[go: up one dir, main page]

CN111935672B - Information reading method, device, system and storage medium - Google Patents

Information reading method, device, system and storage medium Download PDF

Info

Publication number
CN111935672B
CN111935672B CN202010703059.2A CN202010703059A CN111935672B CN 111935672 B CN111935672 B CN 111935672B CN 202010703059 A CN202010703059 A CN 202010703059A CN 111935672 B CN111935672 B CN 111935672B
Authority
CN
China
Prior art keywords
vehicle
key
terminal
information
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010703059.2A
Other languages
Chinese (zh)
Other versions
CN111935672A (en
Inventor
张咏江
于海龙
李源
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiede Jiangxi Technology Co ltd
Original Assignee
Jiede China Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiede China Technology Co ltd filed Critical Jiede China Technology Co ltd
Priority to CN202010703059.2A priority Critical patent/CN111935672B/en
Publication of CN111935672A publication Critical patent/CN111935672A/en
Priority to PCT/CN2021/107063 priority patent/WO2022017314A1/en
Application granted granted Critical
Publication of CN111935672B publication Critical patent/CN111935672B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00857Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00857Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
    • G07C2009/00865Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed remotely by wireless communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Lock And Its Accessories (AREA)
  • Selective Calling Equipment (AREA)

Abstract

The application discloses an information reading method, an information reading device, an information reading system and a storage medium. The method comprises the following steps: sending request information to a server; the request information comprises a first vehicle identity and a preset time length, and is used for the server to determine digital key information according to the first vehicle identity and the preset time length; the first vehicle identity mark is an identity mark of a vehicle pre-controlled by the terminal, and the preset time length is the time length of the vehicle controlled by the terminal; and receiving the digital key information sent by the server so that the vehicle can read the digital key information in the terminal through near field communication, thereby improving the experience of the user.

Description

Information reading method, device, system and storage medium
Technical Field
The present application relates to the field of automotive electronics, and in particular, to an information reading method, apparatus, system, and storage medium.
Background
With the development of the car networking technology, the car can be controlled through the terminal in the related art.
Before a vehicle is controlled through a terminal, the terminal needs to acquire digital key information of the vehicle to be controlled. After the vehicle needs networking authentication, the digital key information of the vehicle can be sent to the terminal. However, the vehicle can only push the digital key information to the terminal in the case of real-time networking, which results in low user experience.
Disclosure of Invention
The embodiment of the application provides an information reading method, device and system and a storage medium, which can enable a terminal to control a vehicle through digital key information in a state that the vehicle is not networked, and improve user experience.
In a first aspect, an information reading method is provided, which is applied to a terminal, and includes:
sending request information to a server; the request information comprises a first vehicle identity and a preset time length, and is used for the server to determine digital key information according to the first vehicle identity and the preset time length; the first vehicle identity mark is an identity mark of a vehicle pre-controlled by the terminal, and the preset time length is the time length of the vehicle controlled by the terminal;
and receiving the digital key information sent by the server for the vehicle to read the digital key information in the terminal through the near field communication.
In one possible implementation manner, the digital key information includes a target parameter corresponding to the first vehicle identification, and the target parameter is generated by the server according to the first vehicle identification; the method further comprises the following steps:
receiving a second vehicle identity sent by the vehicle;
verifying whether the second vehicle identity mark is consistent with the first vehicle identity mark;
and when the second vehicle identity is consistent with the first vehicle identity, sending the target parameter to the vehicle, so that the vehicle generates a third key and a fourth key according to the target parameter corresponding to the first vehicle identity, a preset first key and a preset second key.
In one possible implementation, the method further includes:
receiving a fifth key and a sixth key sent by the server; the fifth key is generated by the server according to the target parameter and a preset first key; the sixth key is generated by the server according to the target parameter and a preset second key;
receiving a third key and a fourth key sent by a vehicle;
authenticating the vehicle according to the third key, the fourth key, the fifth key and the sixth key;
and in the case that the third key is consistent with the fifth key and the fourth key is consistent with the sixth key, the vehicle passes the authentication and the digital key information is transmitted to the vehicle.
In one possible implementation, the method further includes:
and receiving the signature information sent by the server for the vehicle to read the signature information from the terminal, wherein the signature information is used for the vehicle to verify the digital key information.
In a second aspect, an information reading method is provided, which is applied to a server, and includes:
receiving request information sent by a terminal, wherein the request information comprises a first vehicle identity and a preset time length; the first vehicle identity mark is an identity mark of a vehicle pre-controlled by the terminal, and the preset time length is the time length of the vehicle controlled by the terminal;
determining digital key information according to the first vehicle identity and a preset time length;
and transmitting the digital key information to the terminal for the vehicle to read the digital key information in the terminal through near field communication.
In one possible implementation, the method further includes:
generating a target parameter corresponding to the first vehicle identity;
generating a fifth key and a sixth key according to the target parameter, the preset first key and the preset second key;
and sending the fifth key and the sixth key to the terminal for authenticating the vehicle by the terminal.
In one possible implementation, the server stores an information encryption key;
before transmitting the digital key information to the terminal, the method further comprises:
encrypting the digital key information using the information encryption key;
generating signature information according to the encrypted digital key information;
and sending the signature information to the terminal for the vehicle to read the signature information from the terminal, wherein the signature information is used for the vehicle to verify the digital key information.
In a third aspect, an information reading method is provided, which is applied to a vehicle, and includes:
reading digital key information in the terminal through near field communication; and in the case that the digital key information is verified, the digital key information is used for controlling the vehicle through the digital key information by the terminal.
In one possible implementation, the method further includes:
reading signature information in a terminal;
and verifying the digital key information according to the signature information.
In one possible implementation, the method further includes:
sending a second vehicle identity of the vehicle to the terminal, so that when the terminal verifies that the second vehicle identity is consistent with the first vehicle identity, the target parameter is sent to the vehicle;
receiving a target parameter sent by a terminal;
generating a third key and a fourth key according to the target parameter, a preset first key and a preset second key;
and sending the third key and the fourth key to the terminal for the terminal to authenticate the vehicle according to the third key and the fourth key.
In a possible implementation manner, the digital key information includes a preset time length; the method further comprises the following steps:
acquiring a terminal identity of a terminal;
and when the time length of the terminal control vehicle corresponding to the terminal identity is longer than the preset time length, the digital key information is invalid.
In a fourth aspect, an information reading apparatus is provided, which is applied to a terminal, and includes:
the sending module is used for sending request information to the server; the request information comprises a first vehicle identity and a preset time length, and is used for the server to determine digital key information according to the first vehicle identity and the preset time length; the first vehicle identity mark is an identity mark of a vehicle pre-controlled by the terminal, and the preset time length is the time length of the vehicle controlled by the terminal;
and the receiving module is used for receiving the digital key information sent by the server so that the vehicle can read the digital key information in the terminal through near field communication.
In a fifth aspect, an information reading apparatus is provided, which is applied to a server, and includes:
the receiving module is used for receiving request information sent by a terminal, and the request information comprises a first vehicle identity and a preset time length; the first vehicle identity mark is an identity mark of a vehicle pre-controlled by the terminal, and the preset time length is the time length of the vehicle controlled by the terminal;
the determining module is used for determining the digital key information according to the first vehicle identity and the preset time length;
and the sending module is used for sending the digital key information to the terminal so that the vehicle can read the digital key information in the terminal through near field communication.
In a sixth aspect, an information reading apparatus applied to a vehicle, the apparatus includes:
the reading module reads the digital key information in the terminal through near field communication; and in the case that the digital key information is verified, the digital key information is used for controlling the vehicle through the digital key information by the terminal.
In a seventh aspect, there is provided an information reading system including a terminal, a server, and a vehicle;
the terminal is used for sending request information to the server; the request information comprises a first vehicle identity and a preset time length, wherein the first vehicle identity is an identity of a vehicle which is controlled by the terminal in advance, and the preset time length is a time length for controlling the vehicle by the terminal;
the server is used for determining the digital key information according to the first vehicle identity mark and the preset time length;
the terminal is also used for receiving the digital key information sent by the server;
and a vehicle for reading the digital key information in the terminal through near field communication.
In an eighth aspect, a computer storage medium is provided, having stored thereon computer program instructions that, when executed by a processor, implement a method as in the first aspect or any of the possible implementations of the first aspect, implement a method as in the second aspect or any of the possible implementations of the second aspect, and/or implement a method as in the third aspect or any of the possible implementations of the third aspect.
Based on the provided information reading method, device, system and storage medium, when the vehicle can not be networked, request information is sent to the server through the terminal, and the request information comprises vehicle information of the terminal needing to transmit digital key information and a preset time length for using the vehicle. The server can determine the digital key information according to the vehicle information and the preset time length. In this way, the terminal can acquire the digital key information from the server. So that the vehicle can read the digital key information in the terminal based on the near field communication. Therefore, under the condition that the vehicle does not need to be networked, the server can also push the digital key information to the vehicle, so that a user can control the vehicle through the terminal at any time and any place, and the experience degree of the user is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings required to be used in the embodiments of the present application will be briefly described below, and for those skilled in the art, other drawings may be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic structural diagram of an information reading system according to an embodiment of the present application;
fig. 2 is a schematic flowchart of an information reading method according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an information reading apparatus according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of another information reading apparatus provided in an embodiment of the present application;
fig. 5 is a schematic structural diagram of another information reading apparatus according to an embodiment of the present application.
Detailed Description
Features of various aspects and exemplary embodiments of the present application will be described in detail below, and in order to make objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail below with reference to the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. It will be apparent to one skilled in the art that the present application may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present application by illustrating examples thereof.
It should be noted that, in this document, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising 8230; \8230;" comprises 8230; "does not exclude the presence of additional like elements in a process, method, article, or apparatus that comprises the element.
At present, with the development of the car networking technology, the vehicles can be controlled through the terminals in the related technology.
Before a vehicle is controlled through a terminal, the terminal needs to acquire digital key information of the vehicle to be controlled. After the vehicle needs networking authentication, the digital key information of the vehicle can be sent to the terminal. However, the vehicle can only push the digital key information to the terminal in the case of real-time networking, which results in low user experience.
Therefore, the embodiment of the application provides an information reading method, device, system and storage medium, which can enable a terminal to control a vehicle through digital key information in a state that the vehicle is not networked, and improve user experience.
For the convenience of understanding the embodiments of the present application, the information reading system provided in the embodiments of the present application will be first explained in detail.
Fig. 1 is a schematic structural diagram of an information reading system according to an embodiment of the present application.
As shown in fig. 1, an information reading system provided in an embodiment of the present application may include: a terminal 101, a server 102 and a vehicle 103.
The terminal may be a mobile electronic device, such as a mobile phone, a tablet computer, a notebook computer, a palm computer, a wearable device, and the like. And the terminal is used for sending request information to the server to request for controlling the vehicle to be controlled. And the server is used for determining the information of the vehicle pre-controlled by the terminal, the time length for which the terminal controls the vehicle and the like based on the request information sent by the terminal. The information of the pre-controlled vehicle may be an identification of the vehicle. The server can determine digital key information according to the information of the vehicle to be controlled and the time length of the vehicle to be controlled by the terminal, and send the digital key information to the terminal. When the terminal needs to control the pre-controlled vehicle using the digital key information, the digital key information needs to be transmitted to the vehicle so that the terminal can control the vehicle using the digital key information.
The vehicle can acquire the digital key information from the terminal. For example, near Field Communication such as bluetooth Communication, near Field Communication (NFC), ultra Wide Band (UWB), and the like may be used.
Here, the vehicle may be a terminal such as an intelligent door lock or a home gateway.
Based on the information reading system provided by the above embodiment, the information reading system is taken as an execution main body, and the information reading method provided by the embodiment of the present application is explained in detail with reference to the accompanying drawings and the specific embodiment.
Fig. 2 is a schematic flowchart of an information reading method according to an embodiment of the present application.
As shown in fig. 2, an information reading method provided in an embodiment of the present application may include:
s201: the terminal sends the request information to the server.
The request information is request information in which the terminal requests the server for digital key information for controlling a pre-controlled vehicle. The request information comprises a first vehicle identity and a preset time length. The first vehicle identification mark refers to the identification mark of a vehicle pre-controlled by the terminal. The preset time length refers to the time length of the vehicle controlled by the terminal.
For example, the user needs to control the vehicle B through the terminal a, and then the user needs to send request information to the server through the terminal a. The request information includes the identity of the vehicle B and the time length for which the terminal a can control the vehicle B.
S202: and the server determines the digital key information according to the first vehicle identity and the preset time length.
After receiving the request information sent by the terminal, the server generates digital key information of the vehicle to be controlled by the terminal according to the first vehicle identity identifier and the preset time length in the request information. Here, the preset time length is the aging time of the digital key information.
For example, the user needs to control the vehicle B through the terminal a for two hours, and the digital key information may be invalid two hours after the terminal acquires the digital key information, and the terminal a cannot control the vehicle B using the digital key information after two hours.
S203: the server transmits the digital key information to the terminal.
S204: the terminal stores digital key information.
S205: the vehicle reads the digital key information in the terminal through near field communication.
The near field communication may include: bluetooth communication, NFC, UWB and other communication methods. When a user acquires digital key information of a pre-controlled vehicle through a terminal, the user can control the vehicle through the terminal. At this time, the user can bring the terminal close to a Secure Element (SE) provided on the vehicle. The SE on the vehicle can read the digital key information from the terminal by near field communication. So that the user can control the vehicle through the terminal.
Optionally, in an embodiment of the present application, in order to improve security of the digital key information during transmission and use, after the server determines the digital key information, the server needs to encrypt the digital key information, and so on.
Specifically, the digital key information is encrypted using an information encryption key; generating signature information according to the encrypted digital key information; and sending signature information to the terminal, wherein the terminal can transmit the signature information to the vehicle, and the vehicle verifies the digital key information read from the terminal by the vehicle based on the signature information.
The information encryption key is a preset encryption key. The information encryption key is stored in both the terminal and the vehicle. Here, the information encryption key stored in the server, the information encryption key stored in the terminal, and the information encryption key stored in the vehicle are all the same.
The server encrypts the digital key information using the information encryption key to generate signature information of the digital key information. For example, the encrypted digital key information is subjected to hash calculation to obtain signature information of the digital key information. The server sends the signature information corresponding to the digital key information to the terminal, so that the vehicle can read the digital key information and the signature information when reading the information from the terminal, and the vehicle verifies the digital key information based on the signature information to confirm whether the digital key information is tampered in the information transmission process or not, and the information transmission safety of the digital key information is ensured.
Optionally, in another embodiment of the present application, the server further needs to generate the target parameter according to the first vehicle identity, so that the terminal authenticates the vehicle before controlling the vehicle.
Specifically, generating a target parameter corresponding to a first vehicle identity; generating a fifth key and a sixth key according to the target parameter, the preset first key and the preset second key; and sending the fifth key and the sixth key to the terminal for authenticating the vehicle by the terminal.
The target parameter may be a dispersion factor randomly generated based on the first vehicle identification. For example, the server randomly generates a 16 byte dispersion factor based on the first vehicle identification. Here, the target parameter is in one-to-one correspondence with the first vehicle identification.
The first key and the second key are both preset. A fifth key is determined based on the target parameter and the first key, and a sixth key is determined based on the target parameter and the second key. And sending the fifth key and the sixth key to the terminal. The terminal is capable of authenticating the vehicle based on the fifth key and the sixth key.
Optionally, in an embodiment of the present application, the vehicle can acquire the digital key information from the terminal in a near field communication manner, so that the terminal can control the vehicle based on the digital key information.
In order to ensure the security of information, the vehicle and the terminal need to be authenticated in both directions.
First, a process of authenticating a vehicle by a terminal will be described in detail.
Specifically, a fifth key and a sixth key sent by the server are received; the fifth key is generated by the server according to the target parameter and a preset first key; the sixth key is generated by the server according to the target parameter and a preset second key;
receiving a third key and a fourth key sent by a vehicle;
authenticating the vehicle according to the third key, the fourth key, the fifth key and the sixth key;
and in the case that the third key is consistent with the fifth key and the fourth key is consistent with the sixth key, the vehicle passes the authentication and the digital key information is transmitted to the vehicle.
The third key is generated by the vehicle based on the target parameter and a first key preset in the vehicle, and the fourth key is generated by the vehicle based on the target parameter and a second key preset in the vehicle.
Wherein the target parameter in the vehicle is read by the vehicle from the terminal. Before the vehicle reads the digital key information through near field communication, the vehicle sends a second vehicle identification, i.e., the identification of the vehicle, to the terminal. After the terminal receives the second vehicle identification mark, whether the first vehicle identification mark and the second vehicle identification mark are consistent or not can be verified. And if the first vehicle identity mark is consistent with the second vehicle identity mark, the vehicle is proved to be a vehicle pre-controlled by the terminal.
And under the condition that the first vehicle identity identification is verified to be consistent with the second vehicle identity identification, the terminal sends the target parameters to the vehicle.
The terminal receives the fifth key and the sixth key sent by the server and also needs to receive the third key and the fourth key sent by the vehicle.
And when the third key is consistent with the fifth key and the fourth key is consistent with the sixth key, the terminal passes the authentication of the vehicle, so that the digital key information can be transmitted to the vehicle.
Next, a procedure of authenticating the terminal by the vehicle will be described in detail.
The vehicle reads the digital key information and the signature information of the digital key information from the terminal. The digital key information is verified based on the signature information.
Here, the digital key information may be encrypted digital key information. After the signature information is verified, the digital key information can be decrypted.
For example, in order to ensure the integrity and security of the information during transmission, after the vehicle receives the digital key information and the signature information, it is necessary to determine whether the signature in the signature information is correct. When the signature is correct, the encrypted digital key information is decrypted using an information decryption key stored in the vehicle in advance.
Optionally, in some embodiments of the present application, the vehicle further needs to verify whether the information format of the digital key information is consistent with the information format specified in the vehicle, and whether the vehicle id included in the digital key information is consistent with the vehicle id of the vehicle. When the information format of the digital key information is consistent with the information format specified in the vehicle and the vehicle identification mark included in the digital key information is the identification mark of the vehicle, the digital key information is stored, and the terminal can control the vehicle by using the digital key information.
Optionally, in some embodiments of the present application, after the vehicle stores the digital key information, a white list is generated. The white list information includes a terminal identity of a terminal controlling the vehicle and a time length for the terminal to control the vehicle. When the time length of the terminal identity mark for controlling the vehicle is longer than the preset time length, the digital key information of the terminal for controlling the vehicle is invalid, and the terminal cannot control the vehicle by using the digital key information.
According to the information reading method provided by the embodiment of the application, when the vehicles cannot be networked, the request information is sent to the server through the terminal, and the request information comprises the vehicle information of the digital key information needing to be transmitted by the terminal and the preset time length of using the vehicles. The server can determine the digital key information according to the vehicle information and the preset time length. In this way, the terminal can acquire the digital key information from the server. So that the vehicle can read the digital key information in the terminal based on the near field communication. Therefore, the server can also push the digital key information to the vehicle under the condition that the vehicle does not need to be networked, so that a user can control the vehicle through the terminal at any time and any place, and the experience degree of the user is improved.
Based on the information reading method provided by the embodiment of the application, the embodiment of the application also provides an information reading device based on the terminal side. The information reading apparatus will be described in detail below.
Fig. 3 is a schematic structural diagram of an information reading apparatus according to an embodiment of the present application.
As shown in fig. 3, an information reading apparatus provided in this embodiment of the present application is applied to a terminal, and the information reading apparatus may include a sending module 301 and a receiving module 302.
A sending module 301, configured to send request information to a server; the request information comprises a first vehicle identity and a preset time length, and is used for the server to determine digital key information according to the first vehicle identity and the preset time length; the first vehicle identity mark is an identity mark of a vehicle pre-controlled by the terminal, and the preset time length is the time length of the vehicle controlled by the terminal;
a receiving module 302, configured to receive the digital key information sent by the server, so that the vehicle reads the digital key information in the terminal through near field communication.
Optionally, in an embodiment of the present application, the digital key information includes a target parameter corresponding to the first vehicle identifier, and the target parameter is generated by the server according to the first vehicle identifier; the device also includes:
the receiving module 302 is further configured to receive a second vehicle identity sent by the vehicle;
the verification module 303 is configured to verify whether the second vehicle identity is consistent with the first vehicle identity;
the sending module 301 is further configured to send the target parameter to the vehicle when the second vehicle identity is consistent with the first vehicle identity, so that the vehicle generates a third key and a fourth key according to the target parameter corresponding to the first vehicle identity, a preset first key and a preset second key.
Optionally, in an embodiment of the present application, the apparatus further includes:
the receiving module 302 is further configured to receive a fifth key and a sixth key sent by the server; the fifth key is generated by the server according to the target parameter and a preset first key; the sixth key is generated by the server according to the target parameter and a preset second key;
the receiving module 302 is further configured to receive a third key and a fourth key sent by the vehicle;
the authentication module 304 is configured to authenticate the vehicle according to the third key, the fourth key, the fifth key, and the sixth key;
and a transmission module 305, configured to transmit the digital key information to the vehicle after the vehicle authentication is passed if the third key and the fifth key are identical and the fourth key and the sixth key are identical.
Optionally, in an embodiment of the present application, the apparatus further includes:
the receiving module 302 is further configured to receive signature information sent by the server, so that the vehicle reads the signature information from the terminal, and the signature information is used for the vehicle to verify the digital key information.
According to the information reading device provided by the embodiment of the application, when the vehicle cannot be networked, the request information is sent to the server through the terminal, and the request information comprises the vehicle information of the digital key information needing to be transmitted by the terminal and the preset time length of using the vehicle. The server can determine the digital key information according to the vehicle information and the preset time length. In this way, the terminal can acquire the digital key information from the server. So that the vehicle can read the digital key information in the terminal based on the near field communication. Therefore, under the condition that the vehicle does not need to be networked, the server can also push the digital key information to the vehicle, so that a user can control the vehicle through the terminal at any time and any place, and the experience degree of the user is improved.
The information reading device provided by the embodiment of the application executes each step in the method executed by the terminal side in fig. 2, and can achieve the technical effect that the server can also push the digital key information to the vehicle under the condition that the vehicle does not need to be networked, so that a user can control the vehicle through the terminal at any time and any place, the experience of the user is improved, and detailed description is omitted for conciseness description.
Based on the information reading method provided by the embodiment of the application, the embodiment of the application also provides an information reading device based on the server side. The information reading apparatus will be described in detail below.
Fig. 4 is a schematic structural diagram of an information reading apparatus according to an embodiment of the present application.
As shown in fig. 4, an information reading apparatus provided in an embodiment of the present application is applied to a server, and the information reading apparatus may include: a receiving module 401, a determining module 402 and a sending module 403.
The receiving module 401 is configured to receive request information sent by a terminal, where the request information includes a first vehicle identity and a preset time length; the first vehicle identity mark is an identity mark of a vehicle pre-controlled by the terminal, and the preset time length is the time length of the vehicle controlled by the terminal;
a determining module 402, configured to determine digital key information according to the first vehicle identity and a preset time duration;
and a sending module 403, configured to send the digital key information to the terminal, so that the vehicle reads the digital key information in the terminal through near field communication.
Optionally, in an embodiment of the present application, the apparatus further includes:
a generating module 404, configured to generate a target parameter corresponding to the first vehicle identifier;
the generating module 404 is further configured to generate a fifth key and a sixth key according to the target parameter, the preset first key, and the preset second key;
and the sending module 403 is further configured to send the fifth key and the sixth key to the terminal, so that the terminal authenticates the vehicle.
Optionally, in an embodiment of the present application, the server stores an information encryption key; the device also includes:
an encryption module 405 for encrypting the digital key information using the information encryption key;
the generating module 404 is further configured to generate signature information according to the encrypted digital key information;
and the sending module 403 is further configured to send the signature information to the terminal, so that the vehicle reads the signature information from the terminal, and the signature information is used for the vehicle to verify the digital key information.
According to the information reading device provided by the embodiment of the application, when the vehicle cannot be networked, the request information is sent to the server through the terminal, and the request information comprises the vehicle information of the digital key information needing to be transmitted by the terminal and the preset time length of using the vehicle. The server can determine the digital key information according to the vehicle information and the preset time length. In this way, the terminal can acquire the digital key information from the server. So that the vehicle can read the digital key information in the terminal based on the near field communication. Therefore, under the condition that the vehicle does not need to be networked, the server can also push the digital key information to the vehicle, so that a user can control the vehicle through the terminal at any time and any place, and the experience degree of the user is improved.
The information reading device provided by the embodiment of the application executes each step in the method executed by the server side in fig. 2, and can achieve the technical effect that the server can also push the digital key information to the vehicle under the condition that the vehicle does not need to be networked, so that a user can control the vehicle through the terminal at any time and any place, the experience of the user is improved, and detailed description is omitted for conciseness description.
Based on the information reading method provided by the embodiment of the application, the embodiment of the application also provides an information reading device based on a vehicle side. The information reading apparatus will be described in detail below.
Fig. 5 is a schematic structural diagram of an information reading apparatus according to an embodiment of the present application.
As shown in fig. 5, an information reading apparatus provided in an embodiment of the present application is applied to a vehicle, and the information reading apparatus may include: the module 501 is read.
A reading module 501, configured to read digital key information in a terminal through near field communication; and in the case that the digital key information is verified, the digital key information is used for controlling the vehicle through the digital key information by the terminal.
Optionally, in an embodiment of the present application, the apparatus further includes:
the reading module 501 is further configured to read signature information in the terminal;
and the verification module 502 is configured to verify the digital key information according to the signature information.
Optionally, in an embodiment of the present application, the apparatus further includes:
the sending module 503 is configured to send the second vehicle identifier of the vehicle to the terminal, so that when the terminal verifies that the second vehicle identifier is consistent with the first vehicle identifier, the target parameter is sent to the vehicle;
a receiving module 504, configured to receive a target parameter sent by a terminal;
a generating module 505, configured to generate a third key and a fourth key according to the target parameter, a preset first key, and a preset second key;
the sending module 503 is further configured to send the third key and the fourth key to the terminal, so that the terminal authenticates the vehicle according to the third key and the fourth key.
Optionally, in an embodiment of the present application, the apparatus further includes:
an obtaining module 506, configured to obtain a terminal identity of the terminal;
and when the time length of the terminal control vehicle corresponding to the terminal identity mark is greater than the preset time length, the digital key information is invalid.
According to the information reading device provided by the embodiment of the application, when the vehicles cannot be networked, the request information is sent to the server through the terminal, and the request information comprises the vehicle information of the digital key information needing to be transmitted by the terminal and the preset time length of using the vehicles. The server can determine the digital key information according to the vehicle information and the preset time length. In this way, the terminal can acquire the digital key information from the server. So that the vehicle can read the digital key information in the terminal based on the near field communication. Therefore, under the condition that the vehicle does not need to be networked, the server can also push the digital key information to the vehicle, so that a user can control the vehicle through the terminal at any time and any place, and the experience degree of the user is improved.
The information reading device provided by the embodiment of the application executes each step in the method executed by the vehicle side in fig. 2, and can achieve the technical effect that the server can also push the digital key information to the vehicle under the condition that the vehicle does not need to be networked, so that a user can control the vehicle through a terminal at any time and any place, the experience of the user is improved, and detailed description is omitted for conciseness description.
In addition, in combination with the information reading method in the foregoing embodiments, the embodiments of the present application may provide a computer storage medium to implement. The computer storage medium having computer program instructions stored thereon; the computer program instructions, when executed by a processor, implement any of the information reading methods in the above embodiments.
It is to be understood that the present application is not limited to the particular arrangements and instrumentalities described above and shown in the attached drawings. A detailed description of known methods is omitted herein for the sake of brevity. In the above embodiments, several specific steps are described and shown as examples. However, the method processes of the present application are not limited to the specific steps described and illustrated, and those skilled in the art can make various changes, modifications and additions, or change the order between the steps, after comprehending the spirit of the present application.
The functional blocks shown in the above-described structural block diagrams may be implemented as hardware, software, firmware, or a combination thereof. When implemented in hardware, it may be, for example, an electronic circuit, an Application Specific Integrated Circuit (ASIC), suitable firmware, plug-in, function card, or the like. When implemented in software, the elements of the present application are the programs or code segments used to perform the required tasks. The program or code segments may be stored in a machine-readable medium or transmitted by a data signal carried in a carrier wave over a transmission medium or a communication link. A "machine-readable medium" may include any medium that can store or transfer information. Examples of a machine-readable medium include an electronic circuit, a semiconductor memory device, a ROM, a flash memory, an Erasable ROM (EROM), a floppy disk, a CD-ROM, an optical disk, a hard disk, an optical fiber medium, a Radio Frequency (RF) link, and so forth. The code segments may be downloaded via computer networks such as the internet, intranets, etc.
It should also be noted that the exemplary embodiments mentioned in this application describe some methods or systems based on a series of steps or devices. However, the present application is not limited to the order of the above-described steps, that is, the steps may be performed in the order mentioned in the embodiments, may be performed in an order different from the order in the embodiments, or may be performed simultaneously.
As described above, only the specific embodiments of the present application are provided, and it can be clearly understood by those skilled in the art that, for convenience and simplicity of description, the specific working processes of the system, the module and the unit described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again. It should be understood that the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the present application, and these modifications or substitutions should be covered within the scope of the present application.

Claims (12)

1. An information reading method, applied to a terminal, the method comprising:
sending request information to a server; the request information comprises a first vehicle identity and a preset time length, and is used for the server to determine digital key information according to the first vehicle identity and the preset time length; the first vehicle identity mark is an identity mark of a vehicle pre-controlled by the terminal, and the preset time length is the time length of the terminal for controlling the vehicle;
receiving the digital key information sent by the server for the vehicle to read the digital key information in the terminal through near field communication;
the method further comprises the following steps:
receiving a second vehicle identification sent by the vehicle;
verifying whether the second vehicle identification is consistent with the first vehicle identification;
when the second vehicle identity is consistent with the first vehicle identity, sending a target parameter corresponding to the first vehicle identity to the vehicle, so that the vehicle generates a third key and a fourth key according to the target parameter corresponding to the first vehicle identity, a preset first key and a preset second key; wherein the target parameter is generated by the server from the first vehicle identity;
the method further comprises the following steps:
receiving a fifth key and a sixth key sent by the server; the fifth key is generated by the server according to the target parameter and the preset first key; the sixth key is generated by the server according to the target parameter and the preset second key;
receiving the third key and the fourth key sent by the vehicle;
authenticating the vehicle according to the third key, the fourth key, the fifth key and the sixth key;
and if the third key is consistent with the fifth key and the fourth key is consistent with the sixth key, the vehicle passes the authentication and transmits the digital key information to the vehicle.
2. The method of claim 1, further comprising:
and receiving signature information sent by the server for the vehicle to read the signature information from the terminal, wherein the signature information is used for the vehicle to verify the digital key information.
3. An information reading method, applied to a server, the method comprising:
receiving request information sent by a terminal, wherein the request information comprises a first vehicle identity and a preset time length; the first vehicle identity mark is an identity mark of a vehicle pre-controlled by the terminal, and the preset time length is the time length of the terminal for controlling the vehicle;
determining digital key information according to the first vehicle identity and the preset time length;
transmitting the digital key information to the terminal for the vehicle to read the digital key information in the terminal through near field communication;
the method further comprises the following steps:
generating a target parameter corresponding to the first vehicle identification;
generating a fifth key and a sixth key according to the target parameter, a preset first key and a preset second key;
and sending the fifth key and the sixth key to the terminal for the terminal to authenticate the vehicle.
4. The method according to claim 3, wherein the server stores an information encryption key;
before transmitting the digital key information to the terminal, the method further includes:
encrypting the digital key information using the information encryption key;
generating signature information according to the encrypted digital key information;
and sending the signature information to the terminal so that the vehicle can read the signature information from the terminal, wherein the signature information is used for verifying the digital key information by the vehicle.
5. An information reading method, characterized by being applied to a vehicle, the method comprising:
reading digital key information in the terminal through near field communication; under the condition that the digital key information passes verification, the digital key information is used for the terminal to control the vehicle through the digital key information;
the method further comprises the following steps:
sending a second vehicle identity of the vehicle to the terminal, so that when the terminal verifies that the second vehicle identity is consistent with the first vehicle identity, a target parameter is sent to the vehicle;
receiving the target parameters sent by the terminal;
generating a third key and a fourth key according to the target parameter, a preset first key and a preset second key;
and sending the third key and the fourth key to the terminal for the terminal to authenticate the vehicle according to the third key and the fourth key.
6. The method of claim 5, further comprising:
reading signature information in the terminal;
and verifying the digital key information according to the signature information.
7. The method according to any one of claims 5-6, wherein the digital key information includes a preset time length; the method further comprises the following steps:
acquiring a terminal identity of the terminal;
and when the time length of the vehicle controlled by the terminal corresponding to the terminal identity mark is longer than the preset time length, the digital key information is invalid.
8. An information reading apparatus, applied to a terminal, the apparatus comprising:
the sending module is used for sending request information to the server; the request information comprises a first vehicle identity and a preset time length, and is used for the server to determine digital key information according to the first vehicle identity and the preset time length; the first vehicle identification mark is an identification mark of a vehicle pre-controlled by the terminal, and the preset time length is the time length of the terminal controlling the vehicle;
the receiving module is used for receiving the digital key information sent by the server so that the vehicle can read the digital key information in the terminal through near field communication;
the apparatus further comprises a verification module;
the receiving module is further used for receiving a second vehicle identity identifier sent by the vehicle;
the verification module is used for verifying whether the second vehicle identity mark is consistent with the first vehicle identity mark;
the sending module is further configured to send a target parameter corresponding to the first vehicle identity to the vehicle when the second vehicle identity is consistent with the first vehicle identity, so that the vehicle generates a third key and a fourth key according to the target parameter corresponding to the first vehicle identity, a preset first key and a preset second key; wherein the target parameter is generated by the server from the first vehicle identity;
the device also comprises an authentication module and a transmission module;
the receiving module is further configured to receive a fifth key and a sixth key sent by the server; the fifth key is generated by the server according to the target parameter and the preset first key; the sixth key is generated by the server according to the target parameter and the preset second key;
the receiving module is further configured to receive the third key and the fourth key sent by the vehicle;
the authentication module is configured to authenticate the vehicle according to the third key, the fourth key, the fifth key, and the sixth key;
the transmission module is configured to transmit the digital key information to the vehicle after the vehicle passes the authentication if the third key is consistent with the fifth key and the fourth key is consistent with the sixth key.
9. An information reading apparatus, applied to a server, the apparatus comprising:
the receiving module is used for receiving request information sent by a terminal, wherein the request information comprises a first vehicle identity and a preset time length; the first vehicle identity mark is an identity mark of a vehicle pre-controlled by the terminal, and the preset time length is the time length of the terminal for controlling the vehicle;
the determining module is used for determining digital key information according to the first vehicle identity and the preset time length;
the sending module is used for sending the digital key information to the terminal so that the vehicle can read the digital key information in the terminal through near field communication;
the apparatus also includes a generation module;
the generating module is used for generating a target parameter corresponding to the first vehicle identity;
the generation module is further configured to generate a fifth key and a sixth key according to the target parameter, a preset first key and a preset second key;
the sending module is configured to send the fifth key and the sixth key to the terminal, so that the terminal authenticates the vehicle.
10. An information reading apparatus, characterized by being applied to a vehicle, the apparatus comprising:
the reading module reads the digital key information in the terminal through near field communication; under the condition that the digital key information passes verification, the digital key information is used for a terminal to control the vehicle through the digital key information;
the device also comprises a sending module, a receiving module and a generating module;
the sending module is used for sending a second vehicle identity of the vehicle to the terminal, so that when the terminal verifies that the second vehicle identity is consistent with the first vehicle identity, the terminal sends a target parameter to the vehicle;
the receiving module is configured to receive the target parameter sent by the terminal;
the generation module is used for generating a third key and a fourth key according to the target parameter, a preset first key and a preset second key;
the sending module is further configured to send the third key and the fourth key to the terminal, so that the terminal authenticates the vehicle according to the third key and the fourth key.
11. An information reading system, characterized in that the system comprises a terminal, a server and a vehicle;
the terminal is used for sending request information to the server; the request information comprises a first vehicle identity identifier and a preset time length, wherein the first vehicle identity identifier is an identity identifier of a vehicle pre-controlled by the terminal, and the preset time length is a time length for controlling the vehicle by the terminal;
the server is used for determining digital key information according to the first vehicle identity and the preset time length;
the terminal is also used for receiving the digital key information sent by the server;
the vehicle is used for reading the digital key information in the terminal through near field communication;
the terminal is further used for receiving a second vehicle identity mark sent by the vehicle; verifying whether the second vehicle identification is consistent with the first vehicle identification; when the second vehicle identity is consistent with the first vehicle identity, sending a target parameter corresponding to the first vehicle identity to the vehicle;
the vehicle is further used for generating a third key and a fourth key according to a target parameter corresponding to the first vehicle identity, a preset first key and a preset second key; wherein the target parameter is generated by the server from the first vehicle identity;
the terminal is further used for receiving a fifth key and a sixth key sent by the server; the fifth key is generated by the server according to the target parameter and the preset first key; the sixth secret key is generated by the server according to the target parameter and the preset second secret key; receiving the third key and the fourth key sent by the vehicle; authenticating the vehicle according to the third key, the fourth key, the fifth key and the sixth key; and if the third key is consistent with the fifth key and the fourth key is consistent with the sixth key, the vehicle passes the authentication and transmits the digital key information to the vehicle.
12. A computer storage medium having computer program instructions stored thereon, which when executed by a processor implement the method of any of claims 1-2, implement the method of any of claims 3-4, and/or implement the method of any of claims 5-7.
CN202010703059.2A 2020-07-21 2020-07-21 Information reading method, device, system and storage medium Active CN111935672B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202010703059.2A CN111935672B (en) 2020-07-21 2020-07-21 Information reading method, device, system and storage medium
PCT/CN2021/107063 WO2022017314A1 (en) 2020-07-21 2021-07-19 Information reading method, apparatus, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010703059.2A CN111935672B (en) 2020-07-21 2020-07-21 Information reading method, device, system and storage medium

Publications (2)

Publication Number Publication Date
CN111935672A CN111935672A (en) 2020-11-13
CN111935672B true CN111935672B (en) 2022-10-25

Family

ID=73313361

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010703059.2A Active CN111935672B (en) 2020-07-21 2020-07-21 Information reading method, device, system and storage medium

Country Status (2)

Country Link
CN (1) CN111935672B (en)
WO (1) WO2022017314A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111935672B (en) * 2020-07-21 2022-10-25 捷德(中国)科技有限公司 Information reading method, device, system and storage medium
CN116343366A (en) * 2021-12-24 2023-06-27 上海集度汽车有限公司 Matching relation establishment method and device and related equipment
CN116566594A (en) * 2022-01-30 2023-08-08 华为技术有限公司 Equipment control method, equipment and distributed digital key system
CN115226201B (en) * 2022-03-15 2024-02-13 广州汽车集团股份有限公司 Digital key calibration method, device, vehicle and storage medium
CN114401515B (en) * 2022-03-25 2022-08-12 斯润天朗(北京)科技有限公司 Method for controlling vehicle based on digital key
CN115604029B (en) * 2022-11-29 2023-04-07 广州万协通信息技术有限公司 Vehicle information management method of security chip and security chip device
CN116017440B (en) * 2023-03-27 2023-06-02 北京全路通信信号研究设计院集团有限公司 Key acquisition method, device, equipment and storage medium

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105848091A (en) * 2016-03-31 2016-08-10 乐视控股(北京)有限公司 Vehicle control method and device without keys
WO2017108818A1 (en) * 2015-12-21 2017-06-29 Huf Hülsbeck & Fürst Gmbh & Co. Kg System and method for transfer of vehicle access rights
CN107968781A (en) * 2017-11-23 2018-04-27 大陆汽车投资(上海)有限公司 The security processing of vehicle shared service
CN109808643A (en) * 2019-03-04 2019-05-28 重庆长安汽车股份有限公司 Bluetooth electronic key system and its control method
CN110091828A (en) * 2019-05-16 2019-08-06 广州小鹏汽车科技有限公司 A kind of control method and device of car key
CN110126782A (en) * 2019-05-23 2019-08-16 东风小康汽车有限公司重庆分公司 A kind of Vehicular intelligent key application method and device
CN110177354A (en) * 2019-06-21 2019-08-27 湖北亿咖通科技有限公司 A kind of wireless control method and system of vehicle
CN110189442A (en) * 2019-05-28 2019-08-30 上海银基信息安全技术股份有限公司 Authentication method and device
CN111080857A (en) * 2019-12-30 2020-04-28 华人运通(上海)云计算科技有限公司 Vehicle digital key management and use method and device, mobile terminal and storage medium
CN111142509A (en) * 2018-10-17 2020-05-12 现代自动车株式会社 Vehicle, server, vehicle control method, and server control method
CN111194028A (en) * 2019-11-05 2020-05-22 储长青 A vehicle-based safety control method
CN111422162A (en) * 2020-02-21 2020-07-17 吉利汽车研究院(宁波)有限公司 Vehicle starting method and device based on digital key and terminal

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107403483A (en) * 2016-05-18 2017-11-28 富泰华工业(深圳)有限公司 Intelligent automobile key system and its control method
CN106408700A (en) * 2016-08-31 2017-02-15 长城汽车股份有限公司 Mobile terminal, server, vehicle and control system
KR102689212B1 (en) * 2017-02-13 2024-07-29 삼성전자 주식회사 Method and apparatus for setting function customized for individual users using smart car key
CN111935672B (en) * 2020-07-21 2022-10-25 捷德(中国)科技有限公司 Information reading method, device, system and storage medium

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017108818A1 (en) * 2015-12-21 2017-06-29 Huf Hülsbeck & Fürst Gmbh & Co. Kg System and method for transfer of vehicle access rights
CN105848091A (en) * 2016-03-31 2016-08-10 乐视控股(北京)有限公司 Vehicle control method and device without keys
CN107968781A (en) * 2017-11-23 2018-04-27 大陆汽车投资(上海)有限公司 The security processing of vehicle shared service
CN111142509A (en) * 2018-10-17 2020-05-12 现代自动车株式会社 Vehicle, server, vehicle control method, and server control method
CN109808643A (en) * 2019-03-04 2019-05-28 重庆长安汽车股份有限公司 Bluetooth electronic key system and its control method
CN110091828A (en) * 2019-05-16 2019-08-06 广州小鹏汽车科技有限公司 A kind of control method and device of car key
CN110126782A (en) * 2019-05-23 2019-08-16 东风小康汽车有限公司重庆分公司 A kind of Vehicular intelligent key application method and device
CN110189442A (en) * 2019-05-28 2019-08-30 上海银基信息安全技术股份有限公司 Authentication method and device
CN110177354A (en) * 2019-06-21 2019-08-27 湖北亿咖通科技有限公司 A kind of wireless control method and system of vehicle
CN111194028A (en) * 2019-11-05 2020-05-22 储长青 A vehicle-based safety control method
CN111080857A (en) * 2019-12-30 2020-04-28 华人运通(上海)云计算科技有限公司 Vehicle digital key management and use method and device, mobile terminal and storage medium
CN111422162A (en) * 2020-02-21 2020-07-17 吉利汽车研究院(宁波)有限公司 Vehicle starting method and device based on digital key and terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
汽车智能钥匙原理及案例;毕中军 等;《汽车实用技术》;20151027;全文 *

Also Published As

Publication number Publication date
WO2022017314A1 (en) 2022-01-27
CN111935672A (en) 2020-11-13

Similar Documents

Publication Publication Date Title
CN111935672B (en) Information reading method, device, system and storage medium
JP7192122B2 (en) Systems and methods for authenticating connections between user devices and vehicles
CN1550115B (en) Method of verifying downloaded software and corresponding device
CN112396735B (en) Internet automobile digital key safety authentication method and device
US20110113241A1 (en) Ic card, ic card system, and method thereof
CN108768664A (en) Key management method, device, system, storage medium and computer equipment
US10931458B2 (en) Authentication system
CN110191415B (en) Vehicle information encryption method, vehicle-mounted equipment and server
CN110650478A (en) OTA method, system, device, SE module, program server and medium
US20080130879A1 (en) Method and system for a secure PKI (Public Key Infrastructure) key registration process on mobile environment
CN111541716A (en) Data transmission method and related device
CN107733636B (en) Authentication method and authentication system
CN113794734A (en) Vehicle-mounted CAN bus encryption communication method, control device and readable storage medium
CN115396121B (en) Security authentication method for security chip OTA data packet and security chip device
CN110838919B (en) Communication method, storage method, operation method and device
JP5264182B2 (en) Method for fast pre-authentication by distance recognition
CN111541660B (en) Identity authentication method for remote vehicle control
US20240223370A1 (en) Method for authentication of a service provider device to a user device
KR20200043855A (en) Method and apparatus for authenticating drone using dim
JP2017130845A (en) Authentication system, authentication request apparatus, on-vehicle electronic apparatus, computer program and authentication processing method
CN110808998B (en) Initialization of identity authentication device, identity authentication method and device
CN111818482B (en) Online certificate status acquisition method and system for V2X and communication method
CN115499837B (en) Communication method, device, equipment and storage medium based on secure transport layer protocol
WO2013161371A1 (en) Program providing device, system, program providing method and program
CN119232487B (en) Device registration method, device and medium, registration server, authentication server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230630

Address after: 330096 Room 01, Floor 1, Complex Building, No. 399, Torch Street, Nanchang High tech Industrial Development Zone, Nanchang City, Jiangxi Province

Patentee after: Jiede (Jiangxi) Technology Co.,Ltd.

Address before: 330096 No. 399 torch street, hi tech Development Zone, Jiangxi, Nanchang

Patentee before: Jiede (China) Technology Co.,Ltd.