CN118283584B - Terminal control methods, terminals and vehicles - Google Patents
Terminal control methods, terminals and vehiclesInfo
- Publication number
- CN118283584B CN118283584B CN202311203629.1A CN202311203629A CN118283584B CN 118283584 B CN118283584 B CN 118283584B CN 202311203629 A CN202311203629 A CN 202311203629A CN 118283584 B CN118283584 B CN 118283584B
- Authority
- CN
- China
- Prior art keywords
- vehicle
- terminal
- information
- control method
- broadcast
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/009—Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/06—Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a control method of a terminal, the terminal and a vehicle, wherein the control method comprises the following steps: and when the broadcast data is the first type of broadcast data, the first terminal broadcasts the broadcast data by using a special broadcast channel. When the safety information is contained in the broadcast data, the special broadcast channel is adopted for broadcasting, and the special broadcast channel does not need scanning, so that the scanning time can be greatly reduced, and the matching speed is increased.
Description
Technical Field
The present application relates to the field of control technologies, and in particular, to a control method of a terminal, and a vehicle.
Background
Bluetooth connections are increasingly being used in various contexts such as, but not limited to, smart home, smart unlock, etc., due to their convenience and stability advantages. In the current general Bluetooth connection technology, pairing connection is performed and then security authentication is performed. In each pairing connection process, a long scanning time is required to scan to the opposite terminal device.
Disclosure of Invention
The present application has been made in order to solve at least one of the above problems. According to a first aspect of the present application, there is provided a control method of a terminal, the control method comprising a first terminal broadcasting broadcast data using a dedicated broadcast channel when the broadcast data is of a first type.
In one embodiment of the present application, the first type of broadcast data includes security information, where the security information includes identification information of the first terminal.
In one embodiment of the application, the control method further comprises the step that the first terminal receives a Bluetooth connection establishment request sent by a second terminal, wherein the Bluetooth connection establishment request is sent to the first terminal after the second terminal receives the broadcast data broadcast by the special broadcast channel and passes the security information verification, and the Bluetooth connection establishment request contains the identity information of the second terminal.
In one embodiment of the present application, the control method further includes that the first terminal determines that the bluetooth connection establishment with the second terminal is successful after receiving the bluetooth connection establishment request sent by the second terminal and verifying the identity information of the second terminal.
In one embodiment of the present application, one of the first terminal and the second terminal is a vehicle-mounted terminal, and the other terminal is a mobile terminal.
In one embodiment of the application, the identification information of the vehicle-mounted terminal comprises a vehicle identification code.
In one embodiment of the application, the vehicle-mounted terminal identification information further comprises account login information of a vehicle control application program corresponding to the vehicle identification code.
In one embodiment of the application, the identity information of the mobile terminal comprises a user account identity, and the control method further comprises the step that the vehicle-mounted terminal loads vehicle setting parameters corresponding to the user account identity while unlocking the vehicle.
In one embodiment of the application, the identification information of the mobile terminal further comprises identification information for unlocking the vehicle, and the control method further comprises the step that the vehicle-mounted terminal controls the vehicle to be unlocked after receiving the identification information for unlocking the vehicle.
In one embodiment of the application, before loading the vehicle setting parameters corresponding to the user account identity, the control method further comprises the steps that the vehicle-mounted terminal searches the vehicle setting parameters corresponding to the user account identity, and if the vehicle setting parameters corresponding to the user account identity cannot be searched, the vehicle-mounted terminal sends a request for storing the vehicle setting parameters generated when the vehicle is subjected to parameter setting.
In one embodiment of the present application, the control method further includes if the vehicle-mounted terminal receives an instruction for saving the vehicle setting parameters generated when the vehicle is parameter-set, saving the vehicle setting parameters generated when the vehicle is parameter-set by the vehicle-mounted terminal, and binding the vehicle setting parameters with the user account identity.
In one embodiment of the present application, the control method further includes if the in-vehicle terminal receives an instruction that the vehicle setting parameters generated when the vehicle is parameter-set are not saved, the in-vehicle terminal does not save the vehicle setting parameters generated when the vehicle is parameter-set.
In one embodiment of the application, the security information further comprises a MAC address of the first terminal, a MAC address of the second terminal and identity information, and further comprises at least one of a hash code, a cyclic verification code and a channel signal strength of the first terminal, wherein the second terminal is an opposite terminal of the first terminal to establish bluetooth connection.
In one embodiment of the present application, the security information is encrypted data when the broadcast data is broadcast.
In one embodiment of the application, when the distance between the first terminal and the second terminal is smaller than a preset threshold value, the first terminal uses the special broadcast channel to broadcast the broadcast data, wherein the second terminal is an opposite terminal of the first terminal for establishing Bluetooth connection.
In one embodiment of the present application, the first terminal broadcasts the broadcast data using a general broadcast channel when the broadcast data is the second type of broadcast data.
According to a second aspect of the present application there is also provided a terminal comprising a storage medium and a processor, the storage medium having stored thereon a computer program for execution by the processor, which when executed by the processor causes the processor to perform a method of controlling any one of the above terminals.
According to a third aspect of the present application, there is also provided a vehicle including a vehicle body, and a vehicle-mounted terminal provided on the vehicle body, the vehicle-mounted terminal being any one of the above terminals.
According to the control method of the terminal, the terminal and the vehicle provided by the embodiment of the application, when the broadcast data is the first type of broadcast data, the first terminal uses the special broadcast channel to broadcast the broadcast data. By introducing the special broadcast channel, when the broadcast data is the first type of broadcast data, the special broadcast channel is adopted for broadcasting, and because the special broadcast channel does not need to be scanned, the scanning time can be greatly reduced, and the matching speed is increased.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the description of the embodiments will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort to a person skilled in the art.
Fig. 1 is a control flow diagram of a first terminal during broadcasting according to an embodiment of the present invention;
Fig. 2 is a block diagram illustrating a control flow of a terminal during broadcasting according to an embodiment of the present invention;
FIG. 3 is a block schematic diagram of modules within a first terminal and a second terminal according to an embodiment of the present invention;
fig. 4 is a control flow diagram of a first terminal at the time of broadcasting according to another embodiment of the present invention;
fig. 5 is a control flow chart of a second terminal after receiving broadcast data according to an embodiment of the present invention;
FIG. 6 is an unlock flow diagram of a vehicle according to an embodiment of the present invention;
Fig. 7 is a control flow chart showing a vehicle-mounted terminal according to an embodiment of the present invention when vehicle parameter setting is performed after unlocking;
Fig. 8 is a schematic block diagram of a terminal according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, exemplary embodiments according to the present invention will be described in detail with reference to the accompanying drawings. It should be apparent that the described embodiments are only some embodiments of the present invention and not all embodiments of the present invention, and it should be understood that the present invention is not limited by the example embodiments described herein. Based on the embodiments of the invention described in the present application, all other embodiments that a person skilled in the art would have without inventive effort shall fall within the scope of the invention.
In the following description, numerous specific details are set forth in order to provide a more thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the invention may be practiced without one or more of these details. In other instances, well-known features have not been described in detail in order to avoid obscuring the invention.
It should be understood that the present invention may be embodied in various forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. As used herein, the term "and/or" includes any and all combinations of the associated listed items.
In order to provide a thorough understanding of the present invention, detailed structures will be presented in the following description in order to illustrate the technical solutions presented by the present invention. Alternative embodiments of the invention are described in detail below, however, the invention may have other implementations in addition to these detailed descriptions.
Some embodiments of the present invention are described in detail below with reference to the accompanying drawings. The following embodiments and features of the embodiments may be combined with each other without conflict.
First, an application scenario of the control method of the terminal shown in the embodiment of the present application will be described, where the control method of the terminal is applied to a terminal having a bluetooth connection function, for control during bluetooth connection or control after bluetooth connection is completed. The two terminals connected as Bluetooth can be mobile terminals, or one mobile terminal and one vehicle-mounted terminal. Of course, the method can also be applied to intelligent home scenes, wherein one terminal is a mobile terminal, and the other terminal is a terminal arranged on intelligent home equipment. It can be seen that the terminal performing the terminal control method in the present application may be various terminals having a bluetooth connection function.
Referring to fig. 1, an embodiment of the present application provides a control method of a terminal, which includes broadcasting broadcast data using a dedicated broadcast channel when the broadcast data is a first type of broadcast data by a first terminal.
In the above-described scheme, when the broadcast data is the first type of broadcast data, the first terminal broadcasts the broadcast data using the dedicated broadcast channel. By introducing the special broadcast channel, when the broadcast data is the first type of broadcast data, the special broadcast channel is adopted for broadcasting, and because the special broadcast channel does not need to be scanned, the scanning time can be greatly reduced, and the matching speed is increased. The steps are described in detail below with reference to the accompanying drawings.
Referring to fig. 1 and 2, the first terminal, as a broadcasting terminal in the bluetooth connection process, first determines whether the broadcasting data is the first type of broadcasting data after receiving the broadcasting data to be broadcasted, and determines whether to use a dedicated broadcasting channel or a general broadcasting channel to broadcast the broadcasting data according to whether the broadcasting data is the first type of broadcasting data. Note that, the HOST terminal a in fig. 2, 4, and 5 refers to a first terminal, and the HOST terminal B refers to a second terminal. The first terminal is used as a broadcasting terminal of Bluetooth connection, and the second terminal is used as an opposite terminal for receiving broadcasting data. The vehicle end (vehicle-mounted terminal) in fig. 3 and 6 may be a first terminal, and the mobile phone end (mobile terminal) may be a second terminal. Of course, the opposite arrangement mode may also be adopted, that is, the vehicle-mounted terminal is the second terminal, and the mobile terminal is the first terminal. It should be noted that fig. 2 to 6 are only examples of scenes, and the control method is not limited to the scenes shown in fig. 2 to 6, but may be other scenes, for example, may also be applied to smart home scenes.
In some embodiments, the first type of broadcast data may include security information, i.e., the broadcast data that is broadcast using a dedicated broadcast channel needs to include security information. For example, the security information may include identification information of the first terminal, so that the opposite terminal that is to establish the bluetooth connection determines whether to send a bluetooth connection establishment request to the first terminal according to the identification information of the first terminal. By way of example, whether the broadcast data is of the first type may be determined based on whether the security information is included. That is, whether to broadcast the broadcast data using a dedicated broadcast channel or a general broadcast channel is determined according to whether security information is included in the broadcast data. The security information is used for security authentication of the second terminal, wherein the second terminal is an opposite terminal of the first terminal for which Bluetooth connection is to be established, so that partial verification is completed in a paging stage, and security is improved. Specifically, the broadcast data contains the security information, and the special broadcast channel security information field is introduced, so that partial verification can be completed in the paging stage, the matching operation of the terminal can be completed before pairing, partial security connection can be established before pairing, security attack is prevented, and connection efficiency and security are improved. Referring to fig. 1, when security information is included in broadcast data, the broadcast data is broadcast using a dedicated broadcast channel.
For example, referring to fig. 1, the first terminal may broadcast the broadcast data using a general broadcast channel when the broadcast data is the second type of broadcast data. That is, after receiving broadcast data to be broadcast, the first terminal first determines whether the broadcast data is first type broadcast data or second type broadcast data. If the broadcast data is of the first type, the broadcast data is broadcast using a dedicated broadcast channel. And if the broadcast data is the second type of broadcast data, broadcasting the broadcast data by using a general broadcast channel.
In some embodiments, the second type of broadcast data may not include security information. That is, whether the broadcast data is the first type broadcast data or the second type broadcast data is judged according to whether the broadcast data contains security information. When security information is included in broadcast data, the broadcast data is of a first type, and the broadcast data may be broadcast using a dedicated broadcast channel. When the broadcast data does not include security information, the broadcast data is of the second type, and the broadcast data can be broadcast using a general broadcast channel.
For example, referring to fig. 1, 2 and 4, the security information may be a security information field embedded in broadcast data. Before the first terminal broadcasts, broadcast data is formed, and then a broadcast strategy is preset. Specifically, different broadcasting strategies are determined to be adopted according to whether the safety information field of the broadcasting data is empty. For example, when the security information field of the broadcast data is empty, it is indicated that the broadcast data does not include the security information, and the broadcast data is the second type broadcast data, and the broadcast data is broadcast using the general broadcast channel. When the security information field of the broadcast data is not empty, the broadcast data is indicated to contain security information, and the broadcast data is the first type broadcast data, and then the broadcast data is broadcast by using a special broadcast channel.
In a more preferred embodiment, the first terminal may broadcast the broadcast data using a dedicated broadcast channel when the distance from the second terminal is less than a preset threshold. The second terminal is an opposite terminal of the first terminal for establishing Bluetooth connection. That is, when the distance between the first terminal and the second terminal is smaller than the preset threshold, it means that the channel signal strength of the dedicated broadcast channel of the first terminal and the second terminal is stronger, and the broadcast data can be stably broadcast to the second terminal, and the dedicated broadcast channel can be used for broadcasting the broadcast data. In some embodiments, if the distance between the first terminal and the second terminal is not less than the preset threshold, it indicates that the signal strength between the two terminals is weak, the power consumption required for broadcasting is large, and the broadcasting may be abandoned to save the power consumption. As an example, referring to fig. 2, channel signal strength information indicating the channel signal strength of the first terminal may be included in the security information. The channel signal strength is used to calculate a distance between the first terminal and the second terminal, and the dedicated broadcast channel is triggered only when the distance between the first terminal and the second terminal is less than a preset threshold.
For example, referring to fig. 2, the security information may further include a MAC address of the first terminal, and a MAC address and identification information of the second terminal. The MAC address of the first terminal and the MAC address of the second terminal may be used for bluetooth pairing. The identity information of the first terminal is used for enabling the second terminal to confirm whether the Bluetooth connection is matched or not, so that whether a Bluetooth connection establishment request is initiated to the first terminal or not is determined. The MAC address and the identity information of the second terminal are used to broadcast the opposite terminal information of the bluetooth connection to be established, so that after receiving the broadcast data through the dedicated broadcast channel, the other terminals verify whether the other terminals are the second terminals. When the authentication itself is not the second terminal, no processing may be performed. And when the terminal is verified to be the second terminal, confirming whether the Bluetooth connection is matched, so as to determine whether to initiate a Bluetooth connection establishment request to the first terminal.
Illustratively, referring to fig. 2, the security information may further include at least one of a hash code and a cyclic verification code. The hash code is used for checking the transmission process to prevent the information from being tampered or the data from being overturned and other anomalies, and is mainly used for carrying out hash code calculation on the identity information of the first terminal, so that the identity information of the first terminal is prevented from being tampered or the data from being overturned and other anomalies. The circulating verification code is mainly used for identifying the connection identification and connection handshake verification.
For example, referring to fig. 2, the security information may be encrypted data when broadcasting the broadcast data. The method comprises the steps of encrypting the MAC address and the identity information of a first terminal, the MAC address and the identity information of a second terminal, the hash code, the channel signal strength of the first terminal and the like to obtain corresponding encrypted data, broadcasting the corresponding encrypted data by adopting the encrypted data, and decrypting the security information of the encrypted data by the second terminal after receiving the broadcast data broadcasted by the special broadcast channel, namely performing one-time security verification, thereby improving the security.
For example, referring to fig. 2 and 4, the control method may further include the first terminal receiving a bluetooth connection establishment request sent by the second terminal. The Bluetooth connection establishment request is sent to the first terminal after the second terminal receives broadcast data broadcast by a special broadcast channel and passes the security information verification, and the Bluetooth connection establishment request contains the identity information of the second terminal. Specifically, the second terminal sends a bluetooth connection establishment request to the first terminal after receiving broadcast data broadcast by a dedicated broadcast channel and passing the security information verification. That is, the second terminal can directly acquire the broadcast data through the dedicated broadcast channel, so that scanning is not required, scanning time can be greatly reduced, and matching speed is increased. And the broadcast data contains security information, the security information in the broadcast data is verified after the broadcast data of the first terminal is acquired, and a Bluetooth connection establishment request is sent to the first terminal only after the verification is passed. Otherwise, if the security information in the broadcast data is not verified, a Bluetooth connection establishment request is not sent to the first terminal. By introducing the special broadcast channel security information field, partial verification can be completed in the paging stage, the matching operation of the terminal can be completed before pairing, and partial security connection can be established before pairing, so that the terminal is prevented from being attacked by security. And the Bluetooth connection establishment request comprises the identification information of the second terminal, so that the first terminal can conveniently verify the identification information of the second terminal after receiving the Bluetooth connection establishment request sent by the second terminal, thereby realizing bidirectional verification and improving the safety.
For example, referring to fig. 4 and 5, the control method may further include determining that the bluetooth connection establishment with the second terminal is successful after the first terminal receives the bluetooth connection establishment request sent by the second terminal and verifies the identity information of the second terminal. Namely, after receiving a Bluetooth connection establishment request sent by the second terminal, the first terminal verifies the identity information of the second terminal. And only after the identity information of the second terminal passes verification, determining that the Bluetooth connection with the second terminal is established successfully. Otherwise, after the identity information of the second terminal cannot pass the verification, determining that the Bluetooth connection with the second terminal fails to be established. And when the connection is established, the security and the rapidness of connection establishment are ensured by acquiring the identity information of the second terminal and by bidirectional authentication, and the unlocking security and the identity identification security are ensured.
The first terminal and the second terminal are, for example, vehicle-mounted terminals, and the other terminal is a mobile terminal. Specifically, the first terminal may be a vehicle-mounted terminal, and the second terminal may be a mobile terminal. Or the first terminal is a mobile terminal, and the second terminal is a vehicle-mounted terminal. Of course, as described above, the terminal is not limited to the vehicle-mounted terminal system, and other terminal devices in other scenarios may be used. For example, the method can also be an intelligent home terminal device in an intelligent home scene.
For example, referring to fig. 2, when one of the first terminal and the second terminal is a vehicle-mounted terminal, the identification information of the vehicle-mounted terminal may include a vehicle identification code (vehicle VIN code). Of course, the information such as the vehicle name and license plate number can also be used as the identification information of the vehicle-mounted terminal. In a more preferred embodiment, the vehicle terminal identification information may further include account login information of the vehicle control application corresponding to the vehicle identification code. As shown in fig. 3, a vehicle control Application (APP) is installed on the mobile terminal, and similarly, account login information of the vehicle control application is stored or bound on the vehicle-mounted terminal, so that the vehicle-mounted terminal can use the account login information of the vehicle control application corresponding to the vehicle identification code as identity information of the vehicle-mounted terminal. The identity information of the vehicle-mounted terminal can be used for carrying out safety verification on the mobile terminal, and whether the vehicle-mounted terminal is matched with the vehicle-mounted terminal to be connected with Bluetooth is determined, so that whether a Bluetooth connection establishment request is sent out is determined, and therefore any identity information capable of identifying the identity of the vehicle-mounted terminal can be adopted as the identity information of the vehicle-mounted terminal.
By way of example, the identity information of the mobile terminal may be any information capable of identifying the identity of the mobile terminal. For example, the identification information of the mobile terminal may include a mobile device identification code, and of course, the name of the mobile terminal may also be used as the identification information of the mobile terminal. And even other identity information which is bound in the vehicle-mounted terminal in advance can be adopted as the identity information of the mobile terminal.
In some embodiments, the identity information of the mobile terminal may include a user account identity, which may be identity information of a user who is about to drive the vehicle. The control method can further comprise the step that the vehicle-mounted terminal loads vehicle setting parameters corresponding to the user account identity while unlocking the vehicle. The vehicle-mounted terminal acquires vehicle setting parameters corresponding to the user account identity while unlocking the vehicle, and sets various parameters for the vehicle according to the acquired vehicle setting parameters. The user in the user account identity may be the user who is about to drive the vehicle. In some embodiments, when the user who unlocks the vehicle is the user who is about to drive the vehicle, the user may be the user who unlocks the vehicle.
At present, the existing unlocking mode, user authentication and user setting adopt a separated scheme, and after unlocking the vehicle, the vehicle is set with various parameters. Aiming at the defects of the prior art, the invention provides a control method in some embodiments, wherein the identity of the user account is added into the identity information of the mobile terminal, and the vehicle setting parameters corresponding to the identity of the user account are directly loaded when the vehicle is unlocked, so that the user experience is improved. According to the embodiment of the invention, the vehicle setting parameters set by different users of the vehicle can be aimed at, when the user performs near-field unlocking on the vehicle, all the vehicle setting parameters set by the user can be automatically loaded, various personalized configuration vehicle setting parameters are provided for the user before the user uses the vehicle, the user experience and the vehicle intelligent degree can be greatly improved, and the personalized requirements of the same vehicle for a plurality of users are met. And the vehicle is unlocked, namely the vehicle setting parameters corresponding to the user account identity are loaded, the vehicle setting parameters set by the user for the vehicle can be quickly loaded, the configuration of the vehicle setting parameters can be completed after the unlocking is realized, the vehicle is in a comfortable state of personalized configuration for the user, and the user experience is greatly provided.
Referring to fig. 5, 6 and 7, in some embodiments, the identification information of the mobile terminal may further include identification information of an unlocked vehicle, which is used as unlocking information of the vehicle to unlock the vehicle. The control method can further comprise the step that the vehicle-mounted terminal controls the vehicle to be unlocked after receiving the identification information of the vehicle to be unlocked. The identification information of the unlocked vehicle may be any type of information. For example, referring to fig. 6, the identification information of the unlocked vehicle may be identification information pre-bound in bluetooth unlocking, NFC attribution verification identification information pre-bound in NFC unlocking, and even biometric information such as, but not limited to, fingerprint, iris, face information, etc. may be used as the identification information for unlocking the vehicle. Of course, other pre-bound identification information for unlocking may be used.
The identity information of the mobile terminal can comprise the identity of the user account and/or the identity information of the unlocking vehicle. Specifically, the identity information of the mobile terminal may only include the identity of the user account, and the identity information of the unlocked vehicle is transmitted to the vehicle-mounted terminal in other manners. The identity information of the mobile terminal may only include the identity information of the unlocked vehicle, and the user account identity may be transmitted to the vehicle-mounted terminal in other manners. The identity information of the mobile terminal can also comprise the identity of the user account and the identity information of the unlocking vehicle. Namely, the identity information of the mobile terminal not only comprises the identity information for unlocking the vehicle, but also comprises the user account identity which is personalized for the vehicle, so that the vehicle is unlocked, and meanwhile, the vehicle setting parameters corresponding to the user account identity are loaded.
In some embodiments, the identity of the user account may be the identity information of the unlocked vehicle, and in this scenario, the identity information used for unlocking the vehicle is the identity of the user account for personalized configuration of the vehicle, so as to implement a function of dual-purpose information, and more facilitate personalized configuration of the vehicle while unlocking.
The identity information of the mobile terminal can be used as the identity information of the unlocking vehicle, namely the identity information of the mobile terminal is not only used for safety verification in the process of establishing the Bluetooth connection, but also used for safety verification in the process of unlocking the vehicle, so that the establishment and unlocking of the Bluetooth connection are integrated in the same flow, the time of Bluetooth connection and unlocking is shortened, and meanwhile, the safety of Bluetooth connection and unlocking is improved.
In some embodiments, referring to fig. 6 and 7, before loading the vehicle setting parameters corresponding to the user account identity, the control method may further include searching for the vehicle setting parameters corresponding to the user account identity by the vehicle-mounted terminal. The vehicle setting parameters can be stored locally in the vehicle-mounted terminal, can be stored on the mobile terminal which has established Bluetooth connection, and can even be stored in the cloud memory, namely, the vehicle-mounted terminal can search the vehicle setting parameters corresponding to the user account identity in a local search, cloud search or even Bluetooth remote search mode. If the vehicle setting parameters corresponding to the user account identity are searched, the vehicle-mounted terminal can load the vehicle setting parameters corresponding to the user account identity, namely, the vehicle is controlled to be subjected to parameter setting according to the vehicle setting parameters corresponding to the user account identity, the user configuration setting is controlled through centralized management and unlocking, and the corresponding vehicle setting parameters are directly loaded when the vehicle is unlocked, so that the user experience is improved. For example, if the vehicle-mounted terminal searches the vehicle setting parameters corresponding to the user account identity, the vehicle-mounted terminal loads the vehicle setting parameters corresponding to the user account identity.
By way of example, the vehicle setting parameters may be data generated for various types of setting vehicle parameters, including, but not limited to, seat settings (seat angle), air conditioning settings (air conditioning temperature, air conditioning outlet position), vehicle IVI settings (user desktop, various commonly used APP login users, such as music login users), new energy EV settings (battery management), new energy HEV settings (battery SOC settings), mood light settings (color, brightness, etc.), and the like.
For example, referring to fig. 6 and fig. 7, the control method may further include if the vehicle setting parameters corresponding to the user account identity are not searched, the vehicle terminal may issue a request for storing the vehicle setting parameters generated when the vehicle is set with the parameters. The vehicle-mounted terminal can display a request for storing the vehicle setting parameters generated when the vehicle is set by the parameters on the central control screen of the vehicle-mounted terminal in a local mode, and a user replies the request through the central control screen. In some embodiments, the vehicle terminal may also send the request to the mobile terminal or other mobile terminals that have established a bluetooth connection through bluetooth transmission, network transmission, and other users reply to the request through the mobile terminal. And determining whether to save a series of vehicle setting parameters generated when the user sets the parameters of the vehicle according to the reply, and replacing the matching method for the new user after replacing the user of the vehicle.
By way of example, referring to fig. 6 and 7, the control method may further include if the vehicle-mounted terminal receives an instruction to save the vehicle setting parameters generated when the vehicle is set with parameters, saving the vehicle setting parameters generated when the vehicle is set with parameters by the vehicle-mounted terminal, and binding the vehicle setting parameters with the user account identity. At this time, the user who uses the user account identity often uses the vehicle again later, so a series of vehicle setting parameters generated by the user performing parameter setting on the vehicle when the user uses the vehicle for the first time can be saved, and the vehicle setting parameters and the user account identity are bound and stored, so that the vehicle-mounted terminal can automatically search the vehicle setting parameters corresponding to the user account identity and automatically perform the setting of the vehicle parameters when the user uses the same user account identity to perform personalized configuration on the vehicle later, the user experience is improved, and manual repeated setting of the user is not required.
For example, referring to fig. 6 and 7, the control method may further include if the in-vehicle terminal receives an instruction to not save the vehicle setting parameters generated when the vehicle is parameter-set, the in-vehicle terminal does not save the vehicle setting parameters generated when the vehicle is parameter-set. At this time, the user corresponding to the user account identity often uses the vehicle in the visitor mode, and subsequently does not use the vehicle or uses the vehicle less frequently, or the user does not want to save various vehicle setting parameters generated when the user performs parameter setting on the vehicle. The mode may be defined as a guest mode, i.e., various vehicle setting parameters for which the user sets parameters for the vehicle when using the vehicle are not saved. Therefore, after receiving an instruction that the vehicle setting parameters generated when the vehicle is set are not stored, the user can use the vehicle in a traceless mode, and the vehicle-mounted terminal stores various vehicle setting parameters generated when the user sets the vehicle parameters, so that the vehicle-mounted terminal can be adjusted according to the user requirements, and the user experience is improved.
In some embodiments, after loading the vehicle setting parameters corresponding to the user account identity, the control method may further include updating the previously saved vehicle setting parameters according to the adjusted vehicle setting parameters when the user adjusts the vehicle setting parameters. I.e. after the personalized configuration of the vehicle is automatically completed, the user may modify the previously saved vehicle parameters. At this time, the previously saved vehicle setting parameters may be updated to save the vehicle setting parameters that the user has recently used.
The first terminal and the second terminal are shown in fig. 3, wherein the first terminal is a vehicle-mounted terminal (vehicle-mounted terminal), and the second terminal is a mobile terminal (mobile phone terminal), and the functional modules are arranged on each terminal shown in fig. 3. The function modules at least comprise a Bluetooth broadcasting module, a Bluetooth safety verification module, a Bluetooth safety connection interaction module, a vehicle unlocking module, a user management module, a user setting module, a vehicle management APP and a safety identity information management module. The functions of the functional modules are as follows:
s101, a Bluetooth broadcasting module is responsible for Bluetooth broadcasting and usually needs to carry own address and destination address, and the embodiment of the application increases the expansion safety information on the basis of not affecting the original Bluetooth broadcasting, and simultaneously broadcasts the broadcasting data carrying the safety information on a fixed special broadcasting channel to realize less channel scanning period.
S102, a Bluetooth security verification module is responsible for carrying out security information verification after receiving Bluetooth broadcasting.
S103, a Bluetooth secure connection interaction module is responsible for secure encryption and decryption in the Bluetooth interaction process, data verification and connection management.
And S104, a vehicle unlocking module is responsible for unlocking a user vehicle, and generally supports various unlocking schemes, such as a Bluetooth unlocking vehicle, a mobile phone remote cloud unlocking vehicle, a fingerprint unlocking vehicle, an NFC unlocking vehicle and the like, and has the core purposes of completing user unlocking technology matching and user authentication, and power management of various electronic equipment of the vehicle after unlocking.
S105, a user management module which can be an independent ECU (electronic control unit) or can multiplex the current stored and calculated resources by utilizing the current vehicle-mounted terminal, supports hardware encryption and can save various vehicle setting parameters (personalized data) which are logged in and set by each vehicle user, and the module can save the local encryption and synchronously save a cloud server. While the vehicle parameter settings may be modified by communicating wirelessly or by wire with the various domain controllers of the vehicle. The module stores corresponding vehicle setting parameters for different users, including but not limited to seat settings (seat angle), steering wheel settings, air conditioner settings (air conditioner temperature, air conditioner air outlet position), vehicle IVI (in-vehicle infotainment system) settings (user desktop, various common APP login user information, such as music login user), new energy EV settings (battery management), new energy HEV settings (battery SOC settings), atmosphere lamp settings (color, brightness, etc.), and the like. Meanwhile, the user identification information of the unlocking vehicle can adopt various identification modes, such as face or fingerprint data identification, mobile equipment identification numbers (IMEI) of mobile phones and the like, as the user identification information of different unlocking vehicles. And finally, the synchronous vehicle setting parameters are stored on the cloud platform connection module and the cloud platform S202 at regular intervals in S201, so that the vehicle setting parameters generated by the vehicle parameter set by a user are consistent in setting no matter at the mobile phone end or the vehicle-mounted terminal.
And S106, a user setting module which is responsible for communicating with various control units through buses and completing personalized setting for users according to setting parameters of different users of the user management unit. And meanwhile, collecting the user setting change and notifying the user management module to update.
And S107, setting the Bluetooth broadcasting module on the mobile terminal and the vehicle-mounted terminal.
S108, a Bluetooth security verification module is arranged on the mobile terminal and the vehicle-mounted terminal.
And S109, a Bluetooth safe connection interaction module is arranged on the mobile terminal and the vehicle-mounted terminal.
S110, user vehicle management APP is used as a vehicle setting application program for saving the user in the mobile terminal.
S111, a safety identity information management module, wherein the mobile terminal stores the identity information, account information, secret key and other safety modules of the user, and generally, independent management of safety hardware is required.
An exemplary secure bluetooth broadcast channel and architecture is described below in conjunction with fig. 2, 3, and 4. As shown in FIG. 2, the method specifically comprises a step S301 of HOST terminal A (i.e. a first terminal), a step S302 of HOST terminal B (i.e. a second terminal), a step S303 of a general broadcast channel, a step S304 of a special broadcast channel, a step S305 of a destination MAC (MAC address of the second terminal), a step S306 of a source MAC (MAC address of the first terminal), a step S307 of encrypting account information, a step S308 of encrypting vehicle information, a step S309 of encrypting hash codes, a step S310 of circulating verification codes, and a step S311 of channel signal strength. As described in detail below.
Step S301, HOST end A is used as a first terminal. The first terminal (HOST terminal a) carrying the bluetooth low energy function needs to be explained that no matter how HOST a or B can be exchanged, the first terminal can exist as a mobile terminal or a vehicle-mounted terminal, and the embodiment of the application supports bidirectional initiation of connection pairing, so that any one of the mobile terminal or the vehicle-mounted terminal can be used as the HOST terminal a.
Step S302, HOST terminal B and HOST terminal A have the same functions.
Step S303, general broadcast channel. The universal Bluetooth broadcast only comprises the Bluetooth address (MAC address) of the destination terminal, and is broadcast on a random universal broadcast channel, so that the security is low.
In step S304, the special broadcast channel is used as a special Bluetooth broadcast channel, the broadcast data contains security information, the security information specifically contains information such as S305, S306, S307, S308, S309, S310 and S311, and the broadcast data is broadcast on a specific special broadcast channel, and only terminal equipment capable of correctly demodulating the special broadcast channel can acquire and receive the broadcast data. Meanwhile, as the frequency point of the special broadcast channel is fixed, the Bluetooth scanning channel time is reduced, and the pairing and connecting time can be greatly shortened.
In step S305, the destination MAC, i.e. the MAC address of the second terminal, is the bluetooth MAC address of the destination peer for which pairing is planned.
Step S306, the source MAC, i.e. the MAC address of the first terminal, is the Bluetooth MAC address of the originating broadcast end HOST.
Step S307, encrypting account information. The encryption of account information refers to that a Bluetooth module requests to acquire account login information of a vehicle control application program APP from an HOST end operating system, wherein the account login information is usually a user name and a password. Whether at the vehicle terminal (vehicle end) or at the mobile terminal (mobile phone end), account login information is usually stored in an operating system security hardware encryption mode.
Step S308, encrypting the vehicle information. The encrypted vehicle information may include a vehicle name and code information, the code information typically including a vehicle VIN code that can uniquely identify the user vehicle, and the first terminal and the second terminal may encrypt the vehicle information using a universal key.
Step S309, encrypting the hash code. Aiming at the account login information and the vehicle information, hash codes can be calculated, and the hash codes are used for checking whether the transmission process is tampered or not, so that the information is prevented from being tampered or the data is prevented from being overturned and other anomalies.
Step S310, circulating verification codes, which are mainly used for identifying the connection identifier of the time and user connection handshake verification.
Step S311, channel signal intensity. The signal strength of the transmitting end is used for calculating the distance between the transmitting end and the receiving end, and the embodiment of the application can trigger the special broadcast channel to broadcast only when the user distance is smaller than the preset threshold value.
When the HOST end a performs a specific broadcast, referring to fig. 4, the method specifically may include a step S401 of initializing a bluetooth connection by the HOST end a, a step S402 of requesting to acquire the broadcast data shown above, and simultaneously acquiring security information such as, but not limited to, account information and fingerprints, a step S403 of loading a preset broadcast policy, a step S404 of determining whether a security information field in the broadcast data is empty, a step S405 of performing a specific broadcast channel of a vehicle-mounted terminal to perform a secure broadcast, a step S406 of performing a period of receiving broadcast data broadcast through the specific broadcast channel directly by the HOST end B through the specific broadcast channel and determining whether broadcast data broadcast through the specific broadcast channel is received, a step S407 of parsing and verifying security information in the broadcast data after receiving broadcast data broadcast through the specific broadcast channel, a step S408 of receiving broadcast data broadcast through a general broadcast channel by default, and a step S409 of ending. The following describes the steps in detail with reference to the accompanying drawings:
Step S401, HOST terminal A initializes Bluetooth connection. HOST end A initializes Bluetooth connection and initializes Bluetooth resource. HOST terminal A can be a vehicle-mounted terminal or a mobile terminal, and specifically, a mobile terminal such as but not limited to a mobile phone terminal can be used as the mobile terminal.
Step S402, requesting to acquire account information, fingerprint and other information. The Bluetooth module of HOST terminal A requests the operating system of HOST terminal A to acquire the security information. The security information can be account login information, fingerprint or password encryption data of the vehicle-mounted terminal user.
Step S403, loading a preset broadcasting strategy. The method comprises the steps of loading a preset broadcasting strategy, and presetting mainly aiming at Bluetooth special broadcasting channel configuration, broadcasting period, power saving configuration and signal distance configuration. The dedicated broadcast channel configuration includes broadcasting data including security information through a dedicated broadcast channel in a specific channel ID. The broadcast period mainly includes broadcast frequency period information. The power saving configuration includes how the low power module is configured to save power. The signal distance configuration refers to that the opposite terminal performs connection pairing when the opposite terminal receives the broadcast and the signal threshold is more or less.
Step S404, judging whether the safety information in the broadcast data is empty. If the security information in the broadcast data is null, the broadcast data considers the connection request as a general broadcast channel, and step S408 is executed, otherwise step S405 is executed. The security information refers to the information shown in the above embodiments, including information such as, but not limited to, encrypted account information, encrypted vehicle information, encrypted hash codes, cyclic authentication codes, channel signal strength.
And step S405, carrying out vehicle-mounted special Bluetooth safety broadcasting. And carrying out special Bluetooth safety broadcasting of the periodic vehicle-mounted terminal according to the configuration information.
Step S406, HOST end B periodically receives and judges whether broadcast data broadcasted by a special broadcast channel is received. If received, step S407 is executed, otherwise step S406 is continued to monitor the broadcast periodically.
Step S407, analyzing and verifying the safety information. And analyzing the safety information field in the broadcast data, extracting the encrypted information content, and providing a safety verification module for safety verification and data verification.
Step S408, the default general broadcast channel is used for broadcasting. The general broadcast channel generally refers to other non-dedicated broadcast channels, and is generally transmitted using a random channel, and is not configurable in terms of period, etc.
And S409, ending.
An exemplary bluetooth connection authentication and vehicle unlocking method is described below in conjunction with fig. 5. The method specifically comprises the steps of S501, S502, decrypting safety information in broadcast data and verifying whether the safety information is matched with vehicle information and account information, S503, HOST end B obtaining self identity information, S504, ending the connection, S505, initiating a Bluetooth connection establishment request, S506, enabling an identity verification module of HOST end A to decrypt and verify the identity information sent by HOST end B, namely, performing identity verification, S507, enabling the identity verification to pass, S508, enabling the Bluetooth connection to be established successfully, S509, enabling a vehicle-mounted terminal to inform a vehicle configuration module of vehicle setting, S511, and ending. The following is a detailed description:
step S501, broadcast data broadcast by a dedicated broadcast channel is received. And then see if the security information in the broadcast data can be successfully parsed, which may be information such as, but not limited to, the encrypted account information and the vehicle information shown above, check codes, etc.
And step S502, decrypting the security information in the broadcast data, and verifying to see whether the vehicle information and the account information are matched. If the decryption check code matches the verification pass. And if the user account information is verified to pass the two-way matching verification, executing the step S503, otherwise executing the step S504.
Step S503, HOST end B obtains own identity information. The security module of the operating system of HOST B is usually required to apply for encrypted identification information for authentication of HOST a.
And step S504, ending the connection. And if the verification fails, ending the broadcast connection, and rejecting the pairing success.
Step S505, initiate Bluetooth connection establishment request, and conduct key interaction.
Step S506, the identity authentication module of HOST end A decrypts the identity information sent by HOST end B to perform user identity authentication.
Step S507, the identity verification module of HOST end A decrypts the identity information sent by HOST end B and judges whether the identity verification passes. If the authentication is passed, step S508 is performed, otherwise step S504 is performed.
Step S508, the Bluetooth connection is established successfully. The identity verification is passed, the two-way matching verification is passed, the successful matching Bluetooth connection is established successfully, and the secure pairing is completed.
Step S509, whether an unlocking instruction of the vehicle is received. If the vehicle end receives the unlocking instruction, step S510 is executed. Otherwise, the step S509 is continued to be executed for waiting for an instruction. The identity information used for unlocking the vehicle in the unlocking instruction may be the identity information sent by the HOST end B in the connection establishment request.
And S510, the vehicle-mounted terminal informs the user of the vehicle configuration module to set the vehicle. And the vehicle terminal unlocking key is successfully matched, the unlocking is successful, the vehicle configuration module is informed to search and load vehicle setting parameters corresponding to the identity information of the unlocking vehicle, and the corresponding vehicle parameter setting is carried out.
Step S511 ends.
Referring to fig. 6, an exemplary method for unlocking a vehicle and updating a user configuration based on a near field is described, where after a user unlocks the vehicle through a near field communication manner, identification information of the user may be obtained according to different unlocking manners, and a user setting module of the vehicle is notified to load vehicle setting parameters corresponding to the user identification information of the unlocked vehicle. Step S201, a vehicle locking state monitoring unlocking method; step S202, whether Bluetooth is unlocked or not; step S203, whether NFC is unlocked; the method comprises the steps of S204, S205, S206, S207, S208, S209, S210, S211, S212, wherein whether other biological characteristics are unlocked, S205, S206, S207, S208, S209, S210, S211, S212, S210, S2, S, user, S according to be the user, S, user, S, user is utilized to transmit user to unlock the identification information of the user is transmitted by Bluetooth, which is used to be used to. The details are described below with reference to fig. 6.
Step S201, a vehicle locking state monitoring unlocking method. The vehicle pre-condition is a vehicle locking state, and meanwhile, the vehicle can monitor the unlocking of the vehicle by a user in real time.
Step S202, whether Bluetooth is unlocked. If the current user approaches the vehicle, the Bluetooth unlocking of the vehicle is initiated, and the step S206 is executed, otherwise, the step S203 is executed.
Step S203, whether NFC unlocking is performed. If the current user initiates NFC unlocking of the vehicle, step S207 is executed, otherwise, step S204 is executed.
Step S204, whether other biological characteristics are unlocked. If the current user selects other biometric features to unlock the vehicle, the step S208 is executed by other biometric features including but not limited to fingerprint recognition, iris recognition, face recognition, etc., otherwise, the step S205 is executed.
Step S205, whether the unlocking is anonymous. If the current user selects to unlock the vehicle anonymously, e.g., mechanical key unlock, etc., step S210 is performed.
Step S206, transmitting the identification information of the unlocking vehicle of the user by utilizing Bluetooth. The vehicle-mounted bluetooth is used for transmitting the encrypted identification information of the vehicle to be unlocked, and the embodiment can adopt the unique identification IMEI (international mobile equipment identification code) of the mobile phone of the user and the mobile phone number as the identification information of the host of the mobile phone for unlocking the vehicle.
Step S207, the NFC attribution is utilized to verify the identity information of the user unlocking vehicle. The binding relation between the NFC card and the identification information of the unlocking vehicle of the user needs to be set in advance by the user, and the binding relation can be usually finished at the APP end of the mobile phone or the webpage end. When different NFC cards unlock the vehicle, encrypted card ID information needs to be transmitted as identification information of the user unlocking the vehicle.
And step S208, verifying the identity information by utilizing the biological characteristic information. The method comprises the steps of presetting the bound user biological characteristic information in advance through the vehicle-mounted terminal to serve as the identity information of a user unlocking vehicle, and checking whether the currently received identity information for unlocking exists or not. Biometric information includes, but is not limited to, a face, a fingerprint, an iris, a palmprint, a retina, a finger vein, and the like.
Step S209, the user management module successfully acquires corresponding vehicle setting parameters of the user according to the identity information of the user unlocking vehicle. The user management module user unlocks the identity information of the vehicle, and inquires whether corresponding vehicle setting parameters exist according to the provided identity information of the user unlocking the vehicle, and the step S211 is executed, otherwise, the step S210 is executed.
Step S210, entering a visitor mode. The visitor mode is a mode which aims at anonymous users or other non-vehicles to allow common users to use, can fully protect user privacy, clear away all user use marks and does not save current temporary user habits. It is generally suitable for vehicles to be borrowed for other casual users or for other persons to use the vehicle briefly for access to maintenance. That is, in the guest mode, the in-vehicle terminal does not save various vehicle setting parameters generated when the user sets the vehicle.
Step S211, the user setting module carries out corresponding configuration according to the searched vehicle setting parameters. And the user unlocks the identity information of the vehicle, successfully checks the identity information, and logs in an operating system of the vehicle-mounted terminal. The setting module is used for setting vehicle setting parameters stored by users in each Domain Controller (DC) through communication of buses and each ECU (electronic control unit) according to historical configuration information corresponding to the identity information of the unlocked vehicle.
Step S212, ending.
In the various embodiments shown above, when the first terminal includes security information in broadcast data, the broadcast data is broadcast using a dedicated broadcast channel. When the safety information is contained in the broadcast data, the special broadcast channel is adopted for broadcasting, and the special broadcast channel does not need scanning, so that the scanning time can be greatly reduced, and the matching speed is increased. And the broadcast data contains safety information, and a special broadcast channel safety information field is introduced, so that partial verification can be completed in a paging stage, the matching operation of the terminal can be completed before pairing, partial safety connection can be established before pairing, safety attack is prevented, and the connection efficiency and safety are improved.
The method can be used for setting parameters of vehicles of different users, when the user performs near-field unlocking of the vehicle, personalized settings (vehicle setting parameters) set by all the users can be automatically loaded, various personalized configurations are provided for the user before the user uses the vehicle, user experience and the intelligent degree of the vehicle can be greatly improved, and personalized requirements of the same vehicle for a plurality of users are met. Meanwhile, a safe Bluetooth broadcast channel and a mechanism are introduced, information such as user fingerprints and keys is obtained as safety information to be embedded into broadcast data when connection is established, vehicle safety authentication is carried out, connection establishment safety and rapidness are guaranteed through bidirectional authentication, unlocking vehicle safety and identity recognition are guaranteed, user vehicle setting is rapidly loaded, comfortable vehicle configuration can be completed after unlocking is achieved, and user experience is greatly provided.
Furthermore, the embodiment of the application also provides a terminal, which comprises a storage medium and a processor, wherein the storage medium is stored with a computer program operated by the processor, and the computer program enables the processor to execute the control method of any one of the terminals when the computer program is operated by the processor.
Fig. 8 shows a schematic block diagram of a terminal 100 according to an embodiment of the application. As shown in fig. 8, the terminal 100 according to an embodiment of the present application may include a storage medium 110 and a processor 120, the storage medium 110 storing a computer program to be executed by the processor 120, which when executed by the processor 120, causes the processor 120 to perform the foregoing control method of the terminal according to the embodiment of the present application. It should be explained that, the terminal in the embodiment of the present application may be the first terminal in the control method of the terminal, or may be the second terminal in the control method of the terminal, that is, the terminal only needs to execute one embodiment of the method, which belongs to the terminal in the embodiment of the present application. Of course, the terminal may also be a system, which includes the first terminal and the second terminal in the control method of the terminal. Those skilled in the art can understand the specific operation of the terminal 100 deployment apparatus according to the embodiment of the present application in combination with the foregoing, and for brevity, a detailed description is omitted here.
The storage medium 110 may include, for example, a memory card of a smart phone, a memory component of a tablet computer, a hard disk of a personal computer, a read-only memory (ROM), an erasable programmable read-only memory (EPROM), a portable compact disc read-only memory (CD-ROM), a USB memory, or any combination of the foregoing storage media. The computer-readable storage medium may be any combination of one or more computer-readable storage media.
In addition, the embodiment of the application also provides a vehicle, which comprises a vehicle body and a vehicle-mounted terminal arranged on the vehicle body, wherein the vehicle-mounted terminal is any one of the terminals, namely, the vehicle-mounted terminal can be a first terminal serving as a broadcasting party, and the vehicle-mounted terminal can also be a second terminal for receiving broadcasting data. The vehicle may be a vehicle of various power sources such as, but not limited to, a fuel-fired vehicle, a hybrid vehicle, an electric vehicle, and the like. The vehicle may be a variety of types of vehicles such as, but not limited to, passenger cars, coaches, engineering vehicles, and the like.
The present invention has been illustrated by the above-described embodiments, but it should be understood that the above-described embodiments are for purposes of illustration and description only and are not intended to limit the invention to the embodiments described. In addition, it will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, and that many variations and modifications are possible in light of the teachings of the invention, which variations and modifications are within the scope of the invention as claimed. The scope of the invention is defined by the appended claims and equivalents thereof.
Claims (16)
1. A control method of a terminal, comprising:
when the broadcast data is first-class broadcast data, the first terminal uses a special broadcast channel to broadcast the broadcast data;
The first type of broadcast data comprises security information, wherein the security information comprises identity information of the first terminal;
the first terminal receives a Bluetooth connection establishment request sent by a second terminal, wherein the Bluetooth connection establishment request is sent to the first terminal after the second terminal receives the broadcast data broadcasted by the special broadcast channel and verifies the security information, and the Bluetooth connection establishment request contains the identity information of the second terminal.
2. The control method according to claim 1, characterized by further comprising:
And after receiving the Bluetooth connection establishment request sent by the second terminal and verifying the identity information of the second terminal, the first terminal determines that the Bluetooth connection establishment with the second terminal is successful.
3. The control method of claim 2, wherein one of the first terminal and the second terminal is a vehicle-mounted terminal, and the other terminal is a mobile terminal.
4. The control method according to claim 3, wherein the identification information of the in-vehicle terminal includes a vehicle identification code.
5. The control method according to claim 4, wherein the identification information of the in-vehicle terminal further includes account login information of a vehicle control application corresponding to the vehicle identification code.
6. The control method according to claim 3, wherein the identity information of the mobile terminal includes a user account identity;
The control method further comprises the step that the vehicle-mounted terminal loads vehicle setting parameters corresponding to the user account identity while unlocking the vehicle.
7. The control method according to claim 6, wherein the identification information of the mobile terminal further includes unlocking the identification information of the vehicle;
the control method further comprises the step that the vehicle-mounted terminal controls the vehicle to be unlocked after receiving the identification information for unlocking the vehicle.
8. The control method according to claim 6, wherein before loading the vehicle setting parameters corresponding to the user account identity, the vehicle-mounted terminal searches for the vehicle setting parameters corresponding to the user account identity;
And if the vehicle setting parameters corresponding to the user account identity are not searched, the vehicle-mounted terminal sends a request for storing the vehicle setting parameters generated when the vehicle is subjected to parameter setting.
9. The control method as set forth in claim 8, further comprising:
And if the vehicle-mounted terminal receives an instruction for storing the vehicle setting parameters generated when the vehicle is subjected to parameter setting, the vehicle-mounted terminal stores the vehicle setting parameters generated when the vehicle is subjected to parameter setting, and binds the vehicle setting parameters with the user account identity.
10. The control method as set forth in claim 8, further comprising:
And if the vehicle-mounted terminal receives an instruction that the vehicle setting parameters generated when the vehicle is subjected to parameter setting are not stored, the vehicle-mounted terminal does not store the vehicle setting parameters generated when the vehicle is subjected to parameter setting.
11. The control method of claim 1, wherein the security information further comprises a MAC address of the first terminal, and a MAC address and identification information of a second terminal, and further comprises at least one of a hash code, a cyclic authentication code, and a channel signal strength of the first terminal;
The second terminal is an opposite terminal of the first terminal for establishing Bluetooth connection.
12. The control method according to claim 1, wherein the security information is encrypted data at the time of broadcasting the broadcast data.
13. The control method of claim 1, wherein the first terminal uses the dedicated broadcast channel to broadcast the broadcast data when a distance from a second terminal is smaller than a preset threshold, wherein the second terminal is an opposite terminal to which the first terminal is to establish a Bluetooth connection.
14. The control method of claim 1, wherein the first terminal broadcasts the broadcast data using a general broadcast channel when the broadcast data is a second type of broadcast data.
15. A terminal, comprising:
A storage medium and a processor, the storage medium storing thereon a computer program to be executed by the processor, which when executed by the processor, causes the processor to execute the control method of the terminal according to any one of claims 1 to 14.
16. A vehicle, characterized by comprising:
a vehicle body;
An in-vehicle terminal provided on the vehicle body, the in-vehicle terminal being the terminal according to claim 15.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202311203629.1A CN118283584B (en) | 2023-09-15 | 2023-09-15 | Terminal control methods, terminals and vehicles |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202311203629.1A CN118283584B (en) | 2023-09-15 | 2023-09-15 | Terminal control methods, terminals and vehicles |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN118283584A CN118283584A (en) | 2024-07-02 |
| CN118283584B true CN118283584B (en) | 2026-02-10 |
Family
ID=91647532
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202311203629.1A Active CN118283584B (en) | 2023-09-15 | 2023-09-15 | Terminal control methods, terminals and vehicles |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN118283584B (en) |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2018000134A1 (en) * | 2016-06-27 | 2018-01-04 | 华为技术有限公司 | Bluetooth connection method and terminal |
| CN112449328A (en) * | 2019-08-30 | 2021-03-05 | 华为技术有限公司 | Bluetooth searching method, system and related device |
Family Cites Families (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN116489818A (en) * | 2022-01-14 | 2023-07-25 | Oppo广东移动通信有限公司 | Device connection method, device connection apparatus, device storage medium and chip |
-
2023
- 2023-09-15 CN CN202311203629.1A patent/CN118283584B/en active Active
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2018000134A1 (en) * | 2016-06-27 | 2018-01-04 | 华为技术有限公司 | Bluetooth connection method and terminal |
| CN112449328A (en) * | 2019-08-30 | 2021-03-05 | 华为技术有限公司 | Bluetooth searching method, system and related device |
Also Published As
| Publication number | Publication date |
|---|---|
| CN118283584A (en) | 2024-07-02 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN109842862B (en) | Establishing a secure short-range wireless communication connection in a vehicle | |
| US20180326947A1 (en) | Operating a key fob in a car sharing system | |
| CN110798795B (en) | Virtual key vehicle control system, method and device based on Bluetooth and computer equipment | |
| US10538220B1 (en) | User activated/deactivated short-range wireless communications (SRWC) auxiliary key fob | |
| CN107085870B (en) | Regulating vehicle access using encryption methods | |
| CN107650863B (en) | Vehicle sharing method and system | |
| EP3312060B1 (en) | Vehicle start method | |
| US9954851B2 (en) | Method for controlling vehicle security access based on certificate | |
| JP5999108B2 (en) | Vehicle remote operation information providing device, in-vehicle remote operation information acquisition device, and vehicle remote operation system including these devices | |
| US10377346B2 (en) | Anticipatory vehicle state management | |
| US9754431B2 (en) | Method and system for a key fob base station enabling remote car access using a nomadic device | |
| US9855918B1 (en) | Proximity confirming passive access system for vehicle | |
| JP5803724B2 (en) | Authentication system and authentication device | |
| US20200079322A1 (en) | User activated/deactivated key fob | |
| US11173802B2 (en) | Method for controlling a charging process of a vehicle at a charging post using first and second authorisation verification | |
| JP6696942B2 (en) | Vehicle security system and vehicle security method | |
| CN105376249B (en) | Vehicle-mounted information and entertainment system account logon method and mobile unit | |
| CN104363266A (en) | Remote vehicle control method, TSP (telematics service provider) backstage system and vehicular terminal | |
| US20200059787A1 (en) | Vehicle Smart Connection | |
| KR20190029920A (en) | Control system and control mehtod for vehicle | |
| CN107277033B (en) | Charging and battery replacing equipment and authentication method and system for object to be charged and battery replaced | |
| KR102503054B1 (en) | Electric vehicle wireless charging system | |
| CN105848092A (en) | Vehicle control method and device without keys | |
| CN114499999B (en) | Identity authentication methods, devices, platforms, vehicles, equipment and media | |
| CN118283584B (en) | Terminal control methods, terminals and vehicles |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant |