WO2018098886A1 - Method for opening vehicle door, mobile terminal, vehicle-mounted terminal, and system - Google Patents
Method for opening vehicle door, mobile terminal, vehicle-mounted terminal, and system Download PDFInfo
- Publication number
- WO2018098886A1 WO2018098886A1 PCT/CN2016/113399 CN2016113399W WO2018098886A1 WO 2018098886 A1 WO2018098886 A1 WO 2018098886A1 CN 2016113399 W CN2016113399 W CN 2016113399W WO 2018098886 A1 WO2018098886 A1 WO 2018098886A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- vehicle
- mobile terminal
- terminal
- algorithm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0433—Key management protocols
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/2072—Means to switch the anti-theft system on or off with means for preventing jamming or interference of a remote switch control signal
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/24—Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
- B60R25/241—Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user whereby access privileges are related to the identifiers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Definitions
- the present invention relates to the field of communications technologies, and in particular, to a method for opening a vehicle door, a mobile terminal, an in-vehicle terminal, and a system.
- the door When the user needs to use the car, the door must be opened first.
- the existing method of opening the door has a traditional insertion key to open the door, which is cumbersome; in addition, for a vehicle equipped with a keyless entry system, the key can be wirelessly connected with the door, when the key is close to the car. Open the door directly, but this method is less secure. And sometimes the user may forget the key in the car. If this happens, neither of the above methods can open the door. Therefore, there is a need for a convenient and safe way to open the door.
- the technical problem to be solved by the embodiments of the present invention is to provide a method for opening a vehicle door, a mobile terminal, an in-vehicle terminal and a system. It can improve the convenience and safety of door opening.
- a first aspect of the embodiments of the present invention provides a method for opening a vehicle door, including:
- An encryption algorithm and a decryption algorithm for negotiating information between the mobile terminal and the vehicle terminal An encryption algorithm and a decryption algorithm for negotiating information between the mobile terminal and the vehicle terminal;
- the encrypted user fingerprint information is used to match the pre-stored user fingerprint information after the vehicle-mounted terminal decrypts it by using a negotiated decryption algorithm, and after the matching is successful Open the car door.
- a second aspect of the embodiments of the present invention provides a mobile terminal, including:
- a negotiating unit configured as an encryption algorithm and a decryption algorithm for negotiating information with the in-vehicle terminal
- the encryption unit is configured to acquire user fingerprint information and encrypt using a negotiated encryption algorithm
- a sending unit configured to send the encrypted user fingerprint information to the vehicle-mounted terminal, where the encrypted user fingerprint information is used to match the pre-stored user fingerprint information after the vehicle-mounted terminal decrypts the file by using a negotiated decryption algorithm. And after the matching is successful, open the car door.
- a third aspect of the embodiments of the present invention provides a mobile terminal, including:
- a processor a memory, an interface circuit, and a bus, wherein the processor, the memory, and the interface circuit are connected by a bus, wherein the memory is configured to store a set of program codes, and the processor is configured to call the program code stored in the memory , do the following:
- An encryption algorithm and a decryption algorithm for negotiating information with the vehicle terminal An encryption algorithm and a decryption algorithm for negotiating information with the vehicle terminal
- the encrypted user fingerprint information is used to match the pre-stored user fingerprint information after the vehicle-mounted terminal decrypts it by using a negotiated decryption algorithm, and after the matching is successful Open the car door.
- the encryption algorithm and the decryption algorithm are asymmetric keys.
- the encryption algorithm and the decryption algorithm correspond to each other and dynamically change at the same time.
- the processor is further configured to:
- the method further includes:
- the processor is further configured to:
- the mobile terminal After the decrypted information is successfully matched, the mobile terminal sends a control command to the in-vehicle terminal, and controls the in-vehicle terminal to open the car door.
- a fourth aspect of the embodiments of the present invention provides a method for opening a vehicle door, including:
- An encryption algorithm and a decryption algorithm for negotiating information between the vehicle terminal and the mobile terminal are combined;
- the received decryption algorithm is used to decrypt the received information and match the pre-stored information
- the vehicle door is opened or a control command sent by the mobile terminal is received, and the car door is opened;
- the information includes user fingerprint information.
- a fifth aspect of the embodiments of the present invention provides an in-vehicle terminal, including:
- a negotiating unit configured as an encryption algorithm and a decryption algorithm for negotiating information with the mobile terminal
- a receiving unit configured to receive the encrypted information sent by the mobile terminal
- a decryption unit configured to decrypt the received information using a negotiated decryption algorithm and to match the pre-stored information
- the receiving unit is further configured to receive a control command sent by the mobile terminal, instructing the opening unit to open a car door;
- the information includes user fingerprint information.
- a sixth aspect of the embodiments of the present invention provides an in-vehicle terminal, including:
- a processor a memory, an interface circuit, and a bus, wherein the processor, the memory, and the interface circuit are connected by a bus, wherein the memory is configured to store a set of program codes, and the processor is configured to call the program code stored in the memory , do the following:
- An encryption algorithm and a decryption algorithm for negotiating information with the mobile terminal An encryption algorithm and a decryption algorithm for negotiating information with the mobile terminal
- the received decryption algorithm is used to decrypt the received information and match the pre-stored information
- the vehicle door is opened or a control command sent by the mobile terminal is received, and the car door is opened;
- the information includes user fingerprint information.
- the encryption algorithm and the decryption algorithm are asymmetric keys.
- the encryption algorithm and the decryption algorithm correspond to each other and dynamically change at the same time.
- the information further includes identification information of the mobile terminal.
- the processor is further configured to:
- the information sent by the mobile terminal is rejected within a preset time period or the connection with the mobile terminal is disconnected within a preset time period.
- a seventh aspect of the embodiments of the present invention provides a system, including:
- the system can provide double protection, the first layer is decrypted by the encryption algorithm, and the second layer is the uniqueness and complexity of the fingerprint information.
- the complex computing protection of the sexual composition makes the thief unable to crack or simulate the signal sent by the mobile terminal to the vehicle terminal, and realizes the use of the user mobile terminal to unlock the door, which is convenient for the user to use, and ensures the safety of the user's car.
- FIG. 1 is a schematic flow chart of a first embodiment of a method for opening a vehicle door according to the present invention
- FIG. 2 is a schematic flow chart of a second embodiment of a method for opening a vehicle door according to the present invention
- FIG. 3 is a schematic flow chart of a third embodiment of a method for opening a vehicle door according to the present invention.
- FIG. 4 is a schematic diagram showing the composition of a first embodiment of a mobile terminal of the present invention.
- FIG. 5 is a schematic diagram of the composition of a second embodiment of the mobile terminal of the present invention.
- FIG. 6 is a schematic diagram showing the composition of a first embodiment of the vehicle-mounted terminal of the present invention.
- FIG. 7 is a schematic diagram showing the composition of a second embodiment of the vehicle-mounted terminal of the present invention.
- Figure 8 is a schematic diagram showing the composition and interaction flow of the system of the present invention.
- the mobile terminal in the embodiment of the present invention is a device for providing voice and/or data connectivity to a user, which can establish a wireless data connection with the vehicle-mounted terminal, and has a fingerprint acquisition module, which can collect the user fingerprint.
- the mobile terminal may include, but is not limited to, a smart phone (such as an Android mobile phone, an iOS mobile phone, a Windows Phone mobile phone, etc.), a tablet computer, a palmtop computer, a notebook computer, a mobile Internet device (MID), or a wearable device, etc.
- MID mobile Internet device
- the mobile terminal is only an example, not an exhaustive one, including but not limited to the above mobile terminal.
- the in-vehicle terminal in the embodiment of the present invention can establish a wireless data connection with the mobile terminal, which can be integrated with the central control on the car, or can be set independently.
- the embodiment of the present invention does not impose any limitation, and the user can be pre-stored in the memory. Fingerprint information and identification information of the mobile terminal used by the user. It can control various parts of the car, such as doors, headlights, wipers, air conditioners, windows and skylights.
- FIG. 1 is a schematic flowchart of a first embodiment of a method for opening a vehicle door according to the present invention.
- the method includes the following steps:
- S101 An encryption algorithm and a decryption algorithm for negotiating information between the mobile terminal and the vehicle terminal.
- the encryption algorithm and the decryption algorithm are asymmetric keys.
- the symmetric key may be used, which is not limited in the embodiment of the present invention.
- symmetric key encryption is also called Secret Key Encryption (SKE), that is, both sides transmitting and receiving data must use the same / symmetric key to encrypt and decrypt the plaintext.
- Asymmetric key encryption also known as Public Key Encryption (PKE)
- PKE Public Key Encryption
- Asymmetric key encryption also known as Public Key Encryption (PKE)
- PKE Public Key Encryption
- PKE Public Key Encryption
- PKE Public Key Encryption
- the party transmitting the data encrypts the transmitted information with the other party's public key, and then the recipient decrypts it with his own private key.
- Public key encryption technology solves the problem of key release and management and is the core of current commercial passwords. Using public key technology, both parties communicating data can securely identify each other's identity and public key, providing identifiability of the communication.
- the encryption algorithm and the decryption algorithm correspond to each other and dynamically change at the same time.
- multiple sets of corresponding encryption and decryption algorithms can be negotiated, and then one set is agreed to be used each time, and the mobile terminal can notify the in-vehicle terminal by generating algorithm identification information.
- Such dynamically changing encryption and decryption algorithms can further improve the security of the system.
- the mobile terminal when encrypting the user fingerprint information, it is required to detect that a wireless data connection is established with the vehicle-mounted terminal and the user fingerprint information has been acquired.
- the mobile terminal is prevented from encrypting by using the encryption algorithm every time the fingerprint information is acquired.
- the obtained fingerprint information may be encrypted after the terminal opens a specific interface of a specific application, such as a control interface of the car control application.
- the encrypted user fingerprint information is used to match the pre-stored user fingerprint information after the vehicle-mounted terminal decrypts it by using a negotiated decryption algorithm, and opens the car door after the matching is successful. .
- the mobile terminal can establish an infinite data connection with the car control terminal by short-range wireless communication before transmitting the information.
- the short-range wireless communication method is used to transmit the encrypted fingerprint information, so the confidentiality is required to be good and does not spread.
- it can be Bluetooth, Near Field Communication (NFC), Wireless-Fidelity (Wi-Fi), and the like.
- the embodiment of the invention is not limited.
- fingerprint information of multiple users may be pre-stored on the vehicle terminal of the automobile, so that all users in the family member can use the method in this embodiment to open the door.
- the car door may be directly controlled to be turned on, or may not be turned on temporarily, waiting for receiving a control command sent by the mobile terminal to control the door opening.
- the control of opening the door is specifically described, which is a basic step of entering the automobile to use the automobile, but the method described in the embodiment of the present invention can be applied not only to control the opening of the door but also to the door opening. It can be applied to the control of other parts of the car.
- an application for controlling the car can be installed on the mobile terminal, in which various components of the car can be simulated or multiple buttons can be used to correspond to various parts of the car, and the user can pass the fingerprint matching successfully.
- the mobile terminal controls various components of the automobile, such as a headlight, an air conditioner, a window, an audio, and the like, which are not limited in any embodiment of the present invention.
- the vehicle terminal does not execute the control command sent by the mobile terminal.
- the matching of the preset number of times fails, the information sent by the mobile terminal to the in-vehicle terminal is rejected within a preset duration, or the connection between the mobile terminal and the in-vehicle terminal is disconnected within a preset duration .
- the vehicle-mounted terminal may disconnect the wireless data connection with the mobile terminal within one hour after four consecutive fingerprint matching failures, or may not disconnect the wireless data connection, but refuse to receive the mobile terminal's transmission within one hour. information. Or you can also introduce an alarm mechanism to remind the owner after a continuous match failure. Therefore, it is possible to prevent the unscrupulous elements from continuously taking fingerprints and attempting to illegally open the door to improve the security of the system.
- Scene 1 The user walks to the side of the car, and the mobile terminal automatically connects to the vehicle terminal for Bluetooth connection.
- the user opens the door control application of the mobile terminal to enter the door opening interface, puts the finger on the fingerprint identification module, and the mobile terminal acquires the user fingerprint and encrypts the fingerprint.
- the vehicle terminal decrypts the fingerprint, and matches with the pre-stored user fingerprint, matches and passes, and the car door is unlocked.
- Scene 2 The thief cracks the wireless connection of the vehicle terminal next to the car, such as a Bluetooth connection, and sends the stolen fingerprint information to the vehicle terminal.
- the vehicle terminal decrypts the received fingerprint information. Since there is no matching encryption algorithm, the garbled code is obtained after decryption. The match fails. After multiple attempts fail, the car disconnects the wireless connection and sends a notification to the owner.
- the system can provide double protection, the first layer is decrypted by the encryption algorithm, and the second layer is the fingerprint.
- the unique computational complexity of the uniqueness and complexity of the information makes it impossible for the thief to crack or simulate the signal sent by the mobile terminal to the vehicle-mounted terminal. In order to realize the use of the user's mobile terminal to unlock the door, it is convenient for the user to use, and the safety of the user's car is ensured. .
- FIG. 2 is a schematic flowchart of a second embodiment of a method for opening a vehicle door according to the present invention.
- the method includes:
- S202 Acquire user fingerprint information and identification information of the mobile terminal, and perform encryption by using a negotiated encryption algorithm.
- the encrypted identification information is used to match the pre-stored identification information after the vehicle-mounted terminal decrypts it by using a negotiated decryption algorithm, and opens the automobile door after the user fingerprint information and the identification information are successfully matched.
- the process of matching the identification information of the mobile terminal is added, and the security of the system can be further improved by encrypting and decrypting the identification information of the mobile terminal.
- the pre-stored identification information may include identification information of a plurality of mobile terminals of the user's home or a friend, and combined with the pre-stored plurality of fingerprint information, the opening of the door by the mobile terminal of the plurality of reliable users may be implemented.
- FIG. 3 is a schematic flowchart of a third embodiment of a method for opening a vehicle door according to the present invention.
- the method includes the following steps:
- the encryption algorithm and the decryption algorithm are asymmetric keys.
- the symmetric key may be used, which is not limited in the embodiment of the present invention.
- symmetric key encryption is also called Secret Key Encryption (SKE), that is, both sides transmitting and receiving data must use the same / symmetric key to encrypt and decrypt the plaintext.
- Asymmetric key encryption also known as Public Key Encryption (PKE)
- PKE Public Key Encryption
- Asymmetric key encryption also known as Public Key Encryption (PKE)
- PKE Public Key Encryption
- PKE Public Key Encryption
- PKE Public Key Encryption
- the party transmitting the data encrypts the transmitted information with the other party's public key, and then the recipient decrypts it with his own private key.
- Public key encryption technology solves the problem of key release and management and is the core of current commercial passwords. Using public key technology, both parties communicating data can securely identify each other's identity and public key, providing identifiability of the communication.
- the encryption algorithm and the decryption algorithm correspond to each other and dynamically change at the same time.
- multiple sets of corresponding encryption and decryption algorithms can be negotiated, and then one set is agreed to be used each time, and the mobile terminal can notify the in-vehicle terminal by generating algorithm identification information.
- Such dynamically changing encryption and decryption algorithms can further improve the security of the system.
- S302. Receive encrypted information sent by the mobile terminal.
- S303 Decrypt the received information by using a negotiated decryption algorithm and match the pre-stored information.
- the information includes user fingerprint information.
- the information further includes identification information of the mobile terminal.
- the information sent by the mobile terminal is rejected within a preset time period or the connection with the mobile terminal is disconnected within a preset time period.
- the vehicle-mounted terminal includes:
- the negotiating unit 100 is configured as an encryption algorithm and a decryption algorithm for negotiating information with the in-vehicle terminal;
- the encryption unit 200 is configured to acquire user fingerprint information and perform encryption by using a negotiated encryption algorithm
- the sending unit 300 is configured to send the encrypted user fingerprint information to the vehicle-mounted terminal, where the encrypted user fingerprint information is used to decrypt the pre-stored user fingerprint information after the vehicle-mounted terminal decrypts the data using a negotiated decryption algorithm. Match and open the car door after the match is successful.
- the encryption algorithm and the decryption algorithm are asymmetric keys.
- the encryption algorithm and the decryption algorithm correspond to each other and dynamically change at the same time.
- the encryption unit 200 is further configured to:
- the sending unit 300 is further configured to:
- the sending order 300 yuan is further set to:
- the mobile terminal After the decrypted information is successfully matched, the mobile terminal sends a control command to the in-vehicle terminal, and controls the in-vehicle terminal to open the car door.
- the foregoing negotiation unit 100, the encryption unit 200, and the sending unit 300 may exist independently or may be integrated.
- the negotiation unit 100, the encryption unit 200, or the sending unit 300 may be separately set in hardware form independently of the processor of the mobile terminal, and the setting form It may be in the form of a microprocessor; it may also be embedded in the processor of the mobile terminal in hardware form, or may be stored in the memory of the mobile terminal in software, so that the processor of the mobile terminal invokes the above negotiation.
- the operations corresponding to the unit 100, the encryption unit 200, and the transmission unit 300 may exist independently or may be integrated.
- the negotiation unit 100, the encryption unit 200, or the sending unit 300 may be separately set in hardware form independently of the processor of the mobile terminal, and the setting form It may be in the form of a microprocessor; it may also be embedded in the processor of the mobile terminal in hardware form, or may be stored in the memory of the mobile terminal in software, so that the processor of the mobile terminal invokes the above negotiation.
- the encryption unit 200 may be a processor of the mobile terminal, and the functions of the negotiation unit 100 and the sending unit 300 may be embedded in the In the processor, it can also be set separately from the processor, or can be stored in the memory in the form of software, and the function is called by the processor.
- the embodiment of the invention does not impose any limitation.
- the above processor may be a central processing unit (CPU), a microprocessor, a single chip microcomputer, or the like.
- the mobile terminal includes:
- the processor 110, the memory 120, the interface circuit 130, and the bus 140 are connected by a bus 140, wherein the memory 120 is configured to store a set of program codes, and the processor 110 For invoking the program code stored in the memory 120, the following operations are performed:
- An encryption algorithm and a decryption algorithm for negotiating information with the vehicle terminal An encryption algorithm and a decryption algorithm for negotiating information with the vehicle terminal
- the encrypted user fingerprint information is used to match the pre-stored user fingerprint information after the vehicle-mounted terminal decrypts it by using a negotiated decryption algorithm, and after the matching is successful Open the car door.
- the encryption algorithm and the decryption algorithm are asymmetric keys.
- the encryption algorithm and the decryption algorithm correspond to each other and dynamically change at the same time.
- the processor 110 is further configured to:
- the method further includes:
- the processor 110 is further configured to:
- the mobile terminal After the decrypted information is successfully matched, the mobile terminal sends a control command to the in-vehicle terminal, and controls the in-vehicle terminal to open the car door.
- the in-vehicle terminal includes:
- the negotiating unit 400 is configured to negotiate an encryption algorithm and a decryption algorithm with the mobile terminal;
- the receiving unit 500 is configured to receive the encrypted information sent by the mobile terminal
- the decryption unit 600 is configured to decrypt the received information and match the pre-stored information by using a negotiated decryption algorithm
- the receiving unit 500 is further configured to receive a control command sent by the mobile terminal, instructing the opening unit 700 to open a car door;
- the information includes user fingerprint information.
- the information further includes identification information of the mobile terminal.
- the encryption algorithm and the decryption algorithm are asymmetric keys.
- the encryption algorithm and the decryption algorithm correspond to each other and dynamically change at the same time.
- the receiving unit 500 is further configured to:
- the information sent by the mobile terminal is rejected within a preset time period or the connection with the mobile terminal is disconnected within a preset time period.
- the above negotiation unit 400, the receiving unit 500, the decryption unit 600 and the opening unit 700 may exist independently or may be integrated, and the negotiation unit 400, the receiving unit 500, the decryption unit 600 or the opening unit 700 may be independent of the vehicle-mounted terminal in the form of hardware.
- the processor is separately provided and can be in the form of a microprocessor; it can also be embedded in the processor of the vehicle terminal in hardware form, or can be stored in the memory of the vehicle terminal in software for the vehicle.
- the processor of the terminal invokes the operations corresponding to the above negotiation unit 400, the receiving unit 500, the decryption unit 600, and the opening unit 700.
- the decryption unit 600 may be a processor of the vehicle-mounted terminal, and the functions of the negotiation unit 400, the receiving unit 500, and the opening unit 700 may be Embedded in the processor, it can also be set independently of the processor, or can be stored in the memory in the form of software, and the function is called by the processor.
- the embodiment of the invention does not impose any limitation.
- the above processor may be a central processing unit (CPU), a microprocessor, a single chip microcomputer, or the like.
- the vehicle-mounted terminal includes:
- the processor 210, the memory 220, the interface circuit 230, and the bus 240, the processor 210, the memory 220, and the interface circuit 230 are connected by a bus 240, wherein the memory 220 is used to store a set of program codes, and the processor 210 For invoking the program code stored in the memory 220, the following operations are performed:
- An encryption algorithm and a decryption algorithm for negotiating information with the mobile terminal An encryption algorithm and a decryption algorithm for negotiating information with the mobile terminal
- the received decryption algorithm is used to decrypt the received information and match the pre-stored information
- the vehicle door is opened or a control command sent by the mobile terminal is received, and the car door is opened;
- the information includes user fingerprint information.
- the encryption algorithm and the decryption algorithm are asymmetric keys.
- the encryption algorithm and the decryption algorithm correspond to each other and dynamically change at the same time.
- the information further includes identification information of the mobile terminal.
- the processor 110 is further configured to:
- the information sent by the mobile terminal is rejected within a preset time period or the connection with the mobile terminal is disconnected within a preset time period.
- FIG. 8 is a schematic diagram of a composition and an interaction process of a system according to an embodiment of the present invention.
- the system includes:
- Mobile terminal 10 and vehicle terminal 20 are Mobile terminal 10 and vehicle terminal 20;
- the mobile terminal 10 is configured to use an encryption algorithm and a decryption algorithm for negotiating information with the vehicle-mounted terminal, acquire information of the user, perform encryption by using a negotiated encryption algorithm, and transmit the encrypted information to the vehicle-mounted terminal.
- the information includes user fingerprint information, or includes user fingerprint information and identification information of the mobile terminal.
- S802 The mobile terminal establishes a data connection with the vehicle control terminal by short-range wireless communication.
- the mobile terminal acquires user fingerprint information.
- the mobile terminal encrypts the fingerprint information by using a negotiated encryption algorithm.
- the mobile terminal sends the encrypted fingerprint information by establishing a good data connection.
- the identification information of the mobile terminal may be further increased during encryption and decryption to further improve system security, and after the continuous matching fails, the vehicle terminal 20 may reject the information sent or disconnected and moved by the mobile terminal 10.
- the present invention has the following advantages:
- the system can provide double protection, the first layer is decrypted by the encryption algorithm, and the second layer is the uniqueness and complexity of the fingerprint information.
- the complex computing protection of the sexual composition makes the thief unable to crack or simulate the signal sent by the mobile terminal to the vehicle terminal, and realizes the use of the user mobile terminal to unlock the door, which is convenient for the user to use, and ensures the safety of the user's car.
- the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mechanical Engineering (AREA)
- Computer Security & Cryptography (AREA)
- Lock And Its Accessories (AREA)
Abstract
Description
本申请要求于2016年11月29日提交中国专利局,申请号为201611076026.X、发明名称为“一种开启车门的方法、移动终端、车载终端及系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims priority to Chinese Patent Application No. 201611076026.X, the invention name is "a method of opening a door, a mobile terminal, a vehicle terminal and a system", which is filed on November 29, 2016. The entire contents are incorporated herein by reference.
本发明涉及通信技术领域,尤其涉及一种开启车门的方法、移动终端、车载终端及系统。The present invention relates to the field of communications technologies, and in particular, to a method for opening a vehicle door, a mobile terminal, an in-vehicle terminal, and a system.
随着人们生活水平的不断提高,越来越的用户家庭拥有自己的汽车。不管是上班代步、商务接待或者外出旅游等,都可以为用户带来非常大的便利,同时也利于扩大用户的活动半径。As people's living standards continue to improve, more and more users and families have their own cars. Whether it is to go to work, business reception or travel, it can bring great convenience to users, but also help to expand the radius of the user's activities.
用户需要使用汽车时,必须先开启车门。目前现有的开启车门的方式有传统的插入钥匙开门,这种方式比较繁琐;另外对于配置了无钥匙进入系统的车型,还可以通过钥匙与车门的无线连接,当钥匙与汽车距离较近时直接开启车门,但是这种方式安全性较差。且有时候用户可能会将钥匙忘在车中,目前若出现这种情况,上述两种方式均无法打开车门。因此,需要一种便利而安全的开启车门的方式。When the user needs to use the car, the door must be opened first. At present, the existing method of opening the door has a traditional insertion key to open the door, which is cumbersome; in addition, for a vehicle equipped with a keyless entry system, the key can be wirelessly connected with the door, when the key is close to the car. Open the door directly, but this method is less secure. And sometimes the user may forget the key in the car. If this happens, neither of the above methods can open the door. Therefore, there is a need for a convenient and safe way to open the door.
本发明实施例所要解决的技术问题在于,提供一种开启车门的方法、移动终端、车载终端及系统。可提升车门开启的便利性和安全性。The technical problem to be solved by the embodiments of the present invention is to provide a method for opening a vehicle door, a mobile terminal, an in-vehicle terminal and a system. It can improve the convenience and safety of door opening.
为了解决上述技术问题,本发明实施例第一方面提供了一种开启车门的方法,包括:In order to solve the above technical problem, a first aspect of the embodiments of the present invention provides a method for opening a vehicle door, including:
移动终端与车载终端协商信息的加密算法和解密算法;An encryption algorithm and a decryption algorithm for negotiating information between the mobile terminal and the vehicle terminal;
获取用户指纹信息并采用协商的加密算法进行加密;Obtain user fingerprint information and encrypt it by using a negotiated encryption algorithm;
将加密后的用户指纹信息发送给所述车载终端,所述加密后的用户指纹信息用于在所述车载终端采用协商的解密算法对其解密后与预存的用户指纹信息匹配并在匹配成功后开启汽车车门。Sending the encrypted user fingerprint information to the in-vehicle terminal, the encrypted user fingerprint information is used to match the pre-stored user fingerprint information after the vehicle-mounted terminal decrypts it by using a negotiated decryption algorithm, and after the matching is successful Open the car door.
本发明实施例第二方面提供了一种移动终端,包括:A second aspect of the embodiments of the present invention provides a mobile terminal, including:
协商单元,设置为与车载终端协商信息的加密算法和解密算法;a negotiating unit, configured as an encryption algorithm and a decryption algorithm for negotiating information with the in-vehicle terminal;
加密单元,设置为获取用户指纹信息并采用协商的加密算法进行加密;The encryption unit is configured to acquire user fingerprint information and encrypt using a negotiated encryption algorithm;
发送单元,设置为将加密后的用户指纹信息发送给所述车载终端,所述加密后的用户指纹信息用于在所述车载终端采用协商的解密算法对其解密后与预存的用户指纹信息匹配并在匹配成功后开启汽车车门。a sending unit, configured to send the encrypted user fingerprint information to the vehicle-mounted terminal, where the encrypted user fingerprint information is used to match the pre-stored user fingerprint information after the vehicle-mounted terminal decrypts the file by using a negotiated decryption algorithm. And after the matching is successful, open the car door.
本发明实施例第三方面提供了一种移动终端,包括:A third aspect of the embodiments of the present invention provides a mobile terminal, including:
处理器、存储器、接口电路和总线,所述处理器、存储器、接口电路通过总线连接,其中,所述存储器用于存储一组程序代码,所述处理器用于调用所述存储器中存储的程序代码,执行以下操作:a processor, a memory, an interface circuit, and a bus, wherein the processor, the memory, and the interface circuit are connected by a bus, wherein the memory is configured to store a set of program codes, and the processor is configured to call the program code stored in the memory , do the following:
与车载终端协商信息的加密算法和解密算法;An encryption algorithm and a decryption algorithm for negotiating information with the vehicle terminal;
获取用户指纹信息并采用协商的加密算法进行加密;Obtain user fingerprint information and encrypt it by using a negotiated encryption algorithm;
将加密后的用户指纹信息发送给所述车载终端,所述加密后的用户指纹信息用于在所述车载终端采用协商的解密算法对其解密后与预存的用户指纹信息匹配并在匹配成功后开启汽车车门。Sending the encrypted user fingerprint information to the in-vehicle terminal, the encrypted user fingerprint information is used to match the pre-stored user fingerprint information after the vehicle-mounted terminal decrypts it by using a negotiated decryption algorithm, and after the matching is successful Open the car door.
其中,所述加密算法和解密算法为非对称密钥。The encryption algorithm and the decryption algorithm are asymmetric keys.
其中,所述加密算法和解密算法对应且同时动态变化。The encryption algorithm and the decryption algorithm correspond to each other and dynamically change at the same time.
其中,所述处理器还用于:Wherein, the processor is further configured to:
获取所述移动终端的标识信息并采用协商的加密算法进行加密;Obtaining identification information of the mobile terminal and encrypting by using a negotiated encryption algorithm;
在将加密后的所述用户指纹信息发送给所述车载终端时,还包括:When the encrypted user fingerprint information is sent to the vehicle-mounted terminal, the method further includes:
将加密后的标识信息发送给所述车载终端,所述加密后的标识信息用于在所述车载终端采用协商的解密算法对其解密后与预存的标识信息匹配并在用户指纹信息与标识信息均匹配成功后开启汽车车门。Sending the encrypted identification information to the in-vehicle terminal, where the encrypted identification information is used to match the pre-stored identification information and the user fingerprint information and the identification information after the vehicle-mounted terminal decrypts it by using a negotiated decryption algorithm. After the matching is successful, the car door is opened.
其中,所述处理器还用于:Wherein, the processor is further configured to:
在解密后的信息均匹配成功后,所述移动终端发送控制指令至所述车载终端,控制所述车载终端开启汽车车门。After the decrypted information is successfully matched, the mobile terminal sends a control command to the in-vehicle terminal, and controls the in-vehicle terminal to open the car door.
本发明实施例第四方面提供一种开启车门的方法,包括:A fourth aspect of the embodiments of the present invention provides a method for opening a vehicle door, including:
车载终端与移动终端协商信息的加密算法和解密算法;An encryption algorithm and a decryption algorithm for negotiating information between the vehicle terminal and the mobile terminal;
接收所述移动终端发送的加密后的信息;Receiving the encrypted information sent by the mobile terminal;
采用协商的解密算法对接收到的信息进行解密并与预存的信息进行匹配;The received decryption algorithm is used to decrypt the received information and match the pre-stored information;
若所述信息匹配成功,则开启汽车车门或者接收所述移动终端发送的控制指令,开启汽车车门;If the information is successfully matched, the vehicle door is opened or a control command sent by the mobile terminal is received, and the car door is opened;
其中,所述信息包括用户指纹信息。The information includes user fingerprint information.
本发明实施例第五方面提供一种车载终端,包括:A fifth aspect of the embodiments of the present invention provides an in-vehicle terminal, including:
协商单元,设置为与移动终端协商信息的加密算法和解密算法;a negotiating unit, configured as an encryption algorithm and a decryption algorithm for negotiating information with the mobile terminal;
接收单元,设置为接收所述移动终端发送的加密后的信息;a receiving unit, configured to receive the encrypted information sent by the mobile terminal;
解密单元,设置为采用协商的解密算法对接收到的信息进行解密并与预存的信息进行匹配;a decryption unit configured to decrypt the received information using a negotiated decryption algorithm and to match the pre-stored information;
开启单元,若所述信息匹配成功,则开启汽车车门;Opening the unit, if the information is successfully matched, opening the car door;
或者所述接收单元还设置为接收所述移动终端发送的控制指令,指示所述开启单元开启汽车车门;Or the receiving unit is further configured to receive a control command sent by the mobile terminal, instructing the opening unit to open a car door;
其中,所述信息包括用户指纹信息。The information includes user fingerprint information.
本发明实施例第六方面提供一种车载终端,包括:A sixth aspect of the embodiments of the present invention provides an in-vehicle terminal, including:
处理器、存储器、接口电路和总线,所述处理器、存储器、接口电路通过总线连接,其中,所述存储器用于存储一组程序代码,所述处理器用于调用所述存储器中存储的程序代码,执行以下操作:a processor, a memory, an interface circuit, and a bus, wherein the processor, the memory, and the interface circuit are connected by a bus, wherein the memory is configured to store a set of program codes, and the processor is configured to call the program code stored in the memory , do the following:
与移动终端协商信息的加密算法和解密算法;An encryption algorithm and a decryption algorithm for negotiating information with the mobile terminal;
接收所述移动终端发送的加密后的信息;Receiving the encrypted information sent by the mobile terminal;
采用协商的解密算法对接收到的信息进行解密并与预存的信息进行匹配;The received decryption algorithm is used to decrypt the received information and match the pre-stored information;
若所述信息匹配成功,则开启汽车车门或者接收所述移动终端发送的控制指令,开启汽车车门;If the information is successfully matched, the vehicle door is opened or a control command sent by the mobile terminal is received, and the car door is opened;
其中,所述信息包括用户指纹信息。The information includes user fingerprint information.
其中,所述加密算法和解密算法为非对称密钥。The encryption algorithm and the decryption algorithm are asymmetric keys.
其中,所述加密算法和解密算法对应且同时动态变化。The encryption algorithm and the decryption algorithm correspond to each other and dynamically change at the same time.
其中,所述信息还包括所述移动终端的标识信息。The information further includes identification information of the mobile terminal.
其中,所述处理器还用于:Wherein, the processor is further configured to:
若所述信息连续预设次数匹配失败,则在预设时长内拒收所述移动终端发送的信息或者在预设时长内断开与所述移动终端的连接。If the information fails to match the preset number of times, the information sent by the mobile terminal is rejected within a preset time period or the connection with the mobile terminal is disconnected within a preset time period.
本发明实施例第七方面提供一种系统,包括:A seventh aspect of the embodiments of the present invention provides a system, including:
如本发明第二方面任一实现方式所述的移动终端;以及a mobile terminal according to any implementation of the second aspect of the present invention;
如本发明第五方面任一实现方式所述的车载终端。An in-vehicle terminal according to any implementation of the fifth aspect of the present invention.
实施本发明实施例,具有如下有益效果:Embodiments of the present invention have the following beneficial effects:
通过发送加密后的指纹信息而并不发送车门开启指令到车载终端,从而可以为系统提供双层防护,第一层由加密算法构成的解密防护,第二层是由指纹信息的唯一性和复杂性构成的复杂计算防护,使得偷窃者无法破解或模拟移动终端发送给车载终端的信号,在实现利用用户移动终端解锁车门,方便用户使用的同时,保证了用户汽车的安全。By sending the encrypted fingerprint information and not sending the door opening command to the vehicle terminal, the system can provide double protection, the first layer is decrypted by the encryption algorithm, and the second layer is the uniqueness and complexity of the fingerprint information. The complex computing protection of the sexual composition makes the thief unable to crack or simulate the signal sent by the mobile terminal to the vehicle terminal, and realizes the use of the user mobile terminal to unlock the door, which is convenient for the user to use, and ensures the safety of the user's car.
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the description of the prior art will be briefly described below. Obviously, the drawings in the following description are only It is a certain embodiment of the present invention, and other drawings can be obtained from those skilled in the art without any creative work.
图1是本发明开启车门的方法的第一实施例的流程示意图;1 is a schematic flow chart of a first embodiment of a method for opening a vehicle door according to the present invention;
图2是本发明开启车门的方法的第二实施例的流程示意图;2 is a schematic flow chart of a second embodiment of a method for opening a vehicle door according to the present invention;
图3是本发明开启车门的方法的第三实施例的流程示意图;3 is a schematic flow chart of a third embodiment of a method for opening a vehicle door according to the present invention;
图4是本发明移动终端的第一实施例的组成示意图;4 is a schematic diagram showing the composition of a first embodiment of a mobile terminal of the present invention;
图5是本发明移动终端的第二实施例的组成示意图;5 is a schematic diagram of the composition of a second embodiment of the mobile terminal of the present invention;
图6是本发明车载终端的第一实施例的组成示意图;6 is a schematic diagram showing the composition of a first embodiment of the vehicle-mounted terminal of the present invention;
图7是本发明车载终端的第二实施例的组成示意图;7 is a schematic diagram showing the composition of a second embodiment of the vehicle-mounted terminal of the present invention;
图8是本发明系统的组成及交互流程示意图。Figure 8 is a schematic diagram showing the composition and interaction flow of the system of the present invention.
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention are clearly and completely described in the following with reference to the accompanying drawings in the embodiments of the present invention. It is obvious that the described embodiments are only a part of the embodiments of the present invention, but not all embodiments. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention.
本发明的说明书和权利要求书及上述附图中的术语“第一”、“第二”和“第三”等是用于区别不同对象,而非用于描述特定顺序。此外,术语“包括”和“具有”以及它们任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、系统、产品或装置没有限定于已列出的步骤或单元,而是可选地还包括没有列出的步骤或单元,或可选地还包括对于这些过程、方法、产品或装置固有的其它步骤或单元。The terms "first", "second" and "third" and the like in the specification and claims of the present invention and the above drawings are used to distinguish different objects, and are not intended to describe a specific order. Furthermore, the terms "comprises" and "comprising" and "comprising" are intended to cover a non-exclusive inclusion. For example, a process, method, system, product, or device that comprises a series of steps or units is not limited to the listed steps or units, but optionally includes steps or units not listed, or, optionally, Other steps or units inherent to these processes, methods, products or devices.
本发明实施例中的移动终端,是一种为用户提供语音和/或数据连通性的设备,其可以和车载终端建立无线数据连接,且具备指纹获取模组,可以采集用户指纹。该移动终端可以包括但不限于智能手机(如Android手机、iOS手机、Windows Phone手机等)、平板电脑、掌上电脑、笔记本电脑、移动互联网设备(Mobile Internet Devices,MID)或穿戴式设备等,上述移动终端仅是举例,而非穷举,包含但不限于上述移动终端。The mobile terminal in the embodiment of the present invention is a device for providing voice and/or data connectivity to a user, which can establish a wireless data connection with the vehicle-mounted terminal, and has a fingerprint acquisition module, which can collect the user fingerprint. The mobile terminal may include, but is not limited to, a smart phone (such as an Android mobile phone, an iOS mobile phone, a Windows Phone mobile phone, etc.), a tablet computer, a palmtop computer, a notebook computer, a mobile Internet device (MID), or a wearable device, etc. The mobile terminal is only an example, not an exhaustive one, including but not limited to the above mobile terminal.
本发明实施例中的车载终端,可以与移动终端建立无线数据连接,其可以与汽车上的中控集成设置,也可以独立设置,本发明实施例不作任何限定,在其存储器中可以预先存储用户的指纹信息和用户使用的移动终端的标识信息。其可以对汽车上的各个部位进行控制,如车门、大灯、雨刮器、空调、车窗和天窗等。The in-vehicle terminal in the embodiment of the present invention can establish a wireless data connection with the mobile terminal, which can be integrated with the central control on the car, or can be set independently. The embodiment of the present invention does not impose any limitation, and the user can be pre-stored in the memory. Fingerprint information and identification information of the mobile terminal used by the user. It can control various parts of the car, such as doors, headlights, wipers, air conditioners, windows and skylights.
下面结合附图,对本发明实施例的内容进行描述。The content of the embodiments of the present invention will be described below with reference to the accompanying drawings.
请参照图1,为本发明开启车门的方法的第一实施例的流程示意图,在本实施例中,所述方法包括以下步骤:1 is a schematic flowchart of a first embodiment of a method for opening a vehicle door according to the present invention. In this embodiment, the method includes the following steps:
S101,移动终端与车载终端协商信息的加密算法和解密算法。S101. An encryption algorithm and a decryption algorithm for negotiating information between the mobile terminal and the vehicle terminal.
可选地,所述加密算法和解密算法为非对称密钥。Optionally, the encryption algorithm and the decryption algorithm are asymmetric keys.
当然,如果安全性要求较低或者移动终端或车载终端的处理器能力较弱,也可以采用对称密钥,本发明实施例不作任何限定。Of course, if the security requirement is low or the processor capability of the mobile terminal or the in-vehicle terminal is weak, the symmetric key may be used, which is not limited in the embodiment of the present invention.
其中,对称密钥加密也叫秘密/专用密钥加密(Secret Key Encryption,SKE),即发送和接收数据的双方必须使用相同的/对称的密钥对明文进行加密和解密运算。 非对称密钥加密也叫公开密钥加密(Public Key Encryption,PKE),是指每个人都有一对唯一对应的密钥:公开密钥和私有密钥,公钥对外公开,私钥由个人秘密保存;用其中一把密钥来加密,就只能用另一把密钥来解密。发送数据的一方用另一方的公钥对发送的信息进行加密,然后由接受者用自己的私钥进行解密。公开密钥加密技术解决了密钥的发布和管理问题,是目前商业密码的核心。使用公开密钥技术,进行数据通信的双方可以安全地确认对方身份和公开密钥,提供通信的可鉴别性。Among them, symmetric key encryption is also called Secret Key Encryption (SKE), that is, both sides transmitting and receiving data must use the same / symmetric key to encrypt and decrypt the plaintext. Asymmetric key encryption, also known as Public Key Encryption (PKE), means that each person has a unique pair of keys: a public key and a private key. The public key is publicly disclosed and the private key is private. Save; use one of the keys to encrypt, you can only use another key to decrypt. The party transmitting the data encrypts the transmitted information with the other party's public key, and then the recipient decrypts it with his own private key. Public key encryption technology solves the problem of key release and management and is the core of current commercial passwords. Using public key technology, both parties communicating data can securely identify each other's identity and public key, providing identifiability of the communication.
可选地,所述加密算法和解密算法对应且同时动态变化。例如,可以协商多套对应的加解密算法,然后是每次使用时约定使用其中一套,移动终端可以通过发生算法标识信息来告知车载终端。这样动态变化的加解密算法可以进一步提升系统的安全性。Optionally, the encryption algorithm and the decryption algorithm correspond to each other and dynamically change at the same time. For example, multiple sets of corresponding encryption and decryption algorithms can be negotiated, and then one set is agreed to be used each time, and the mobile terminal can notify the in-vehicle terminal by generating algorithm identification information. Such dynamically changing encryption and decryption algorithms can further improve the security of the system.
S102,获取用户指纹信息并采用协商的加密算法进行加密。S102. Acquire user fingerprint information and perform encryption by using a negotiated encryption algorithm.
可选地,在对用户指纹信息进行加密时,需要检测到与车载终端建立了无线数据连接且已获取到用户指纹信息。避免移动终端每次获取到指纹信息后都用该加密算法进行加密。或者也可以在终端打开特定应用的特定界面如汽车控制应用的控制界面后,才对获取到的指纹信息进行加密。Optionally, when encrypting the user fingerprint information, it is required to detect that a wireless data connection is established with the vehicle-mounted terminal and the user fingerprint information has been acquired. The mobile terminal is prevented from encrypting by using the encryption algorithm every time the fingerprint information is acquired. Alternatively, the obtained fingerprint information may be encrypted after the terminal opens a specific interface of a specific application, such as a control interface of the car control application.
S103,将加密后的用户指纹信息发送给所述车载终端。S103. Send the encrypted user fingerprint information to the vehicle-mounted terminal.
其中,所述加密后的用户指纹信息用于在所述车载终端采用协商的解密算法对其解密后与预存的用户指纹信息匹配并在匹配成功后开启汽车车门。。The encrypted user fingerprint information is used to match the pre-stored user fingerprint information after the vehicle-mounted terminal decrypts it by using a negotiated decryption algorithm, and opens the car door after the matching is successful. .
可选地,在发送信息之前,移动终端可以通过短距离无线通信方式与汽车控制终端建立无限数据连接。Optionally, the mobile terminal can establish an infinite data connection with the car control terminal by short-range wireless communication before transmitting the information.
该短距离无线通信方式因为会用来传输加密后的指纹信息,因此要求保密性好,不扩散。例如,可以为蓝牙,近场通信(Near Field Communication,NFC),无线保真(Wireless-Fidelity,Wi-Fi)等。本发明实施例不作限定。The short-range wireless communication method is used to transmit the encrypted fingerprint information, so the confidentiality is required to be good and does not spread. For example, it can be Bluetooth, Near Field Communication (NFC), Wireless-Fidelity (Wi-Fi), and the like. The embodiment of the invention is not limited.
需要说明的是,由于一个家庭可能存在多个成员,因此可以在汽车的车载终端上预存多个用户的指纹信息,这样家庭成员中的所有用户都可以使用本实施例中的方法来开启车门。It should be noted that since a family may have multiple members, fingerprint information of multiple users may be pre-stored on the vehicle terminal of the automobile, so that all users in the family member can use the method in this embodiment to open the door.
可选地,当车载终端对指纹信息的匹配成功之后,可以直接控制汽车车门开启,或者,也可以暂时不开启,等待接收移动终端发送的控制指令再控制车门开启。Optionally, after the matching of the fingerprint information by the vehicle terminal is successful, the car door may be directly controlled to be turned on, or may not be turned on temporarily, waiting for receiving a control command sent by the mobile terminal to control the door opening.
需要说明的是,在本实施例中,具体描述了开启车门的控制,这是进入汽车使用汽车的基本步骤,但是本发明实施例所述的方法除了可以应用在控制车门开启之外,同样还可以应用在汽车其他部件的控制上,例如,移动终端上可以安装一个控制汽车的应用,其中可以模拟汽车的各个部件或者使用多个按键对应汽车的各个部件,用户可以在指纹匹配成功之后,通过移动终端控制汽车的各个部件如大灯、空调、车窗、音响等,本发明实施例不做任何限定。It should be noted that, in this embodiment, the control of opening the door is specifically described, which is a basic step of entering the automobile to use the automobile, but the method described in the embodiment of the present invention can be applied not only to control the opening of the door but also to the door opening. It can be applied to the control of other parts of the car. For example, an application for controlling the car can be installed on the mobile terminal, in which various components of the car can be simulated or multiple buttons can be used to correspond to various parts of the car, and the user can pass the fingerprint matching successfully. The mobile terminal controls various components of the automobile, such as a headlight, an air conditioner, a window, an audio, and the like, which are not limited in any embodiment of the present invention.
可选地,如果匹配失败,则不会开启车门,车载终端也不会执行移动终端发送的控制指令。Optionally, if the matching fails, the door is not opened, and the vehicle terminal does not execute the control command sent by the mobile terminal.
若连续预设次数匹配失败,则所述移动终端发送给所述车载终端的信息在预设时长内被拒收,或者所述移动终端与所述车载终端的连接在预设时长内被断开。If the matching of the preset number of times fails, the information sent by the mobile terminal to the in-vehicle terminal is rejected within a preset duration, or the connection between the mobile terminal and the in-vehicle terminal is disconnected within a preset duration .
例如,车载终端可以在连续4次指纹匹配失败后,在一个小时内断开与该移动终端的无线数据连接,或者也可以不断开无线数据连接,但是在一个小时内拒绝接收该移动终端发送的信息。或者还可以在连续匹配失败后引入报警机制以提醒车主。从而提防不法份子持续套取指纹、试图非法开启车门的不良企图,提升系统的安全性。For example, the vehicle-mounted terminal may disconnect the wireless data connection with the mobile terminal within one hour after four consecutive fingerprint matching failures, or may not disconnect the wireless data connection, but refuse to receive the mobile terminal's transmission within one hour. information. Or you can also introduce an alarm mechanism to remind the owner after a continuous match failure. Therefore, it is possible to prevent the unscrupulous elements from continuously taking fingerprints and attempting to illegally open the door to improve the security of the system.
下面举例说明本实施例中所述的方法可以运用的场景:The following is an example of a scenario that can be applied to the method described in this embodiment:
场景一、用户走到汽车旁边,移动终端自动与车载终端进行蓝牙连接,用户打开移动终端上车门控制应用进入车门开启界面,将手指放在指纹识别模块上,移动终端获取用户指纹,加密该指纹并通过该蓝牙连接发送给车载终端,车载终端对该指纹解密,并与预存的用户指纹匹配,匹配通过,汽车车门解锁。Scene 1: The user walks to the side of the car, and the mobile terminal automatically connects to the vehicle terminal for Bluetooth connection. The user opens the door control application of the mobile terminal to enter the door opening interface, puts the finger on the fingerprint identification module, and the mobile terminal acquires the user fingerprint and encrypts the fingerprint. And transmitting to the vehicle terminal through the Bluetooth connection, the vehicle terminal decrypts the fingerprint, and matches with the pre-stored user fingerprint, matches and passes, and the car door is unlocked.
场景二、偷窃者在汽车旁破解车载终端的无线连接,例如蓝牙连接,发送窃取的指纹信息到车载终端,车载终端对接收到的指纹信息解密,由于没有匹配的加密算法,因此解密后得到乱码,匹配失败,多次尝试失败后,汽车断开无线连接,并向车主发送通知。Scene 2: The thief cracks the wireless connection of the vehicle terminal next to the car, such as a Bluetooth connection, and sends the stolen fingerprint information to the vehicle terminal. The vehicle terminal decrypts the received fingerprint information. Since there is no matching encryption algorithm, the garbled code is obtained after decryption. The match fails. After multiple attempts fail, the car disconnects the wireless connection and sends a notification to the owner.
在本实施例中,通过发送加密后的指纹信息而并不发送车门开启指令到车载终端,从而可以为系统提供双层防护,第一层由加密算法构成的解密防护,第二层是由指纹信息的唯一性和复杂性构成的复杂计算防护,使得偷窃者无法破解或模拟移动终端发送给车载终端的信号,在实现利用用户移动终端解锁车门,方便用户使用的同时,保证了用户汽车的安全。In this embodiment, by sending the encrypted fingerprint information and not sending the door opening command to the vehicle terminal, the system can provide double protection, the first layer is decrypted by the encryption algorithm, and the second layer is the fingerprint. The unique computational complexity of the uniqueness and complexity of the information makes it impossible for the thief to crack or simulate the signal sent by the mobile terminal to the vehicle-mounted terminal. In order to realize the use of the user's mobile terminal to unlock the door, it is convenient for the user to use, and the safety of the user's car is ensured. .
需要说明的是,本发明实施例仅针对较常见的车门开启场景进行了详细描述,但是本实施例所述的方法除了应用于汽车车门开启之外,同样可以应用于其他车门开启的领域如智能门禁等,或者还可以应用于其他可以采用指纹加解密进行验证后进行控制的场景中。It should be noted that the embodiment of the present invention is only described in detail for a more common door opening scenario, but the method described in this embodiment can be applied to other door opening fields such as smart, in addition to the door opening of the automobile. Access control, etc., or can be applied to other scenarios that can be controlled by fingerprint encryption and decryption.
请参照图2,为本发明开启车门的方法的第二实施例的流程示意图,在本实施例中,所述方法包括:2 is a schematic flowchart of a second embodiment of a method for opening a vehicle door according to the present invention. In this embodiment, the method includes:
S201,移动终端与车载终端协商信息的加密算法和解密算法。S201. An encryption algorithm and a decryption algorithm for negotiating information between the mobile terminal and the vehicle terminal.
S202,获取用户指纹信息和所述移动终端的标识信息并采用协商的加密算法进行加密。S202. Acquire user fingerprint information and identification information of the mobile terminal, and perform encryption by using a negotiated encryption algorithm.
S203,将加密后的所述用户指纹信息和所述标识信息发送给所述车载终端。S203. Send the encrypted user fingerprint information and the identifier information to the vehicle-mounted terminal.
所述加密后的标识信息用于在所述车载终端采用协商的解密算法对其解密后与预存的标识信息匹配并在用户指纹信息与标识信息均匹配成功后开启汽车车门。The encrypted identification information is used to match the pre-stored identification information after the vehicle-mounted terminal decrypts it by using a negotiated decryption algorithm, and opens the automobile door after the user fingerprint information and the identification information are successfully matched.
在本发明实施例中,增加了移动终端的标识信息匹配的过程,通过对移动终端标识信息的加密和解密,可以进一步提升系统的安全性。且预存的标识信息中可以包含用户家庭或朋友的多个移动终端的标识信息,结合预存的多个指纹信息,可以实现多个可靠用户的移动终端对车门的开启。In the embodiment of the present invention, the process of matching the identification information of the mobile terminal is added, and the security of the system can be further improved by encrypting and decrypting the identification information of the mobile terminal. The pre-stored identification information may include identification information of a plurality of mobile terminals of the user's home or a friend, and combined with the pre-stored plurality of fingerprint information, the opening of the door by the mobile terminal of the plurality of reliable users may be implemented.
请参照图3,为本发明开启车门的方法的第三实施例的流程示意图,在本实施例中,所述方法包括以下步骤:3 is a schematic flowchart of a third embodiment of a method for opening a vehicle door according to the present invention. In this embodiment, the method includes the following steps:
S301,车载终端与移动终端协商信息的加密算法和解密算法。S301. An encryption algorithm and a decryption algorithm for negotiating information between the vehicle terminal and the mobile terminal.
可选地,所述加密算法和解密算法为非对称密钥。Optionally, the encryption algorithm and the decryption algorithm are asymmetric keys.
当然,如果安全性要求较低或者移动终端或车载终端的处理器能力较弱,也可以采用对称密钥,本发明实施例不作任何限定。Of course, if the security requirement is low or the processor capability of the mobile terminal or the in-vehicle terminal is weak, the symmetric key may be used, which is not limited in the embodiment of the present invention.
其中,对称密钥加密也叫秘密/专用密钥加密(Secret Key Encryption,SKE),即发送和接收数据的双方必须使用相同的/对称的密钥对明文进行加密和解密运算。 非对称密钥加密也叫公开密钥加密(Public Key Encryption,PKE),是指每个人都有一对唯一对应的密钥:公开密钥和私有密钥,公钥对外公开,私钥由个人秘密保存;用其中一把密钥来加密,就只能用另一把密钥来解密。发送数据的一方用另一方的公钥对发送的信息进行加密,然后由接受者用自己的私钥进行解密。公开密钥加密技术解决了密钥的发布和管理问题,是目前商业密码的核心。使用公开密钥技术,进行数据通信的双方可以安全地确认对方身份和公开密钥,提供通信的可鉴别性。Among them, symmetric key encryption is also called Secret Key Encryption (SKE), that is, both sides transmitting and receiving data must use the same / symmetric key to encrypt and decrypt the plaintext. Asymmetric key encryption, also known as Public Key Encryption (PKE), means that each person has a unique pair of keys: a public key and a private key. The public key is publicly disclosed and the private key is private. Save; use one of the keys to encrypt, you can only use another key to decrypt. The party transmitting the data encrypts the transmitted information with the other party's public key, and then the recipient decrypts it with his own private key. Public key encryption technology solves the problem of key release and management and is the core of current commercial passwords. Using public key technology, both parties communicating data can securely identify each other's identity and public key, providing identifiability of the communication.
可选地,所述加密算法和解密算法对应且同时动态变化。例如,可以协商多套对应的加解密算法,然后是每次使用时约定使用其中一套,移动终端可以通过发生算法标识信息来告知车载终端。这样动态变化的加解密算法可以进一步提升系统的安全性。Optionally, the encryption algorithm and the decryption algorithm correspond to each other and dynamically change at the same time. For example, multiple sets of corresponding encryption and decryption algorithms can be negotiated, and then one set is agreed to be used each time, and the mobile terminal can notify the in-vehicle terminal by generating algorithm identification information. Such dynamically changing encryption and decryption algorithms can further improve the security of the system.
S302,接收所述移动终端发送的加密后的信息。S302. Receive encrypted information sent by the mobile terminal.
S303,采用协商的解密算法对接收到的信息进行解密并与预存的信息进行匹配。S303: Decrypt the received information by using a negotiated decryption algorithm and match the pre-stored information.
S304,若所述信息匹配成功,则开启汽车车门或者接收所述移动终端发送的控制指令,开启汽车车门。S304. If the information is successfully matched, open a car door or receive a control command sent by the mobile terminal to open the car door.
可选地,所述信息包括用户指纹信息。Optionally, the information includes user fingerprint information.
可选地,所述信息还包括所述移动终端的标识信息。Optionally, the information further includes identification information of the mobile terminal.
可选地,若所述信息连续预设次数匹配失败,则在预设时长内拒收所述移动终端发送的信息或者在预设时长内断开与所述移动终端的连接。Optionally, if the information fails to match the preset number of times, the information sent by the mobile terminal is rejected within a preset time period or the connection with the mobile terminal is disconnected within a preset time period.
请参照图4,为本发明移动终端的第一实施例的组成示意图;在本实施例中,所述车载终端包括:Referring to FIG. 4, it is a schematic diagram of a composition of a mobile terminal according to a first embodiment of the present invention. In this embodiment, the vehicle-mounted terminal includes:
协商单元100,设置为与车载终端协商信息的加密算法和解密算法;The
加密单元200,设置为获取用户指纹信息并采用协商的加密算法进行加密;The
发送单元300,设置为将加密后的用户指纹信息发送给所述车载终端,所述加密后的用户指纹信息用于在所述车载终端采用协商的解密算法对其解密后与预存的用户指纹信息匹配并在匹配成功后开启汽车车门。The sending
可选地,所述加密算法和解密算法为非对称密钥。Optionally, the encryption algorithm and the decryption algorithm are asymmetric keys.
可选地,所述加密算法和解密算法对应且同时动态变化。Optionally, the encryption algorithm and the decryption algorithm correspond to each other and dynamically change at the same time.
可选地,所述加密单元200还设置为:Optionally, the
获取所述移动终端的标识信息并采用协商的加密算法进行加密;Obtaining identification information of the mobile terminal and encrypting by using a negotiated encryption algorithm;
所述发送单元300还设置为:The sending
将加密后的标识信息发送给所述车载终端,所述加密后的标识信息用于在所述车载终端采用协商的解密算法对其解密后与预存的标识信息匹配并在用户指纹信息与标识信息均匹配成功后开启汽车车门。Sending the encrypted identification information to the in-vehicle terminal, where the encrypted identification information is used to match the pre-stored identification information and the user fingerprint information and the identification information after the vehicle-mounted terminal decrypts it by using a negotiated decryption algorithm. After the matching is successful, the car door is opened.
可选地,所述发送单300元还设置为:Optionally, the sending
在解密后的信息均匹配成功后,所述移动终端发送控制指令至所述车载终端,控制所述车载终端开启汽车车门。After the decrypted information is successfully matched, the mobile terminal sends a control command to the in-vehicle terminal, and controls the in-vehicle terminal to open the car door.
以上协商单元100、加密单元200和发送单元300可以独立存在,也可以集成设置,协商单元100、加密单元200或发送单元300可以以硬件的形式独立于移动终端的处理器单独设置,且设置形式可以是微处理器的形式;也可以以硬件形式内嵌于该移动终端的处理器中,还可以以软件形式存储于该移动终端的存储器中,以便于该移动终端的处理器调用执行以上协商单元100、加密单元200和发送单元300对应的操作。The foregoing
例如,在本发明移动终端的第一实施例(图4所示的实施例)中,加密单元200可以为该移动终端的处理器,而协商单元100和发送单元300的功能可以内嵌于该处理器中,也可以独立于处理器单独设置,也可以以软件的形式存储于存储器中,由处理器调用实现其功能。本发明实施例不做任何限制。以上处理器可以为中央处理单元(CPU)、微处理器、单片机等。For example, in the first embodiment of the mobile terminal of the present invention (the embodiment shown in FIG. 4), the
请参照图5,为本发明移动终端的第二实施例的组成示意图,在本实施例中,所述移动终端包括:5 is a schematic diagram of a composition of a mobile terminal according to a second embodiment of the present invention. In this embodiment, the mobile terminal includes:
处理器110、存储器120、接口电路130和总线140,所述处理器110、存储器120、接口电路130通过总线140连接,其中,所述存储器120用于存储一组程序代码,所述处理器110用于调用所述存储器120中存储的程序代码,执行以下操作:The
与车载终端协商信息的加密算法和解密算法;An encryption algorithm and a decryption algorithm for negotiating information with the vehicle terminal;
获取用户指纹信息并采用协商的加密算法进行加密;Obtain user fingerprint information and encrypt it by using a negotiated encryption algorithm;
将加密后的用户指纹信息发送给所述车载终端,所述加密后的用户指纹信息用于在所述车载终端采用协商的解密算法对其解密后与预存的用户指纹信息匹配并在匹配成功后开启汽车车门。Sending the encrypted user fingerprint information to the in-vehicle terminal, the encrypted user fingerprint information is used to match the pre-stored user fingerprint information after the vehicle-mounted terminal decrypts it by using a negotiated decryption algorithm, and after the matching is successful Open the car door.
可选地,所述加密算法和解密算法为非对称密钥。Optionally, the encryption algorithm and the decryption algorithm are asymmetric keys.
可选地,所述加密算法和解密算法对应且同时动态变化。Optionally, the encryption algorithm and the decryption algorithm correspond to each other and dynamically change at the same time.
可选地,所述处理器110还用于:Optionally, the
获取所述移动终端的标识信息并采用协商的加密算法进行加密;Obtaining identification information of the mobile terminal and encrypting by using a negotiated encryption algorithm;
在将加密后的所述用户指纹信息发送给所述车载终端时,还包括:When the encrypted user fingerprint information is sent to the vehicle-mounted terminal, the method further includes:
将加密后的标识信息发送给所述车载终端,所述加密后的标识信息用于在所述车载终端采用协商的解密算法对其解密后与预存的标识信息匹配并在用户指纹信息与标识信息均匹配成功后开启汽车车门。Sending the encrypted identification information to the in-vehicle terminal, where the encrypted identification information is used to match the pre-stored identification information and the user fingerprint information and the identification information after the vehicle-mounted terminal decrypts it by using a negotiated decryption algorithm. After the matching is successful, the car door is opened.
可选地,所述处理器110还用于:Optionally, the
在解密后的信息均匹配成功后,所述移动终端发送控制指令至所述车载终端,控制所述车载终端开启汽车车门。After the decrypted information is successfully matched, the mobile terminal sends a control command to the in-vehicle terminal, and controls the in-vehicle terminal to open the car door.
请参照图6,为本发明车载终端的第一实施例的组成示意图;在本实施例中,所述车载终端包括:Referring to FIG. 6 , it is a schematic diagram of a composition of a first embodiment of an in-vehicle terminal according to the present invention. In this embodiment, the in-vehicle terminal includes:
协商单元400,设置为与移动终端协商信息的加密算法和解密算法;The
接收单元500,设置为接收所述移动终端发送的加密后的信息;The receiving
解密单元600,设置为采用协商的解密算法对接收到的信息进行解密并与预存的信息进行匹配;The
开启单元700,若所述信息匹配成功,则开启汽车车门;Opening the
或者所述接收单元500还设置为接收所述移动终端发送的控制指令,指示所述开启单元700开启汽车车门;Or the receiving
其中,所述信息包括用户指纹信息。The information includes user fingerprint information.
可选地,所述信息还包括所述移动终端的标识信息。Optionally, the information further includes identification information of the mobile terminal.
可选地,所述加密算法和解密算法为非对称密钥。Optionally, the encryption algorithm and the decryption algorithm are asymmetric keys.
可选地,所述加密算法和解密算法对应且同时动态变化。Optionally, the encryption algorithm and the decryption algorithm correspond to each other and dynamically change at the same time.
可选地,所述接收单元500还设置为:Optionally, the receiving
若所述信息连续预设次数匹配失败,则在预设时长内拒收所述移动终端发送的信息或者在预设时长内断开与所述移动终端的连接。If the information fails to match the preset number of times, the information sent by the mobile terminal is rejected within a preset time period or the connection with the mobile terminal is disconnected within a preset time period.
以上协商单元400、接收单元500、解密单元600和开启单元700可以独立存在,也可以集成设置,协商单元400、接收单元500、解密单元600或开启单元700可以以硬件的形式独立于车载终端的处理器单独设置,且设置形式可以是微处理器的形式;也可以以硬件形式内嵌于该车载终端的处理器中,还可以以软件形式存储于该车载终端的存储器中,以便于该车载终端的处理器调用执行以上协商单元400、接收单元500、解密单元600和开启单元700对应的操作。The
例如,在本发明车载终端的第一实施例(图6所示的实施例)中,解密单元600可以为该车载终端的处理器,而协商单元400、接收单元500和开启单元700的功能可以内嵌于该处理器中,也可以独立于处理器单独设置,也可以以软件的形式存储于存储器中,由处理器调用实现其功能。本发明实施例不做任何限制。以上处理器可以为中央处理单元(CPU)、微处理器、单片机等。For example, in the first embodiment of the vehicle-mounted terminal of the present invention (the embodiment shown in FIG. 6), the
请参照图7,为本发明车载终端的第二实施例的组成示意图,在本实施例中,所述车载终端包括:Referring to FIG. 7 , it is a schematic diagram of a composition of a second embodiment of the vehicle-mounted terminal of the present invention. In this embodiment, the vehicle-mounted terminal includes:
处理器210、存储器220、接口电路230和总线240,所述处理器210、存储器220、接口电路230通过总线240连接,其中,所述存储器220用于存储一组程序代码,所述处理器210用于调用所述存储器220中存储的程序代码,执行以下操作:The
与移动终端协商信息的加密算法和解密算法;An encryption algorithm and a decryption algorithm for negotiating information with the mobile terminal;
接收所述移动终端发送的加密后的信息;Receiving the encrypted information sent by the mobile terminal;
采用协商的解密算法对接收到的信息进行解密并与预存的信息进行匹配;The received decryption algorithm is used to decrypt the received information and match the pre-stored information;
若所述信息匹配成功,则开启汽车车门或者接收所述移动终端发送的控制指令,开启汽车车门;If the information is successfully matched, the vehicle door is opened or a control command sent by the mobile terminal is received, and the car door is opened;
其中,所述信息包括用户指纹信息。The information includes user fingerprint information.
可选地,所述加密算法和解密算法为非对称密钥。Optionally, the encryption algorithm and the decryption algorithm are asymmetric keys.
可选地,所述加密算法和解密算法对应且同时动态变化。Optionally, the encryption algorithm and the decryption algorithm correspond to each other and dynamically change at the same time.
可选地,所述信息还包括所述移动终端的标识信息。Optionally, the information further includes identification information of the mobile terminal.
可选地,所述处理器110还用于:Optionally, the
若所述信息连续预设次数匹配失败,则在预设时长内拒收所述移动终端发送的信息或者在预设时长内断开与所述移动终端的连接。If the information fails to match the preset number of times, the information sent by the mobile terminal is rejected within a preset time period or the connection with the mobile terminal is disconnected within a preset time period.
请参照图8,为本发明实施例系统的组成及交互流程示意图;在本实施例中,所述系统包括:FIG. 8 is a schematic diagram of a composition and an interaction process of a system according to an embodiment of the present invention; in this embodiment, the system includes:
移动终端10和车载终端20;Mobile terminal 10 and vehicle terminal 20;
其中,移动终端10用于与车载终端协商信息的加密算法和解密算法,获取用户的信息并采用协商的加密算法进行加密,将加密后的信息发送给所述车载终端。The mobile terminal 10 is configured to use an encryption algorithm and a decryption algorithm for negotiating information with the vehicle-mounted terminal, acquire information of the user, perform encryption by using a negotiated encryption algorithm, and transmit the encrypted information to the vehicle-mounted terminal.
车载终端,用于与所述移动终端协商信息的加密算法和解密算法;接收所述移动终端发送的加密后的信息;采用协商的解密算法对接收到的信息进行解密并与预存的信息进行匹配;若信息匹配成功,则开启汽车车门或者接收所述移动终端发送的控制指令,控制汽车车门开启;若信息连续预设次数匹配失败,则在预设时长内拒收所述移动终端发送的信息或者在预设时长内断开与所述移动终端的连接;An in-vehicle terminal, an encryption algorithm and a decryption algorithm for negotiating information with the mobile terminal; receiving the encrypted information sent by the mobile terminal; decrypting the received information by using a negotiated decryption algorithm and matching the pre-stored information If the information is successfully matched, the vehicle door is opened or the control command sent by the mobile terminal is received to control the opening of the car door; if the information fails to match the preset number of times, the information sent by the mobile terminal is rejected within the preset time period. Or disconnecting the mobile terminal within a preset time period;
其中,所述信息包括用户指纹信息,或者包括用户指纹信息和所述移动终端的标识信息The information includes user fingerprint information, or includes user fingerprint information and identification information of the mobile terminal.
具体交互流程如下:The specific interaction process is as follows:
S801,移动终端与汽车控制终端协商信息的加密算法和解密算法。S801. An encryption algorithm and a decryption algorithm for negotiating information between the mobile terminal and the vehicle control terminal.
S802,移动终端通过短距离无线通信方式与汽车控制终端建立数据连接。S802: The mobile terminal establishes a data connection with the vehicle control terminal by short-range wireless communication.
S803,移动终端获取用户指纹信息。S803. The mobile terminal acquires user fingerprint information.
S804,移动终端采用协商的加密算法加密该指纹信息。S804. The mobile terminal encrypts the fingerprint information by using a negotiated encryption algorithm.
S805,移动终端通过建立好的数据连接发送该加密后的指纹信息。S805. The mobile terminal sends the encrypted fingerprint information by establishing a good data connection.
S806,利用协商的解密算法对该加密后的指纹信息进行解密。S806. Decrypt the encrypted fingerprint information by using a negotiated decryption algorithm.
S807,得到解密后的指纹信息后,与预存的用户指纹信息进行匹配。S807, after obtaining the decrypted fingerprint information, matching with the pre-stored user fingerprint information.
S808,当匹配成功时,接收移动终端对汽车的控制指令开启车门,或直接开启车门。S808, when the matching is successful, receiving a control command of the mobile terminal to the car to open the door, or directly opening the door.
可选地,在进行加解密和匹配时还可以增加移动终端的标识信息以进一步提升系统安全性,且在连续匹配失败后,车载终端20可以拒收移动终端10发送的信息或断开与移动终端10的连接,或者还可以在连续匹配失败后引入报警机制以提醒车主。Optionally, the identification information of the mobile terminal may be further increased during encryption and decryption to further improve system security, and after the continuous matching fails, the vehicle terminal 20 may reject the information sent or disconnected and moved by the mobile terminal 10. The connection of the terminal 10, or may also introduce an alarm mechanism after the continuous matching failure to remind the owner.
需要说明的是,本说明书中的各个实施例均采用递进的方式描述,每个实施例重点说明的都是与其它实施例的不同之处,各个实施例之间相同相似的部分互相参见即可。对于装置实施例而言,由于其与方法实施例基本相似,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。It should be noted that the various embodiments in the present specification are described in a progressive manner, and each embodiment focuses on differences from other embodiments, and the same similar parts between the various embodiments are mutually referred to. can. For the device embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant parts can be referred to the description of the method embodiment.
通过上述实施例的描述,本发明具有以下优点:Through the description of the above embodiments, the present invention has the following advantages:
通过发送加密后的指纹信息而并不发送车门开启指令到车载终端,从而可以为系统提供双层防护,第一层由加密算法构成的解密防护,第二层是由指纹信息的唯一性和复杂性构成的复杂计算防护,使得偷窃者无法破解或模拟移动终端发送给车载终端的信号,在实现利用用户移动终端解锁车门,方便用户使用的同时,保证了用户汽车的安全。By sending the encrypted fingerprint information and not sending the door opening command to the vehicle terminal, the system can provide double protection, the first layer is decrypted by the encryption algorithm, and the second layer is the uniqueness and complexity of the fingerprint information. The complex computing protection of the sexual composition makes the thief unable to crack or simulate the signal sent by the mobile terminal to the vehicle terminal, and realizes the use of the user mobile terminal to unlock the door, which is convenient for the user to use, and ensures the safety of the user's car.
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的程序可存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,简称ROM)或随机存储记忆体(Random Access Memory,简称RAM)等。One of ordinary skill in the art can understand that all or part of the process of implementing the foregoing embodiments can be completed by a computer program to instruct related hardware, and the program can be stored in a computer readable storage medium. When executed, the flow of an embodiment of the methods as described above may be included. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).
以上所揭露的仅为本发明较佳实施例而已,当然不能以此来限定本发明之权利范围,因此依本发明权利要求所作的等同变化,仍属本发明所涵盖的范围。The above is only the preferred embodiment of the present invention, and the scope of the present invention is not limited thereto, and thus equivalent changes made in the claims of the present invention are still within the scope of the present invention.
Claims (21)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201611076026.X | 2016-11-29 | ||
| CN201611076026.XA CN106792440A (en) | 2016-11-29 | 2016-11-29 | A kind of method of opening car door, mobile terminal, car-mounted terminal and system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2018098886A1 true WO2018098886A1 (en) | 2018-06-07 |
Family
ID=58900805
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2016/113399 Ceased WO2018098886A1 (en) | 2016-11-29 | 2016-12-30 | Method for opening vehicle door, mobile terminal, vehicle-mounted terminal, and system |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN106792440A (en) |
| WO (1) | WO2018098886A1 (en) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110203169A (en) * | 2019-04-30 | 2019-09-06 | 惠州市德赛西威汽车电子股份有限公司 | A method of automobile burglar grade is promoted based on car networking system |
| CN114582048A (en) * | 2020-12-01 | 2022-06-03 | 比亚迪股份有限公司 | NFC-based vehicle door control method, mobile terminal and vehicle |
| EP4113927A4 (en) * | 2020-03-17 | 2023-02-22 | Huawei Technologies Co., Ltd. | VEHICLE CONTROL METHOD, COMMUNICATION DEVICE AND COMPUTER READABLE STORAGE MEDIA |
Families Citing this family (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108123805A (en) * | 2017-12-15 | 2018-06-05 | 上海汽车集团股份有限公司 | Communication security authentication method between vehicle-mounted ECU |
| CN110406498A (en) * | 2019-07-12 | 2019-11-05 | 深圳市元征科技股份有限公司 | A kind of control method for vehicle and device |
| CN110868699A (en) * | 2019-11-07 | 2020-03-06 | 北京长城华冠汽车科技股份有限公司 | Vehicle remote control system, device and method and new energy automobile |
| JP2021149877A (en) * | 2020-03-23 | 2021-09-27 | 株式会社東海理化電機製作所 | Control device, program, and system |
| CN111447601B (en) * | 2020-04-07 | 2023-06-20 | 北京四维智联科技有限公司 | Implementation method and device of automobile Bluetooth key |
| CN116152957A (en) * | 2021-11-19 | 2023-05-23 | 国民技术股份有限公司 | Vehicle access control method and system |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102682506A (en) * | 2012-05-25 | 2012-09-19 | 北京华大信安科技有限公司 | Intelligent Bluetooth door access control method and device based on symmetric cryptographic technique |
| CN102936980A (en) * | 2012-10-31 | 2013-02-20 | 北京小米科技有限责任公司 | Method and device for controlling electronic lock |
| CN105227516A (en) * | 2014-05-28 | 2016-01-06 | 中兴通讯股份有限公司 | The access method of Smart Home, control centre's equipment and dress terminal |
| CN105701896A (en) * | 2016-02-29 | 2016-06-22 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint authorization unlocking method and device and terminals |
-
2016
- 2016-11-29 CN CN201611076026.XA patent/CN106792440A/en active Pending
- 2016-12-30 WO PCT/CN2016/113399 patent/WO2018098886A1/en not_active Ceased
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102682506A (en) * | 2012-05-25 | 2012-09-19 | 北京华大信安科技有限公司 | Intelligent Bluetooth door access control method and device based on symmetric cryptographic technique |
| CN102936980A (en) * | 2012-10-31 | 2013-02-20 | 北京小米科技有限责任公司 | Method and device for controlling electronic lock |
| CN105227516A (en) * | 2014-05-28 | 2016-01-06 | 中兴通讯股份有限公司 | The access method of Smart Home, control centre's equipment and dress terminal |
| CN105701896A (en) * | 2016-02-29 | 2016-06-22 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint authorization unlocking method and device and terminals |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110203169A (en) * | 2019-04-30 | 2019-09-06 | 惠州市德赛西威汽车电子股份有限公司 | A method of automobile burglar grade is promoted based on car networking system |
| EP4113927A4 (en) * | 2020-03-17 | 2023-02-22 | Huawei Technologies Co., Ltd. | VEHICLE CONTROL METHOD, COMMUNICATION DEVICE AND COMPUTER READABLE STORAGE MEDIA |
| US12430973B2 (en) | 2020-03-17 | 2025-09-30 | Shenzhen Yinwang Intelligent Technologies Co., Ltd. | Vehicle control method, communications apparatus, and computer-readable storage medium |
| CN114582048A (en) * | 2020-12-01 | 2022-06-03 | 比亚迪股份有限公司 | NFC-based vehicle door control method, mobile terminal and vehicle |
| CN114582048B (en) * | 2020-12-01 | 2023-09-05 | 比亚迪股份有限公司 | NFC-based vehicle door control method, mobile terminal and vehicle |
Also Published As
| Publication number | Publication date |
|---|---|
| CN106792440A (en) | 2017-05-31 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2018098886A1 (en) | Method for opening vehicle door, mobile terminal, vehicle-mounted terminal, and system | |
| WO2020218627A1 (en) | Method and system for digital key sharing service for vehicle | |
| WO2020171538A1 (en) | Electronic device and method for providing digital signature service of block chain using the same | |
| WO2019225921A1 (en) | Method for storing digital key and electronic device | |
| WO2020029585A1 (en) | Neural network federation modeling method and device employing transfer learning, and storage medium | |
| WO2016123926A1 (en) | Remote control based subscriber identity module card terminal management method and system | |
| WO2020050424A1 (en) | BLOCK CHAIN-BASED SYSTEM AND METHOD FOR MULTIPLE SECURITY AUTHENTICATION BETWEEN MOBILE TERMINAL AND IoT DEVICE | |
| WO2017071363A1 (en) | Password sharing method, password sharing system, and terminal device | |
| WO2014104507A1 (en) | System and method for secure login, and apparatus for same | |
| WO2009107994A2 (en) | Method and system of providing personal information control service for mobile communication terminal | |
| WO2018151390A1 (en) | Internet of things device | |
| WO2020022700A1 (en) | Secure element for processing and authenticating digital key and operation method therefor | |
| WO2020116785A1 (en) | Dual blockchain based-digital electronic device having virtual blockchain, and operating method therefor | |
| WO2013086758A1 (en) | Ethernet encryption and authentication system and method | |
| WO2014063455A1 (en) | Instant messaging method and system | |
| WO2016206530A1 (en) | Highly secure mobile payment method, apparatus, and system | |
| WO2016176967A1 (en) | Mobile payment system and mobile payment method therefor | |
| WO2019139420A1 (en) | Electronic device, server, and control method therefor | |
| WO2015126037A1 (en) | Personal identification and anti-theft system and method using disposable random key | |
| WO2020171466A1 (en) | Electronic device, and authentication method in electronic device | |
| WO2012149717A1 (en) | License dynamic management method, device and system based on tcm or tpm | |
| WO2015111794A1 (en) | Smart key and control method and apparatus using the same | |
| WO2012053875A2 (en) | Apparatus and system for transceiving data through fingerprint information | |
| WO2020032351A1 (en) | Method for establishing anonymous digital identity | |
| WO2021080316A1 (en) | Method and device for performing access control by using authentication certificate based on authority information |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16923028 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 16923028 Country of ref document: EP Kind code of ref document: A1 |