WO2020181691A1 - 虚拟钥匙绑定方法及*** - Google Patents

虚拟钥匙绑定方法及*** Download PDF

Info

Publication number
WO2020181691A1
WO2020181691A1 PCT/CN2019/093474 CN2019093474W WO2020181691A1 WO 2020181691 A1 WO2020181691 A1 WO 2020181691A1 CN 2019093474 W CN2019093474 W CN 2019093474W WO 2020181691 A1 WO2020181691 A1 WO 2020181691A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
vehicle
feature information
bluetooth
binding
Prior art date
Application number
PCT/CN2019/093474
Other languages
English (en)
French (fr)
Inventor
程紫尧
Original Assignee
广州小鹏汽车科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 广州小鹏汽车科技有限公司 filed Critical 广州小鹏汽车科技有限公司
Priority to EP19918790.7A priority Critical patent/EP3806382A4/en
Publication of WO2020181691A1 publication Critical patent/WO2020181691A1/zh
Priority to US17/133,230 priority patent/US11882509B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3252Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/48Security arrangements using identity modules using secure binding, e.g. securely binding identity modules to devices, services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/71Hardware identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/48Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for in-vehicle communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/84Vehicles

Definitions

  • the invention relates to the technical field of vehicles, in particular to a virtual key binding method and system.
  • card-type car keys instead of traditional physical keys.
  • the card-type car key needs to be bound with the car before it is used.
  • the usual way to bind the card-type car key to the car is: when the card-type car key approaches the car, the card-type car key can be connected to the car through the Bluetooth protocol stack.
  • the terminal device on the computer realizes simple matching authentication. After the authentication is passed, it can be determined that the card-type car key is bound to the car.
  • the embodiment of the invention discloses a virtual key binding method and system, which can improve the security of data transmission during the binding process of the car key and the car.
  • the first aspect of the embodiments of the present invention discloses a virtual key binding method, and the method includes:
  • the terminal device When detecting the input binding instruction, the terminal device extracts the device fingerprint of the terminal device and generates a service key;
  • the terminal device sends the device feature information to the service server, so that the service server stores the device feature information in the on-board electronic device of the vehicle to be bound;
  • the terminal device When detecting that the binding result sent by the service server is a successful binding, the terminal device stores the Bluetooth information in the binding result, and the Bluetooth information matches the vehicle to be bound.
  • the terminal device when the input binding instruction is detected, extracts the device fingerprint of the terminal device and generates a service key, including:
  • the terminal device When detecting the input binding instruction, the terminal device extracts several device fingerprint characteristic values of the terminal device;
  • the terminal device generates the device fingerprint of the terminal device according to the plurality of device fingerprint characteristic values, and generates a service key, where the service key is a service public-private key pair or a service symmetric key.
  • the second aspect of the embodiments of the present invention discloses another virtual key binding method, the method includes:
  • the service server When receiving the device feature information sent by the terminal device, the service server converts the device fingerprint and service key contained in the device feature information, the user account information of the terminal device, and the pending information that matches the user account information. Binding vehicle information for associated storage, and sending the device feature information to a security server, so that the security server can perform a signature and encryption operation on the device feature information;
  • the service server sends the target device feature information to the vehicle-mounted electronic device matching the vehicle information to be bound, so that the The vehicle-mounted electronic device stores the target device characteristic information;
  • the service server When receiving the binding result sent by the in-vehicle electronic device, the service server sends the binding result to the terminal device.
  • the service server when the binding result sent by the in-vehicle electronic device is received, sends the binding result to the terminal device, include:
  • the service server determines whether the binding result is a successful binding result
  • the service server obtains the Bluetooth information included in the binding result, where the Bluetooth information includes at least a Bluetooth address and a Bluetooth name;
  • the service server associates and stores the Bluetooth information with the user account information, the vehicle information to be bound, and the device fingerprint and the service key contained in the device feature information, and sends it to the The terminal device sends the binding result.
  • the third aspect of the embodiments of the present invention discloses a virtual key binding method, the method includes:
  • the security server When receiving the device feature information sent by the service server, the security server performs a signature and encryption operation on the device feature information to obtain the target device feature information;
  • the security server sends the target device characteristic information to the service server.
  • the security server when the device feature information sent by the service server is received, the security server performs a signature encryption operation on the device feature information to obtain the target device feature information ,include:
  • the security server When receiving the device feature information sent by the service server, the security server digitally signs the device feature information with a preset private key to obtain the signed device feature information;
  • the security server performs a symmetric encryption operation on the signature device feature information by using a preset symmetric key to obtain the target device feature information.
  • the fourth aspect of the embodiments of the present invention discloses another virtual key binding method, the method includes:
  • the in-vehicle security module of the in-vehicle electronic device When the in-vehicle security module of the in-vehicle electronic device receives the target device feature information sent by the business server, the in-vehicle electronic device decrypts and verifies the target device feature information through the in-vehicle security module to obtain Current equipment feature information;
  • the in-vehicle electronic device stores the current device characteristic information through the Bluetooth module outside the vehicle, and transmits the storage result and the Bluetooth information corresponding to the Bluetooth module outside the vehicle to the safety module in the vehicle, wherein the
  • the Bluetooth information includes the Bluetooth address and Bluetooth name of the Bluetooth module outside the car;
  • the in-vehicle electronic device generates a binding result including the storage result and the Bluetooth information through the in-vehicle security module, and sends the binding result to the service server through the in-vehicle security module.
  • a fifth aspect of the embodiments of the present invention discloses a terminal device, including:
  • the extraction unit is configured to extract the device fingerprint of the terminal device and generate a service key when the input binding instruction is detected;
  • a generating unit configured to generate device feature information including the device fingerprint and the service key
  • the first sending unit is configured to send the device feature information to the service server
  • the first storage unit is configured to store Bluetooth information in the binding result when it is detected that the binding result sent by the service server is a successful binding, and the Bluetooth information matches the vehicle to be bound .
  • the extracting unit includes:
  • the extraction subunit is used to extract several device fingerprint feature values of the terminal device when the input binding instruction is detected;
  • the generating subunit is used to generate the device fingerprint of the terminal device according to the characteristic values of the several device fingerprints and generate a service key, the service key being a service public-private key pair or a service symmetric key.
  • a sixth aspect of the embodiments of the present invention discloses a business server, including:
  • the second storage unit is configured to, when receiving the device feature information sent by the terminal device, combine the device fingerprint and service key contained in the device feature information, the user account information of the terminal device, and the user account information The matched vehicle information to be bound is associated and stored, and the device characteristic information is sent to the security server;
  • the second sending unit is configured to send the target device characteristic information to an in-vehicle electronic device matching the vehicle information to be bound when the signature and encrypted target device characteristic information fed back by the security server is detected;
  • the third sending unit is configured to send the binding result to the terminal device when the binding result sent by the in-vehicle electronic device is received.
  • the third sending unit includes:
  • the judging subunit is used to judge whether the binding result is a successful binding result when the binding result sent by the in-vehicle electronic device is received;
  • An obtaining subunit configured to obtain Bluetooth information contained in the binding result when the judgment result of the judging subunit is yes, the Bluetooth information including at least a Bluetooth address and a Bluetooth name;
  • the sending subunit is used to associate the Bluetooth information with the user account information, the vehicle information to be bound, and the device fingerprint and the service key contained in the device characteristic information, and to The terminal device sends the binding result.
  • a seventh aspect of the embodiments of the present invention discloses a security server, including:
  • the signature and encryption unit is configured to perform a signature and encryption operation on the device feature information when the device feature information sent by the service server is received to obtain the target device feature information;
  • the fourth sending unit is configured to send the target device characteristic information to the service server.
  • the signature encryption unit includes:
  • the signing sub-unit is used for when receiving the device characteristic information sent by the service server, digitally signing the device characteristic information with a preset private key to obtain the signed device characteristic information;
  • the encryption subunit is used to perform a symmetric encryption operation on the signature device feature information by using a preset symmetric key to obtain the target device feature information.
  • An eighth aspect of the embodiments of the present invention discloses a vehicle-mounted electronic device, including:
  • the decryption unit is used for decrypting and verifying the target device characteristic information through the in-vehicle security module when the in-vehicle security module of the in-vehicle electronic device receives the target device characteristic information sent by the service server To get the current device feature information;
  • the transmission unit is configured to store the current device characteristic information through the Bluetooth module outside the vehicle, and transmit the storage result and the Bluetooth information corresponding to the Bluetooth module outside the vehicle to the safety module inside the vehicle, wherein the
  • the Bluetooth information includes the Bluetooth address and Bluetooth name of the Bluetooth module outside the car;
  • the fourth sending unit is configured to generate a binding result including the storage result and the Bluetooth information through the in-vehicle security module, and send the binding result to the service server through the in-vehicle security module result.
  • a virtual key binding system includes a terminal device, a business server, a security server, and an in-vehicle electronic device, wherein:
  • the terminal device is configured to extract the device fingerprint of the terminal device and generate a service key when the input binding instruction is detected; and generate device feature information including the device fingerprint and the service key; and Send the device feature information to the service server, so that the service server stores the device feature information in the on-board electronic device of the vehicle to be bound; and when it is detected that the binding result sent by the service server is a successful binding Timing, storing the Bluetooth information in the binding result, where the Bluetooth information matches the vehicle to be bound;
  • the service server is configured to, when receiving the device feature information sent by the terminal device, combine the device fingerprint and service key contained in the device feature information, the user account information of the terminal device, and the The vehicle information to be bound that matches the user account information is associated and stored, and the device feature information is sent to a security server, so that the security server performs a signature and encryption operation on the device feature information;
  • the target device feature information is sent to the vehicle-mounted electronic device that matches the vehicle information to be bound, so that the vehicle-mounted electronic device stores the target device Characteristic information; and when receiving the binding result sent by the in-vehicle electronic device, sending the binding result to the terminal device;
  • the security server is configured to, when receiving the device characteristic information sent by the service server, perform a signature and encryption operation on the device characteristic information to obtain target device characteristic information; and send the target device characteristic information to the service server ;
  • the in-vehicle electronic device is configured to, when the in-vehicle security module of the in-vehicle electronic device receives the target device feature information sent by the service server, use the in-vehicle security module to analyze the features of the target device
  • the information is decrypted and signed to obtain the current device feature information; and the current device feature information is stored through the Bluetooth module outside the vehicle, and the storage result and the Bluetooth information corresponding to the Bluetooth module outside the vehicle are transmitted to the vehicle And generating a binding result including the storage result and the Bluetooth information through the in-vehicle security module, and sending the binding result to the service server through the in-vehicle security module Result; wherein, the Bluetooth information includes the Bluetooth address and Bluetooth name of the Bluetooth module outside the vehicle.
  • a tenth aspect of the embodiments of the present invention discloses a vehicle, including the vehicle-mounted electronic equipment disclosed in the eighth aspect.
  • the eleventh aspect of the embodiment of the present invention discloses a computer-readable storage medium, the computer-readable storage medium stores program code, wherein the program code includes functions for executing the first aspect, the second aspect, and the third aspect And instructions for part or all of the steps of any method in the fourth aspect.
  • a twelfth aspect of the embodiments of the present invention discloses a computer program product.
  • the computer program product runs on a computer, the computer is caused to execute any one of the first aspect, the second aspect, the third aspect, and the fourth aspect. Part or all of the steps of this method.
  • a thirteenth aspect of the embodiments of the present invention discloses an application publishing platform, the application publishing platform is used to publish a computer program product, wherein when the computer program product runs on a computer, the computer is caused to execute the first aspect, Part or all of the steps of any one of the second aspect, the third aspect, and the fourth aspect.
  • the terminal device when the input binding instruction is detected, extracts the device fingerprint of the terminal device and generates the service key; the terminal device generates device characteristic information including the device fingerprint and the service key; the terminal device sends the service server Send the device feature information so that the service server can store the device feature information in the on-board electronic device of the vehicle to be bound; and when it is detected that the binding result sent by the service server is a successful binding, the terminal device will The Bluetooth information is stored, and the Bluetooth information is matched with the vehicle to be bound.
  • implementing the embodiments of the present invention can send the device feature information generated according to the terminal device to the service server, and bind the device feature information to the on-board electronic device through the service server, so that the terminal device can be bound to the on-board electronic device. It must be realized through the business server, which avoids the problem of data loss that may occur when the terminal device and the vehicle electronic device directly transmit data, thereby improving the security of data transmission during the binding process of the terminal device and the vehicle electronic device.
  • Fig. 1 is a schematic flowchart of a method for binding a virtual key disclosed in an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of another virtual key binding method disclosed in an embodiment of the present invention.
  • FIG. 3 is a schematic flowchart of another virtual key binding method disclosed in an embodiment of the present invention.
  • FIG. 4 is a schematic flowchart of another virtual key binding method disclosed in an embodiment of the present invention.
  • FIG. 5 is a schematic flowchart of another virtual key binding method disclosed in an embodiment of the present invention.
  • FIG. 6 is a schematic flowchart of another virtual key binding method disclosed in an embodiment of the present invention.
  • FIG. 7 is a schematic flowchart of another virtual key binding method disclosed in an embodiment of the present invention.
  • Figure 8 is a schematic structural diagram of a terminal device disclosed in an embodiment of the present invention.
  • Figure 9 is a schematic structural diagram of another terminal device disclosed in an embodiment of the present invention.
  • Figure 10 is a schematic structural diagram of a business server disclosed in an embodiment of the present invention.
  • Figure 11 is a schematic structural diagram of another service server disclosed in an embodiment of the present invention.
  • Figure 12 is a schematic structural diagram of a security server disclosed in an embodiment of the present invention.
  • Figure 13 is a schematic structural diagram of another security server disclosed in an embodiment of the present invention.
  • FIG. 14 is a schematic structural diagram of a vehicle-mounted electronic device disclosed in an embodiment of the present invention.
  • FIG. 15 is a schematic structural diagram of a virtual key binding system disclosed in an embodiment of the present invention.
  • FIG. 16 is a schematic flowchart of another method for binding a virtual key disclosed in an embodiment of the present invention.
  • the embodiment of the invention discloses a virtual key binding method and system, which can improve the security of data transmission during the binding process of the terminal device and the on-board electronic device of the vehicle. Detailed descriptions are given below.
  • FIG. 1 is a schematic flowchart of a virtual key binding method disclosed in an embodiment of the present invention. As shown in Figure 1, the virtual key binding method may include the following steps:
  • the terminal device When detecting the input binding instruction, the terminal device extracts the device fingerprint of the terminal device and generates a service key.
  • the terminal device may be a smart phone, a smart bracelet, etc.; the user who inputs the binding instruction needs to be the owner user, and not the driver user.
  • the owner user can first send to the service server through the owner's terminal device Binding instruction, the business server can read the vehicle information to be bound and the user information to be bound contained in the binding instruction, and when the business server recognizes that the identity of the user to be bound is the owner of the vehicle, the business server will bind the instruction Send to the terminal device of the vehicle owner.
  • the service server recognizes that the user to be bound is the driver
  • the service server reads the driver’s account information from the memory and sends the binding instruction to the driver’s account. So that the terminal device where the driver logs in can receive the binding instruction, and then obtain the device fingerprint and other information of the driver's terminal device.
  • the device fingerprint (Device Fingerprint) can be used to uniquely identify the device characteristics of the terminal device, so that the terminal device can be uniquely determined according to the device fingerprint.
  • the service key may be a service public-private key pair or a service symmetric key.
  • the service key may enable the security server to perform signature and encryption operations on the device characteristic information, so that the service-based secret key stored in the on-board electronic device The key signature and encrypted device feature information can be verified by the terminal device storing the service key.
  • the security server can digitally sign the device characteristic information (Digital Signature), which is an application of asymmetric encryption technology and digital digest technology, and can be implemented through the Elliptic Curve Digital Signature Algorithm (ECDSA) or RSA Encryption algorithm (RSA Algorithm) implementation.
  • Digital Signature is an application of asymmetric encryption technology and digital digest technology
  • EDSA Elliptic Curve Digital Signature Algorithm
  • RSA Algorithm RSA Encryption algorithm
  • the specific implementation can be as follows: the security server can calculate the device feature information through hash coding (Hash code) to obtain the digital digest of the device feature information, and use the private key and encryption algorithm preset by the security server to calculate the digital digest. Encryption is performed to obtain a digital signature, and the encrypted digital signature and the encrypted device characteristic information are sent to the vehicle electronic device at the same time.
  • Hash code hash coding
  • Encryption is performed to obtain a digital signature
  • the encrypted digital signature and the encrypted device characteristic information are sent to the vehicle electronic
  • the vehicle electronic device can pre-store the public key corresponding to the private key preset by the security server, and then The public key can be used to decrypt the received digital signature to obtain the current digital digest; at the same time, the in-vehicle electronic device can decrypt the encrypted device feature information to obtain the current device feature information, and the current device feature can also be obtained through Hash encoding
  • the information is calculated to obtain the test digital digest. If the calculated test digital digest is the same as the current digital digest obtained by decryption, it can be considered that the vehicle-mounted electronic device receives the device characteristic information sent by the security server is accurate and has not been lost during transmission. Or omissions, etc., to ensure the accuracy of the device feature information received by the in-vehicle electronic device.
  • the terminal device generates device feature information including device fingerprints and service keys.
  • the terminal device sends the device feature information to the service server, so that the service server stores the device feature information in the on-board electronic device of the vehicle to be bound.
  • the service server may be a device such as a cloud server, and the service server may establish a communication connection with the terminal device, thereby interacting with the terminal device and processing the data uploaded by the terminal device, and may also establish a communication connection with the vehicle electronic device , So as to interact with the on-board electronic equipment and process the data uploaded by the on-board electronic equipment.
  • the terminal device stores the Bluetooth information in the binding result, and the Bluetooth information matches the vehicle to be bound.
  • the terminal device since the terminal device and the vehicle-mounted electronic device need to be unlocked and other operations based on Bluetooth pairing after the binding is successful, the terminal device needs to store the Bluetooth information corresponding to the Bluetooth key authentication module of the vehicle-mounted electronic device.
  • the Bluetooth information can include at least a Bluetooth name and a Bluetooth address, etc., so that the terminal device can match the correct on-board electronic device set on the vehicle according to the Bluetooth information.
  • the terminal device may also perform the following steps:
  • the terminal device determines whether the unbound user type included in the unbound instruction is the owner type;
  • the terminal device identifies the vehicle information to be unbound and the unbound account information of the user to be unbound from the unbound information;
  • the terminal device generates an unbinding request that includes the vehicle information to be unbound and the unbound account information, and sends the unbound request to the service server;
  • the terminal device When receiving the unbinding result sent by the service server, the terminal device outputs the unbinding result.
  • the implementation of this embodiment can respond to the unbinding application submitted by the owner user, and send the unbinding information of the vehicle to be unbound contained in the unbinding instruction and the unbound account information of the user to be unbound to the service server, so that The service server can accurately delete the information corresponding to the unbinding instruction, and feed back the unbinding result to the terminal device, so that the user who initiated the unbinding application can clearly know the unbinding result, which improves the interaction between the terminal device and the user.
  • the security of data transmission during the binding process of the terminal device and the on-board electronic device of the vehicle can be improved.
  • implementing the method described in FIG. 1 improves the interaction between the terminal device and the user.
  • FIG. 2 is a schematic flowchart of another virtual key binding method disclosed in an embodiment of the present invention.
  • the embodiment of the present invention describes in more detail the method of generating the device fingerprint of the terminal device, which can make the information related to the terminal device contained in the device fingerprint more comprehensive.
  • the virtual key binding method may include the following steps:
  • the terminal device When detecting the input binding instruction, the terminal device extracts several device fingerprint characteristic values of the terminal device.
  • the device fingerprint of the terminal device can be generated based on the extracted device fingerprint feature value of the terminal device.
  • the device fingerprint feature value can be the device model, serial number, hardware version and other information, and the device fingerprint of the terminal device can be Generated by more than 200 device fingerprint feature values.
  • the terminal device generates a device fingerprint of the terminal device according to several device fingerprint characteristic values, and generates a service key, which is a service public-private key pair or a service symmetric key.
  • the device fingerprint of the terminal device needs to be generated by combining several device fingerprint feature values, so the fingerprint feature information of the terminal device needs to include all the acquired device fingerprint feature values.
  • the device fingerprint can be generated based on the several device fingerprint feature values, so that the device fingerprint and the terminal Equipment-related information is more comprehensive.
  • the terminal device generates device feature information including device fingerprints and service keys.
  • the terminal device sends the device feature information to the service server, so that the service server stores the device feature information in the on-board electronic device of the vehicle to be bound.
  • the terminal device stores the Bluetooth information in the binding result, and the Bluetooth information matches the vehicle to be bound.
  • the security of data transmission during the binding process of the terminal device and the on-board electronic device of the vehicle can be improved.
  • implementing the method described in FIG. 2 can make the information related to the terminal device contained in the device fingerprint more comprehensive.
  • FIG. 3 is a schematic flowchart of another virtual key binding method disclosed in an embodiment of the present invention.
  • the virtual key binding method may include the following steps:
  • the service server When receiving the device feature information sent by the terminal device, the service server associates the device fingerprint and service key contained in the device feature information, the user account information of the terminal device, and the vehicle information to be bound that matches the user account information. Store and send the device characteristic information to the security server, so that the security server performs a signature and encryption operation on the device characteristic information.
  • the service server may be a device such as a cloud server, which may process data sent by a terminal device or a vehicle-mounted electronic device, and may also store data uploaded by the terminal device or a vehicle-mounted electronic device.
  • the business server may establish a data connection with the terminal device or the vehicle-mounted electronic device in advance, so that the terminal device and the vehicle-mounted electronic device can send data to the business server at any time.
  • the service server can also synchronize the device feature information to the security server; the security server can perform signature and encryption operations on the device feature information to ensure the security of the device feature information.
  • the user’s account stored in the service server and the vehicle information to be bound that matches the user’s account information may be pre-stored by the user.
  • the user can register the account through the terminal device after buying a car, and The registered account is bound to the vehicle identification number (Vehicle Identification Number, VIN) of the user’s vehicle, and the user’s registered account and the VIN bound to the account can be stored in the service server.
  • VIN Vehicle Identification Number
  • the service server can directly determine the user information of the terminal device and the vehicle information to be bound that matches the user information from the pre-stored information.
  • the vehicle information to be bound may include the VIN of the user vehicle .
  • the service server can pre-identify the account information of the user who sent the binding instruction, and can also read the information of the vehicle to be bound to which the account information needs to be bound from the binding instruction.
  • the information can include the VIN of the vehicle to be bound, and the target vehicle can be uniquely determined through the vehicle identification number.
  • the account information of the user to be bound may include information such as the phone number and serial number of the user to be bound, which is not limited in the embodiment of the present invention.
  • the business server can store the device feature information, user account information, and vehicle information to be bound in the memory of the business server in association with each other, so that the business server can according to any of the device feature information, user account information, and vehicle information to be bound.
  • the information determines other information that matches any item of information from the memory, so as to improve the correlation between device feature information, user account information, and vehicle information to be bound.
  • the service server can also synchronize the stored device feature information to the security server, so that the security server can endorse and encrypt the device feature information.
  • the device feature information sent by the service server to the in-vehicle electronic device is signed and encrypted information, thereby improving the security of data transmission between the service server and the in-vehicle electronic device.
  • the service server sends the target device characteristic information to the vehicle-mounted electronic device matching the vehicle information to be bound, so that the vehicle-mounted electronic device stores the target device characteristic information .
  • the service server can find the target vehicle matching the vehicle information to be bound in the memory, and further can determine the information of the on-board electronic equipment set on the target vehicle. Send the target device feature information to the vehicle-mounted electronic device that matches the vehicle information to be bound.
  • the vehicle-mounted electronic device can bind the target device feature information with the Bluetooth set on the vehicle, so that the terminal device can communicate with the vehicle when it approaches the vehicle.
  • the Bluetooth set on the vehicle is connected, and the identity verification of the terminal device is realized based on the connected Bluetooth, so that the user of the vehicle can realize the unlock authentication between the terminal device and the vehicle based on the Bluetooth.
  • the service server When receiving the binding result sent by the in-vehicle electronic device, the service server sends the binding result to the terminal device.
  • the vehicle-mounted electronic device since the vehicle-mounted electronic device has not yet established a communication connection with the terminal device during the binding phase, the vehicle-mounted electronic device needs to send the target device feature information and the binding result of the vehicle-mounted electronic device to the service server first, so that the service The server sends the binding result to the terminal device, so that the terminal device obtains the binding result.
  • the binding result can be binding success or binding failure.
  • the service server may further perform the following steps:
  • the service server When receiving the unbinding request sent by the terminal device, the service server identifies the vehicle information to be unbound and the unbound account information contained in the unbinding request;
  • the service server obtains the feature information of the device to be unbound that matches the information of the vehicle to be unbound and the unbound account information, and sends the feature information of the device to be unbound to the security server, so that the security server can sign and encrypt the feature information of the device to be unbound ,
  • the feature information of the device to be unbound may include the fingerprint and service key of the device to be unbound;
  • the service server When receiving the signed and encrypted feature information of the device to be unbound from the security server, the service server sends the encrypted feature information of the device to be unbound to the on-board electronic device matching the vehicle information to be unbound, so that the on-board electronic device will Delete the bound vehicle information to be unbound;
  • the service server When receiving the unbinding result sent by the in-vehicle electronic device, the service server sends the unbinding result to the terminal device.
  • the implementation of this embodiment allows the service server to obtain the matching feature information of the device to be unbound according to the unbinding request, and send the encrypted feature information of the device to be unbound after being signed and encrypted by the security server to the in-vehicle electronic device, so that The in-vehicle electronic device deletes the feature information of the device to be unbound, thereby realizing the unbinding operation of the terminal device and the in-vehicle electronic device, and sends the unbinding result to the terminal device, so that the user of the terminal device can know the unbinding result in time.
  • the security of data transmission during the binding process of the terminal device and the on-board electronic device of the vehicle can be improved.
  • implementing the method described in FIG. 3 can enable the user of the terminal device to know the unbinding result in time.
  • FIG. 4 is a schematic flowchart of another virtual key binding method disclosed in an embodiment of the present invention.
  • the embodiment of the present invention adds a method for binding Bluetooth information with device feature information, which ensures that the information stored in the service server is time-sensitive.
  • the virtual key binding method may include the following steps:
  • the service server When receiving the device feature information sent by the terminal device, the service server associates the device fingerprint and service key included in the device feature information, the user account information of the terminal device, and the vehicle information to be bound that matches the user account information. Store and send the device characteristic information to the security server, so that the security server performs a signature and encryption operation on the device characteristic information.
  • the service server sends the target device characteristic information to the vehicle-mounted electronic device matching the vehicle information to be bound, so that the vehicle-mounted electronic device stores the target device characteristic information .
  • the service server judges whether the binding result is a successful binding result, if yes, execute step 404 to step 405; if not, end this process.
  • the in-vehicle electronic device when it is determined that the binding result is a successful binding, it can be considered that the in-vehicle electronic device successfully stores the signed and encrypted device feature information, and the terminal device can successfully connect with the in-vehicle electronic device in Bluetooth. And can successfully unlock the vehicle with the on-board electronic equipment through Bluetooth.
  • the binding result is unsuccessful binding, it can be considered that the on-board electronic device has failed to store the signed and encrypted device characteristic information, and the terminal device cannot successfully connect the on-board electronic device to the vehicle through the Bluetooth connection with the on-board electronic device.
  • the service server can re-send the signed and encrypted device feature information to the on-board electronic device, so that the on-board electronic device can re-store the signed and encrypted device feature information.
  • the service server can also send to the terminal device Sending the binding failure information so that the user of the terminal device can perform the binding operation again, ensuring that the user of the terminal device can timely know the binding result of the terminal device and the in-vehicle electronic device.
  • the service server obtains the Bluetooth information included in the binding result, and the Bluetooth information includes at least a Bluetooth address and a Bluetooth name.
  • the binding result is a successful binding result
  • the in-vehicle electronic device successfully stores the target device characteristic information in the in-vehicle electronic device matching the vehicle information to be bound, and because the subsequent terminal device and the in-vehicle electronic device
  • the device needs to be connected based on Bluetooth. Therefore, the vehicle electronic device needs to transmit its own Bluetooth information to the terminal device so that the terminal device can successfully connect to the correct Bluetooth.
  • the vehicle electronic device can transfer its own Bluetooth information (such as Bluetooth name and Bluetooth address). Etc.)
  • the binding result is uploaded to the service server, and the Bluetooth information including the on-board electronic device is transmitted to the terminal device through the service server.
  • the service server associates the Bluetooth information with the user account information, the vehicle information to be bound, and the device fingerprint and service key contained in the device characteristic information, and sends the binding result to the terminal device.
  • the service server may associate and store the Bluetooth information with the corresponding device characteristic information, so that subsequent operations such as modification or deletion of the binding information between the terminal device and the vehicle electronic device can be quickly and comprehensively obtained To the binding information of the terminal device and the on-board electronic device, so as to ensure the comprehensiveness of the modified or deleted binding information.
  • the Bluetooth information fed back by the on-board electronic device can be stored in association with the device characteristic information, so that the service server can store the information of the terminal device and the on-board electronic device that have a binding relationship.
  • the associative storage in the business server ensures that the information stored in the business server is time-effective.
  • the security of data transmission during the binding process of the terminal device and the on-board electronic device of the vehicle can be improved.
  • implementing the method described in Figure 4 ensures that the information stored in the service server is time-sensitive.
  • FIG. 5 is a schematic flowchart of another virtual key binding method disclosed in an embodiment of the present invention. As shown in Figure 5, the virtual key binding method may include the following steps:
  • the security server When receiving the device feature information sent by the service server, the security server performs a signature and encryption operation on the device feature information to obtain the target device feature information.
  • the security server may be a device such as a cloud server, which can receive data sent by the business server, and can also send data to the business server.
  • the service server can synchronize the device feature information to the security server, so that the security server can operate on the device feature information.
  • the security server can use the service key and RSA encryption algorithm to perform asymmetric encryption signature calculations on the device feature information, and use advanced device feature information.
  • Encryption Standard Advanced Encryption Standard, AES
  • AES Advanced Encryption Standard
  • the device that needs to be verified has the private key corresponding to the public key of the asymmetric encryption. It can be seen that the asymmetric encryption is obtained The security of the signature device feature information is guaranteed.
  • the security server sends the target device characteristic information to the service server.
  • the security server may further perform the following steps:
  • the security server performs signature and encryption operations on the feature information of the device to be unbound to obtain the encrypted feature information of the device to be unbound;
  • the security server sends the encrypted feature information of the device to be unbound to the service server.
  • the feature information of the device to be unbound sent by the service server can be signed and encrypted, so that the service server sends the encrypted feature information of the device to be unbound to the on-board electronic device, ensuring that The security of the feature information of the device to be unbound between the service server and the on-board electronic device.
  • the security of data transmission during the binding process of the terminal device and the on-board electronic device of the vehicle can be improved.
  • implementing the method described in FIG. 5 ensures the security of the feature information of the device to be unbound between the service server and the on-board electronic device.
  • FIG. 6 is a schematic flowchart of another virtual key binding method disclosed in an embodiment of the present invention.
  • the embodiment of the present invention describes in more detail the signature and encryption operations for the device feature information, which ensures the security of the data in the transmission process.
  • the virtual key binding method may include the following steps:
  • the security server When receiving the device feature information sent by the service server, the security server digitally signs the device feature information by using a preset private key to obtain the signed device feature information.
  • the process for the security server to digitally sign the device feature information may be as follows: the security server can extract a summary of the device feature information, and encrypt the extracted summary with a preset private key to obtain a digital signature, and The digital signature and target device characteristic information are sent to the vehicle-mounted electronic device at the same time.
  • the vehicle-mounted electronic device pre-stores the public key corresponding to the private key preset by the security server.
  • the vehicle-mounted electronic device can use the public key to decrypt the received digital signature.
  • Obtain the current summary the vehicle electronic device can compare the current summary with the decrypted device feature information.
  • the device feature information obtained by the decryption of the vehicle electronic device is accurate and is not being transmitted Loss or omissions occurred in the process, thereby ensuring the accuracy of the in-vehicle electronic equipment to confirm the device characteristic information.
  • the security server performs a symmetric encryption operation on the signature device feature information by using a preset symmetric key to obtain the target device feature information.
  • the device feature information can be digitally signed, and then the signed device feature information can be encrypted to obtain the encrypted target device feature information, so that the The data transmitted by the in-vehicle electronic equipment is encrypted data, thereby ensuring the security of the data during the transmission process.
  • the security server sends the target device characteristic information to the service server.
  • the security of data transmission during the binding process of the terminal device and the on-board electronic device of the vehicle can be improved.
  • the method described in FIG. 6 is implemented to make the data transmitted with the vehicle-mounted electronic device the encrypted data, thereby ensuring the security of the data in the transmission process.
  • FIG. 7 is a schematic flowchart of another virtual key binding method disclosed in an embodiment of the present invention. As shown in Figure 7, the virtual key binding method may include the following steps:
  • the in-vehicle security module of the in-vehicle electronic device receives the target device feature information sent by the business server, the in-vehicle electronic device decrypts and verifies the target device feature information through the in-vehicle security module to obtain the current device feature information .
  • a software system such as an in-vehicle system may be set in the in-vehicle electronic device, and the in-vehicle electronic device can control any part of the vehicle, thereby facilitating the operation of the user of the vehicle.
  • In-vehicle electronic equipment can include an external Bluetooth module and an in-vehicle security module.
  • the external Bluetooth module can realize Bluetooth connection with the terminal device, and can also store the target device characteristic information sent by the service server, so that the terminal device can communicate with the vehicle The electronic equipment is properly connected.
  • the in-vehicle security module can decrypt and verify the target device characteristic information.
  • the in-vehicle security module successfully decrypts the target device characteristic information and verifies the correctness and integrity of the decrypted target device characteristic information.
  • the current device characteristic information can be obtained only when the decryption and signature verification operations of the target device characteristic information are passed.
  • the in-vehicle electronic device stores the current device characteristic information through the Bluetooth module outside the vehicle, and transmits the storage result and the Bluetooth information corresponding to the Bluetooth module outside the vehicle to the safety module in the vehicle, where the Bluetooth information includes the Bluetooth module outside the vehicle Bluetooth address and Bluetooth name.
  • the Bluetooth module outside the vehicle may be a Bluetooth module set outside the vehicle, and the Bluetooth module outside the vehicle may store the current device characteristic information.
  • the Bluetooth module outside the car can transmit Bluetooth information such as the Bluetooth name and Bluetooth address of the Bluetooth module outside the car and the stored results to the safety module in the car.
  • the in-vehicle electronic device generates a binding result including the storage result and Bluetooth information through the in-vehicle security module, and sends the binding result to the service server through the in-vehicle security module.
  • the in-vehicle electronic device may further perform the following steps:
  • the in-vehicle security module of the in-vehicle electronic device When the in-vehicle security module of the in-vehicle electronic device receives the encrypted feature information of the device to be unbound from the business server, the in-vehicle electronic device decrypts and verifies the encrypted feature information of the device to be unbound through the in-vehicle security module to obtain The feature information of the target device to be unbound;
  • the vehicle electronic device deletes the target device feature information to be unbound through the Bluetooth module outside the vehicle, and transmits the deletion result to the safety module inside the vehicle;
  • the in-vehicle electronic device determines that the deletion result is the unbinding result through the in-vehicle security module, and sends the unbinding result to the business server through the in-vehicle security module.
  • the stored feature information of the target device to be unbound can be found according to the encrypted device feature information sent by the service server, and the feature information of the target device to be unbound can be deleted to realize the terminal device Unbinding operation with on-board electronic equipment, thereby improving the accuracy of unbinding operation.
  • the security of data transmission during the binding process of the terminal device and the on-board electronic device of the vehicle can be improved.
  • implementing the method described in FIG. 7 improves the accuracy of the unbinding operation.
  • FIG. 8 is a schematic structural diagram of a terminal device disclosed in an embodiment of the present invention. As shown in FIG. 8, the terminal device may include:
  • the extracting unit 801 is configured to extract the device fingerprint of the terminal device and generate a service key when the input binding instruction is detected.
  • the generating unit 802 is configured to generate device feature information including the device fingerprint and the service key extracted by the extracting unit 801.
  • the first sending unit 803 is configured to send the device feature information generated by the generating unit 802 to the service server.
  • the first storage unit 804 is configured to store the Bluetooth information in the binding result when it is detected that the binding result sent by the service server is a successful binding, and the Bluetooth information is matched with the vehicle to be bound.
  • the first storage unit 804 may also be used for:
  • the implementation of this embodiment can respond to the unbinding application submitted by the owner user, and send the unbinding information of the vehicle to be unbound contained in the unbinding instruction and the unbound account information of the user to be unbound to the service server, so that The service server can accurately delete the information corresponding to the unbinding instruction, and feed back the unbinding result to the terminal device, so that the user who initiated the unbinding application can clearly know the unbinding result, which improves the interaction between the terminal device and the user.
  • implementing the terminal device described in FIG. 8 can improve the security of data transmission during the binding process of the terminal device and the on-board electronic equipment of the vehicle.
  • implementing the terminal device described in FIG. 8 improves the interaction between the terminal device and the user.
  • FIG. 8 is a schematic structural diagram of another terminal device disclosed in an embodiment of the present invention.
  • the terminal device shown in FIG. 9 is optimized by the terminal device shown in FIG. 8.
  • the terminal device shown in FIG. 9 explains in more detail the method of generating the device fingerprint of the terminal device, which can make the information related to the terminal device contained in the device fingerprint more comprehensive.
  • the illustrated extraction unit 801 of the terminal device may include:
  • the extraction subunit 8011 is used to extract several device fingerprint characteristic values of the terminal device when the input binding instruction is detected.
  • the generating subunit 8012 is used to generate the device fingerprint of the terminal device according to the several device fingerprint characteristic values extracted by the extracting subunit 8011, and generate a service key, which is a service public-private key pair or a service symmetric key.
  • the device fingerprint can be generated according to the several device fingerprint characteristic values, so that the information related to the terminal device contained in the device fingerprint is more comprehensive.
  • implementing the terminal device described in FIG. 9 can improve the security of data transmission during the binding process of the terminal device and the on-board electronic device of the vehicle.
  • implementing the terminal device described in FIG. 9 can make the information related to the terminal device contained in the device fingerprint more comprehensive.
  • FIG. 10 is a schematic structural diagram of a service server disclosed in an embodiment of the present invention.
  • the service server may include:
  • the second storage unit 1001 is configured to, when receiving the device feature information sent by the terminal device, combine the device fingerprint and service key contained in the device feature information, the user account information of the terminal device, and the to-be-bound matching user account information
  • the vehicle information is associated and stored, and the device characteristic information is sent to the security server.
  • the second sending unit 1002 is configured to send the target device characteristic information to the on-vehicle electronic device matching the vehicle information to be bound when the signature and encrypted target device characteristic information fed back by the security server is detected.
  • the third sending unit 1003 is configured to send the binding result to the terminal device when the binding result sent by the in-vehicle electronic device is received.
  • the third sending unit 1003 may also be used for:
  • the feature information of the device to be unbound may include the fingerprint and service key of the device to be unbound;
  • the encrypted feature information of the device to be unbound is sent to the vehicle-mounted electronic device that matches the vehicle information to be unbound, so that the vehicle-mounted electronic device will be bound. Delete the vehicle information to be unbound;
  • the unbinding result is sent to the terminal device.
  • the implementation of this embodiment allows the service server to obtain the matching feature information of the device to be unbound according to the unbinding request, and send the encrypted feature information of the device to be unbound after being signed and encrypted by the security server to the in-vehicle electronic device, so that The in-vehicle electronic device deletes the feature information of the device to be unbound, thereby realizing the unbinding operation of the terminal device and the in-vehicle electronic device, and sends the unbinding result to the terminal device, so that the user of the terminal device can know the unbinding result in time.
  • implementing the service server described in FIG. 10 can improve the security of data transmission during the binding process of the terminal device and the on-board electronic device of the vehicle.
  • implementing the service server described in FIG. 10 can enable the user of the terminal device to know the unbinding result in time.
  • FIG. 11 is a schematic structural diagram of another service server disclosed in an embodiment of the present invention.
  • the business server shown in FIG. 11 is obtained by optimizing the business server shown in FIG. 10.
  • the service server shown in Figure 11 adds a method of binding Bluetooth information with device feature information, which ensures that the information stored in the service server is time-sensitive.
  • the service shown in Figure 11 The third sending unit 1003 of the server may include:
  • the judging subunit 10031 is used for judging whether the binding result is a successful binding result when the binding result sent by the in-vehicle electronic device is received.
  • the obtaining subunit 10032 is configured to obtain the Bluetooth information included in the binding result when the judgment result of the judging subunit 10031 is yes, and the Bluetooth information includes at least a Bluetooth address and a Bluetooth name.
  • the sending subunit 10033 is used to associate the Bluetooth information obtained by the obtaining subunit 10032 with the user account information, the vehicle information to be bound, and the device fingerprint and service key contained in the device characteristic information, and send the binding to the terminal device result.
  • the Bluetooth information fed back by the vehicle-mounted electronic device can be stored in association with the device characteristic information, so that the service server can associate the information of the terminal device with the binding relationship and the vehicle-mounted electronic device into the service server, ensuring The information stored in the business server is time-sensitive.
  • implementing the service server described in FIG. 11 can improve the security of data transmission during the binding process of the terminal device and the on-board electronic device of the vehicle.
  • implementing the service server described in FIG. 11 ensures that the information stored in the service server is time-sensitive.
  • FIG. 12 is a schematic structural diagram of a security server disclosed in an embodiment of the present invention.
  • the security server may include:
  • the signature and encryption unit 1201 is configured to perform a signature and encryption operation on the device feature information when receiving the device feature information sent by the service server to obtain the target device feature information.
  • the fourth sending unit 1202 is configured to send the target device feature information obtained by the signature encryption unit 1201 to the service server.
  • the fourth sending unit 1202 may also be used for:
  • the feature information of the device to be unbound sent by the service server can be signed and encrypted, so that the service server sends the encrypted feature information of the device to be unbound to the on-board electronic device, ensuring that The security of the feature information of the device to be unbound between the service server and the on-board electronic device.
  • implementing the security server described in FIG. 12 can improve the security of data transmission during the binding process of the terminal device and the on-board electronic device of the vehicle.
  • the implementation of the security server described in FIG. 12 ensures the security of transmitting the feature information of the device to be unbound between the service server and the in-vehicle electronic device.
  • FIG. 13 is a schematic structural diagram of another security server disclosed in an embodiment of the present invention.
  • the security server shown in FIG. 13 is obtained by optimizing the security server shown in FIG. 12.
  • the security server shown in Figure 13 explains in more detail the signature and encryption operations for device feature information, which ensures the security of data during transmission.
  • the signature and encryption unit 1201 of the security server may include:
  • the signature subunit 12011 is configured to, when receiving the device feature information sent by the service server, digitally sign the device feature information by using a preset private key to obtain the signature device feature information.
  • the encryption subunit 12012 is configured to perform a symmetric encryption operation on the signature device feature information obtained by the signature subunit 12011 by using a preset symmetric key to obtain target device feature information.
  • the device feature information can be digitally signed, and then the signed device feature information can be encrypted to obtain the encrypted target device feature information, so that the data transmitted with the vehicle electronic device is encrypted The data, thus ensuring the safety of the data in the transmission process.
  • the security server described in FIG. 13 can improve the security of data transmission during the binding process of the terminal device and the on-board electronic device of the vehicle.
  • the security server described in FIG. 13 is implemented to make the data transmitted with the vehicle-mounted electronic device encrypted data, thereby ensuring the security of the data in the transmission process.
  • FIG. 14 is a schematic structural diagram of a vehicle-mounted electronic device disclosed in an embodiment of the present invention. As shown in FIG. 14, the vehicle-mounted electronic device may include:
  • the decryption unit 1401 is used for when the in-vehicle security module of the in-vehicle electronic device receives the target device feature information sent by the service server, decrypts and verifies the target device feature information through the in-vehicle security module to obtain the current device feature information.
  • the transmission unit 1402 is used to store the current device characteristic information obtained by the decryption unit 1401 through the Bluetooth module outside the car, and transmit the storage result and the Bluetooth information corresponding to the Bluetooth module outside the car to the safety module in the car, where the Bluetooth information Contains the Bluetooth address and Bluetooth name of the Bluetooth module outside the car.
  • the fourth sending unit 1403 is configured to generate a binding result including the storage result transmitted by the transmission unit 1402 and the Bluetooth information through the in-vehicle security module, and send the binding result to the service server through the in-vehicle security module.
  • the fourth sending unit 1403 may also be used for:
  • the in-vehicle security module of the in-vehicle electronic device receives the encrypted feature information of the device to be unbound from the business server, the in-vehicle security module decrypts and verifies the feature information of the encrypted device to be unbound to obtain the target to be unbound Bind device feature information;
  • the in-vehicle security module determines that the deletion result is the unbinding result, and sends the unbound result to the business server through the in-vehicle security module.
  • the stored feature information of the target device to be unbound can be found according to the encrypted device feature information sent by the service server, and the feature information of the target device to be unbound can be deleted to realize the terminal device Unbinding operation with on-board electronic equipment, thereby improving the accuracy of unbinding operation.
  • FIG. 15 is a schematic structural diagram of a virtual key binding system disclosed in an embodiment of the present invention.
  • the virtual key binding system may include: a terminal device 1501, a business server 1502, and a security server 1503 and in-vehicle electronic equipment 1504.
  • the structure and function of the terminal device 1501 are the same as the structure and function of any of the terminal devices described in the eighth and ninth embodiments, which will not be repeated in this embodiment of the present invention.
  • the service server 1502 The structure and function of the security server 1503 are the same as the structure and function of any service server described in the tenth embodiment and the eleventh embodiment.
  • the structure and function of the security server 1503 are the same as those of the twelfth embodiment.
  • the structure and function of any security server are the same as those described in the thirteenth embodiment, and will not be repeated in this embodiment of the present invention.
  • the structure and function of the in-vehicle electronic device 1504 are the same as those of the in-vehicle electronic device described in the fourteenth embodiment. The same as the function, the embodiment of the present invention will not be repeated.
  • FIG. 16 is a schematic flowchart of another virtual key binding method disclosed in an embodiment of the present invention. As shown in FIG. 16, the virtual key binding method may include the following steps:
  • the terminal device When detecting the input binding instruction, the terminal device extracts the device fingerprint of the terminal device and generates a service key.
  • the terminal device generates device feature information including device fingerprints and service keys.
  • the terminal device sends the device feature information to the service server.
  • the service server associates and stores the device fingerprint and service key included in the device feature information, the user account information of the terminal device, and the vehicle information to be bound that matches the user account information.
  • the service server sends the device feature information to the security server.
  • the security server performs a signature and encryption operation on the device feature information to obtain the target device feature information.
  • the security server sends the target device characteristic information to the service server.
  • the service server sends the target device feature information to the vehicle-mounted electronic device matching the vehicle information to be bound.
  • the in-vehicle electronic device decrypts and verifies the feature information of the target device through the in-vehicle security module to obtain the current device feature information.
  • the vehicle electronic equipment stores the current device characteristic information through the Bluetooth module outside the vehicle, and transmits the storage results and the Bluetooth information corresponding to the Bluetooth module outside the vehicle to the safety module in the vehicle, where the Bluetooth information includes the Bluetooth module outside the vehicle Bluetooth address and Bluetooth name.
  • the vehicle-mounted electronic device generates a binding result including the storage result and Bluetooth information through the in-vehicle security module, and sends the binding result to the business server through the in-vehicle security module.
  • the service server sends the binding result to the terminal device.
  • the terminal device stores the Bluetooth information in the binding result, and the Bluetooth information matches the vehicle to be bound.
  • the device feature information generated according to the terminal device can be sent to the service server, so that the service server can store the device feature information and send the device feature information to the safe
  • the server to encrypt the device feature information of the security server and bind the encrypted device feature information to the on-board electronic device, so that the data transmitted by the terminal device during the binding operation with the on-board electronic device is encrypted data , To avoid leakage of data caused by data loss, thereby improving the security of data transmission during the binding process of the terminal device and the vehicle's on-board electronic device.
  • the embodiment of the present invention discloses a vehicle on which an in-vehicle electronic device 1504 is provided.
  • the embodiment of the present invention also discloses a computer-readable storage medium, where the computer-readable storage medium stores program code, where the program code includes instructions for executing part or all of the steps in the above method embodiments.
  • the embodiment of the present invention also discloses a computer program product, wherein when the computer program product runs on a computer, the computer is caused to execute part or all of the steps of the method in the above method embodiments.
  • the embodiment of the present invention also discloses an application publishing platform, wherein the application publishing platform is used to publish a computer program product, wherein, when the computer program product runs on a computer, the computer is caused to execute parts of the method in the above method embodiments Or all steps.
  • the program can be stored in a computer-readable storage medium.
  • the storage medium includes read-only Memory (Read-Only Memory, ROM), Random Access Memory (RAM), Programmable Read-only Memory (PROM), Erasable Programmable Read Only Memory, EPROM), One-time Programmable Read-Only Memory (OTPROM), Electronically-Erasable Programmable Read-Only Memory (EEPROM), CD-ROM (Compact Disc) Read-Only Memory, CD-ROM) or other optical disk storage, magnetic disk storage, tape storage, or any other computer-readable medium that can be used to carry or store data.
  • Read-Only Memory ROM
  • RAM Random Access Memory
  • PROM Programmable Read-only Memory
  • EPROM Erasable Programmable Read Only Memory
  • OTPROM One-time Programmable Read-Only Memory
  • EEPROM Electronically-Erasable Programmable Read-Only Memory
  • CD-ROM Compact Disc
  • the units described above as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, and may be located in one place or distributed on multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • the functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
  • the aforementioned integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer-accessible memory.
  • the essence of the technical solution of the present invention or the part that contributes to the existing technology or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a memory.
  • a computer device which may be a personal computer, a server, or a network device, etc., specifically a processor in a computer device

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mechanical Engineering (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Lock And Its Accessories (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明涉及车辆技术领域,公开一种虚拟钥匙绑定方法及***,包括:当检测到输入的绑定指令时,终端设备提取终端设备的设备指纹并生成业务密钥;并生成包含设备指纹和业务密钥的设备特征信息,以及向业务服务器发送该设备特征信息,以使业务服务器将设备特征信息存储至待绑定车辆的车载电子设备中;以及当检测到业务服务器发送的绑定结果为成功绑定时,终端设备将绑定结果中的蓝牙信息进行存储,该蓝牙信息与待绑定车辆信息匹配。实施本发明实施例,能够提高终端设备与车辆的车载电子设备绑定过程中传输数据的安全性。

Description

虚拟钥匙绑定方法及*** 技术领域
本发明涉及车辆技术领域,具体涉及一种虚拟钥匙绑定方法及***。
背景技术
随着物联网的发展与普及,一些汽车厂商选择使用卡片式汽车钥匙取代传统物理钥匙。目前,卡片式汽车钥匙在使用之前需要与汽车进行绑定,通常卡片式汽车钥匙与汽车的绑定方式通常为:当卡片式汽车钥匙接近汽车时,卡片式汽车钥匙可以通过蓝牙协议栈与汽车上的终端设备实现简单的匹配认证,在认证通过后可以确定卡片式汽车钥匙与该汽车实现绑定。
然而,在实践中发现,当前在卡片式汽车钥匙与车载电子设备的绑定过程中存在的数据传输完全依赖于蓝牙协议栈,由于不同的蓝牙协议栈对应的安全级别不同,且安全级别较低的蓝牙协议栈在使用过程中可能会出现信道劫持或信道干扰等问题,因此,上述卡片式汽车钥匙与汽车的绑定方式无法保证传输数据的安全性。
发明内容
本发明实施例公开一种虚拟钥匙绑定方法及***,能够提高汽车钥匙与汽车在绑定过程中传输数据的安全性。
本发明实施例第一方面公开一种虚拟钥匙绑定方法,所述方法包括:
当检测到输入的绑定指令时,终端设备提取所述终端设备的设备指纹并生成业务密钥;
所述终端设备生成包含所述设备指纹和所述业务密钥的设备特征信息;
所述终端设备向业务服务器发送所述设备特征信息,以使所述业务服务器将所述设备特征信息存储至待绑定车辆的车载电子设备中;
当检测到所述业务服务器发送的绑定结果为成功绑定时,所述终端设备将所述绑定结果中的蓝牙信息进行存储,所述蓝牙信息与所述待绑定车辆匹配。
作为一种可选的实施方式,在本发明实施例第一方面中,所述当检测到输入的绑定指令时,终端设备提取所述终端设备的设备指纹并生成业务密钥,包括:
当检测到输入的绑定指令时,终端设备提取所述终端设备的若干个设备指纹特征值;
所述终端设备根据所述若干个设备指纹特征值生成所述终端设备的设备指纹,并生成业务密钥,所述业务密钥为业务公私钥对或业务对称密钥。
本发明实施例第二方面公开另一种虚拟钥匙绑定方法,所述方法包括:
当接收到终端设备发送的设备特征信息时,所述业务服务器将所述设备特征信息中包含的设备指纹和业务密钥、所述终端设备的用户账号信息以及与所述用户账号信息匹配的待绑定车辆信息进行关联存储,并将所述设备特征信息发送至安全服务器,以使所述安全服务器对所述设备特征信息进行加签加密操作;
当检测到所述安全服务器反馈的加签加密后的目标设备特征信息时,所述业务服务器向与所述待绑定车辆信息匹配的车载电子设备发送所述目标设备特征信息,以使所述车载电子设备存储所述目标设备特征信息;
当接收到所述车载电子设备发送的绑定结果时,所述业务服务器向所述终端设备发送所述绑定结果。
作为一种可选的实施方式,在本发明实施例第二方面中,当接收到所述车载电子设备发送的绑定结果时,所述业务服务器向所述终端设备发送所述绑定结果,包括:
当接收到所述车载电子设备发送的绑定结果时,所述业务服务器判断所述绑定结果是否为成功绑定结果;
如果是,所述业务服务器获取所述绑定结果中包含的蓝牙信息,所述蓝牙信息至少包含蓝牙地址和蓝牙名称;
所述业务服务器将所述蓝牙信息与所述用户账号信息、所述待绑定车辆信息以及所述设备特征信息中包含的所述设备指纹和所述业务密钥进行关联存储,并向所述终端设备发送所述绑定结果。
本发明实施例第三方面公开一种虚拟钥匙绑定方法,所述方法包括:
当接收到业务服务器发送的设备特征信息时,安全服务器对所述设备特征信息进行加签加密操作,得到目标设备特征信息;
所述安全服务器向所述业务服务器发送所述目标设备特征信息。
作为一种可选的实施方式,在本发明实施例第三方面中,当接收到业务服务器发送的设备特征信息时,安全服务器对所述设备特征信息进行加签加密操作,得到目标设备特征信息,包括:
当接收到业务服务器发送的设备特征信息时,安全服务器通过预设的私钥对所述设备特征信息进行数字签名,得到加签设备特征信息;
所述安全服务器通过预设的对称密钥对所述加签设备特征信息进行对称加密运算,得到目标设备特征信息。
本发明实施例第四方面公开另一种虚拟钥匙绑定方法,所述方法包括:
当车载电子设备的车内安全模组接收到业务服务器发送的目标设备特征信息时,所述车载电子设备通过所述车内安全模组对所述目标设备特征信息进行解密和验签操作,得到当前设备特征信息;
所述车载电子设备通过车外蓝牙模组存储所述当前设备特征信息,并将存储结果以及所述车外蓝牙模组对应的蓝牙信息传输至所述车内安全模组中,其中,所述蓝牙信息包含所述车外蓝牙模组的蓝牙地址和蓝牙名称;
所述车载电子设备通过所述车内安全模组生成包含所述存储结果和所述蓝牙信息的绑定结果,并通过所述车内安全模组向所述业务服务器发送所述绑定结果。
本发明实施例第五方面公开一种终端设备,包括:
提取单元,用于当检测到输入的绑定指令时,提取所述终端设备的设备指纹并生成业务密钥;
生成单元,用于生成包含所述设备指纹和所述业务密钥的设备特征信息;
第一发送单元,用于向业务服务器发送所述设备特征信息;
第一存储单元,用于当检测到所述业务服务器发送的绑定结果为成功绑定时,将所述绑定结果中的蓝牙信息进行存储,所述蓝牙信息与所述待绑定车辆匹配。
作为一种可选的实施方式,在本发明实施例第五方面中,所述提取单元包括:
提取子单元,用于当检测到输入的绑定指令时,提取所述终端设备的若干个设备指纹特征值;
生成子单元,用于根据所述若干个设备指纹特征值生成所述终端设备的设备指纹,并生成业务密钥,所述业务密钥为业务公私钥对或业务对称密钥。
本发明实施例第六方面公开一种业务服务器,包括:
第二存储单元,用于当接收到终端设备发送的设备特征信息时,将所述设备特征信息中包含的设备指纹和业务密钥、所述终端设备的用户账号信息以及与所述用户账号信息匹配的待绑定车辆信息进行关联存储,并将所述设备特征信息发送至安全服务器;
第二发送单元,用于当检测到所述安全服务器反馈的加签加密后的目标设备特征信息时,向与所述待绑定车辆信息匹配的车载电子设备发送所述目标设备特征信息;
第三发送单元,用于当接收到所述车载电子设备发送的绑定结果时,向所述终端设备发送所述绑定结果。
作为一种可选的实施方式,在本发明实施例第六方面中,所述第三发送单元包括:
判断子单元,用于当接收到所述车载电子设备发送的绑定结果时,判断所述绑定结果是否为成功绑定结果;
获取子单元,用于在所述判断子单元判断结果为是时,获取所述绑定结果中包含的蓝牙信息,所述蓝牙信息至少包含蓝牙地址和蓝牙名称;
发送子单元,用于将所述蓝牙信息与所述用户账号信息、所述待绑定车辆信息以及所述设备特征信息中包含的所述设备指纹和所述业务密钥进行关联存储,并向所述终端设备发送所述绑定结果。
本发明实施例第七方面公开一种安全服务器,包括:
加签加密单元,用于当接收到业务服务器发送的设备特征信息时,对所述设备特征信息进行加签加密操作,得到目标设备特征信息;
第四发送单元,用于向所述业务服务器发送所述目标设备特征信息。
作为一种可选的实施方式,在本发明实施例第七方面中,所述加签加密单元包括:
加签子单元,用于当接收到业务服务器发送的设备特征信息时,通过预设的私钥对所述设备特征信息进行数字签名,得到加签设备特征信息;
加密子单元,用于通过预设的对称密钥对所述加签设备特征信息进行对称加密运算,得到目标设备特征信息。
本发明实施例第八方面公开一种车载电子设备,包括:
解密单元,用于当所述车载电子设备的车内安全模组接收到业务服务器发送的目标设备特征信息时,通过所述车内安全模组对所述目标设备特征信息进行解密和验签操作,得到当前设备特征信息;
传输单元,用于通过车外蓝牙模组存储所述当前设备特征信息,并将存储结果以及所述车外蓝牙模组对应的蓝牙信息传输至所述车内安全模组中,其中,所述蓝牙信息包含所述车外蓝牙模组的蓝牙地址和蓝牙名称;
第四发送单元,用于通过所述车内安全模组生成包含所述存储结果和所述蓝牙信息的绑定结果,并通过所述车内安全模组向所述业务服务器发送所述绑定结果。
本发明实施例第九方面公开一种虚拟钥匙绑定***,所述***包括终端设备、业务服务器、安全服务器以及车载电子设备,其中:
所述终端设备,用于当检测到输入的绑定指令时,提取所述终端设备的设备指纹并生成业务密钥;以及生成包含所述设备指纹和所述业务密钥的设备特征信息;以及向业务服务器发送所述设备特征信息,以使所述业务服务器将所述设备特征信息存储至待绑定车辆的车载电子设备中;以及当检测到所述业务服务器发送的绑定结果为成功绑定时,将所述绑定结果中的蓝牙信息进行存储,所述蓝牙信息与所述待绑定车辆匹配;
所述业务服务器,用于当接收到所述终端设备发送的所述设备特征信息时,将所述设备特征信息中包含的设备指纹和业务密钥、所述终端设备的用户账号信息以及与所述用户账号信息匹配的待绑定车辆信息进行关联存储,并将所述设备特征信息发送至安全服务器,以使所述安全服务器对所述设备特征信息进行加签加密操作;以及当检测到所述安全服务器反馈的加签加密后的目标设备特征信息时,向与所述待绑定车辆信息匹配的车载电子设备发送所述目标设备特征信息,以使所述车载电子设备存储所述目标设备特征信息;以及当接收到所述车载电子设备发送的绑定结果时,向所述终端设备发送所述绑定结果;
所述安全服务器,用于当接收到业务服务器发送的设备特征信息时,对所述设备特征信息进行加签加密操作,得到目标设备特征信息;并向所述业务服务器发送所述目标设备特征信息;
所述车载电子设备,用于当所述车载电子设备的车内安全模组接收到所述业务服务器发送的所述目标设备特征信息时,通过所述车内安全模组对所述目标设备特征信息进行解密和验签操作,得到当前设备特征信息;以及通过车外蓝牙模组存储所述当前设备特征信息,并将存储结果以及所述车外蓝牙模组对应的蓝牙信息传输至所述车内安全模组中;以及通过所述车内安全模组生成包含所述存储结果和所述蓝牙信息的绑定结果,并通过所述车内安全模组向所述业务服务器发送所述绑定结果;其中,所述蓝牙信息包含所述车外蓝牙模组的蓝牙地址和蓝牙 名称。
本发明实施例第十方面公开一种车辆,包括第八方面公开的车载电子设备。
本发明实施例第十一方面公开一种计算机可读存储介质,所述计算机可读存储介质存储了程序代码,其中,所述程序代码包括用于执行第一方面、第二方面、第三方面以及第四方面的任意一种方法的部分或全部步骤的指令。
本发明实施例第十二方面公开一种计算机程序产品,当所述计算机程序产品在计算机上运行时,使得所述计算机执行第一方面、第二方面、第三方面以及第四方面的任意一种方法的部分或全部步骤。
本发明实施例第十三方面公开一种应用发布平台,所述应用发布平台用于发布计算机程序产品,其中,当所述计算机程序产品在计算机上运行时,使得所述计算机执行第一方面、第二方面、第三方面以及第四方面的任意一种方法的部分或全部步骤。
与现有技术相比,本发明实施例具有以下有益效果:
本发明实施例中,当检测到输入的绑定指令时,终端设备提取终端设备的设备指纹并生成业务密钥;终端设备生成包含设备指纹和业务密钥的设备特征信息;终端设备向业务服务器发送设备特征信息,以使业务服务器将设备特征信息存储至待绑定车辆的车载电子设备中;以及当检测到业务服务器发送的绑定结果为成功绑定时,终端设备将绑定结果中的蓝牙信息进行存储,蓝牙信息与待绑定车辆匹配。可见,实施本发明实施例,能够将根据终端设备生成的设备特征信息发送至业务服务器,并通过业务服务器将设备特征信息绑定至车载电子设备中,以使终端设备在与车载电子设备的绑定是通过业务服务器实现的,避免了终端设备与车载电子设备直接传输数据而可能出现的数据丢失问题,从而提高了终端设备与车辆的车载电子设备绑定过程中传输数据的安全性。
附图说明
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本发明实施例公开的一种虚拟钥匙绑定方法的流程示意图;
图2是本发明实施例公开的另一种虚拟钥匙绑定方法的流程示意图;
图3是本发明实施例公开的另一种虚拟钥匙绑定方法的流程示意图;
图4是本发明实施例公开的另一种虚拟钥匙绑定方法的流程示意图;
图5是本发明实施例公开的另一种虚拟钥匙绑定方法的流程示意图;
图6是本发明实施例公开的另一种虚拟钥匙绑定方法的流程示意图;
图7是本发明实施例公开的另一种虚拟钥匙绑定方法的流程示意图;
图8是本发明实施例公开的一种终端设备的结构示意图;
图9是本发明实施例公开的另一种终端设备的结构示意图;
图10是本发明实施例公开的一种业务服务器的结构示意图;
图11是本发明实施例公开的另一种业务服务器的结构示意图;
图12是本发明实施例公开的一种安全服务器的结构示意图;
图13是本发明实施例公开的另一种安全服务器的结构示意图;
图14是本发明实施例公开的一种车载电子设备的结构示意图;
图15是本发明实施例公开的一种虚拟钥匙绑定***的结构示意图;
图16是本发明实施例公开的另一种虚拟钥匙绑定方法的流程示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
需要说明的是,本发明实施例及附图中的术语“包括”和“具有”以及它们任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、***、产品或设备没有限定于已列出的步骤或单元,而是可选地还包括没有列出的步骤或单元,或可选地还包括对于这些过程、方法、产品或设备固有的其它步骤或单元。
本发明实施例公开一种虚拟钥匙绑定方法及***,能够提高终端设备与车辆的车载电子设备绑定过程中传输数据的安全性。以下分别进行详细说明。
实施例一
请参阅图1,图1是本发明实施例公开的一种虚拟钥匙绑定方法的流程示意图。如图1所示,该虚拟钥匙绑定方法可以包括以下步骤:
101、当检测到输入的绑定指令时,终端设备提取终端设备的设备指纹并生成业务密钥。
本发明实施例中,终端设备可以为智能手机、智能手环等设备;输入绑定指令的用户需要为车主用户,且不可以为驾驶员用户,车主用户可以先通过车主的终端设备向业务服务器发送绑定指令,业务服务器可以读取绑定指令中包含的待绑定车辆信息与待绑定用户信息,且当业务服务器识别出待绑定用户的身份为车主时,业务服务器将该绑定指令发送至车主的终端设备,当业务服务器识别出待绑定用户的身份为驾驶员时,业务服务器从存储器中读取该驾驶员的账号信息,并向该驾驶员的账号发送该绑定指令,以使驾驶员登录的终端设备可以接收到该绑定指令,进而获取到驾驶员的终端设备的设备指纹等信息。
本发明实施例中,设备指纹(Device Fingerprint)可以用于唯一的标识出终端设备的设备特征,从而根据设备指纹可以唯一的确定终端设备。
本发明实施例中,业务密钥可以为业务公私钥对或业务对称密钥,业务密钥可以使安全服务器对设备特征信息进行加签和加密操作,以使存储于车载电子设备的基于业务密钥的加签和加密后的设备特征信息能够被存储有该业务密钥的终端设备验证。
更进一步,安全服务器可以对设备特征信息进行数字签名(Digital Signature),数字签名为非对称加密技术与数字摘要技术的应用,可以通过椭圆曲线数字签名算法(Elliptic Curve Digital Signature Algorithm,ECDSA)或RSA加密算法(RSA Algorithm)实现。具体实现方式可以为:安全服务器可以通过散列编码(Hash编码)对设备特征信息进行运算,得到设备特征信息的数字摘要,并利用安全服务器预设的私钥以及加密算法对运算得到的数字摘要进行加密,得到数字签名,并将加密得到的数字签名与加密后的设备特征信息同时发送至车载电子设备,车载电子设备中可以预存储有与安全服务器预设的私钥对应的公钥,进而可以利用该公钥将接收的数字签名进行解密,得到当前数字摘要;同时,车载电子设备可以将加密后的设备特征信息进行解密,得到当前设备特征信息,并通过Hash编码同样对该当前设备特征信息进行运算,得到测试数字摘要,如果运算得到的测试数字摘要与解密得到的当前数字摘要相同,则可以认为车载电子设备接收安全服务器发送的设备特征信息是准确的,未在传输过程中出现丢失或遗漏等情况,保证了车载电子设备接收的设备特征信息的准确性。
102、终端设备生成包含设备指纹和业务密钥的设备特征信息。
103、终端设备向业务服务器发送设备特征信息,以使业务服务器将设备特征信息存储至待绑定车辆的车载电 子设备中。
本发明实施例中,业务服务器可以为云服务器等设备,业务服务器可以与终端设备建立通信连接,从而与终端设备进行数据交互,并处理终端设备上传的数据,也可以与车载电子设备建立通信连接,从而与车载电子设备进行数据交互并处理车载电子设备上传的数据。
104、当检测到业务服务器发送的绑定结果为成功绑定时,终端设备将绑定结果中的蓝牙信息进行存储,该蓝牙信息与待绑定车辆匹配。
本发明实施例中,由于终端设备与车载电子设备在绑定成功之后需要基于蓝牙配对的方式实现解锁等操作,因此,终端设备中需要存储车载电子设备的蓝牙钥匙认证模组对应的蓝牙信息,蓝牙信息至少可以包含蓝牙名称和蓝牙地址等,以使终端设备可以根据蓝牙信息匹配正确的车辆上设置的车载电子设备。
作为一种可选的实施方式,终端设备执行步骤104之后,还可以执行以下步骤:
当检测到输入的解绑指令时,终端设备判断该解绑指令中包含的解绑用户类型是否为车主类型;
如果是,终端设备从该解绑信息中识别待解绑车辆信息以及待解绑用户的解绑账号信息;
终端设备生成包含待解绑车辆信息以及解绑账号信息的解绑请求,并向业务服务器发送该解绑请求;
当接收到业务服务器发送的解绑结果时,终端设备输出该解绑结果。
其中,实施这种实施方式,可以对车主用户提出的解绑申请进行响应,并将解绑指令中包含的待解绑车辆信息以及待解绑用户的解绑账号信息发送至业务服务器,从而使得业务服务器可以准确的删除与解绑指令对应的信息,并向终端设备反馈解绑结果,以使发起解绑申请的用户可以清楚的知道解绑结果,提高了终端设备与用户的交互性。
在图1所描述的方法中,能够提高终端设备与车辆的车载电子设备绑定过程中传输数据的安全性。此外,实施图1所描述的方法,提高了终端设备与用户的交互性。
实施例二
请参阅图2,图2是本发明实施例公开的另一种虚拟钥匙绑定方法的流程示意图。与实施例一相比,本发明实施例更加详细的说明了终端设备的设备指纹的生成方式,可以使设备指纹中包含的与终端设备相关的信息更加全面。如图2所示,该虚拟钥匙绑定方法可以包括以下步骤:
201、当检测到输入的绑定指令时,终端设备提取终端设备的若干个设备指纹特征值。
本发明实施例中,终端设备的设备指纹可以根据提取到的终端设备的设备指纹特征值生成,设备指纹特征值可以为设备的型号、序列号、硬件版本等信息,且终端设备的设备指纹可以由200项以上的设备指纹特征值生成。
202、终端设备根据若干个设备指纹特征值生成终端设备的设备指纹,并生成业务密钥,业务密钥为业务公私钥对或业务对称密钥。
本发明实施例中,终端设备的设备指纹需要由若干个设备指纹特征值组合生成,因此终端设备的指纹特征信息中需要包含获取到的全部的设备指纹特征值。
本发明实施例中,实施上述的步骤201~步骤202,可以提取到终端设备的若干项设备指纹特征值,并根据该若干项设备指纹特征值生成设备指纹,以使设备指纹中包含的与终端设备相关的信息更加全面。
203、终端设备生成包含设备指纹和业务密钥的设备特征信息。
204、终端设备向业务服务器发送设备特征信息,以使业务服务器将设备特征信息存储至待绑定车辆的车载电子设备中。
205、当检测到业务服务器发送的绑定结果为成功绑定时,终端设备将绑定结果中的蓝牙信息进行存储,蓝牙信息与待绑定车辆匹配。
在图2所描述的方法中,能够提高终端设备与车辆的车载电子设备绑定过程中传输数据的安全性。此外,实施图2所描述的方法,可以使设备指纹中包含的与终端设备相关的信息更加全面。
实施例三
请参阅图3,图3是本发明实施例公开的另一种虚拟钥匙绑定方法的流程示意图。如图3所示,该虚拟钥匙绑定方法可以包括以下步骤:
301、当接收到终端设备发送的设备特征信息时,业务服务器将设备特征信息中包含的设备指纹和业务密钥、终端设备的用户账号信息以及与用户账号信息匹配的待绑定车辆信息进行关联存储,并将设备特征信息发送至安全服务器,以使安全服务器对设备特征信息进行加签加密操作。
本发明实施例中,业务服务器可以为云服务器等设备,可以对终端设备或者车载电子设备发送的数据进行处理,还可以存储终端设备或者车载电子设备上传的数据。业务服务器可以预先与终端设备或者车载电子设备建立数据连接,以使终端设备和车载电子设备可以随时向业务服务器发送数据。此外,业务服务器中还可以将设备特征信息同步至安全服务器中;安全服务器可以对设备特征信息进行加签和加密操作,以保证设备特征信息的安全性。
本发明实施例中,业务服务器中存储的用户的账号的以及与用户的账号信息匹配的待绑定车辆信息可以为用户预先存储的,例如,用户买车之后可以通过终端设备注册账号,并将注册得到的账号与用户车辆的车辆识别号码(Vehicle Identification Number,VIN)进行绑定,并且用户注册的账号以及与该账号绑定的VIN可以存储至业务服务器中,当用户需要将虚拟钥匙与用户的车辆进行绑定时,业务服务器可以直接从预先存储的信息中确定出终端设备的用户信息以及与该用户信息匹配的待绑定车辆信息,该待绑定车辆信息中可以包含用户车辆的VIN。
本发明实施例中,业务服务器中可以预先识别出发送绑定指令的用户的账号信息,还可以从绑定指令中读取出该账号信息需要绑定的待绑定车辆信息,待绑定车辆信息中可以包含待绑定车辆的VIN,通过车辆识别号码可以唯一的确定目标车辆。待绑定用户的账号信息中可以包含待绑定用户的电话号码、编号等信息,对此,本发明实施例不做限定。业务服务器可以将设备特征信息和用户账号信息以及待绑定车辆信息关联存储至业务服务器的存储器中,以使业务服务器可以根据设备特征信息和用户账号信息以及待绑定车辆信息中的任意一项信息从存储器中确定出与该任意一项信息匹配的其他信息,以提高设备特征信息、用户账号信息以及待绑定车辆信息之间的相关性。此外,业务服务器在存储设备特征信息、用户账号信息以及待绑定车辆信息之后,还可以将存储的设备特征信息同步至安全服务器,以使安全服务器对设备特征信息进行加签和加密操作,以使业务服务器向车载电子设备发送的设备特征信息为加签加密后的信息,从而提高了业务服务器与车载电子设备之间数据传输的安全性。
302、当检测到安全服务器反馈的加签加密后的目标设备特征信息时,业务服务器向与待绑定车辆信息匹配的车载电子设备发送目标设备特征信息,以使车载电子设备存储目标设备特征信息。
本发明实施例中,业务服务器可以在存储器中查找到与待绑定车辆信息匹配的目标车辆,更进一步可以确定目标车辆上设置的车载电子设备的信息,业务服务器可以根据获取到的车载电子设备的信息向与待绑定车辆信息匹配的车载电子设备发送目标设备特征信息,车载电子设备可以将目标设备特征信息与车辆上设置的蓝牙进行绑定,以使终端设备接近该车辆时,可以与车辆上设置的蓝牙进行连接,进而基于连接的蓝牙实现终端设备的身份验证,以使车辆的用户可以基于蓝牙实现终端设备与车辆之间的解锁认证。
303、当接收到车载电子设备发送的绑定结果时,业务服务器向终端设备发送绑定结果。
本发明实施例中,由于车载电子设备在绑定阶段还未与终端设备建立通信连接,因此车载电子设备需要将目标设备特征信息与车载电子设备的绑定结果先发送至业务服务器,以使业务服务器将绑定结果发送至终端设备, 以使终端设备得到绑定结果。此外,绑定结果可以为绑定成功或者绑定失败。
作为一种可选的实施方式,业务服务器执行步骤303之后,还可以执行以下步骤:
当接收到终端设备发送的解绑请求时,业务服务器识别解绑请求中包含的待解绑车辆信息和解绑账号信息;
业务服务器获取与待解绑车辆信息和解绑账号信息匹配的待解绑设备特征信息,并向安全服务器发送该待解绑设备特征信息,以使安全服务器将待解绑设备特征信息进行加签加密,该待解绑设备特征信息中可以包含待解绑设备指纹和业务密钥等;
当接收到安全服务器发送的加签加密后的加密待解绑设备特征信息时,业务服务器向待解绑车辆信息匹配的车载电子设备发送加密待解绑设备特征信息,以使车载电子设备将已绑定的待解绑车辆信息删除;
当接收到车载电子设备发送的解绑结果时,业务服务器向终端设备发送解绑结果。
其中,实施这种实施方式,可以使业务服务器根据解绑请求获取匹配的待解绑设备特征信息,以及将安全服务器加签加密后的加密待解绑设备特征信息发送至车载电子设备,以使车载电子设备将该待解绑设备特征信息删除,从而实现终端设备与车载电子设备的解绑操作,并将解绑结果发送至终端设备,以使终端设备的用户及时的知晓解绑结果。
在图3所描述的方法中,能够提高终端设备与车辆的车载电子设备绑定过程中传输数据的安全性。此外,实施图3所描述的方法,可以使终端设备的用户及时的知晓解绑结果。
实施例四
请参阅图4,图4是本发明实施例公开的另一种虚拟钥匙绑定方法的流程示意图。与实施例三相比,本发明实施例增加了将蓝牙信息与设备特征信息绑定的方法,保证了业务服务器中存储的信息具有时效性。如图4所示,该虚拟钥匙绑定方法可以包括以下步骤:
401、当接收到终端设备发送的设备特征信息时,业务服务器将设备特征信息中包含的设备指纹和业务密钥、终端设备的用户账号信息以及与用户账号信息匹配的待绑定车辆信息进行关联存储,并将设备特征信息发送至安全服务器,以使安全服务器对设备特征信息进行加签加密操作。
402、当检测到安全服务器反馈的加签加密后的目标设备特征信息时,业务服务器向与待绑定车辆信息匹配的车载电子设备发送目标设备特征信息,以使车载电子设备存储目标设备特征信息。
403、当接收到车载电子设备发送的绑定结果时,业务服务器判断绑定结果是否为成功绑定结果,如果是,执行步骤404~步骤405;如果否,结束本流程。
本发明实施例中,当判断出该绑定结果为成功绑定时,可以认为车载电子设备成功将加签加密后的设备特征信息进行存储,且终端设备可以与车载电子设备成功进行蓝牙连接,并可以通过蓝牙成功对车载电子设备的车辆进行解锁操作。当判断出该绑定结果为未成功绑定时,可以认为车载电子设备未能成功存储加签加密的设备特征信息,终端设备无法通过与车载电子设备的蓝牙连接成功的将车载电子设备的车辆进行解锁,因此,业务服务器可以重新向车载电子设备发送加签加密后的设备特征信息,以使车载电子设备重新对加签加密后的设备特征信息进行存储,此外,业务服务器还可以向终端设备发送绑定失败信息,以使终端设备的用户可以重新进行绑定操作,保证终端设备的用户可以及时知悉终端设备与车载电子设备的绑定结果。
404、业务服务器获取绑定结果中包含的蓝牙信息,蓝牙信息至少包含蓝牙地址和蓝牙名称。
本发明实施例中,如果绑定结果为成功绑定结果,可以认为车载电子设备成功将目标设备特征信息存储至与待绑定车辆信息匹配的车载电子设备中,且由于后续终端设备与车载电子设备需要基于蓝牙进行连接,因此,车载电子设备需要将自身的蓝牙信息传输至终端设备,以使终端设备能够成功连接正确的蓝牙,车载电子设备可以将自身的蓝牙信息(如蓝牙名称和蓝牙地址等)通过绑定结果上传至业务服务器,并通过业务服务器将包含车载 电子设备的蓝牙信息传输至终端设备。
405、业务服务器将蓝牙信息与用户账号信息、待绑定车辆信息以及设备特征信息中包含的设备指纹和业务密钥进行关联存储,并向终端设备发送绑定结果。
本发明实施例中,业务服务器可以将蓝牙信息与对应的设备特征信息进行关联存储,以使后续对终端设备与车载电子设备的绑定信息进行修改、删除等操作时,可以快速、全面的获取到终端设备与车载电子设备的绑定信息,从而保证修改或删除的绑定信息的全面性。
本发明实施例中,实施上述的步骤403~步骤405,可以将车载电子设备反馈的蓝牙信息与设备特征信息关联存储,以使业务服务器可以将具有绑定关系的终端设备和车载电子设备的信息关联存储至业务服务器中,保证了业务服务器中存储的信息具有时效性。
在图4所描述的方法中,能够提高终端设备与车辆的车载电子设备绑定过程中传输数据的安全性。此外,实施图4所描述的方法,保证了业务服务器中存储的信息具有时效性。
实施例五
请参阅图5,图5是本发明实施例公开的另一种虚拟钥匙绑定方法的流程示意图。如图5所示,该虚拟钥匙绑定方法可以包括以下步骤:
501、当接收到业务服务器发送的设备特征信息时,安全服务器对设备特征信息进行加签加密操作,得到目标设备特征信息。
本发明实施例中,安全服务器可以为云服务器等设备,可以接收业务服务器发送的数据,也可以向业务服务器发送数据。业务服务器可以将设备特征信息同步至安全服务器,以使安全服务器可以对设备特征信息进行操作。安全服务器获取到设备特征信息之后,可以对设备特征信息进行加签和加密操作,安全服务器可以利用业务密钥以及RSA加密算法对设备特征信息进行非对称加密签名计算,并对设备特征信息利用高级加密标准(Advanced Encryption Standard,AES)加密,得到加签加密后的目标设备特征信息。当要对利用非对称加密方式的得到的加签和加密后的设备特征信息进行验证,则需要验签的设备拥有与非对称加密的公钥对应的私钥,可见,通过非对称加密得到的加签设备特征信息的安全性得到保证。
502、安全服务器向业务服务器发送目标设备特征信息。
作为一种可选的实施方式,安全服务器执行步骤502之后,还可以执行以下步骤:
安全服务器对待解绑设备特征信息进行加签和加密操作,得到加密待解绑设备特征信息;
安全服务器向业务服务器发送加密待解绑设备特征信息。
其中,实施这种实施方式,可以对业务服务器发送的待解绑设备特征信息进行加签和加密操作,以使业务服务器向车载电子设备发送的是加密后的待解绑设备特征信息,保证了业务服务器与车载电子设备之间传输待解绑设备特征信息的安全性。
在图5所描述的方法中,能够提高终端设备与车辆的车载电子设备绑定过程中传输数据的安全性。此外,实施图5所描述的方法,保证了业务服务器与车载电子设备之间传输待解绑设备特征信息的安全性。
实施例六
请参阅图6,图6是本发明实施例公开的另一种虚拟钥匙绑定方法的流程示意图。与实施例五相比,本发明实施例更加详细的说明了针对设备特征信息的加签和加密操作,保证了数据在传输过程中的安全性。如图6所示,该虚拟钥匙绑定方法可以包括以下步骤:
601、当接收到业务服务器发送的设备特征信息时,安全服务器通过预设的私钥对设备特征信息进行数字签名,得到加签设备特征信息。
本发明实施例中,安全服务器对设备特征信息进行数字签名的过程可以为:安全服务器可以提取设备特征信息的摘要,并利用预设的私钥对提取的摘要进行加密,得到数字签名,并将该数字签名与目标设备特征信息同时发送至车载电子设备,车载电子设备中预存储有安全服务器预设的私钥对应的公钥,车载电子设备可以利用该公钥将接收的数字签名进行解密,得到当前摘要,车载电子设备可以将该当前摘要与解密得到的设备特征信息进行对比,如果当前摘要与设备特征信息一致,则可以认为车载电子设备解密得到的设备特征信息是准确的,未在传输过程中出现丢失或遗漏等情况,从而保证了车载电子设备确认设备特征信息的准确性。
602、安全服务器通过预设的对称密钥对加签设备特征信息进行对称加密运算,得到目标设备特征信息。
本发明实施例中,实施上述的步骤601~步骤602,可以先对设备特征信息进行数字签名,进而对加签后的设备特征信息进行加密运算,得到加密后的目标设备特征信息,以使与车载电子设备传输的数据为加密后的数据,从而保证了数据在传输过程中的安全性。
603、安全服务器向业务服务器发送目标设备特征信息。
在图6所描述的方法中,能够提高终端设备与车辆的车载电子设备绑定过程中传输数据的安全性。此外,实施图6所描述的方法,使与车载电子设备传输的数据为加密后的数据,从而保证了数据在传输过程中的安全性。
实施例七
请参阅图7,图7是本发明实施例公开的另一种虚拟钥匙绑定方法的流程示意图。如图7所示,该虚拟钥匙绑定方法可以包括以下步骤:
701、当车载电子设备的车内安全模组接收到业务服务器发送的目标设备特征信息时,车载电子设备通过车内安全模组对目标设备特征信息进行解密和验签操作,得到当前设备特征信息。
本发明实施例中,车载电子设备中可以设置车载***等软件***,车载电子设备可以实现对车辆任意部件的控制,从而便于车辆的用户的操作。车载电子设备中可以包含车外蓝牙模组和车内安全模组,车外蓝牙模组可以与终端设备实现蓝牙连接,还可以存储业务服务器发送的目标设备特征信息,以使终端设备可以与车载电子设备正确连接。车内安全模组可以对目标设备特征信息进行解密和验签操作,只有车内安全模组成功对目标设备特征信息进行解密,并验证解密后的目标设备特征信息的正确性和完整性,只有对目标设备特征信息的解密和验签操作都通过的情况下才能得到当前设备特征信息。
702、车载电子设备通过车外蓝牙模组存储当前设备特征信息,并将存储结果以及车外蓝牙模组对应的蓝牙信息传输至车内安全模组中,其中,蓝牙信息包含车外蓝牙模组的蓝牙地址和蓝牙名称。
本发明实施例中,车外蓝牙模组可以为设置在车辆外部的蓝牙模组,车外蓝牙模组可以存储当前设备特征信息,当车外蓝牙模组成功的将当前设备特征信息存储时,车外蓝牙模组可以将车外蓝牙模组的蓝牙名称和蓝牙地址等蓝牙信息以及存储结果传输至车内安全模组。
703、车载电子设备通过车内安全模组生成包含存储结果和蓝牙信息的绑定结果,并通过车内安全模组向业务服务器发送绑定结果。
作为一种可选的实施方式,车载电子设备执行步骤703之后,还可以执行以下步骤:
当车载电子设备的车内安全模组接收到业务服务器发送的加密待解绑设备特征信息时,车载电子设备通过车内安全模组对加密待解绑设备特征信息进行解密和验签操作,得到目标待解绑设备特征信息;
车载电子设备通过车外蓝牙模组删除目标待解绑设备特征信息,并将删除结果传输至车内安全模组中;
车载电子设备通过车内安全模组确定删除结果为解绑结果,并通过车内安全模组向业务服务器发送解绑结果。
其中,实施这种实施方式,可以根据业务服务器发送的加密待解绑设备特征信息查找到已存储的目标待解绑设备特征信息,并将该目标待解绑设备特征信息删除,以实现终端设备与车载电子设备的解绑操作,从而提高了 解绑操作的准确性。
在图7所描述的方法中,能够提高终端设备与车辆的车载电子设备绑定过程中传输数据的安全性。此外,实施图7所描述的方法,提高了解绑操作的准确性。
实施例八
请参阅图8,图8是本发明实施例公开的一种终端设备的结构示意图,如图8所示,该终端设备可以包括:
提取单元801,用于当检测到输入的绑定指令时,提取终端设备的设备指纹并生成业务密钥。
生成单元802,用于生成包含提取单元801提取的设备指纹和业务密钥的设备特征信息。
第一发送单元803,用于向业务服务器发送生成单元802生成的设备特征信息。
第一存储单元804,用于当检测到业务服务器发送的绑定结果为成功绑定时,将绑定结果中的蓝牙信息进行存储,蓝牙信息与待绑定车辆匹配。
作为一种可选的实施方式,第一存储单元804还可以用于:
当检测到输入的解绑指令时,判断该解绑指令中包含的解绑用户类型是否为车主类型;
如果是,从该解绑信息中识别待解绑车辆信息以及待解绑用户的解绑账号信息;
生成包含待解绑车辆信息以及解绑账号信息的解绑请求,并向业务服务器发送该解绑请求;
当接收到业务服务器发送的解绑结果时,输出该解绑结果。
其中,实施这种实施方式,可以对车主用户提出的解绑申请进行响应,并将解绑指令中包含的待解绑车辆信息以及待解绑用户的解绑账号信息发送至业务服务器,从而使得业务服务器可以准确的删除与解绑指令对应的信息,并向终端设备反馈解绑结果,以使发起解绑申请的用户可以清楚的知道解绑结果,提高了终端设备与用户的交互性。
可见,实施图8所描述的终端设备,能够提高终端设备与车辆的车载电子设备绑定过程中传输数据的安全性。此外,实施图8所描述的终端设备,提高了终端设备与用户的交互性。
实施例九
请参阅图9,图8是本发明实施例公开的另一种终端设备的结构示意图。其中,图9所示的终端设备是由图8所示的终端设备进行优化得到的。与图8所示的终端设备相比,图9所示的终端设备更加详细的说明了终端设备的设备指纹的生成方式,可以使设备指纹中包含的与终端设备相关的信息更加全面,图9所示的终端设备的提取单元801可以包括:
提取子单元8011,用于当检测到输入的绑定指令时,提取终端设备的若干个设备指纹特征值。
生成子单元8012,用于根据提取子单元8011提取的若干个设备指纹特征值生成终端设备的设备指纹,并生成业务密钥,该业务密钥为业务公私钥对或业务对称密钥。
本发明实施例中,可以提取到终端设备的若干项设备指纹特征值,并根据该若干项设备指纹特征值生成设备指纹,以使设备指纹中包含的与终端设备相关的信息更加全面。
可见,实施图9所描述的终端设备,能够提高终端设备与车辆的车载电子设备绑定过程中传输数据的安全性。此外,实施图9所描述的终端设备,可以使设备指纹中包含的与终端设备相关的信息更加全面。
实施例十
请参阅图10,图10是本发明实施例公开的一种业务服务器的结构示意图,如图10所示,该业务服务器可以包括:
第二存储单元1001,用于当接收到终端设备发送的设备特征信息时,将设备特征信息中包含的设备指纹和业务密钥、终端设备的用户账号信息以及与用户账号信息匹配的待绑定车辆信息进行关联存储,并将设备特征信息 发送至安全服务器。
第二发送单元1002,用于当检测到安全服务器反馈的加签加密后的目标设备特征信息时,向与待绑定车辆信息匹配的车载电子设备发送目标设备特征信息。
第三发送单元1003,用于当接收到车载电子设备发送的绑定结果时,向终端设备发送绑定结果。
作为一种可选的实施方式,第三发送单元1003还可以用于:
当接收到终端设备发送的解绑请求时,识别解绑请求中包含的待解绑车辆信息和解绑账号信息;
获取与待解绑车辆信息和解绑账号信息匹配的待解绑设备特征信息,并向安全服务器发送该待解绑设备特征信息,以使安全服务器将待解绑设备特征信息进行加签加密,该待解绑设备特征信息中可以包含待解绑设备指纹和业务密钥等;
当接收到安全服务器发送的加签加密后的加密待解绑设备特征信息时,向待解绑车辆信息匹配的车载电子设备发送加密待解绑设备特征信息,以使车载电子设备将已绑定的待解绑车辆信息删除;
当接收到车载电子设备发送的解绑结果时,向终端设备发送解绑结果。
其中,实施这种实施方式,可以使业务服务器根据解绑请求获取匹配的待解绑设备特征信息,以及将安全服务器加签加密后的加密待解绑设备特征信息发送至车载电子设备,以使车载电子设备将该待解绑设备特征信息删除,从而实现终端设备与车载电子设备的解绑操作,并将解绑结果发送至终端设备,以使终端设备的用户及时的知晓解绑结果。
可见,实施图10所描述的业务服务器,能够提高终端设备与车辆的车载电子设备绑定过程中传输数据的安全性。此外,实施图10所描述的业务服务器,可以使终端设备的用户及时的知晓解绑结果。
实施例十一
请参阅图11,图11是本发明实施例公开的另一种业务服务器的结构示意图。其中,图11所示的业务服务器是由图10所示的业务服务器进行优化得到的。与图10所示的业务服务器相比,图11所示的业务服务器增加了将蓝牙信息与设备特征信息绑定的方法,保证了业务服务器中存储的信息具有时效性,图11所示的业务服务器的第三发送单元1003可以包括:
判断子单元10031,用于当接收到车载电子设备发送的绑定结果时,判断绑定结果是否为成功绑定结果。
获取子单元10032,用于在判断子单元10031判断结果为是时,获取绑定结果中包含的蓝牙信息,蓝牙信息至少包含蓝牙地址和蓝牙名称。
发送子单元10033,用于将获取子单元10032获取的蓝牙信息与用户账号信息、待绑定车辆信息以及设备特征信息中包含的设备指纹和业务密钥进行关联存储,并向终端设备发送绑定结果。
本发明实施例中,可以将车载电子设备反馈的蓝牙信息与设备特征信息关联存储,以使业务服务器可以将具有绑定关系的终端设备和车载电子设备的信息关联存储至业务服务器中,保证了业务服务器中存储的信息具有时效性。
可见,实施图11所描述的业务服务器,能够提高终端设备与车辆的车载电子设备绑定过程中传输数据的安全性。此外,实施图11所描述的业务服务器,保证了业务服务器中存储的信息具有时效性。
实施例十二
请参阅图12,图12是本发明实施例公开的一种安全服务器的结构示意图,如图12所示,该安全服务器可以包括:
加签加密单元1201,用于当接收到业务服务器发送的设备特征信息时,对设备特征信息进行加签加密操作,得到目标设备特征信息。
第四发送单元1202,用于向业务服务器发送加签加密单元1201得到的目标设备特征信息。
作为一种可选的实施方式,第四发送单元1202还可以用于:
对待解绑设备特征信息进行加签和加密操作,得到加密待解绑设备特征信息;
向业务服务器发送加密待解绑设备特征信息。
其中,实施这种实施方式,可以对业务服务器发送的待解绑设备特征信息进行加签和加密操作,以使业务服务器向车载电子设备发送的是加密后的待解绑设备特征信息,保证了业务服务器与车载电子设备之间传输待解绑设备特征信息的安全性。
可见,实施图12所描述的安全服务器,能够提高终端设备与车辆的车载电子设备绑定过程中传输数据的安全性。此外,实施图12所描述的安全服务器,保证了业务服务器与车载电子设备之间传输待解绑设备特征信息的安全性。
实施例十三
请参阅图13,图13是本发明实施例公开的另一种安全服务器的结构示意图。其中,图13所示的安全服务器是由图12所示的安全服务器进行优化得到的。与图12所示的安全服务器相比,图13所示的安全服务器更加详细的说明了针对设备特征信息的加签和加密操作,保证了数据在传输过程中的安全性,图13所示的安全服务器的加签加密单元1201可以包括:
加签子单元12011,用于当接收到业务服务器发送的设备特征信息时,通过预设的私钥对设备特征信息进行数字签名,得到加签设备特征信息。
加密子单元12012,用于通过预设的对称密钥对加签子单元12011得到的加签设备特征信息进行对称加密运算,得到目标设备特征信息。
本发明实施例中,可以先对设备特征信息进行数字签名,进而对加签后的设备特征信息进行加密运算,得到加密后的目标设备特征信息,以使与车载电子设备传输的数据为加密后的数据,从而保证了数据在传输过程中的安全性。
可见,实施图13所描述的安全服务器,能够提高终端设备与车辆的车载电子设备绑定过程中传输数据的安全性。此外,实施图13所描述的安全服务器,使与车载电子设备传输的数据为加密后的数据,从而保证了数据在传输过程中的安全性。
实施例十四
请参阅图14,图14是本发明实施例公开的一种车载电子设备的结构示意图,如图14所示,该车载电子设备可以包括:
解密单元1401,用于当车载电子设备的车内安全模组接收到业务服务器发送的目标设备特征信息时,通过车内安全模组对目标设备特征信息进行解密和验签操作,得到当前设备特征信息。
传输单元1402,用于通过车外蓝牙模组存储解密单元1401得到的当前设备特征信息,并将存储结果以及车外蓝牙模组对应的蓝牙信息传输至车内安全模组中,其中,蓝牙信息包含车外蓝牙模组的蓝牙地址和蓝牙名称。
第四发送单元1403,用于通过车内安全模组生成包含传输单元1402传输的存储结果和蓝牙信息的绑定结果,并通过车内安全模组向业务服务器发送绑定结果。
作为一种可选的实施方式,第四发送单元1403还可以用于:
当车载电子设备的车内安全模组接收到业务服务器发送的加密待解绑设备特征信息时,通过车内安全模组对加密待解绑设备特征信息进行解密和验签操作,得到目标待解绑设备特征信息;
通过车外蓝牙模组删除目标待解绑设备特征信息,并将删除结果传输至车内安全模组中;
通过车内安全模组确定删除结果为解绑结果,并通过车内安全模组向业务服务器发送解绑结果。
其中,实施这种实施方式,可以根据业务服务器发送的加密待解绑设备特征信息查找到已存储的目标待解绑设备特征信息,并将该目标待解绑设备特征信息删除,以实现终端设备与车载电子设备的解绑操作,从而提高了解绑操作的准确性。
可见,实施图14所描述的车载电子设备,能够提高终端设备与车辆的车载电子设备绑定过程中传输数据的安全性。此外,实施图14所描述的车载电子设备,提高了解绑操作的准确性。
实施例十五
请参阅图15,图15是本发明实施例公开的一种虚拟钥匙绑定***的结构示意图,如图15所示,该虚拟钥匙绑定***可以包括:终端设备1501、业务服务器1502、安全服务器1503以及车载电子设备1504。其中,在本发明实施例中,终端设备1501的结构和功能与前面实施例八和实施例九所描述的任一种终端设备的结构和功能相同,本发明实施例不再赘述,业务服务器1502的结构和功能与前面实施例十和实施例十一所描述的任一种业务服务器的结构和功能相同,本发明实施例也不再赘述,安全服务器1503的结构和功能与前面实施例十二和实施例十三所描述的任一种安全服务器的结构和功能相同,本发明实施例也不再赘述,车载电子设备1504的结构和功能与前面实施例十四所描述的车载电子设备的结构和功能相同,本发明实施例亦不再赘述。
实施例十六
请参阅图16,图16是本发明实施例公开的另一种虚拟钥匙绑定方法的流程示意图,如图16所示,该虚拟钥匙绑定方法可以包括以下步骤:
1601、当检测到输入的绑定指令时,终端设备提取终端设备的设备指纹并生成业务密钥。
1602、终端设备生成包含设备指纹和业务密钥的设备特征信息。
1603、终端设备向业务服务器发送设备特征信息。
1604、业务服务器将设备特征信息中包含的设备指纹和业务密钥、终端设备的用户账号信息以及与用户账号信息匹配的待绑定车辆信息进行关联存储。
1605、业务服务器将设备特征信息发送至安全服务器。
1606、安全服务器对设备特征信息进行加签加密操作,得到目标设备特征信息。
1607、安全服务器向业务服务器发送目标设备特征信息。
1608、业务服务器向与待绑定车辆信息匹配的车载电子设备发送目标设备特征信息。
1609、车载电子设备通过车内安全模组对目标设备特征信息进行解密和验签操作,得到当前设备特征信息。
1610、车载电子设备通过车外蓝牙模组存储当前设备特征信息,并将存储结果以及车外蓝牙模组对应的蓝牙信息传输至车内安全模组中,其中,蓝牙信息包含车外蓝牙模组的蓝牙地址和蓝牙名称。
1611、车载电子设备通过车内安全模组生成包含存储结果和蓝牙信息的绑定结果,并通过车内安全模组向业务服务器发送绑定结果。
1612、业务服务器向终端设备发送绑定结果。
1613、终端设备将绑定结果中的蓝牙信息进行存储,蓝牙信息与待绑定车辆匹配。
可见,通过实施图16所描述的虚拟钥匙绑定方法中,能够将根据终端设备生成的设备特征信息发送至业务服务器,以使业务服务器对设备特征信息进行存储,并将设备特征信息发送至安全服务器,以使安全服务器设备特征信息进行加密,并将加密后的设备特征信息绑定至车载电子设备中,以使终端设备在与车载电子设备进行绑定操作中传输的数据是加密后的数据,避免了数据丢失造成的泄密,从而提高了终端设备与车辆的车载电子设备绑定过程中传输数据的安全性。
本发明实施例公开一种车辆,其上设置有车载电子设备1504。
本发明实施例还公开一种计算机可读存储介质,其中,计算机可读存储介质存储了程序代码,其中,程序代码包括用于执行以上各方法实施例中的方法的部分或全部步骤的指令。
本发明实施例还公开一种计算机程序产品,其中,当计算机程序产品在计算机上运行时,使得计算机执行如以上各方法实施例中的方法的部分或全部步骤。
本发明实施例还公开一种应用发布平台,其中,应用发布平台用于发布计算机程序产品,其中,当计算机程序产品在计算机上运行时,使得计算机执行如以上各方法实施例中的方法的部分或全部步骤。
应理解,说明书通篇中提到的“本发明实施例”意味着与实施例有关的特定特征、结构或特性包括在本发明的至少一个实施例中。因此,在整个说明书各处出现的“在本发明实施例中”未必一定指相同的实施例。此外,这些特定特征、结构或特性可以以任意适合的方式结合在一个或多个实施例中。本领域技术人员也应该知悉,说明书中所描述的实施例均属于可选实施例,所涉及的动作和模块并不一定是本发明所必须的。
在本发明的各种实施例中,应理解,上述各过程的序号的大小并不意味着执行顺序的必然先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本发明实施例的实施过程构成任何限定。
另外,本文中术语“***”和“网络”在本文中常可互换使用。应理解,“与A对应的B”表示B与A相关联,根据A可以确定B。但还应理解,根据A确定B并不意味着仅仅根据A确定B,还可以根据A和/或其他信息确定B。
本领域普通技术人员可以理解上述实施例的各种方法中的全部或部分步骤是可以通过程序来指令相关的硬件来完成,该程序可以存储于一计算机可读存储介质中,存储介质包括只读存储器(Read-Only Memory,ROM)、随机存储器(Random Access Memory,RAM)、可编程只读存储器(Programmable Read-only Memory,PROM)、可擦除可编程只读存储器(Erasable Programmable Read Only Memory,EPROM)、一次可编程只读存储器(One-time Programmable Read-Only Memory,OTPROM)、电子抹除式可复写只读存储器(Electrically-Erasable Programmable Read-Only Memory,EEPROM)、只读光盘(Compact Disc Read-Only Memory,CD-ROM)或其他光盘存储器、磁盘存储器、磁带存储器、或者能够用于携带或存储数据的计算机可读的任何其他介质。
上述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可位于一个地方,或者也可以分布到多个网络单元上。可根据实际的需要选择其中的部分或全部单元来实现本实施例方案的目的。
另外,在本发明各实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
上述集成的单元若以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可获取的存储器中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或者部分,可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储器中,包括若干请求用以使得一台计算机设备(可以为个人计算机、服务器或者网络设备等,具体可以是计算机设备中的处理器)执行本发明的各个实施例上述方法的部分或全部步骤。
以上对本发明实施例公开的一种虚拟钥匙绑定方法及***进行了详细介绍,本文中应用了具体个例对本发明的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本发明的方法及其核心思想;同时,对于本领域的一般技术人员,依据本发明的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本发明的限制。

Claims (16)

  1. 一种虚拟钥匙绑定方法,其特征在于,所述方法包括:
    当检测到输入的绑定指令时,终端设备提取所述终端设备的设备指纹并生成业务密钥;
    所述终端设备生成包含所述设备指纹和所述业务密钥的设备特征信息;
    所述终端设备向业务服务器发送所述设备特征信息,以使所述业务服务器将所述设备特征信息存储至待绑定车辆的车载电子设备中;
    当检测到所述业务服务器发送的绑定结果为成功绑定时,所述终端设备将所述绑定结果中的蓝牙信息进行存储,所述蓝牙信息与所述待绑定车辆匹配。
  2. 根据权利要求1所述的方法,其特征在于,所述当检测到输入的绑定指令时,终端设备提取所述终端设备的设备指纹并生成业务密钥,包括:
    当检测到输入的绑定指令时,终端设备提取所述终端设备的若干个设备指纹特征值;
    所述终端设备根据所述若干个设备指纹特征值生成所述终端设备的设备指纹,并生成业务密钥,所述业务密钥为业务公私钥对或业务对称密钥。
  3. 一种虚拟钥匙绑定方法,其特征在于,所述方法包括:
    当接收到终端设备发送的设备特征信息时,所述业务服务器将所述设备特征信息中包含的设备指纹和业务密钥、所述终端设备的用户账号信息以及与所述用户账号信息匹配的待绑定车辆信息进行关联存储,并将所述设备特征信息发送至安全服务器,以使所述安全服务器对所述设备特征信息进行加签加密操作;
    当检测到所述安全服务器反馈的加签加密后的目标设备特征信息时,所述业务服务器向与所述待绑定车辆信息匹配的车载电子设备发送所述目标设备特征信息,以使所述车载电子设备存储所述目标设备特征信息;
    当接收到所述车载电子设备发送的绑定结果时,所述业务服务器向所述终端设备发送所述绑定结果。
  4. 根据权利要求3所述的方法,其特征在于,当接收到所述车载电子设备发送的绑定结果时,所述业务服务器向所述终端设备发送所述绑定结果,包括:
    当接收到所述车载电子设备发送的绑定结果时,所述业务服务器判断所述绑定结果是否为成功绑定结果;
    如果是,所述业务服务器获取所述绑定结果中包含的蓝牙信息,所述蓝牙信息至少包含蓝牙地址和蓝牙名称;
    所述业务服务器将所述蓝牙信息与所述用户账号信息、所述待绑定车辆信息以及所述设备特征信息中包含的所述设备指纹和所述业务密钥进行关联存储,并向所述终端设备发送所述绑定结果。
  5. 一种虚拟钥匙绑定方法,其特征在于,所述方法包括:
    当接收到业务服务器发送的设备特征信息时,安全服务器对所述设备特征信息进行加签加密操作,得到目标设备特征信息;
    所述安全服务器向所述业务服务器发送所述目标设备特征信息。
  6. 根据权利要求5所述的方法,其特征在于,当接收到业务服务器发送的设备特征信息时,安全服务器对所述设备特征信息进行加签加密操作,得到目标设备特征信息,包括:
    当接收到业务服务器发送的设备特征信息时,安全服务器通过预设的私钥对所述设备特征信息进行数字签名,得到加签设备特征信息;
    所述安全服务器通过预设的对称密钥对所述加签设备特征信息进行对称加密运算,得到目标设备特征信息。
  7. 一种虚拟钥匙绑定方法,其特征在于,所述方法包括:
    当车载电子设备的车内安全模组接收到业务服务器发送的目标设备特征信息时,所述车载电子设备通过所述车内安全模组对所述目标设备特征信息进行解密和验签操作,得到当前设备特征信息;
    所述车载电子设备通过车外蓝牙模组存储所述当前设备特征信息,并将存储结果以及所述车外蓝牙模组对应 的蓝牙信息传输至所述车内安全模组中,其中,所述蓝牙信息包含所述车外蓝牙模组的蓝牙地址和蓝牙名称;
    所述车载电子设备通过所述车内安全模组生成包含所述存储结果和所述蓝牙信息的绑定结果,并通过所述车内安全模组向所述业务服务器发送所述绑定结果。
  8. 一种终端设备,其特征在于,包括:
    提取单元,用于当检测到输入的绑定指令时,提取所述终端设备的设备指纹并生成业务密钥;
    生成单元,用于生成包含所述设备指纹和所述业务密钥的设备特征信息;
    第一发送单元,用于向业务服务器发送所述设备特征信息;
    第一存储单元,用于当检测到所述业务服务器发送的绑定结果为成功绑定时,将所述绑定结果中的蓝牙信息进行存储,所述蓝牙信息与所述待绑定车辆匹配。
  9. 根据权利要求8所述的终端设备,其特征在于,所述提取单元包括:
    提取子单元,用于当检测到输入的绑定指令时,提取所述终端设备的若干个设备指纹特征值;
    生成子单元,用于根据所述若干个设备指纹特征值生成所述终端设备的设备指纹,并生成业务密钥,所述业务密钥为业务公私钥对或业务对称密钥。
  10. 一种业务服务器,其特征在于,包括:
    第二存储单元,用于当接收到终端设备发送的设备特征信息时,将所述设备特征信息中包含的设备指纹和业务密钥、所述终端设备的用户账号信息以及与所述用户账号信息匹配的待绑定车辆信息进行关联存储,并将所述设备特征信息发送至安全服务器;
    第二发送单元,用于当检测到所述安全服务器反馈的加签加密后的目标设备特征信息时,向与所述待绑定车辆信息匹配的车载电子设备发送所述目标设备特征信息;
    第三发送单元,用于当接收到所述车载电子设备发送的绑定结果时,向所述终端设备发送所述绑定结果。
  11. 根据权利要求10所述的业务服务器,其特征在于,所述第三发送单元包括:
    判断子单元,用于当接收到所述车载电子设备发送的绑定结果时,判断所述绑定结果是否为成功绑定结果;
    获取子单元,用于在所述判断子单元判断结果为是时,获取所述绑定结果中包含的蓝牙信息,所述蓝牙信息至少包含蓝牙地址和蓝牙名称;
    发送子单元,用于将所述蓝牙信息与所述用户账号信息、所述待绑定车辆信息以及所述设备特征信息中包含的所述设备指纹和所述业务密钥进行关联存储,并向所述终端设备发送所述绑定结果。
  12. 一种安全服务器,其特征在于,包括:
    加签加密单元,用于当接收到业务服务器发送的设备特征信息时,对所述设备特征信息进行加签加密操作,得到目标设备特征信息;
    第四发送单元,用于向所述业务服务器发送所述目标设备特征信息。
  13. 根据权利要求12所述的安全服务器,其特征在于,所述加签加密单元包括:
    加签子单元,用于当接收到业务服务器发送的设备特征信息时,通过预设的私钥对所述设备特征信息进行数字签名,得到加签设备特征信息;
    加密子单元,用于通过预设的对称密钥对所述加签设备特征信息进行对称加密运算,得到目标设备特征信息。
  14. 一种车载电子设备,其特征在于,包括:
    解密单元,用于当所述车载电子设备的车内安全模组接收到业务服务器发送的目标设备特征信息时,通过所述车内安全模组对所述目标设备特征信息进行解密和验签操作,得到当前设备特征信息;
    传输单元,用于通过车外蓝牙模组存储所述当前设备特征信息,并将存储结果以及所述车外蓝牙模组对应的 蓝牙信息传输至所述车内安全模组中,其中,所述蓝牙信息包含所述车外蓝牙模组的蓝牙地址和蓝牙名称;
    第四发送单元,用于通过所述车内安全模组生成包含所述存储结果和所述蓝牙信息的绑定结果,并通过所述车内安全模组向所述业务服务器发送所述绑定结果。
  15. 一种虚拟钥匙绑定***,其特征在于,所述***包括终端设备、业务服务器、安全服务器以及车载电子设备,其中:
    所述终端设备,用于当检测到输入的绑定指令时,提取所述终端设备的设备指纹并生成业务密钥;以及生成包含所述设备指纹和所述业务密钥的设备特征信息;以及向业务服务器发送所述设备特征信息,以使所述业务服务器将所述设备特征信息存储至待绑定车辆的车载电子设备中;以及当检测到所述业务服务器发送的绑定结果为成功绑定时,将所述绑定结果中的蓝牙信息进行存储,所述蓝牙信息与所述待绑定车辆匹配;
    所述业务服务器,用于当接收到所述终端设备发送的所述设备特征信息时,将所述设备特征信息中包含的设备指纹和业务密钥、所述终端设备的用户账号信息以及与所述用户账号信息匹配的待绑定车辆信息进行关联存储,并将所述设备特征信息发送至安全服务器,以使所述安全服务器对所述设备特征信息进行加签加密操作;以及当检测到所述安全服务器反馈的加签加密后的目标设备特征信息时,向与所述待绑定车辆信息匹配的车载电子设备发送所述目标设备特征信息,以使所述车载电子设备存储所述目标设备特征信息;以及当接收到所述车载电子设备发送的绑定结果时,向所述终端设备发送所述绑定结果;
    所述安全服务器,用于当接收到业务服务器发送的设备特征信息时,对所述设备特征信息进行加签加密操作,得到目标设备特征信息;并向所述业务服务器发送所述目标设备特征信息;
    所述车载电子设备,用于当所述车载电子设备的车内安全模组接收到所述业务服务器发送的所述目标设备特征信息时,通过所述车内安全模组对所述目标设备特征信息进行解密和验签操作,得到当前设备特征信息;以及通过车外蓝牙模组存储所述当前设备特征信息,并将存储结果以及所述车外蓝牙模组对应的蓝牙信息传输至所述车内安全模组中;以及通过所述车内安全模组生成包含所述存储结果和所述蓝牙信息的绑定结果,并通过所述车内安全模组向所述业务服务器发送所述绑定结果;其中,所述蓝牙信息包含所述车外蓝牙模组的蓝牙地址和蓝牙名称。
  16. 一种车辆,其特征在于,所述车辆包括权利要求14所述的车载电子设备。
PCT/CN2019/093474 2019-03-12 2019-06-28 虚拟钥匙绑定方法及*** WO2020181691A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP19918790.7A EP3806382A4 (en) 2019-03-12 2019-06-28 VIRTUAL KEY BINDING METHOD AND SYSTEM
US17/133,230 US11882509B2 (en) 2019-03-12 2020-12-23 Virtual key binding method and system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910187024.5A CN109951277B (zh) 2019-03-12 2019-03-12 虚拟钥匙绑定方法及***
CN201910187024.5 2019-03-12

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/133,230 Continuation US11882509B2 (en) 2019-03-12 2020-12-23 Virtual key binding method and system

Publications (1)

Publication Number Publication Date
WO2020181691A1 true WO2020181691A1 (zh) 2020-09-17

Family

ID=67009796

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/093474 WO2020181691A1 (zh) 2019-03-12 2019-06-28 虚拟钥匙绑定方法及***

Country Status (4)

Country Link
US (1) US11882509B2 (zh)
EP (1) EP3806382A4 (zh)
CN (2) CN109951277B (zh)
WO (1) WO2020181691A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113891290A (zh) * 2021-09-29 2022-01-04 重庆长安汽车股份有限公司 基于遥控钥匙登录车载***的方法、***及车辆

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110570569B (zh) * 2019-09-11 2022-02-11 广州小鹏汽车科技有限公司 虚拟钥匙配置信息的激活方法、移动终端及服务器
WO2021082195A1 (zh) * 2019-10-30 2021-05-06 上海博泰悦臻电子设备制造有限公司 创建和管理虚拟钥匙的方法、设备和计算机可读存储介质
CN110992540A (zh) * 2019-12-19 2020-04-10 广州中胜物联网络科技有限公司 一种基于无钥匙进入***的开闭锁方法及装置
EP4113927A4 (en) * 2020-03-17 2023-02-22 Huawei Technologies Co., Ltd. VEHICLE CONTROL METHOD, COMMUNICATION DEVICE AND COMPUTER READABLE STORAGE MEDIUM
CN115842720A (zh) * 2021-08-19 2023-03-24 青岛海尔科技有限公司 智能设备绑定方法及装置、存储介质及电子设备
CN113411771B (zh) * 2021-08-20 2021-11-09 湖北亿咖通科技有限公司 车辆的蓝牙控制方法和装置
CN113799734B (zh) * 2021-10-25 2022-11-18 中国第一汽车股份有限公司 一种车辆防盗***的防盗匹配方法、装置、服务器及介质
CN115019419A (zh) * 2022-04-26 2022-09-06 上海银基信息安全技术股份有限公司 一种车辆开锁方法、装置、设备和存储介质
CN115447533B (zh) * 2022-08-30 2024-04-23 重庆长安汽车股份有限公司 一种nfc钥匙绑定方法、装置、绑定设备及储存介质
CN116546459B (zh) * 2023-07-05 2023-09-12 小米汽车科技有限公司 车钥匙的配对方法、装置、存储介质及***

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104540132A (zh) * 2015-01-15 2015-04-22 天地融科技股份有限公司 蓝牙设备的通讯方法、移动设备、电子签名设备和服务器
CN105490996A (zh) * 2014-10-09 2016-04-13 比亚迪股份有限公司 车辆蓝牙钥匙的授权***和方法
CN107685714A (zh) * 2017-08-30 2018-02-13 上海博泰悦臻电子设备制造有限公司 智能车钥匙***及其控制方法
US20180068505A1 (en) * 2016-09-06 2018-03-08 Denso International America, Inc. Wireless Passenger Proximity Detection System for Autonomous Vehicles
CN207884646U (zh) * 2018-01-12 2018-09-18 山西水利职业技术学院 数据安全监控***

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8831224B2 (en) * 2012-09-14 2014-09-09 GM Global Technology Operations LLC Method and apparatus for secure pairing of mobile devices with vehicles using telematics system
CN103035054B (zh) * 2012-12-29 2015-04-08 江苏中科天安智联科技有限公司 具有许可及授权功能的nfc智能汽车钥匙***
WO2014205803A1 (zh) * 2013-06-28 2014-12-31 深圳市掌讯通讯设备有限公司 一种汽车远程控制***及其方法
CN103684786A (zh) * 2013-12-10 2014-03-26 北京天威诚信电子商务服务有限公司 数字证书的存储与硬件载体绑定的方法及***
CN106696894B (zh) * 2014-07-28 2018-12-21 保汇通(厦门)网络科技有限公司 一种基于智能手机的汽车无钥匙进入***
CN104808608A (zh) * 2015-02-12 2015-07-29 深圳市米家互动网络有限公司 汽车远程操控方法和***、远程操控终端和服务器
CN105015489B (zh) * 2015-07-14 2018-04-13 杭州万好万家新能源科技有限公司 一种基于数字钥匙的车辆智能控制***
CN106553617B (zh) * 2015-09-25 2019-10-22 上海汽车集团股份有限公司 车辆控制方法、共享方法及装置
CN107358419B (zh) * 2016-05-09 2020-12-11 阿里巴巴集团控股有限公司 机载终端支付鉴权方法、装置以及***
CN106408700A (zh) * 2016-08-31 2017-02-15 长城汽车股份有限公司 移动终端、服务器、车辆及其控制***
DE102017202024B4 (de) * 2017-02-09 2019-02-28 Audi Ag Verfahren zum Koppeln eines portablen, mobilen Nutzergeräts mit einem in einem Kraftfahrzeug verbauten Fahrzeuggerät sowie Servervorrichtung
CN106878008B (zh) * 2017-02-15 2018-01-12 北京航空航天大学 一种车载T‑Box与用户手机信息交互安全认证***及方法
DE102018105443A1 (de) * 2017-03-13 2018-09-13 Huf Hülsbeck & Fürst Gmbh & Co. Kg Sicherheitsverfahren für ein Sicherheitssystem eines Fahrzeuges
CN108665337A (zh) * 2017-04-01 2018-10-16 重庆无线绿洲通信技术有限公司 一种车辆***及其虚拟钥匙认证方法
CN108206996A (zh) * 2017-12-08 2018-06-26 中兴通讯股份有限公司 身份验证方法及装置
CN108569250B (zh) * 2018-03-30 2020-12-22 上海汽车集团股份有限公司 基于共享汽车的蓝牙钥匙的自动授权方法
CN109446787A (zh) * 2018-10-07 2019-03-08 上海酷信息科技有限公司 一种app绑定、解绑设备的方法
CN109448195B (zh) * 2018-12-12 2021-10-08 无锡车联天下信息技术有限公司 车辆虚拟钥匙的认证方法及装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105490996A (zh) * 2014-10-09 2016-04-13 比亚迪股份有限公司 车辆蓝牙钥匙的授权***和方法
CN104540132A (zh) * 2015-01-15 2015-04-22 天地融科技股份有限公司 蓝牙设备的通讯方法、移动设备、电子签名设备和服务器
US20180068505A1 (en) * 2016-09-06 2018-03-08 Denso International America, Inc. Wireless Passenger Proximity Detection System for Autonomous Vehicles
CN107685714A (zh) * 2017-08-30 2018-02-13 上海博泰悦臻电子设备制造有限公司 智能车钥匙***及其控制方法
CN207884646U (zh) * 2018-01-12 2018-09-18 山西水利职业技术学院 数据安全监控***

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3806382A4 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113891290A (zh) * 2021-09-29 2022-01-04 重庆长安汽车股份有限公司 基于遥控钥匙登录车载***的方法、***及车辆

Also Published As

Publication number Publication date
US11882509B2 (en) 2024-01-23
CN109951277A (zh) 2019-06-28
CN109951277B (zh) 2020-10-16
US20210120392A1 (en) 2021-04-22
EP3806382A1 (en) 2021-04-14
EP3806382A4 (en) 2022-01-26
CN111698664B (zh) 2023-09-15
CN111698664A (zh) 2020-09-22

Similar Documents

Publication Publication Date Title
WO2020181691A1 (zh) 虚拟钥匙绑定方法及***
EP3457344B1 (en) Payment authentication method, apparatus and system for onboard terminal
US11218323B2 (en) Method and system for producing a secure communication channel for terminals
EP3602991B1 (en) Mechanism for achieving mutual identity verification via one-way application-device channels
KR101666374B1 (ko) 사용자 인증서 발급과 사용자 인증을 위한 방법, 장치 및 컴퓨터 프로그램
JP6239788B2 (ja) 指紋認証方法、装置、インテリジェント端末及びコンピュータ記憶媒体
CN106656488B (zh) 一种pos终端的密钥下载方法和装置
US7028184B2 (en) Technique for digitally notarizing a collection of data streams
EP3806384B1 (en) Vehicle unlocking authentication method and apparatus
US6968453B2 (en) Secure integrated device with secure, dynamically-selectable capabilities
US6948066B2 (en) Technique for establishing provable chain of evidence
US8433914B1 (en) Multi-channel transaction signing
US20020095586A1 (en) Technique for continuous user authentication
US20020095587A1 (en) Smart card with integrated biometric sensor
US20020095296A1 (en) Technique for improved audio compression
CN110570569B (zh) 虚拟钥匙配置信息的激活方法、移动终端及服务器
EP2690840B1 (en) Internet based security information interaction apparatus and method
JP5827692B2 (ja) バインドされたデータカード及び移動ホストの認証方法、装置及びシステム
US20140172741A1 (en) Method and system for security information interaction based on internet
US20230180010A1 (en) Method for securely connecting vehicle and bluetooth key, and bluetooth module and bluetooth key
WO2015168878A1 (zh) 支付方法和装置以及支付要素处理方法和装置
CN114143312A (zh) 基于区块链的边缘计算终端认证方法、***及设备
KR102551592B1 (ko) 자동차의 주행거리 조작을 방지하는 방법 및 이를 사용한 주행거리기록장치
WO2016165662A1 (zh) 一种手机准数字证书子***及其***及其方法
CN110704827B (zh) 一种权限管理方法及相关装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19918790

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2019918790

Country of ref document: EP

Effective date: 20210107

ENP Entry into the national phase

Ref document number: 2019918790

Country of ref document: EP

Effective date: 20210107

NENP Non-entry into the national phase

Ref country code: DE