification information of the intelligent key, and sends the first authentication request to the TSP; the TSP carries out authentication based on the first authentication request, and if the authentication is successful, first authentication success information is sent to the lifting mechanism;
if the lifting mechanism does not receive the identification information of the intelligent key for the first time in the first preset period, the lifting mechanism compares the currently received identification information of the intelligent key with the identification information of the intelligent key stored by the lifting mechanism, and if the currently received identification information of the intelligent key is consistent with the identification information of the intelligent key stored by the lifting mechanism, the communication authentication between the intelligent key and the lifting mechanism is determined to be successful.
2. The key fob authentication method of claim 1, wherein if the lifting mechanism first receives the identification information of the key fob within a first predetermined period, the key fob authentication method further comprises:
and after receiving the first authentication success information, the lifting mechanism stores the identification information of the smart key which is successfully authenticated this time.
3. The method as claimed in claim 1, wherein the TSP authenticates based on the first authentication request, and if the authentication is successful, transmits first authentication success information to the elevator mechanism, including:
and the TSP checks the first authentication request and prestored verification information, if the first authentication request is consistent with the prestored verification information, the communication authentication between the intelligent key and the lifting mechanism is determined to be successful, and first authentication success information is sent to the lifting mechanism.
4. The smart key authentication method of claim 3, wherein the pre-stored verification information includes pre-stored identification information of the smart key and pre-stored identification information of the vehicle;
the TSP verifies the first authentication request with pre-stored verification information, and if the first authentication request is consistent with the pre-stored verification information, determines that the communication authentication between the smart key and the lifting mechanism is successful, including:
and the TSP analyzes the first authentication request to obtain identification information of the intelligent key carried by the first authentication request and identification information of the vehicle carried by the first authentication request, and if the identification information of the intelligent key carried by the first authentication request is consistent with the pre-stored identification information of the intelligent key and the identification information of the vehicle carried by the first authentication request is consistent with the pre-stored identification information of the vehicle, the TSP determines that the communication authentication between the intelligent key and the lifting mechanism is successful.
5. The method of claim 1, wherein sending the first authentication request to a TSP comprises:
the lifting mechanism sends the first authentication request to a T-BOX of a vehicle;
the T-BOX sends the first authentication request to the TSP.
6. The smart key authentication method according to claim 1, wherein the identification information of the smart key includes a MAC of the smart key; the identification information of the vehicle includes a VIN of the vehicle.
7. The smart key authentication method according to any one of claims 1 to 6, further comprising:
after the intelligent key is connected with the vehicle control mobile terminal, the intelligent key sends identification information of the intelligent key to the vehicle control mobile terminal;
if the vehicle control mobile terminal receives the identification information of the intelligent key for the first time in a second preset period, the vehicle control mobile terminal acquires the identification information of the vehicle bound by the vehicle control mobile terminal, generates a second authentication request based on the identification information of the vehicle bound by the vehicle control mobile terminal and the received identification information of the intelligent key, and sends the second authentication request to the TSP; the TSP carries out authentication based on the second authentication request, and if the authentication is successful, second authentication success information is sent to the vehicle control mobile terminal;
if the vehicle control mobile terminal does not receive the identification information of the intelligent key for the first time in the second preset period, the vehicle control mobile terminal compares the currently received identification information of the intelligent key with the identification information of the intelligent key stored by the vehicle control mobile terminal, and if the currently received identification information of the intelligent key is consistent with the identification information of the intelligent key stored by the vehicle control mobile terminal, the vehicle control mobile terminal determines that the communication authentication between the intelligent key and the vehicle control mobile terminal is successful.
8. A smart key authentication system, comprising: an intelligent key and a lifting mechanism;
the intelligent key is used for sending identification information of the intelligent key to a lifting mechanism after being connected with the lifting mechanism on the vehicle;
the lifting mechanism is used for acquiring the identification information of the vehicle if the identification information of the intelligent key is received for the first time in a first preset period, generating a first authentication request based on the identification information of the vehicle and the identification information of the intelligent key, and sending the first authentication request to the TSP; if the identification information of the intelligent key is not received for the first time in the first preset period, comparing the currently received identification information of the intelligent key with the identification information of the intelligent key stored by the intelligent key, and if the currently received identification information of the intelligent key is consistent with the identification information of the intelligent key stored by the intelligent key, determining that the communication authentication between the intelligent key and the lifting mechanism is successful;
the first authentication request is used for indicating the TSP to authenticate based on the first authentication request, and if the authentication is successful, first authentication success information is sent to the lifting mechanism.
9. The smart key authentication system according to claim 8, further comprising: T-BOX;
the lifting mechanism sends the first authentication request to a TSP through the T-BOX;
and the TSP sends the first authentication success information to the lifting mechanism through the T-BOX.
10. A vehicle characterized by comprising the smart key authentication system as recited in claim 8 or 9.
CN202210772768.5A 2022-06-30 2022-06-30 Intelligent key authentication method and system and vehicle Pending CN115150823A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210772768.5A CN115150823A (en) 2022-06-30 2022-06-30 Intelligent key authentication method and system and vehicle

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210772768.5A CN115150823A (en) 2022-06-30 2022-06-30 Intelligent key authentication method and system and vehicle

Publications (1)

Publication Number Publication Date
CN115150823A true CN115150823A (en) 2022-10-04

Family

ID=83410910

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210772768.5A Pending CN115150823A (en) 2022-06-30 2022-06-30 Intelligent key authentication method and system and vehicle

Country Status (1)

Country Link
CN (1) CN115150823A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20100025324A (en) * 2008-08-27 2010-03-09 한국오므론전장주식회사 Smart key starting apparatus of vehicle
JP2011005909A (en) * 2009-06-24 2011-01-13 Tokai Rika Co Ltd On-vehicle device
KR20120102414A (en) * 2011-03-08 2012-09-18 주식회사 스마트온커뮤니케이션 Vehicle smart key system and processing method thereof
JP2018104958A (en) * 2016-12-26 2018-07-05 ダイハツ工業株式会社 Vehicle communication device
CN110126782A (en) * 2019-05-23 2019-08-16 东风小康汽车有限公司重庆分公司 A kind of Vehicular intelligent key application method and device
CN111083670A (en) * 2019-12-31 2020-04-28 东风小康汽车有限公司重庆分公司 Vehicle using method and device based on intelligent key

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20100025324A (en) * 2008-08-27 2010-03-09 한국오므론전장주식회사 Smart key starting apparatus of vehicle
JP2011005909A (en) * 2009-06-24 2011-01-13 Tokai Rika Co Ltd On-vehicle device
KR20120102414A (en) * 2011-03-08 2012-09-18 주식회사 스마트온커뮤니케이션 Vehicle smart key system and processing method thereof
JP2018104958A (en) * 2016-12-26 2018-07-05 ダイハツ工業株式会社 Vehicle communication device
CN110126782A (en) * 2019-05-23 2019-08-16 东风小康汽车有限公司重庆分公司 A kind of Vehicular intelligent key application method and device
CN111083670A (en) * 2019-12-31 2020-04-28 东风小康汽车有限公司重庆分公司 Vehicle using method and device based on intelligent key

Similar Documents

Publication Publication Date Title
CN104380764B (en) For the method for the customer data base for the characteristic of vehicle being registered in Internet Server equipment
CN106257861B (en) By control equipment come the authentication method and its system with auto communication
CN107650863A (en) Vehicle sharing method and system
US8014528B2 (en) Method for accessing a user operable device of controlled access
CN102752359B (en) Long-distance service assisted type method and system for automobile fingerprint identification authentication
JP4942261B2 (en) Vehicle relay device and in-vehicle communication system
US10144391B2 (en) Electronics unit, method carried out in an electronics unit of said type, method for sharing a time frame between a server and an electronics unit, and method for synchronizing a server and an electronics unit
CN103723119B (en) Electronic key registration system, method and control device
CN104158819A (en) Safety authentication method of vehicle-mounted information entertainment terminal
CN104966343B (en) Access control method Internet-based
CN113492797B (en) Method and system for automatically logging in vehicle machine and vehicle
WO2022078193A1 (en) Vehicle control method and apparatus, and storage medium
JP4075544B2 (en) Authentication system
US20180054317A1 (en) Communication system for the detection of a driving license
KR101392571B1 (en) Near Field Communication Interface Control
KR20180012218A (en) Method for providing an authenticated connection between at least two communication partners
US10973060B2 (en) Methods and systems for management of an association between a user and a vehicle
CN116101116B (en) Charging method, device and storage medium
CN115150823A (en) Intelligent key authentication method and system and vehicle
CN108521645A (en) A kind of auth method, system and control system based on identifying code
CN116824740A (en) Multi-door lock interconnection processing method and equipment, control device and storage medium
CN115019421A (en) Vehicle control method
CN114915939A (en) Vehicle personalized configuration method and system, readable storage medium and electronic equipment
CN210924706U (en) Take security chip's district entrance guard remote control ware
CN114615309A (en) Client access control method, device and system, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination