Disclosure of Invention
The invention aims to provide a physical key activation method, electronic equipment and a storage medium, wherein a physical key is used for being connected with a mobile terminal and a vehicle end, and the physical key is activated to replace a mobile phone digital key to control an automobile through cooperative confirmation of the mobile terminal, the vehicle end, the physical key end and a digital key server end, so that the problem that a user using a traditional physical key in habit is bad in experience caused by unaccustomed use of the mobile phone digital key is prevented.
In order to solve the technical problems, the embodiment of the invention provides a physical key activation method, which comprises the steps that a user sends an activation instruction to a target physical key which is successfully paired with a mobile terminal through the mobile terminal, a key downloading request is initiated by the target physical key to obtain a target key corresponding to the target physical key in response to the activation instruction, after the target key is obtained, the target physical key is paired with a target vehicle, the target vehicle writes the target physical key into a white list of the target vehicle, the target vehicle is a vehicle which is bound with the mobile terminal in advance, the target vehicle sends a control authority request to the target physical key, and the target physical key obtains and caches authority data corresponding to the control authority request from a digital key server and returns the authority data to the target vehicle at the same time, so that the activation of the target physical key is completed.
The embodiment of the application also provides electronic equipment, which comprises at least one processor and a memory, wherein the memory is in communication connection with the at least one processor;
Wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the physical key activation method as described above.
Embodiments of the present application also provide a computer readable storage medium storing a computer program which, when executed by a processor, implements a physical key activation method as described above.
The method comprises the steps of carrying out Bluetooth pairing on a mobile terminal and a target physical key to be activated, sending an activation instruction to the target physical key successfully paired with the mobile terminal through the mobile terminal, carrying out pairing connection on the target physical key and a target vehicle after key verification, writing the target physical key into a white list of the target physical key by the target vehicle so that the target physical key can access and acquire data of the target vehicle, sending a control authority request to the target physical key by the target vehicle, acquiring and caching authority data corresponding to the control authority request from a digital key server by the target physical key, returning the authority data to the target vehicle, and completing activation by the target physical key after the authority data are acquired by the target physical key. The activated physical key acquires the authority data corresponding to the control authority request, so that the specific function control on the target vehicle can be realized through the target physical key, and the specific function is a function corresponding to the control authority request and can be realized through the authority data. The physical key is activated through the scheme, and the physical key is connected with the vehicle end through the terminal, so that the activated physical key can replace the mobile phone digital key to realize the control of related functions of the automobile, and the problem that the experience is poor due to the fact that a user of the traditional physical key used to the mobile phone digital key is not used to the mobile phone digital key is prevented.
In some embodiments, before the mobile terminal sends the activation instruction to the target physical key successfully paired with the mobile terminal, the method further comprises the steps that the mobile terminal receives Bluetooth broadcasts of all physical keys in a preset range, one physical key is selected, the mobile terminal initiates an activation state inquiry request of the digital key of the target vehicle to the digital key server, and when the activation state is activated, bluetooth pairing connection is carried out between the target physical key and the mobile terminal.
In some embodiments, after the mobile terminal sends the activation instruction to the target physical key successfully paired with the mobile terminal, the method includes that the target physical key detects the self-electricity quantity, and if the self-electricity quantity is lower than a preset electricity quantity value, the target physical key stops activation and returns an activation failure message to the mobile terminal.
In some embodiments, after the mobile terminal sends the activation instruction to the target physical key successfully paired with the mobile terminal, the method includes that the target physical key judges whether the activation instruction is received for the first time, wherein the activation instruction at least comprises a user ID, if not, whether the activation instruction and the activation instruction received for the first time come from the same user is judged, and if not, the target physical key stops activation and returns an activation failure message to the mobile terminal.
In some embodiments, the target physical key initiates a key downloading request to obtain a target key corresponding to the target physical key, the method includes that the target physical key initiates the key downloading request to the mobile terminal, the mobile terminal forwards the key downloading request to the digital key server, the key downloading request carries information of the target physical key, the digital key server analyzes the key downloading request to determine the target key corresponding to the target physical key, a private key corresponding to the target physical key is used for signing and encrypting the target key to obtain an encryption key, the encryption key is returned to the target physical key, the target physical key decrypts and verifies the encryption key by using a public key stored in the target physical key, and the verification is passed to obtain the target key, wherein the private key and the public key are a group of public-private pairs which are generated in advance for the target physical key by the digital key.
In some embodiments, signing the target key as described above includes signing the target key using an elliptic curve digital signature algorithm.
In some embodiments, after the target physical key and the target vehicle are connected in a pairing manner, the method further comprises the steps that the target vehicle sends a version negotiation request to the target physical key, the target physical key returns ICCE protocol version information supported by the target physical key to the target vehicle according to the version negotiation request, if the target vehicle supports an ICCE protocol corresponding to the ICCE protocol version information, the target vehicle writes the target physical key into a white list of the target vehicle, and if the target vehicle does not support the ICCE protocol corresponding to the ICCE protocol version information, an activation failure message is returned to the mobile terminal.
In some embodiments, before the target vehicle writes the target physical key into the white list of the target vehicle, the target vehicle initiates an authentication request to the target physical key to request negotiation of a session key with the target physical key, the authentication request comprises a vehicle-end random number generated by the target vehicle and a frame number of the target vehicle, the target physical key forwards the authentication request to the mobile terminal, the mobile terminal generates a first terminal random number to generate a terminal session key and sends the terminal session key to the target vehicle, the target vehicle decrypts the terminal session key, compares the correctness of the vehicle-end random number to obtain a second terminal random number, generates a first verification value and a vehicle-end session key and sends the first verification value to the mobile terminal, the mobile terminal decrypts the vehicle-end session key to obtain the first verification value, generates a terminal hash value according to the first verification value and encrypts the first verification value to obtain a terminal encryption value and sends the terminal encryption value to the target vehicle, and the target vehicle decrypts the terminal hash value and sends the terminal hash value to the mobile terminal according to the comparison result.
In some embodiments, the target vehicle writing the target physical key into the white list of the target vehicle comprises the steps that the target vehicle initiates a white list request to the target physical key, the target physical key synchronizes the white list request to the mobile terminal, the mobile terminal sends the white list request to the digital key server, the digital key server returns signed white list data matched with the white list request according to the white list request and forwards the white list data to the target vehicle through the target physical key, the target vehicle checks the signed white list data, and the target physical key is written into the white list of the target vehicle after successful signature verification.
In some embodiments, the target physical key acquires and caches authority data corresponding to the control authority request from a digital key server and returns the authority data to the target vehicle, wherein the target physical key synchronizes the control authority request to the mobile terminal, the mobile terminal sends the control authority request to the digital key server, the digital key server returns the authority data matched with the control authority request to the mobile terminal according to the control authority request and forwards the authority data to the target physical key, the target physical key sends the authority data to the target vehicle, and simultaneously caches the authority data and updates the self-activation identification, and the authority data is data required by the target physical key for realizing control of the target vehicle for a specific function corresponding to the control authority request.
In some embodiments, the method further comprises the steps that the target physical key sends a message of successful activation to the mobile terminal as an activation result responding to the activation instruction, the mobile terminal reports the activation result to the digital key server, and the digital key server stores the activation state of the target physical key.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the following detailed description of the embodiments of the present application will be given with reference to the accompanying drawings. However, those of ordinary skill in the art will understand that in various embodiments of the present application, numerous technical details have been set forth in order to provide a better understanding of the present application. The claimed application may be practiced without these specific details and with various changes and modifications based on the following embodiments. The following embodiments are divided for convenience of description, and should not be construed as limiting the specific implementation of the present application, and the embodiments can be mutually combined and referred to without contradiction.
An embodiment of the present application relates to a physical key activation method, and it should be noted that the following details are provided for understanding, and are not necessary to implement the present embodiment.
Before specifically stating the scheme of the embodiment of the present application, the preconditions required before the implementation of the scheme will be explained first. The mobile phone digital key technology is combined with the software and hardware technology, so that a mobile phone (mobile terminal) has the function of a car key, and a car owner can control a car through the mobile phone to finish operations such as door opening, door closing and the like. Therefore, the owner needs to activate the mobile phone digital key before using the physical key activation method in the present solution to replace the mobile phone digital key with the target physical key. However, the present application is not limited in this regard, as different vehicle manufacturers may have different settings for the specific step of activating the digital key of the cell phone.
As shown in fig. 1, the physical key activation method according to the embodiment of the present invention specifically includes the following steps.
And 101, the user sends an activation instruction to a target physical key successfully paired with the mobile terminal through the mobile terminal.
The mobile terminal is an electronic device with a bluetooth function and capable of installing an application program, and may be a mobile phone, a tablet computer, etc., which is not particularly limited in the present application. The target physical key in the application is a physical Bluetooth key, such as Keyfob, a small hard disk device with a built-in verification mechanism.
Specifically, the mobile terminal sending the activation instruction needs to be pre-installed with a physical key management application program developed by a manufacturer of the target physical key successfully paired with the mobile terminal, wherein the application program is used for managing the life cycle of the target physical key, including creation, activation, use, logout and the like of the target physical key, and the target physical key is the physical key to be activated selected by a user. The user needs to log in the physical key management application program with the identity of the vehicle owner, an 'activation' button can be arranged in the physical key management application program, and the user can trigger sending an activation instruction to a target physical key successfully paired with the mobile terminal after clicking the button. It should be noted that, in this solution, the user is the owner of the target vehicle, the mobile terminal is the mobile phone used by the owner, and all actions executed by the mobile terminal in this solution are performed in the physical key management application program installed by the mobile terminal, which will not be described in detail below.
And starting timing at the moment when the user sends an activation instruction to the target physical key which is successfully paired with the mobile terminal, and if the activation success message returned by the target physical key is not received within the set time, judging that the activation fails, automatically ending the activation flow by the mobile terminal and sending an activation failure message prompt to the user. The specific setting of the specific set time may be determined according to the actual communication condition of the mobile terminal when the activation command is triggered, the network environment, and other factors, for example, 30s, 45s, 60s, 90s, 120s, 150s, and the like, which is not particularly limited in the present application.
Step 102, responding to the activation instruction, and initiating a key downloading request by the target physical key to acquire a target key corresponding to the target physical key.
Specifically, after the target physical key receives the activation instruction sent by the mobile terminal, an activation process is started. Firstly, a target physical key initiates a key downloading request to a mobile terminal so as to acquire a target key corresponding to the target physical key, and at the same time, the validity of an activation instruction of the mobile terminal is verified. After receiving the key downloading request, the mobile terminal can request the digital key server to download the target key and return the target physical key. The subsequent activation step can only be performed if the target physical key has obtained the corresponding target key.
Step 103, after the target key is obtained, the target physical key is in pairing connection with the target vehicle, and the target vehicle writes the target physical key into a white list of the target vehicle;
the target vehicle is a vehicle which is bound with the mobile terminal in advance.
Specifically, after the target physical key obtains the corresponding target key, the target physical key actively initiates pairing connection with the target vehicle, and the pairing mode may be performed by adopting a justwork pairing mode of bluetooth, which is not limited in this embodiment. It should be noted that, if the target vehicle is a vehicle that is bound to the mobile terminal in advance, and if the user is a vehicle owner of a plurality of vehicles, the mobile terminal binds the plurality of vehicles, and the user needs to select a specific vehicle in advance and then enter the activation step of the physical key after logging in the physical key management application program with the identity of the vehicle owner. For example, the mobile terminal of the user binds the vehicle a and the vehicle B together, when the user selects to log in the physical key management application program with the owner identity, the user needs to select to log in with the owner identity of the vehicle a or log in with the owner identity of the vehicle B, and if the user selects the vehicle a, the vehicle a is the target vehicle which is in pairing connection with the target physical key when the target physical key is activated subsequently. After the target physical key is in pairing connection with the target vehicle, the target vehicle writes the target physical key into a white list of the target vehicle, so that the target physical key can realize access to the target vehicle.
104, The target vehicle sends a control authority request to the target physical key, the target physical key acquires and caches authority data corresponding to the control authority request from the digital key server, and meanwhile, the authority data is returned to the target vehicle, so that the target physical key is activated.
Specifically, in order to achieve the purpose of performing function control on the target vehicle by using the target physical key instead of the mobile phone digital key, the target physical key has related data for performing specific function control on the target vehicle in addition to enabling the target physical key to access the target vehicle. Based on the purpose, the target vehicle sends a control authority request to the target physical key, the target physical key receives the control authority request and then forwards the control authority request to the digital key server (DIGITAL KEY SERVICE, DKS), the digital key server returns authority data corresponding to the control authority request to the target physical key, and the target physical key receives and caches the authority data and synchronously sends the authority data to the target vehicle. The permission data is the related data which can realize the specific function corresponding to the control permission request. At this point, the target physical key has already been able to achieve control of the target vehicle, i.e., it is representative that the target physical key has completed activation.
Compared with the related art, the method and the device have the advantages that Bluetooth pairing is conducted on the mobile terminal and the target physical key to be activated, an activation instruction is sent to the target physical key successfully paired with the mobile terminal through the mobile terminal, the target physical key is paired with the target vehicle after key verification, the target vehicle writes the target physical key into a white list of the target physical key, so that the target physical key can access and acquire data of the target vehicle, the target vehicle sends a control authority request to the target physical key, the target physical key acquires and caches authority data corresponding to the control authority request from the digital key server, meanwhile, the target physical key returns to the target vehicle, and activation is completed after the target physical key acquires the authority data. The activated physical key acquires the authority data corresponding to the control authority request, so that the specific function control on the target vehicle can be realized through the target physical key, and the specific function is a function corresponding to the control authority request and can be realized through the authority data. The physical key is activated through the scheme, and the physical key is connected with the vehicle end through the terminal, so that the activated target physical key can replace the mobile phone digital key to realize the control of related functions of the automobile, and the problem that the experience is poor due to the fact that a user of the traditional physical key used in habit is not used to the mobile phone digital key is prevented.
Another embodiment of the present invention relates to a physical key activation method, and the physical key activation method in the foregoing embodiment is supplemented, and specific details thereof are as follows.
In one example, as shown in fig. 2, before step 101, the method further includes the following steps:
Step 201, the mobile terminal receives bluetooth broadcast of all physical keys within a preset range, and selects one physical key as a target physical key.
Specifically, to make a bluetooth pairing connection with a mobile terminal, the physical key needs to be within the connectable range of the vehicle and the mobile terminal and at the same time turn on a connectable broadcast. The mobile terminal may receive all broadcasts within the connectable range, display a connectable list, from which the user selects one physical key to activate as the target physical key to be paired with the terminal.
Step 202, the mobile terminal initiates an activation state inquiry request of a digital key of a target vehicle to a digital key server.
Specifically, the activation state of the digital key of the target vehicle is stored in a Digital Key Server (DKS), and the target physical key can only re-etch the relevant functions of the mobile phone digital key to realize the control of the target vehicle when the digital key of the target vehicle (mobile phone digital key) is in the activated state.
And 203, when the activated state is activated, carrying out Bluetooth pairing connection on the target physical key and the mobile terminal.
Specifically, when the activation state of the digital key of the target vehicle is inquired to be activated, the target physical key can be in Bluetooth pairing connection with the mobile terminal to perform a subsequent target physical key activation step, and when the activation state of the digital key of the target vehicle is inquired to be not activated, the mobile terminal prompts a user that the user cannot be in pairing connection with the target physical key to perform the subsequent target physical key activation step.
In one example, after step 101, the method further includes the steps of detecting the self-power of the target physical key, and if the self-power is lower than a preset power value, stopping activation of the target physical key and returning an activation failure message to the mobile terminal.
Specifically, after the target physical key receives the activation instruction, whether the self electric quantity can meet the power consumption in the normal working state is detected. The preset electric quantity value which can meet the power consumption of the normal working state of the target physical key can be preset, the self electric quantity detected by the target physical key is compared with the preset electric quantity value, and if the self electric quantity detected by the target physical key is lower than the preset electric quantity value, the target physical key stops activating and returns an activation failure message to the mobile terminal. The preset electric quantity value can be set to be any electric quantity value in 1% -50%, such as 20%, 25%, 30%, 35% and the like, and the specific value can be determined according to the normal working state power consumption of the actual target physical key in the preset time, and the application is not particularly limited to the specific value.
In another example, after step 101, the method further includes the step of determining whether the target physical key receives the activation instruction for the first time, where the activation instruction at least includes a user ID;
if not, judging whether the activation instruction and the first received activation instruction come from the same user, and if not, stopping activating the target physical key and returning an activation failure message to the mobile terminal.
Specifically, if the target physical key can be successfully activated, the target physical key is required to be activated by the activation instruction received for the first time, or by the activation instruction sent by the same user and the activation instruction received for the user again. Therefore, the target physical key needs to judge whether the activation instruction is received for the first time after receiving the activation instruction, if so, each step of subsequent response to the activation instruction is executed, and if the target physical key does not receive the activation instruction for the first time, whether the activation instruction received for the first time and the activation instruction received in history come from the same user is judged. It should be noted that, because the activation instruction is sent, the user is required to log in the physical key management application program installed in the mobile terminal with the identity of the owner, and the activation instruction is triggered by the physical key management application program to send to the target physical key successfully paired with the mobile terminal. Therefore, when the activation instruction is sent, the logged-in user ID can be carried in the activation instruction, the target physical key can learn the user information of the activation instruction, and whether the user ID is from the same user can be judged by comparing the user ID carried in the activation instruction received at the time with the user information carried in the activation instruction received in history. And if the received activating instruction and the activating instruction received in the history are not from the same user, not allowing the other user to activate the target physical key again, and sending an activation failure prompt message to the mobile terminal.
Under the condition that other target physical keys and target vehicles can only be activated in a unique corresponding mode, the activation instruction comprises a frame number of the target vehicle in addition to the user ID, when the target physical key does not receive the activation instruction for the first time, whether the received activation instruction and the received activation instruction received in the history come from the same user or not needs to be judged, if so, whether the received activation instruction and the received activation instruction received in the history are the activation of the same vehicle by the same user or not needs to be judged, and the unique corresponding activation of one physical key and one vehicle can be ensured by verifying the user ID and the frame number. In addition, in consideration of different activation requirements, the activation instruction can also comprise a unique code of a target physical key besides the user ID and the frame number of the target vehicle, and the specific information contained in the activation instruction is not limited.
In one example, as shown in fig. 3, after the target physical key in step 102 initiates a key verification request to the mobile terminal, the method further includes the following steps:
Step 301, a target physical key initiates a key downloading request to a mobile terminal, the mobile terminal forwards the key downloading request to a digital key server, and the key downloading request carries identification information of the target physical key.
Specifically, when the mobile terminal receives a key download request of a target physical key, the key download request is forwarded to a digital key server storing the target key of the target physical key. The digital server analyzes the request, and can obtain the unique identification information, such as user ID, of the target physical key carried in the key downloading request, and determine the target key corresponding to the unique identification information according to the unique identification information of the target physical key.
Step 302, the digital key server analyzes the key downloading request to determine a target key corresponding to the target physical key, signs and encrypts the target key by using a private key corresponding to the target physical key to obtain an encryption key, and returns the encryption key to the target physical key.
Specifically, before the physical keys are activated, the digital key server generates a set of public and private key pairs for each physical key in advance in the crypto machine according to an ECC (Elliptic Curve Cryptography ) P256 algorithm, the private keys are stored in the digital key server, and the public keys are preset in the corresponding physical keys.
The key request sent by the target physical key to the mobile terminal can carry the unique identification information of the target physical key, and the mobile terminal forwards the key request to the digital key server. Similarly, the key stored in the digital key server may also have unique identification information for identifying the corresponding physical key, and the target key of the target physical key may be determined according to the parsed unique identification information. After the target key is determined, since the private key of the target physical key is stored in the digital key server in advance, the target key can be signed and encrypted by using the private key of the target physical key to obtain an encryption key, and the encryption key is returned to the target physical key. In particular, the target key may be signed using an elliptic curve digital signature algorithm (Elliptic Curve Digital Signature Algorith, ECDSA), which is not particularly limited by the present application.
And 303, decrypting the encryption key by using the public key stored in the target physical key, checking the signature, and obtaining the target key after the signature passes, wherein the private key and the public key are a group of public-private key pairs which are generated by the digital key server in advance for the target physical key.
Specifically, after the target key corresponding to the key download request is returned to the target physical key after being signed and encrypted, the public key belonging to the same public-private key pair as the private key for encrypting the target key is already preset inside the target physical key. Therefore, the encryption key is decrypted and checked by utilizing the public key stored in the target physical key, if the decryption and the check are successful, the public key in the target physical key and the private key for encrypting the key are proved to be the same public-private key pair, and the target key can be successfully obtained.
In one example, after the target physical key in step 102 is paired with the target vehicle, the method further includes the steps that the target vehicle sends a version negotiation request to the target physical key, the target physical key returns ICCE protocol version information supported by the target physical key to the target vehicle according to the version negotiation request, if the target vehicle supports an ICCE protocol corresponding to the ICCE protocol version information, the target vehicle writes the target physical key into a white list of the target vehicle, and if the target vehicle does not support the ICCE protocol corresponding to the ICCE protocol version information, an activation failure message is returned to the mobile terminal.
The ICCE (INTELLIGENT CAR Connectivity Industry Ecosystem Alliance, ecological alliance of the intelligent car co-production industry) is an open platform which is jointly manufactured by main stream manufacturers in the field of China intelligent terminals and automobiles, and has been developed into the largest industry alliance in the field of the domestic car co-production industry for years.
Specifically, since ICCE has been released from its birth, if a target physical key is required to control a target vehicle, the same ICCE protocol needs to be supported by both. Therefore, the target vehicle can send a version negotiation request to the target physical key to acquire the ICCE protocol version supported by the target physical key, and after acquiring the information, the target vehicle judges whether the target vehicle supports the ICCE protocol version supported by the target physical key. If the information is supported, the target vehicle writes the target physical key into a white list of the target vehicle, the target physical key can be communicated with the target vehicle later, and if the information is not supported, a message of activation failure is returned to the mobile terminal.
In addition, before the target vehicle writes the target physical key into a white list of the target vehicle, the method further comprises the steps that the target vehicle initiates an authentication request to the target physical key to request to negotiate a session key with the target physical key, the authentication request comprises a vehicle-end random number generated by the target vehicle and a frame number of the target vehicle, the target physical key forwards the authentication request to a mobile terminal, the mobile terminal generates a first terminal random number to generate a terminal session key and sends the terminal session key to the target vehicle, the target vehicle decrypts the terminal session key, compares the correctness of the vehicle-end random number to obtain a second terminal random number, generates a first verification value and a vehicle-end session key and sends the first verification value to the mobile terminal, the mobile terminal decrypts the vehicle-end session key to obtain a first verification value, generates a terminal hash value according to the first verification value and encrypts the terminal hash value and sends the terminal hash value to the target vehicle, and the target vehicle decrypts the terminal hash value to generate a vehicle-end hash value, and compares the terminal hash value and returns an authentication result according to a comparison result.
Specifically, the authentication and authentication are performed after version negotiation is completed, and the main process includes three steps, namely, a session material exchange process initiated by the target vehicle, a session key of the mobile terminal and the target vehicle will be calculated respectively after the exchange is completed, and a correctness stage for confirming the session key negotiation, and whether the authority of the current user is legal or not is judged at the stage. Thirdly, after authentication is completed, the target vehicle informs the mobile terminal of the current authentication result, so that the mobile terminal can carry out corresponding notification and the like on the user. That is, the authentication process between the target vehicle and the target physical key is to negotiate a session key and verify the validity of the session key. The method comprises the steps of receiving an authentication request from a target vehicle, wherein the authentication request comprises a vehicle-end random number generated by the target vehicle and a frame number of the target vehicle, forwarding the authentication request to a mobile terminal by a target physical key, generating a first terminal random number by the mobile terminal, generating a terminal session key by the mobile terminal and sending the terminal session key to the target vehicle, decrypting the terminal session key by the target vehicle, comparing the correctness of the vehicle-end random number to obtain a second terminal random number, generating a first verification value and the vehicle-end session key, and sending the first verification value and the vehicle-end session key to a session material exchange process initiated by the mobile terminal for the target vehicle. The terminal session key comprises a second key, wherein the second terminal random number and the vehicle-end random number are obtained by encrypting a target key of a target physical key, the vehicle-end random number and the first terminal random number. The target vehicle decrypts the terminal encryption hash value, simultaneously generates a vehicle end hash value by using the first verification value, compares the terminal hash value with the vehicle end hash value, and returns an authentication result as a second stage and a third stage process according to the comparison result. The vehicle-end session key comprises a first terminal random number, a second terminal random number and a first verification value. The mobile terminal calculates a vehicle end hash value according to the vehicle end random number and the first verification value, and the vehicle end calculates a terminal hash value according to the vehicle end random number and the first verification value.
In another example, the target vehicle in step 102 writes the target physical key to the white list of the target vehicle, specifically including the steps of:
The method comprises the steps that a target vehicle initiates a white list request to a target physical key, the target physical key synchronizes the white list request to a mobile terminal, the mobile terminal sends the white list request to a digital key server, the digital key server returns white list data matched with the white list request according to the white list request and forwards the white list data to the target physical key, and the target physical key synchronizes the white list data to the target vehicle, so that the target vehicle writes the target physical key into the white list of the target vehicle.
Specifically, the target physical key forwards the white list request to the digital key server through the mobile terminal, and the digital key server assembles and issues white list information according to the white list request and returns the white list information to the target physical key through the mobile terminal. The white list information issued contains information of the target vehicle, and the white list information can be signed at the digital key server before being issued. After the target vehicle receives the white list information issued by the digital key server, the white list information is checked, and if the check is successful, the target physical key is successfully written into the white list of the target vehicle. If the signature verification fails, the process is terminated, and a message of activation failure is returned.
In yet another example, the target physical key in step 103 obtains and caches rights data corresponding to the control rights request from the digital key server, and returns rights data to the target vehicle, including:
the target physical key synchronizes the control authority request to the mobile terminal, and the mobile terminal sends the control authority request to the digital key server; the digital key server returns the authority data matched with the control authority request to the mobile terminal according to the control authority request, and the mobile terminal forwards the authority data to the target physical key;
the permission data is data required by the target physical key to control the target vehicle for a specific function corresponding to the control permission request.
Specifically, after the target vehicle writes the target physical key into the white list of the target vehicle, the target vehicle sends a control authority request to the target physical key, wherein the control authority request comprises a personalized data request and a calibration data request, the personalized data request is used for requesting authority for opening a specific function, and the calibration data request is used for requesting specific data required for realizing the specific function. The specific functions comprise at least one of vehicle unlocking, locking, vehicle window opening and closing, vehicle air conditioner inside, approaching unlocking, vehicle locking and the like, and all functions which can be realized by the mobile phone digital key can be realized by the target physical key.
The digital key server returns right data matched with the control right request to the mobile terminal according to the control right request, wherein the right data comprises personalized data requested by the personalized data request and calibration data requested by the calibration data request. After the target physical key caches the permission data and the target vehicle also receives the permission data, the target physical key can control the target vehicle according to the specific function corresponding to the control permission request, such as controlling at least one function of unlocking and locking the target vehicle, opening and closing a vehicle window, an air conditioner in the vehicle, approaching and unlocking, locking off the vehicle and the like. The target physical key updates its own activation identification, which is the frame number (vin) of the target vehicle, while the target physical key caches the rights data.
On the basis, the target physical key sends a message of successful activation to the mobile terminal as an activation result responding to the activation instruction, the mobile terminal reports the activation result to the digital key server, and the digital key server stores the activation state of the target physical key.
Another embodiment of the invention is directed to an electronic device, as shown in fig. 4, comprising at least one processor 402, and a memory 401 communicatively coupled to the at least one processor 402, wherein the memory 401 stores instructions executable by the at least one processor 402, the instructions being executable by the at least one processor 402 to enable the at least one processor 402 to perform an embodiment of any one of the physical key activation methods described above.
Where memory 401 and processor 402 are connected by a bus, the bus may comprise any number of interconnected buses and bridges, the buses connecting together one or more of the processor 402 and the various circuits of the memory 401. The bus may also connect various other circuits such as peripherals, voltage regulators, and power management circuits, which are well known in the art, and therefore, will not be described any further herein. The bus interface provides an interface between the bus and the transceiver. The transceiver may be one element or may be a plurality of elements, such as a plurality of receivers and transmitters, providing a means for communicating with various other apparatus over a transmission medium. The data processed by the processor 402 is transmitted over a wireless medium via an antenna, which in turn receives the data and transmits the data to the processor 402.
The processor 402 is responsible for managing the bus and general processing and may also provide various functions including timing, peripheral interfaces, voltage regulation, power management, and other control functions. And memory 401 may be used to store data used by processor 402 in performing operations. The electronic device in this embodiment may be a physical key, a mobile phone terminal, or the like, and the present application is not particularly limited thereto.
Another embodiment of the present invention relates to a computer-readable storage medium storing a computer program. Embodiments of any of the physical key activation methods described above are implemented when a computer program is executed by a processor.
That is, it will be understood by those skilled in the art that all or part of the steps in implementing the methods of the embodiments described above may be implemented by a program stored in a storage medium, where the program includes several instructions for causing a device (which may be a single-chip microcomputer, a chip or the like) or a processor (processor) to perform all or part of the steps in the methods of the embodiments of the application. The storage medium includes a U disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, an optical disk, or other various media capable of storing program codes.
It will be understood by those of ordinary skill in the art that the foregoing embodiments are specific examples of carrying out the invention and that various changes in form and details may be made therein without departing from the spirit and scope of the invention.