Disclosure of Invention
The embodiment of the application provides an intelligent key authentication method, an intelligent key authentication system and a vehicle, which are used for solving the problem that the prior art lacks a communication authentication method between a vehicle key and vehicle-related equipment.
In a first aspect, an embodiment of the present application provides a smart key authentication method, including:
after the intelligent key is connected with a lifting mechanism on the vehicle, the intelligent key sends identification information of the intelligent key to the lifting mechanism;
If the lifting mechanism receives the identification information of the intelligent key for the first time in a first preset period, the lifting mechanism acquires the identification information of the vehicle, generates a first authentication request based on the identification information of the vehicle and the identification information of the intelligent key, and sends the first authentication request to the TSP; the TSP performs authentication based on the first authentication request, and if the authentication is successful, the TSP sends first authentication success information to the lifting mechanism;
If the lifting mechanism does not receive the identification information of the intelligent key for the first time in the first preset period, the lifting mechanism compares the identification information of the intelligent key which is currently received with the identification information of the intelligent key which is stored by the lifting mechanism, and if the identification information of the intelligent key which is currently received is consistent with the identification information of the intelligent key which is stored by the lifting mechanism, the communication authentication between the intelligent key and the lifting mechanism is determined to be successful.
In one possible implementation manner, if the lifting mechanism receives the identification information of the smart key for the first time in the first preset period, the smart key authentication method further includes:
after receiving the first authentication success information, the lifting mechanism stores identification information of the intelligent key which is authenticated successfully.
In one possible implementation, the TSP authenticates based on the first authentication request, and if the authentication is successful, sends first authentication success information to the lifting mechanism, including:
And the TSP checks the first authentication request with the pre-stored authentication information, if the first authentication request is consistent with the pre-stored authentication information, the communication authentication between the intelligent key and the lifting mechanism is determined to be successful, and the first authentication success information is sent to the lifting mechanism.
In one possible implementation, the pre-stored verification information includes pre-stored identification information of the smart key and pre-stored identification information of the vehicle;
The TSP checks the first authentication request with the pre-stored authentication information, and if the first authentication request is consistent with the pre-stored authentication information, the communication authentication between the intelligent key and the lifting mechanism is determined to be successful, and the TSP comprises the following steps:
The TSP analyzes the first authentication request to obtain identification information of the intelligent key carried by the first authentication request and identification information of the vehicle carried by the first authentication request, and if the identification information of the intelligent key carried by the first authentication request is consistent with the pre-stored identification information of the intelligent key, and the identification information of the vehicle carried by the first authentication request is consistent with the pre-stored identification information of the vehicle, the communication authentication between the intelligent key and the lifting mechanism is determined to be successful.
In one possible implementation, sending the first authentication request to the TSP includes:
The lifting mechanism sends a first authentication request to a T-BOX of the vehicle;
The T-BOX sends a first authentication request to the TSP.
In one possible implementation, the identification information of the smart key includes a MAC of the smart key; the identification information of the vehicle includes a VIN of the vehicle.
In one possible implementation manner, the smart key authentication method further includes:
After the intelligent key is connected with the vehicle control mobile terminal, the intelligent key sends identification information of the intelligent key to the vehicle control mobile terminal;
if the vehicle control mobile terminal receives the identification information of the intelligent key for the first time in a second preset period, the vehicle control mobile terminal acquires the identification information of the vehicle bound by itself, generates a second authentication request based on the identification information of the vehicle bound by itself and the received identification information of the intelligent key, and sends the second authentication request to the TSP; the TSP performs authentication based on the second authentication request, and if the authentication is successful, second authentication success information is sent to the vehicle control mobile terminal;
If the vehicle control mobile terminal does not receive the identification information of the intelligent key for the first time in the second preset period, the vehicle control mobile terminal compares the identification information of the intelligent key which is received currently with the identification information of the intelligent key which is stored by the vehicle control mobile terminal, and if the identification information of the intelligent key which is received currently is consistent with the identification information of the intelligent key which is stored by the vehicle control mobile terminal, the communication authentication between the intelligent key and the vehicle control mobile terminal is determined to be successful.
In a second aspect, an embodiment of the present application provides a smart key authentication system, including: an intelligent key and a lifting mechanism;
the intelligent key is used for sending identification information of the intelligent key to the lifting mechanism after the intelligent key is connected with the lifting mechanism on the vehicle;
The lifting mechanism is used for acquiring the identification information of the vehicle if the identification information of the intelligent key is received for the first time in a first preset period, generating a first authentication request based on the identification information of the vehicle and the identification information of the intelligent key, and sending the first authentication request to the TSP; if the identification information of the intelligent key is not received for the first time in the first preset period, comparing the identification information of the intelligent key which is received currently with the identification information of the intelligent key which is stored by the intelligent key, and if the identification information of the intelligent key which is received currently is consistent with the identification information of the intelligent key which is stored by the intelligent key, determining that the communication authentication between the intelligent key and the lifting mechanism is successful;
the first authentication request is used for indicating the TSP to authenticate based on the first authentication request, and if authentication is successful, first authentication success information is sent to the lifting mechanism.
In one possible implementation, the smart key authentication system further includes: T-BOX;
The lifting mechanism sends a first authentication request to the TSP through the T-BOX;
the TSP sends the first authentication success information to the lifting mechanism through the T-BOX.
In a third aspect, an embodiment of the present application provides a vehicle, including a smart key authentication system as described in the second aspect or any one of the possible implementation manners of the second aspect.
The embodiment of the application provides an intelligent key authentication method, an intelligent key authentication system and a vehicle, wherein after the intelligent key is connected with a lifting mechanism on the vehicle, the intelligent key sends identification information of the intelligent key to the lifting mechanism, the lifting mechanism carries out communication authentication in different modes according to whether the identification information of the intelligent key is received for the first time in a first preset period, if the identification information of the intelligent key is received for the first time in the first preset period, a first authentication request is generated and sent to a TSP, the TSP is used for authentication, and if the identification information of the intelligent key is not received for the first time in the first preset period, the received identification information of the intelligent key is compared with the identification information of the intelligent key stored locally, so that the purpose of authentication is achieved, and communication authentication between the intelligent key and the lifting mechanism in the vehicle can be realized, so that communication between the intelligent key and the lifting mechanism can be realized, and some linkage functions are realized.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth such as the particular system architecture, techniques, etc., in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
For the purpose of making the objects, technical solutions and advantages of the present application more apparent, the following description will be made by way of specific embodiments with reference to the accompanying drawings.
The application scene of the intelligent key authentication method provided by the embodiment of the application comprises an intelligent key and a lifting mechanism arranged in a vehicle. The lifting mechanism is used for placing the intelligent key and interacting with the intelligent key after authentication between the lifting mechanism and the intelligent key is successful. The intelligent key and the lifting mechanism can be fixed through a magnetic attraction mode, under a fixed state, the intelligent key and the lifting mechanism interact through 4 metal contact structures, wherein two metal contacts are used for charging the intelligent key by the lifting mechanism, the other two metal contacts are used for data communication between the intelligent key and the lifting mechanism, the communication mode can adopt UART (Universal Asynchronous Receiver/Transmitter ) serial port communication, and communication contents comprise equipment authentication, vehicle condition data, key control vehicle instructions and the like.
The lifting mechanism may be disposed around a multimedia Host (HUT) in the vehicle, or may be disposed between two air conditioning ports in the middle of the center console. When the intelligent key is not placed, the lifting mechanism is in a lifting state, and the surface of the lifting mechanism is flush with the interior trim of the whole automobile. After the intelligent key is placed and the intelligent key are subjected to communication authentication, the lifting mechanism drives the vehicle key to automatically descend, and after the vehicle key descends in place, the surface of the intelligent key is flush with the interior trim of the whole vehicle.
Referring to fig. 1, a flowchart of an implementation of a smart key authentication method according to an embodiment of the present application is shown, where the method is described in detail as follows:
In S101, when the smart key is connected to the lifting mechanism on the vehicle, the smart key transmits its own identification information to the lifting mechanism.
When the intelligent key is connected with the lifting mechanism on the vehicle, the intelligent key and the lifting mechanism need to carry out communication validity authentication, and at the moment, the intelligent key sends identification information of the intelligent key to the lifting mechanism. The identification information of the smart key can distinguish the smart key from other keys or other devices, and the smart key can be uniquely identified through the identification information.
In S102, if the lifting mechanism receives the identification information of the smart key for the first time within the first preset period, the lifting mechanism acquires the identification information of the vehicle, generates a first authentication request based on the identification information of the vehicle and the identification information of the smart key, and sends the first authentication request to a TSP (TELEMATICS SERVICE Provider); the TSP performs authentication based on the first authentication request, and if the authentication is successful, the TSP sends first authentication success information to the lifting mechanism.
The duration of the first preset period may be set according to actual requirements, for example, one day, five days, ten days, one month, and the like, which is not limited herein.
The purpose of setting the first preset period is to: in a first preset period, if the intelligent key and the lifting mechanism are authenticated for the first time, the intelligent key needs to be authenticated through the TSP, and after the first authentication is successful, the lifting mechanism can store the identification information of the intelligent key, so that the authentication can be completed directly through the identification information of the intelligent key locally stored by the lifting mechanism when the intelligent key and the lifting mechanism are authenticated again in the first preset period, and the intelligent key and the lifting mechanism are convenient and quick. In order to enhance the safety of the vehicle system, when the next first preset period starts, the smart key and the lifting mechanism still need to pass through the TSP for authentication when first authentication is performed. The TSP may be a background system of the internet of vehicles, which is a core of the internet of vehicles system.
If the lifting mechanism receives the identification information of the intelligent key for the first time in the first preset period, the lifting mechanism can acquire the identification information of the vehicle through the gateway after receiving the identification information sent by the intelligent key, and generates a first authentication request according to the received identification information of the intelligent key and the acquired identification information of the vehicle. The first authentication request carries identification information of the smart key and identification information of the vehicle. Wherein the identification information of the vehicle can distinguish the vehicle from other vehicles and the like, and the vehicle can be uniquely identified by the identification information.
After the lifting mechanism generates the first authentication request, the lifting mechanism sends the first authentication request to the TSP so that the TSP can authenticate based on the first authentication request, if authentication is successful, first authentication success information is generated, and the lifting mechanism is sent the first authentication success information to prompt the lifting mechanism that communication authentication between the lifting mechanism and the intelligent key is successful; if the authentication fails, generating first authentication failure information, and sending the first authentication failure information to the lifting mechanism to prompt the lifting mechanism that the communication authentication between the lifting mechanism and the intelligent key fails.
In S103, if the lifting mechanism does not receive the identification information of the smart key for the first time within the first preset period, the lifting mechanism compares the currently received identification information of the smart key with the identification information of the smart key stored by itself, and if the currently received identification information of the smart key is consistent with the identification information of the smart key stored by itself, it is determined that the communication authentication between the smart key and the lifting mechanism is successful.
In this embodiment, in the first preset period, if the lifting mechanism does not receive the identification information of the smart key for the first time, the lifting mechanism may compare the identification information sent by the smart key with the identification information of the smart key locally stored therein, if the two are consistent, the authentication is successful, and if the two are inconsistent, the authentication is failed.
In this case, since a plurality of smart keys may be bound to the same vehicle, the identification information of the smart keys stored in the elevating mechanism may be plural. When the lifting mechanism compares the currently received identification information of the intelligent key with the identification information of the intelligent key stored by the lifting mechanism, if the currently received identification information of the intelligent key is consistent with one of the identification information of all the intelligent keys stored by the lifting mechanism, authentication is successful, and if the currently received identification information of the intelligent key is inconsistent with the identification information of all the intelligent keys stored by the lifting mechanism, authentication is failed.
In the first preset period, when the intelligent key and the lifting mechanism are authenticated again after the first authentication is successful, the local authentication is directly performed through the lifting mechanism, the remote TSP is not required for authentication, and the authentication speed can be improved; and when the intelligent key and the lifting mechanism are authenticated every time the first preset period passes, remote authentication is required to be carried out through the TSP, so that the safety of a vehicle system can be improved.
After the communication authentication between the intelligent key and the lifting mechanism is successful, the intelligent key and the lifting mechanism can be communicated with each other to realize some linkage functions. For example, after the communication authentication between the intelligent key and the lifting mechanism is successful, the lifting mechanism can be controlled to descend, so that the lifting mechanism can execute descending operation, and after the lifting mechanism descends in place, the surface of the vehicle key is flush with the interior trim, so that the vehicle key is prevented from being mistakenly touched, and reliable connection between the vehicle key and the lifting mechanism is ensured. After the communication authentication between the intelligent key and the lifting mechanism is successful, the lifting mechanism can be linked with the screen of the vehicle, so that the display screen of the intelligent key and the screen of the vehicle play linkage animation, and the technological sense and the aesthetic degree are improved.
According to the embodiment, after the intelligent key is connected with the lifting mechanism on the vehicle, the intelligent key sends identification information of the intelligent key to the lifting mechanism, the lifting mechanism carries out communication authentication in different modes according to whether the identification information of the intelligent key is received for the first time in a first preset period, if the identification information of the intelligent key is received for the first time in the first preset period, a first authentication request is generated and sent to the TSP, the identification is carried out through the TSP, if the identification information of the intelligent key is not received for the first time in the first preset period, the received identification information of the intelligent key is compared with the identification information of the intelligent key stored locally, so that the purpose of authentication is achieved, communication authentication between the intelligent key and the lifting mechanism in the vehicle can be achieved, and therefore communication between the intelligent key and the lifting mechanism can be achieved, and some linkage functions are achieved.
In some embodiments, the step S102 may further include:
If the lifting mechanism receives the identification information of the intelligent key for the first time in the first preset period, the lifting mechanism stores the identification information of the intelligent key which is successfully authenticated after receiving the first authentication success information.
After receiving the first authentication success information, the lifting mechanism confirms that the intelligent key and the intelligent key are authenticated successfully for the first time in a first preset period, stores identification information of the intelligent key, and can send authentication success information to the intelligent key so that the intelligent key can display the authentication success information on a display screen of the intelligent key to prompt a user.
After receiving the first authentication failure information, the lifting mechanism confirms that the communication authentication between the lifting mechanism and the intelligent key fails, and sends the authentication failure information to the intelligent key, so that the intelligent key displays the authentication failure information on a display screen of the intelligent key to prompt a user.
According to the embodiment, after the lifting mechanism is successfully authenticated with the intelligent key through communication for the first time in the first preset period, the identification information of the intelligent key which is successfully authenticated at this time is stored, so that when the lifting mechanism is authenticated with the intelligent key through communication again in the first preset period, authentication can be performed according to the locally stored information, and the authentication speed can be improved.
In some embodiments, the "TSP" in S102 performs authentication based on the first authentication request, and if the authentication is successful, sends first authentication success information to the lifting mechanism, which may include:
And the TSP checks the first authentication request with the pre-stored authentication information, if the first authentication request is consistent with the pre-stored authentication information, the communication authentication between the intelligent key and the lifting mechanism is determined to be successful, and the first authentication success information is sent to the lifting mechanism.
The authentication information pre-stored in the TSP may include identification information of the vehicle and identification information of the smart key that are mutually bound. The pre-stored verification information can be that when the vehicle is produced, in the matching process of the vehicle and the intelligent key, the production line data reading equipment binds the identification information of the vehicle and the identification information of the intelligent key and uploads the binding information to the production system server. The production system server transmits the identification information of the bound vehicle and the identification information of the smart key to the TSP. The TSP stores the received identification information of the bound vehicle and the identification information of the smart key as the pre-stored authentication information.
When the first authentication request is verified to be consistent with the pre-stored authentication information, the TSP generates first authentication success information and sends the first authentication success information to the lifting mechanism so as to prompt the lifting mechanism that the communication authentication between the TSP and the intelligent key is successful. When the first authentication request is inconsistent with the verification information, the TSP generates first authentication failure information, and sends the first authentication failure information to the lifting mechanism so as to prompt the lifting mechanism that communication authentication between the lifting mechanism and the intelligent key fails.
In some embodiments, the pre-stored authentication information includes pre-stored identification information of the smart key and pre-stored identification information of the vehicle;
The TSP checks the first authentication request with the pre-stored authentication information, and if the first authentication request is consistent with the pre-stored authentication information, the communication authentication between the intelligent key and the lifting mechanism is determined to be successful, and the TSP comprises the following steps:
The TSP analyzes the first authentication request to obtain identification information of the intelligent key carried by the first authentication request and identification information of the vehicle carried by the first authentication request, and if the identification information of the intelligent key carried by the first authentication request is consistent with the pre-stored identification information of the intelligent key, and the identification information of the vehicle carried by the first authentication request is consistent with the pre-stored identification information of the vehicle, the communication authentication between the intelligent key and the lifting mechanism is determined to be successful.
The pre-stored identification information of the intelligent key and the pre-stored identification information of the vehicle are in a binding relationship.
In this embodiment, the TSP may determine that the communication authentication between the smart key and the lifting mechanism is successful when the identification information of the smart key carried by the first authentication request is consistent with the identification information of the pre-stored smart key, and the identification information of the vehicle carried by the first authentication request is consistent with the identification information of the pre-stored vehicle; and determining that communication authentication between the intelligent key and the lifting mechanism fails when the identification information of the intelligent key carried by the first authentication request is inconsistent with the pre-stored identification information of the intelligent key or the identification information of the vehicle carried by the first authentication request is inconsistent with the pre-stored identification information of the vehicle.
Because the identification information of the same vehicle may bind the identification information of a plurality of smart keys, the identification information of the smart key carried by the first authentication request is consistent with the pre-stored identification information of the smart key, and may include: the identification information of the intelligent key carried by the first authentication request is consistent with one of the prestored identification information of all intelligent keys bound with the identification information of the vehicle. The inconsistent identification information of the smart key carried by the first authentication request and the prestored identification information of the smart key may include: the identification information of the intelligent key carried by the first authentication request is inconsistent with the prestored identification information of all intelligent keys bound with the identification information of the vehicle.
In some embodiments, sending the first authentication request to the TSP includes:
the lift mechanism sends a first authentication request to a T-BOX (TELEMATICS BOX ) of the vehicle;
The T-BOX sends a first authentication request to the TSP.
The T-BOX is used as a vehicle communication module and can be used as a communication tool between the lifting mechanism and the TSP and used for forwarding communication data between the lifting mechanism and the TSP.
In some embodiments, the identification information of the smart key includes a MAC (MEDIA ACCESS Control Address ) of the smart key; the identification information of the vehicle includes a VIN of the vehicle (Vehicle Identification Number, vehicle identification code).
The MAC of the smart key is unique and fixed, and thus can be used as identification information of the smart key. The VIN of the vehicle is unique and fixed, so the VIN can be used as the identification information of the vehicle.
In some embodiments, the smart key authentication method further comprises:
After the intelligent key is connected with the vehicle control mobile terminal, the intelligent key sends identification information of the intelligent key to the vehicle control mobile terminal;
if the vehicle control mobile terminal receives the identification information of the intelligent key for the first time in a second preset period, the vehicle control mobile terminal acquires the identification information of the vehicle bound by itself, generates a second authentication request based on the identification information of the vehicle bound by itself and the received identification information of the intelligent key, and sends the second authentication request to the TSP; the TSP performs authentication based on the second authentication request, and if the authentication is successful, second authentication success information is sent to the vehicle control mobile terminal;
If the vehicle control mobile terminal does not receive the identification information of the intelligent key for the first time in the second preset period, the vehicle control mobile terminal compares the identification information of the intelligent key which is received currently with the identification information of the intelligent key which is stored by the vehicle control mobile terminal, and if the identification information of the intelligent key which is received currently is consistent with the identification information of the intelligent key which is stored by the vehicle control mobile terminal, the communication authentication between the intelligent key and the vehicle control mobile terminal is determined to be successful.
Wherein, install car accuse APP in car accuse mobile terminal. The user can control the vehicle or check the related information of the vehicle through the vehicle control APP in the vehicle control mobile terminal and the like.
In this embodiment, the smart key may perform authentication and communication with a vehicle control mobile terminal installed with an APP associated with a vehicle, in addition to authentication and communication with a lifting mechanism in the vehicle, so that the vehicle is controlled by the vehicle control mobile terminal to implement some linkage functions.
The purpose of setting the second preset period is similar to the purpose of setting the first preset period. The purpose of setting up the second and predetermine the cycle is in the second and predetermine the cycle, if smart key and car accuse mobile terminal carry out authentication for the first time, then need pass through TSP and carry out authentication, after authentication success for the first time, can store the identification information of smart key in the car accuse mobile terminal to in the second predetermine the cycle, when smart key and car accuse mobile terminal carry out authentication again, authentication can be accomplished through the identification information of smart key of car accuse mobile terminal local storage directly, convenient and fast. In order to enhance the safety of the vehicle system, when the next second preset period starts, the smart key and the vehicle control mobile terminal still need to pass through the TSP for authentication when first authentication is performed.
The duration of the second preset period may be set according to actual requirements, for example, one day, five days, ten days, one month, and the like, which is not particularly limited herein. The duration, start time and end time of the second preset period and the first preset period may be the same or different.
In this embodiment, after the smart key is connected to the vehicle control mobile terminal equipped with the vehicle control APP, the smart key and the vehicle control mobile terminal need to perform communication validity authentication, and at this time, the smart key sends its own identification information to the vehicle control mobile terminal.
If the vehicle control mobile terminal receives the identification information of the intelligent key for the first time in the second preset period, the vehicle control mobile terminal can acquire the identification information of the vehicle bound by the login account of the vehicle control APP installed by the vehicle control mobile terminal after receiving the identification information sent by the intelligent key, and generates a second authentication request according to the received identification information of the intelligent key and the acquired identification information of the vehicle. The second authentication request carries the identification information of the smart key and the identification information of the vehicle.
And after the vehicle control mobile terminal generates the second authentication request, the second authentication request is sent to the TSP so as to facilitate the information verification of the TSP.
When the second authentication request is consistent with the pre-stored verification information, the TSP generates second authentication success information, and sends the second authentication success information to the vehicle control mobile terminal so as to prompt the vehicle control mobile terminal that the communication authentication between the vehicle control mobile terminal and the intelligent key is successful, wherein the second authentication success information can be displayed in the vehicle control APP. When the second authentication request is inconsistent with the pre-stored verification information, the TSP generates second authentication failure information, and sends the second authentication failure information to the vehicle control mobile terminal so as to prompt the vehicle control mobile terminal that communication authentication between the vehicle control mobile terminal and the intelligent key fails, wherein the second authentication failure information can be displayed in the vehicle control APP.
The process of verifying the second authentication request with the pre-stored authentication information by the TSP is similar to the process of verifying the first authentication request with the pre-stored authentication information, and will not be described again.
After receiving the second authentication success information, the vehicle control mobile terminal confirms that the vehicle control mobile terminal and the intelligent key are successfully authenticated for the first time in a second preset period, stores identification information of the intelligent key, and can send the authentication success information to the intelligent key so that the intelligent key can display the authentication success information on a display screen of the intelligent key to prompt a user.
After receiving the second authentication failure information, the vehicle control mobile terminal confirms that the communication authentication between the vehicle control mobile terminal and the intelligent key fails, and sends the authentication failure information to the intelligent key, so that the intelligent key displays the authentication failure information on a display screen of the intelligent key to prompt a user.
In a second preset period, if the vehicle control mobile terminal does not receive the identification information of the intelligent key for the first time, the vehicle control mobile terminal can compare the identification information sent by the intelligent key with the identification information of the intelligent key locally stored in the vehicle control mobile terminal, if the identification information is consistent with the identification information of the intelligent key, authentication is successful, and if the identification information is inconsistent with the identification information, authentication is failed.
In the second preset period, after the first authentication of the intelligent key and the vehicle control mobile terminal is successful, when the authentication is performed again, the local authentication is directly performed through the vehicle control mobile terminal, the remote TSP is not required for the authentication, and the authentication speed can be improved; and when the intelligent key and the vehicle control mobile terminal are authenticated every time the second preset period passes, the remote authentication is required to be performed through the TSP, so that the safety of a vehicle system can be improved.
The smart key and the vehicle control mobile terminal may be connected through bluetooth, or may be connected through any other realizable mode, which is not limited herein. The vehicle control mobile terminal may be a mobile phone, a tablet computer, or any other terminal that can be realized, which is not particularly limited herein.
The intelligent key authentication method provided by the embodiment not only can realize communication authentication between the intelligent key and the lifting mechanism in the vehicle so as to facilitate communication between the intelligent key and the lifting mechanism and realize some linkage functions, but also can realize communication authentication between the intelligent key and the vehicle control mobile terminal provided with the vehicle control APP so as to facilitate communication between the intelligent key and the vehicle control mobile terminal, and the vehicle is controlled by the vehicle control mobile terminal to realize some linkage functions.
In some possible implementations, the smart key authentication system may further include:
the intelligent key sends identification information of the intelligent key to a door lock controller of the vehicle;
After receiving the identification information of the intelligent key, the door lock controller compares the received identification information of the intelligent key with the identification information of the intelligent key stored by the door lock controller, if the received identification information of the intelligent key is consistent with the identification information of the intelligent key stored by the door lock controller, the door lock controller authenticates successfully, and sends third authentication success information to the intelligent key, and if the received identification information of the intelligent key is inconsistent with the identification information of the intelligent key stored by the door lock controller, the door lock controller fails to authenticate, and sends third authentication failure information to the intelligent key.
The embodiment can realize the authentication between the intelligent key and the door lock controller, and the intelligent key can realize the key functions of unlocking, locking and the like after the door lock controller authenticates that the intelligent key is legal.
It should be understood that the sequence number of each step in the foregoing embodiment does not mean that the execution sequence of each process should be determined by the function and the internal logic, and should not limit the implementation process of the embodiment of the present application.
The following are system embodiments of the application, for details not described in detail therein, reference may be made to the corresponding method embodiments described above.
Fig. 2 is a schematic structural diagram of a smart key authentication system according to an embodiment of the present application, and for convenience of explanation, only a portion related to the embodiment of the present application is shown, which is described in detail below:
As shown in fig. 2, the smart key authentication system 30 includes: a smart key 31 and a lifting mechanism 32.
The smart key 31 is configured to transmit identification information of the smart key to the lifting mechanism 32 after the smart key is connected to the lifting mechanism 32 on the vehicle;
The lifting mechanism 32 is configured to, if the identification information of the smart key 31 is received for the first time within a first preset period, obtain the identification information of the vehicle, generate a first authentication request based on the identification information of the vehicle and the identification information of the smart key 31, and send the first authentication request to the TSP; if the identification information of the intelligent key 31 is not received for the first time in the first preset period, comparing the identification information of the intelligent key 31 which is received currently with the identification information of the intelligent key which is stored by the intelligent key, and if the identification information of the intelligent key 31 which is received currently is consistent with the identification information of the intelligent key which is stored by the intelligent key, determining that the communication authentication between the intelligent key 31 and the lifting mechanism 32 is successful;
the first authentication request is used for indicating the TSP to authenticate based on the first authentication request, and if authentication is successful, the first authentication success information is sent to the lifting mechanism 32.
In one possible implementation, as shown in fig. 3, the smart key authentication system further includes: T-BOX33.
The lifting mechanism 32 sends a first authentication request to the TSP through the T-BOX 33;
the TSP transmits the first authentication success information to the lifting mechanism 32 through the T-BOX 33.
In one possible implementation manner, the lifting mechanism 32 is further configured to store the identification information of the smart key that is authenticated successfully at this time after receiving the first authentication success information if the identification information of the smart key 31 is received for the first time in the first preset period.
In one possible implementation, the TSP authenticates based on the first authentication request, and if the authentication is successful, sends first authentication success information to the lift mechanism 32, including:
the TSP checks the first authentication request with the pre-stored authentication information, and if the first authentication request is identical to the pre-stored authentication information, determines that the communication authentication between the smart key 31 and the lifting mechanism 32 is successful, and sends first authentication success information to the lifting mechanism 32.
In one possible implementation, the pre-stored verification information includes pre-stored identification information of the smart key and pre-stored identification information of the vehicle;
The TSP checks the first authentication request with the pre-stored authentication information, and if the first authentication request is identical to the pre-stored authentication information, determines that the communication authentication between the smart key 31 and the lifting mechanism 32 is successful, including:
The TSP analyzes the first authentication request to obtain the identification information of the smart key 31 carried by the first authentication request and the identification information of the vehicle carried by the first authentication request, and if the identification information of the smart key 31 carried by the first authentication request is consistent with the pre-stored identification information of the smart key and the identification information of the vehicle carried by the first authentication request is consistent with the pre-stored identification information of the vehicle, it is determined that the communication authentication between the smart key 31 and the lifting mechanism is successful.
In one possible implementation, the identification information of the smart key includes a MAC of the smart key; the identification information of the vehicle includes a VIN of the vehicle.
In one possible implementation, the smart key authentication system further includes: a vehicle control mobile terminal; the vehicle control mobile terminal is provided with a vehicle control APP associated with a vehicle.
The intelligent key 31 is further configured to send identification information of the intelligent key to the vehicle control mobile terminal after the intelligent key is connected with the vehicle control mobile terminal;
The vehicle control mobile terminal is configured to obtain the identification information of the vehicle bound by itself if the identification information of the smart key 31 is received for the first time in a second preset period, generate a second authentication request based on the identification information of the vehicle bound by itself and the received identification information of the smart key 31, and send the second authentication request to the TSP; if the identification information of the intelligent key 31 is not received for the first time in the second preset period, comparing the identification information of the intelligent key 31 which is received currently with the identification information of the intelligent key which is stored by the intelligent key, and if the identification information of the intelligent key 31 which is received currently is consistent with the identification information of the intelligent key which is stored by the intelligent key, determining that the communication authentication between the intelligent key 31 and the vehicle control mobile terminal is successful;
the second authentication request is used for indicating the TSP to authenticate based on the second authentication request, and if authentication is successful, second authentication success information is sent to the vehicle control mobile terminal.
Corresponding to the intelligent key authentication system, the embodiment of the application also provides a vehicle which comprises the intelligent key authentication system and has the beneficial effects brought by any intelligent key authentication system.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional units and modules is illustrated, and in practical application, the above-described functional distribution may be performed by different functional units and modules according to needs, i.e. the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-described functions. The functional units and modules in the embodiment may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit, where the integrated units may be implemented in a form of hardware or a form of a software functional unit. In addition, the specific names of the functional units and modules are only for distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working process of the units and modules in the above system may refer to the corresponding process in the foregoing method embodiment, which is not described herein again.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and in part, not described or illustrated in any particular embodiment, reference is made to the related descriptions of other embodiments.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
Furthermore, the features of the embodiments shown in the drawings of the application or of the various embodiments mentioned in the description are not necessarily to be understood as separate embodiments from each other. Rather, each feature described in one example of one embodiment may be combined with one or more other desired features from other embodiments, resulting in other embodiments not described in text or with reference to the drawings.
The above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application, and are intended to be included in the scope of the present application.