Unlock instant, AI-driven research and patent intelligence for your innovation.

Anti-theft method and system for cloud computing vehicle

An anti-theft method and cloud computing technology, applied in anti-theft vehicle accessories, vehicle parts, transportation and packaging, etc., can solve the problems of cracking and the security is not as safe as imagined, and achieve the effect of reducing theft cases and improving the difficulty.

Active Publication Date: 2020-08-11
UNIVERSAL GLOBAL TECH KUNSHAN
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when a Bluetooth mobile phone is set to detectable mode, it will send a signal indicating that it can perform two-way data transmission after pairing with another Bluetooth device, but an attacker who receives this signal can also try to pair to steal Fixed personal identification code, and then crack the car anti-theft system, so the existing car anti-theft system controlled by Bluetooth mobile phone is not as safe as imagined

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-theft method and system for cloud computing vehicle
  • Anti-theft method and system for cloud computing vehicle
  • Anti-theft method and system for cloud computing vehicle

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The implementation of the "cloud computing carrier anti-theft method and system" disclosed in the present invention is described below through specific specific examples. Those skilled in the art can understand the advantages and effects of the present invention from the content disclosed in this specification. The present invention can be implemented or applied through other different specific embodiments, and the details in this specification can also be modified and changed based on different viewpoints and applications without departing from the concept of the present invention. In addition, the drawings of the present invention are only for simple illustration, and are not drawn according to the actual size, which is stated in advance. The following embodiments will further describe the relevant technical content of the present invention in detail, but the disclosed content is not intended to limit the protection scope of the present invention.

[0019] It should b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cloud computing carrier anti-theft method. When the carrier is switched to a power-on mode from a flameout mode, whether a network signal request for authentication exists ornot is judged; if yes, a transmission control unit is switched to a locking mode; and if not, the transmission control unit is switched to a normal mode. In the locking mode, a vehicle-mounted control module transmits the authentication request to a remote authentication management system via a vehicle-mounted wireless transmission module. The remote authentication management system transmits a first authentication code to a corresponding handheld device. The handheld device transmits a second authentication code to the remote authentication management system within a predetermined time. Andwhether the second authentication code is the same as the first authentication code is judged, if so, the authentication is considered successful, and the transmission control unit is switched to a normal mode; and if not, the authentication fails, and the transmission control unit is switched to the locking mode. Therefore, the cloud computing carrier anti-theft method provides an effective anti-theft mechanism which is low in cost and high in elasticity, so that the carrier stealing difficulty is improved, and the occurrence of stealing cases is reduced.

Description

technical field [0001] The invention relates to a vehicle anti-theft method and system, in particular to a cloud computing vehicle anti-theft method and system. Background technique [0002] Existing car anti-theft system inventions often use specially designed smart keys, which usually integrate various wireless communication transmission technologies. Some patented inventions must also design an LCD screen on the key to achieve more complex human-computer interaction. environment, driving verification and anti-theft purposes. However, the overly complicated hardware and software design on the key will inevitably increase the manufacturing cost significantly, and the wireless communication with the vehicle must be customized (to prevent being skimmed). This type of key is also durable in the daily use of actual consumers. big test. [0003] Therefore, combining the car anti-theft system with the bluetooth mobile phone becomes the solution of the above-mentioned smart key....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): B60R25/20
CPCB60R25/2018B60R2325/202B60R2325/205
Inventor 吴执维陈贵深
Owner UNIVERSAL GLOBAL TECH KUNSHAN