Method and system for remotely logging in vehicle-mounted system on the basis of user permission
An in-vehicle system and remote login technology, applied in the field of smart cars, can solve the problems of smart car safety impact and low safety factor of smart cars.
Inactive Publication Date: 2018-10-02
FJ MOTOR GRP YUDO NEW ENERGY AUTOMOBILE CO LTD
6 Cites 2 Cited by
AI-Extracted Technical Summary
Problems solved by technology
[0003] To this end, it is necessary to provide a method and system for remotely logging in to the vehicle system based on user rights, so as to solve the impact on the security ...
Method used
In the present embodiment, in order to further ensure the safety of remote login, wherein, in step S120, the judgment of the authority of the user ID by the vehicle-mounted system specifically includes the following steps: if the user ID has the owner autho...
Abstract
The invention relates to a method and a system for remotely logging in a vehicle-mounted system on the basis of user permission. The method comprises the following steps that: a mobile terminal sendsuser login request information to the vehicle-mounted system, wherein the user login request information comprises a user ID (Identity); after the vehicle-mounted system receives the user login request information, according to the permission of the user ID, whether the user ID can log in or not is judged, if the user ID can log in, login permission information is sent to the mobile terminal, andif the user ID can not log in, the user ID can not be permitted to log in; and after the mobile terminal receives the login permission information, the mobile terminal permits the user ID to log in the vehicle-mounted system. According to user ID permission, whether a user can remotely log in the vehicle-mounted system or not is judged, and the vehicle use safety of the user ID can be guaranteed.
Application Domain
Digital data authenticationBuying/selling/leasing transactions
Technology Topic
In vehicleUser identifier +1
Image
Examples
- Experimental program(1)
Example Embodiment
[0031] In order to describe in detail the technical content, structural features, achieved objectives and effects of the technical solution, the following detailed descriptions are given in conjunction with specific embodiments and accompanying drawings.
[0032] Please refer to 1. The method for remotely logging in to the vehicle-mounted system based on user authority in this embodiment includes the following steps:
[0033] Step S110: The mobile terminal sends user login request information to the in-vehicle system, the user login request information includes the user ID; when the user remotely logs in to the in-vehicle system of the car through the mobile terminal, the mobile terminal sends the user login request information to the in-vehicle system through The user login request information requests a login from the vehicle-mounted system, where the user login request information includes the user ID.
[0034] Step S120: After the in-vehicle system receives the user login request information, it judges whether the user ID can log in according to the authority of the user ID. If the user ID can log in, it sends the login permission information to the mobile terminal. If not, the login permission information is not allowed. User ID login; when the vehicle system receives the user login request information, it responds to the user login request information and determines whether the user can log in to the vehicle system. The vehicle system determines whether the user ID can be performed by the authority of the user ID Login; when the in-vehicle system determines that the user ID can log in to the in-vehicle system, the in-vehicle system sends login permission information to the mobile terminal, allowing the mobile terminal to log in to the in-vehicle system through the user ID; if the in-vehicle system determines that the user ID does not have permission to log in to the in-vehicle system The in-vehicle system does not allow the user ID to log in.
[0035] Step S130: After the mobile terminal receives the login permission information, the mobile terminal allows the user ID to log in to the in-vehicle system. After the mobile terminal receives the login permission information, the user ID can be authorized by the vehicle system to remotely log in to the vehicle system, and the user can use the mobile terminal to remotely log in to the vehicle terminal through the user ID.
[0036] When the user remotely logs in to the in-vehicle system of the smart car through the mobile terminal, the mobile terminal sends the user login request information to the in-vehicle system. When the in-vehicle system receives the user login request information, it is based on the user ID authority in the user login request information Determine whether the user ID can log in. When it is determined that the user can log in, the vehicle system sends login permission information to the mobile terminal. After the mobile terminal receives the login permission information, the mobile terminal allows the user to remotely log in to the vehicle system through the user ID. , And when the in-vehicle system determines that the user ID is not allowed to log in, the user cannot log in with the user ID through the mobile terminal. By judging whether the user can remotely log in to the in-vehicle system according to the user ID authority, the user ID is guaranteed to use the vehicle Security.
[0037] In this embodiment, in order to further ensure the security of remote login, the determination of the authority of the user ID by the in-vehicle system in step S120 specifically includes the following steps: if the user ID has the authority of the vehicle owner, the user ID is allowed to log in; If the user ID is not authorized by the car owner, the user ID is not allowed to log in. It is restricted that only the user ID of the owner of the vehicle can log in remotely through the mobile terminal, which ensures the safety of the vehicle.
[0038] In other embodiments, in order to facilitate the login of other users, step S120 specifically includes: if the user ID has the owner authority, then the user ID is allowed to log in; if the user ID is not the owner authority, the user ID is retrieved from the database If the user ID has the login permission, the user ID is allowed to log in, if not, the user ID is not allowed to log in. When the in-vehicle system detects that the user ID is the owner's authority, it directly determines that the user ID can remotely log in to the in-vehicle system, and the in-vehicle system sends login permission information to the mobile terminal, allowing the user ID to remotely log in to the in-vehicle system through the mobile terminal; If the user ID is not authorized by the car owner, the user ID will be retrieved from the database according to the user ID. If the user ID has the login authorization, the user is allowed to log in, and the vehicle system will send login authorization information to the mobile terminal to permit the user ID. The user ID is used to remotely log in to the vehicle system through the mobile terminal; if the user does not have the login permission or the permission data of the user ID is not stored in the database, the user ID is not allowed to log in, which is convenient for other users to log in. Increase the security of the remote login of the vehicle.
[0039] In this embodiment, the user ID may have been logged in on other vehicles, and the user ID needs to be logged out of the user ID in other vehicles, which causes trouble for the user. In order to solve this problem, the "based on user ID Permission to determine whether the user ID can log in, if the user ID can log in”, it also includes the following steps: detecting whether the user ID is logged in on other vehicles; if it is checked that the user ID is logged in on other vehicles, the user ID is already in The login information of other vehicles is returned to the mobile terminal, otherwise the login permission information is directly sent to the mobile terminal. When the user performs remote login to the vehicle, when the vehicle’s vehicle system determines that the user ID has the vehicle system to log in to the vehicle system, it will again determine whether the user ID is logged in on another vehicle. If it is detected that the user ID is already in another vehicle Log in on the vehicle, the information that the user ID has been logged in in other vehicles is returned to the mobile terminal, if it is detected that the user ID is not logged in in other vehicles, the login permission information is directly sent to the mobile terminal; when the mobile terminal receives After the user ID has been logged in to other vehicles, a corresponding response will be made according to the authority of the user ID. If the authority of the user ID is the authority of the owner, log out the user ID from other vehicles and use the user ID Log in; if the authority of the user ID is not the authority of the car owner, directly use the user ID to log in. There is no need to log out of the user ID in other vehicles. This solves the problem that when the user ID is logged in in other vehicles, and the user ID needs to be logged out of the user ID in other vehicles, the user is troublesome to use, and the illegal user ID is avoided. Invasion.
[0040] See figure 2 In another embodiment, a system for remotely logging in to an in-vehicle system based on user permissions includes an in-vehicle system 220 and a mobile terminal 210;
[0041] The mobile terminal 210 establishes a communication connection with a vehicle-mounted terminal;
[0042] The mobile terminal 210 is configured to send user login request information to the in-vehicle system 220, the user login request information includes a user ID, and after receiving the login permission information, log in to the in-vehicle system 220 through the mobile terminal 210;
[0043] The in-vehicle system 220 is configured to, after receiving the user login request information, determine whether the user ID can log in according to the authority of the user ID, if the user ID can log in, send login permission information to the mobile terminal 210, if not, then The user ID is not allowed to log in.
[0044] When the user remotely logs in to the in-vehicle system 220 of the smart car through the mobile terminal 210, the mobile terminal 210 sends the user login request information to the in-vehicle system 220. When the in-vehicle system 220 receives the user login request information, it will be based on the user login request information. The user ID of the user ID is authorized to determine whether the user ID can log in. When it is determined that the user can log in, the in-vehicle system 220 sends login permission information to the mobile terminal 210. After the mobile terminal 210 receives the login permission information, the mobile terminal 210 allows the user The user ID is used to remotely log in to the in-vehicle system 220, and when the in-vehicle system 220 determines that the user ID is not allowed to log in, the user cannot log in using the user ID through the mobile terminal 210, and judges whether the user is based on the user ID authority. The vehicle system 220 can be remotely logged in to ensure the safety of the user ID using the vehicle.
[0045] In this embodiment, in order to further ensure the security of remote login, the in-vehicle system 220 is specifically configured to determine whether the user ID can log in according to the authority of the user ID, and if the user ID has the authority of the car owner, the user ID is allowed to log in ; If the user ID is not authorized by the car owner, the user ID is not allowed to log in. It is restricted that the user ID with only the authority of the vehicle owner can log in remotely through the mobile terminal 210, which ensures the safety of vehicle use.
[0046] In other embodiments, in order to facilitate the login of other users, the in-vehicle system 220 is specifically configured to determine whether the user ID can log in according to the authority of the user ID, and if the user ID has the authority of the car owner, the user ID is allowed to log in; if The user ID is a non-car owner authority, and the authority of the user ID is retrieved from the database. If the user ID has the login authority, the user ID is allowed to log in; if not, the user ID is not allowed to log in. When the in-vehicle system 220 detects that the user ID is the owner's authority, it directly determines that the user ID can remotely log in to the in-vehicle system 220, then the in-vehicle system 220 sends login permission information to the mobile terminal 210, allowing the user ID to remotely log in through the mobile terminal 210 Vehicle system 220; if it is determined that the user ID is not the owner authority, the user ID authority is retrieved in the database according to the user ID, if the user ID has the login authority, the user is allowed to log in, and the vehicle system 220 sends the mobile terminal 210 sends login permission information to allow the user ID to remotely log in to the vehicle system 220 through the mobile terminal 210; if the user does not have the login permission or the permission data of the user ID is not stored in the database, the user ID is not allowed to log in , Which can facilitate other users to log in, while increasing the security of the vehicle's remote login.
[0047] In this embodiment, the user ID may have been logged in on other vehicles, and the user ID needs to be logged out of the user ID in other vehicles, which causes trouble for the user. In order to solve this problem, the in-vehicle system 220 also uses To detect whether the user ID is logged in on other vehicles; if it is checked that the user ID is logged in on other vehicles, return the information that the user ID has been logged in to other vehicles to the mobile terminal 210, otherwise directly send the login permission information to the mobile terminal 210. When a user remotely logs in to the vehicle, when the vehicle’s on-board system 220 determines that the user ID has the on-board system 220 logging in to the in-vehicle system 220, it again determines whether the user ID is logged in on another vehicle. If the user ID is detected If you have logged in on another vehicle, return the information that the user ID has been logged in in another vehicle to the mobile terminal 210. If it is detected that the user ID has not logged in in another vehicle, then directly send the login permission information to the mobile terminal 210 The mobile terminal 210 is also used to receive the information that the user ID has been logged in other vehicles, and make a corresponding response according to the authority of the user ID, if the authority of the user ID is the authority of the owner, then the user ID Log out from other vehicles and log in with the user ID; if the user ID is not authorized by the owner, log in directly with the user ID. There is no need to log out of the user ID in other vehicles. This solves the problem that when the user ID is logged in in other vehicles, and the user ID needs to be logged out of the user ID in other vehicles, the user is troublesome to use, and the user ID is notified to increase The security of login to avoid illegal intrusion of illegal user ID.
[0048] It should be noted that although the foregoing embodiments have been described in this article, the scope of patent protection of the present invention is not limited thereby. Therefore, based on the innovative concept of the present invention, changes and modifications to the embodiments described herein, or equivalent structures or equivalent process transformations made by using the description and drawings of the present invention, directly or indirectly apply the above technical solutions In other related technical fields, they are all included in the scope of patent protection of the present invention.
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.