Method for securely connecting vehicle and bluetooth key, and bluetooth module and bluetooth key

ABSTRACT

The present invention relates to a method for securely connecting a vehicle and a Bluetooth key, a vehicle Bluetooth module and a Bluetooth key. The method comprises: when a vehicle Bluetooth module successfully establishes a Bluetooth communication connection with a mobile terminal installed with a Bluetooth key, the vehicle Bluetooth module receiving an authentication request from the Bluetooth key, wherein an authentication manner of the authentication request is simple authentication or common authentication; when the authentication manner of the authentication request is simple authentication, the vehicle Bluetooth module performing security authentication on the Bluetooth key according to the simple authentication manner, and sending an authentication result to the Bluetooth key; and when the authentication result indicates that authentication fails, or the authentication manner of the authentication request is common authentication, the vehicle Bluetooth module performing security authentication on the Bluetooth key according to the common authentication manner.

RELATED APPLICATIONS

This application is a 371 of International Application No.PCT/CN2021/096711, filed May 28, 2021, which is based upon and claimspriority to Chinese Patent Application CN202010584034.5, “Method forSecurely Connecting Vehicle and Bluetooth Key, and Bluetooth Module andBluetooth Key”, filed Jun. 24, 2020, the entire contents of which areincorporated herein by reference.

TECHNICAL FIELD

The invention relates to the technical field of vehicle communication,in particular to a method for securely connecting vehicle and Bluetoothkey, and Bluetooth module and Bluetooth key.

BACKGROUND

At present, the mobile phone Bluetooth key on the market has anon-inductive function, that is, when the mobile phone is close to thevehicle, the mobile phone Bluetooth and the car end are automaticallyconnected. However, due to many connection technologies used, they areconnected first and then do the security authentication. The time foreach security authentication is too long, resulting in the finalrecognition of the mobile phone taking too long. When the user arrivesat the car with the mobile phone, the mobile phone still cannot connectto the car, and the user experience is not good.

SUMMARY

The present invention aims to provide a method for securely connecting avehicle with a Bluetooth key, a Bluetooth module for a vehicle, and aBluetooth key.

In a first aspect, an embodiment of the present invention provides amethod for securely connecting a vehicle and a Bluetooth key, comprises:

when a vehicle Bluetooth module successfully establishes a Bluetoothcommunication connection with a mobile terminal installed with aBluetooth key, the vehicle Bluetooth module receives an authenticationrequest from the Bluetooth key, wherein the authentication manner of theauthentication request is a simple authentication or an commonauthentication;

When the authentication manner of the authentication request is thesimple authentication, the vehicle Bluetooth module performs securityauthentication on the Bluetooth key according to the simpleauthentication manner, and sends the authentication result to theBluetooth key;

When the authentication result is authentication passed, the vehicleBluetooth module is securely connected with the Bluetooth key;

when the authentication result indicates that authentication fails, orthe authentication manner of the authentication request is commonauthentication, the vehicle Bluetooth module performs securityauthentication with the Bluetooth key according to the commonauthentication manner.

In some embodiments, the vehicle Bluetooth module performs securityauthentication on the Bluetooth key according to the simpleauthentication manner, comprises:

the vehicle Bluetooth module determines whether there is a keywhitelist;

If there is a key whitelist, the vehicle Bluetooth module obtains thedevice information of the currently connected mobile terminal, anddetermines whether there is a digital key matching the deviceinformation in the key whitelist;

If there is a digital key matching the device information in the keywhitelist, the vehicle Bluetooth module verifies the digital keyaccording to a preset verification rule, and determines whether thesecurity authentication is passed according to the verification result.

In some embodiments, the vehicle Bluetooth module performs securityauthentication with the Bluetooth key according to the commonauthentication manner, comprises:

The vehicle Bluetooth module sends a first feature value and a firstrandom number to the Bluetooth key, and receives a second feature value,a second random number, and key authority data configured to generatethe digital key sent by the Bluetooth key;

The vehicle Bluetooth module receives a first encrypted feature valuesent by the Bluetooth key, and performs key authentication on theBluetooth key according to the first feature value, the key authoritydata, and the first encrypted feature value;

After the key authentication is passed, the vehicle Bluetooth modulegenerates a session key according to the first random number and thesecond random number;

Wherein, the first encrypted feature value is obtained by encrypting thefirst feature value by the Bluetooth key according to the digital keydownloaded from the server; the second feature value and the digital keyare configured for the Bluetooth key to perform key authentication onthe vehicle Bluetooth module; When both the vehicle Bluetooth module andthe Bluetooth key pass the key authentication of each other and thesession key is successfully generated, the vehicle Bluetooth module andthe Bluetooth key are securely connected.

In some embodiments, the vehicle Bluetooth module receives a firstencrypted feature value sent by the Bluetooth key, and performs keyauthentication on the Bluetooth key according to the first featurevalue, the key authority data, and the first encrypted feature value,comprises:

The vehicle Bluetooth module generates a digital key according to thekey authority data, and receives the first encrypted feature value sentby the Bluetooth key;

The vehicle Bluetooth module decrypts the first encrypted feature valueaccording to the generated digital key to obtain a first verificationfeature value, and determines whether the key authentication is passedaccording to the matching result between the first verification featurevalue and the first feature value;

The vehicle Bluetooth module encrypts the second feature value accordingto the generated digital key to obtain a second encrypted feature value,and sends the second encrypted feature value to the Bluetooth key;wherein the second encrypted feature value, the second feature value andthe digital key downloaded from the server by the Bluetooth key areconfigured for the Bluetooth key to perform key authentication on thevehicle Bluetooth module.

In some embodiments, the vehicle Bluetooth module performs securityauthentication with the Bluetooth key according to the commonauthentication manner, further comprises:

When the vehicle Bluetooth module and the Bluetooth key are successfullyauthenticated according to the common authentication manner,

If there is no key whitelist, the vehicle Bluetooth module generates akey whitelist, and stores the digital key in the key whitelist;

Or, if there is a key whitelist and there is no digital key matching thedevice information in the key whitelist, the vehicle Bluetooth modulestores the digital key in the key whitelist;

Or, if there is a key whitelist and there is a digital key matching thedevice information in the key whitelist, the vehicle Bluetooth modulereplaces the digital key matching the device information in the keywhitelist with the generated digital key;

In a second aspect, an embodiment of the present invention provides amethod for securely connecting a vehicle and a Bluetooth key, comprises:

When a mobile terminal installed with a Bluetooth key and a vehicleBluetooth module successfully establish a Bluetooth connection, theBluetooth key obtains the security information of the mobile terminal,and determines the authentication manner of the security authenticationaccording to the security information; wherein the authentication manneris simple authentication or common authentication;

The Bluetooth key generates an authentication request according to thedetermined authentication manner, and sends the authentication requestto the vehicle Bluetooth module;

When the authentication manner of the authentication request is simpleauthentication, the Bluetooth key receives the authentication resultreturned by the vehicle Bluetooth module; the authentication request isconfigured for the vehicle Bluetooth module to perform securityauthentication on the Bluetooth key according to the simple method;

When the authentication result is authentication passed, the Bluetoothkey is securely connected with the vehicle Bluetooth module;

when the authentication result indicates that authentication fails, orthe authentication manner of the authentication request is commonauthentication, the Bluetooth key performs security authentication withthe vehicle Bluetooth module according to the common authenticationmanner.

In some embodiments, the security information includes device changeinformation of the mobile terminal, user change information, digital keychange information and time information when the user logs in theBluetooth key;

When the device change information of the mobile terminal, user changeinformation, digital key change information and the time informationwhen the user logs in the Bluetooth key meet the preset securityconditions, the Bluetooth key determines that the authentication mannerof the security authentication is the simple authentication; when thedevice change information of the mobile terminal, user changeinformation, digital key change information and the time informationwhen the user logs in the Bluetooth key do not meet the preset securityconditions, the Bluetooth key determines that the authentication mannerof security authentication is the ordinary authentication.

In some embodiments, when the authentication manner of theauthentication request is the simple authentication, the authenticationrequest is In particular configured for the vehicle Bluetooth module toobtain the digital key that matches the device information from the keywhitelist according to the device information, and verify the digitalkey for simple authentication of the Bluetooth key.

In some embodiments, the Bluetooth key performs security authenticationwith the vehicle Bluetooth module according to the common authenticationmanner, comprises:

The vehicle Bluetooth key sends a key download request to the server,and receives the digital key returned by the server;

The Bluetooth key sends a second characteristic value, a second randomnumber, and key authority data for generating the digital key to thevehicle Bluetooth module, and receives a first characteristic value anda first random number sent by the vehicle Bluetooth module;

The Bluetooth key encrypts the first feature value according to thedownloaded digital key to obtain the first encrypted feature value, andsends the first encrypted feature value to the vehicle Bluetooth module;

The Bluetooth key receives the second encrypted feature value sent bythe vehicle Bluetooth module, and decrypts the second feature valueaccording to the digital key to obtain the second verification featurevalue;

The Bluetooth key determines whether the key authentication of thevehicle Bluetooth module is passed according to the matching resultbetween the second verification feature value and the second featurevalue;

The Bluetooth key generates a session key according to the first randomnumber and the second random number;

Wherein, the first feature value, the key authority data, and the firstencryption feature value are configured for the vehicle Bluetooth moduleto perform key authentication on the Bluetooth key according to thecommon authentication manner; the second encryption feature value isconfigured for the vehicle Bluetooth module to generates a digital keyaccording to the key authority data, and encrypts the second featurevalue according to the generated digital key; when the Bluetooth key andthe vehicle Bluetooth module pass the key authentication of each otheraccording to the common authentication manner and the session key issuccessfully generated, the Bluetooth key is securely connected with thevehicle Bluetooth module.

In a third aspect, an embodiment of the present invention provides acomputer-readable storage medium having stored therein instructionsthat, when executed by a processor of a device, causes the device toperform a method for generating driving suggestions, the methodcomprises: when a vehicle Bluetooth module successfully establishes aBluetooth communication connection with a mobile terminal installed witha Bluetooth key, the vehicle Bluetooth module receives an authenticationrequest from the Bluetooth key, wherein the authentication manner of theauthentication request is a simple authentication or an commonauthentication; When the authentication manner of the authenticationrequest is the simple authentication, the vehicle Bluetooth moduleperforms security authentication on the Bluetooth key according to thesimple authentication manner, and sends the authentication result to theBluetooth key; When the authentication result is authentication passed,the vehicle Bluetooth module is securely connected with the Bluetoothkey; When the authentication result indicates that authentication fails,or the authentication manner of the authentication request is commonauthentication, the vehicle Bluetooth module performs securityauthentication with the Bluetooth key according to the commonauthentication manner.

Other features and advantages of the present invention will be describedin the following description and will be apparent partly from thedescription, or will be understood by implementing the embodiments ofthe present invention. The objectives and other advantages of theinvention may be realized and attained by the structure particularlypointed out in the description, claims and drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

In order to explain the technical solutions of the embodiments of thepresent invention or the prior art more clearly, the following willbriefly introduce the drawings that need to be used in the descriptionof the embodiments or the prior art. Obviously, the drawings in thefollowing description are only some embodiments of the presentinvention. For those of ordinary skill in the art, without any creativework, other drawings can be obtained according to these drawings.

FIG. 1 is a schematic flowchart of a method for securely connecting avehicle and a Bluetooth key according to the first embodiment of thepresent invention.

FIG. 2 is a schematic flowchart of the initial Bluetooth connectionbetween the vehicle Bluetooth module and the Bluetooth key of the mobileterminal.

FIG. 3 is a specific schematic flowchart of security authenticationperformed by a Bluetooth key and a vehicle Bluetooth module according toa simple authentication manner.

FIG. 4 is a specific schematic flowchart of security authenticationperformed by a Bluetooth key and a vehicle Bluetooth module according toa common authentication manner.

FIG. 5 is a schematic diagram of a system framework of a vehicleBluetooth module according to the second embodiment of the presentinvention.

FIG. 6 is a schematic flowchart of a method for securely connecting avehicle and a Bluetooth key according to the third embodiment of thepresent invention.

FIG. 7 is a schematic diagram of a system framework of a Bluetooth keyaccording to the embodiment four of the present invention.

DETAILED DESCRIPTION

Various exemplary embodiments, features and aspects of the presentdisclosure will be described in detail below with reference to theaccompanying drawings. The same reference numbers in the figures denoteelements that have the same or similar functions. Although variousaspects of the embodiments are shown in the drawings, the drawings arenot necessarily drawn to scale unless otherwise indicated.

In addition, in order to better illustrate the present invention,numerous specific details are given in the following specificembodiments. It will be understood by those skilled in the art that thepresent invention may be practiced without certain specific details. Insome instances, means well known to those skilled in the art have notbeen described in detail in order not to obscure the subject matter ofthe present invention.

Refer to FIG. 1 , an embodiment of the present invention provides amethod for securely connecting a vehicle and a Bluetooth key, includingthe following steps S11˜S14:

Step S11, when a vehicle Bluetooth module successfully establishes aBluetooth communication connection with a mobile terminal installed witha Bluetooth key, the vehicle Bluetooth module receives an authenticationrequest from the Bluetooth key, wherein the authentication manner of theauthentication request is a simple authentication or an commonauthentication;

In particular, the Bluetooth key is generally an APP, that is, anapplication program. The method in this embodiment is suitable for thescenario where the mobile terminal and the vehicle Bluetooth module havesuccessfully established a Bluetooth communication connection at leastonce. If the mobile terminal and the vehicle Bluetooth module areconnected for the first time, then it is necessary to manually operatethe Bluetooth key of the mobile terminal to complete the Bluetoothconnection and pairing operation between the mobile terminal and thevehicle Bluetooth module. When the connection and pairing is successful,the mobile terminal and the vehicle Bluetooth module will record theirpairing status respectively. The next time the mobile terminal and thevehicle Bluetooth module are close to each other to a certain range andthe both Bluetooth switches are turned on, the Bluetooth connectionoperation will be completed automatically.

Wherein, the mobile terminal includes, but is not limited to, a mobilesmart terminal such as a mobile phone, a tablet computer, and a smartbracelet.

This embodiment proposes a security authentication manner combiningsimple authentication and common authentication, and the simpleauthentication manner is used first for security authentication. TheSimple authentication means that the vehicle Bluetooth module performsone-way authentication on the Bluetooth key of the mobile terminalaccording to the preset authentication rules, and when the informationsecurity situation in the mobile terminal does not meet the requirementsof simple authentication, or when the simple authentication manner forsecurity authentication fails, the common authentication manner is usedto conduct the two-way authentication between the vehicle Bluetoothmodule and the Bluetooth key of the mobile terminal.

It can be understood that the specific authentication rules of thesimple authentication manner and the common authentication manner inthis embodiment can be specifically configured. As long as thecharacteristics that the common authentication manner is morecomplicated but also safer than the simple authentication manner aresatisfied, the purpose and effect of this embodiment can be achieved.

Step S12, when the authentication manner of the authentication requestis the simple authentication, the vehicle Bluetooth module performssecurity authentication on the Bluetooth key according to the simpleauthentication manner, and sends the authentication result to theBluetooth key;

In particular, the authentication result is authentication passed orauthentication failed.

Step S13, when the authentication result is authentication passed, thevehicle Bluetooth module is securely connected with the Bluetooth key;

Step S14, when the authentication result indicates that authenticationfails, or the authentication manner of the authentication request iscommon authentication, the vehicle Bluetooth module performs securityauthentication with the Bluetooth key according to the commonauthentication manner.

In particular, the selection of the authentication manner in thisembodiment needs to be confirmed by both the vehicle Bluetooth moduleand the Bluetooth key. When either party determines to adopt the commonauthentication manner for safety authentication, the currentauthentication manner is determined to be the common authenticationmanner. Only when both parties decide to use the simple authenticationmanner for security authentication, the current authentication manner isdetermined as the simple authentication manner. It can be understoodthat the process of determining the security authentication manner isthe authentication manner negotiation process.

Among them, the flow of the initial Bluetooth connection between thevehicle Bluetooth module and the Bluetooth key of the mobile terminal,can be seen in FIG. 2 .

In summary, the method of this embodiment adopts a securityauthentication manner combining simple authentication and commonauthentication, and adopts different security authentication mannersaccording to different security states, which can ensure the safetywhile also ensuring the stability of the connection and improve theconnection speed between the vehicle and the Bluetooth key.

In a specific embodiment, in the Step S12, the vehicle Bluetooth moduleperforms security authentication on the Bluetooth key according to thesimple authentication manner, including the following steps:

Step S121, the vehicle Bluetooth module determines whether there is akey whitelist;

In particular, the key whitelist refers to the list in which one or moredigital keys are stored. Each digital key in the key whitelist isassociated with and matched with the device information of a mobileterminal. In particular, the device information can be the MAC addressof the mobile terminal and other information that can identify themobile terminal. It can be understood that when the vehicle terminaldoes not have any matching digital keys, there is no key whitelist.

Step S122, if there is a key whitelist, the vehicle Bluetooth moduleobtains the device information of the currently connected mobileterminal, and determines whether there is a digital key matching thedevice information in the key whitelist;

In particular, when it is determined that there is a key whitelist atthe vehicle side, it is further necessary to determine whether there isa digital key matching the device information in the key whitelist. Itcan be understood that the digital key that can be matched here can beconsidered to have been used at least once, the security is high, butthe verification of the digital key is also required.

Step S123, if there is a digital key matching the device information inthe key whitelist, the vehicle Bluetooth module verifies the digital keyaccording to a preset verification rule, and determines whether thesecurity authentication is passed according to the verification result.

In particular, in the step, the digital key obtained by the search isverified according to the preset verification rules, and theverification content includes but is not limited to the valid time andauthority of the digital key. It can be understood that the verificationof the digital key is to verify the correctness of the key data, and theverification method can be specifically limited according to the actualsecurity requirements.

In particular, the specific process for the authentication of thevehicle Bluetooth module according to the simple method can be referredto FIG. 3 .

In a specific embodiment, in the step S14, the vehicle Bluetooth moduleperforms security authentication with the Bluetooth key according to acommon authentication manner, including the following steps:

Step S141, the vehicle Bluetooth module sends a first feature value anda first random number to the Bluetooth key, and receives a secondfeature value, a second random number, and key authority data configuredto generate the digital key sent by the Bluetooth key;

In particular, when the vehicle Bluetooth module negotiates with theBluetooth key and determines to use the common method for securityauthentication, it means that there is no digital key in the vehicleBluetooth module or there is a security problem with the digital key,and it is necessary to re-update the digital key and perform securityauthentication. The Bluetooth key therefore initiates a digital keydownload request to the server that provides the digital key. Afterreceiving the digital key download request, the server verifies thedownload authority of the Bluetooth key according to the digital keydownload request. After the verification is passed, it returns thedigital key to the Bluetooth key, at this time, the Bluetooth keycompletes the download of the digital key. It can be understood thatthere are many ways for the server to verify the download authority, forexample, determining whether the user change information of theBluetooth key is a registered account, which is not specifically limitedin this embodiment.

Among them, the Bluetooth key, after downloading the digital key,processes the digital key to obtain key authority data that can be usedto generate the digital key. Of course, the key authority data forgenerating the digital key can also be directly provided by the server.The vehicle Bluetooth module on the vehicle side that the key authoritydata is used for can generate the same digital key as the digital keydownloaded by the Bluetooth key according to the key authority data.

In particular, the vehicle side also stores a corresponding algorithmthat can be used to generate the digital key according to the keyauthority data. The specific content of the algorithm is not limited toa certain one, as long as the vehicle Bluetooth module can generate thesame digital key as the digital key downloaded by the Bluetooth keyaccording to the key authority data provided by the Bluetooth key.

In the step, the vehicle Bluetooth module generates a first featurevalue and a first random number, and sends them to the Bluetooth key,and the Bluetooth key generates a second feature value and a secondrandom number, and sends the second feature value, the second randomnumber and the key authority data configured to generate the digital keysent by the Bluetooth key to the vehicle Bluetooth module, at this time,the exchange of identity feature values between the two parties iscompleted.

Step S142, the vehicle Bluetooth module receives a first encryptedfeature value sent by the Bluetooth key, and performs key authenticationon the Bluetooth key according to the first feature value, the keyauthority data, and the first encrypted feature value; wherein, thefirst encrypted feature value is obtained by encrypting the firstfeature value by the Bluetooth key according to the digital keydownloaded from the server; the second feature value and the digital keydownloaded by the Bluetooth key from the server are configured for theBluetooth key to perform key authentication on the vehicle Bluetoothmodule;

In particular, the digital key downloaded by the Bluetooth key from theserver in the step is a key, and the Bluetooth key can encrypt the firstfeature value according to the preset encryption algorithm and the keyto obtain the first encrypted feature value.

Step S143, after the key authentication is passed, the vehicle Bluetoothmodule generates a session key according to the first random number andthe second random number;

Wherein, when both the vehicle Bluetooth module and the Bluetooth keypass the key authentication of each other and the session key issuccessfully generated, the vehicle Bluetooth module and the Bluetoothkey are securely connected.

In particular, when the vehicle Bluetooth module passes the keyauthentication of the Bluetooth key, the vehicle Bluetooth modulefurther conducts session key negotiation with the Bluetooth key. Inparticular, a session is generated according to the first random numberand the second random number exchanged by the two parties. The generatedsession key is a dynamic key, which is only used for the session betweenthe two parties during the current connection.

Among them, one end of the Bluetooth key performs key authentication onthe vehicle Bluetooth module according to the second feature value andthe downloaded digital key. Similarly, when the key authentication ofthe Bluetooth key to the vehicle Bluetooth module is passed, the sessionkey negotiation is further performed with the vehicle Bluetooth module.The same session key is generated according to the first random numberand the second random number exchanged by both parties.

In a specific embodiment, the step S142 specifically includes:

Step S1421, the vehicle Bluetooth module generates a digital keyaccording to the key authority data, and receives the first encryptedfeature value sent by the Bluetooth key;

In detail, the vehicle Bluetooth module generates a digital keyaccording to the key authority data and the preset algorithm, and thedigital key generated by the vehicle Bluetooth module should beconsistent with the digital key downloaded from the server by theBluetooth key.

Step S1422, the vehicle Bluetooth module decrypts the first encryptedfeature value according to the generated digital key to obtain a firstverification feature value, and determines whether the keyauthentication is passed according to the matching result between thefirst verification feature value and the first feature value;

In particular, the vehicle Bluetooth module decrypts the first encryptedfeature value according to the generated digital key and the presetdecryption algorithm to obtain the first verification feature value, andfinally determine whether the key authentication of the Bluetooth key ispassed according to the matching result of the first verificationfeature value and the first feature value. In detail, when the firstverification feature value is consistent with the first feature value,the key authentication of the Bluetooth key by the vehicle Bluetoothmodule is passed, and when the first verification feature value isinconsistent with the first feature value, the key authentication of theBluetooth key by the vehicle Bluetooth module fails.

Step S1423, the vehicle Bluetooth module encrypts the second featurevalue according to the generated digital key to obtain a secondencrypted feature value, and sends the second encrypted feature value tothe Bluetooth key; wherein the second encrypted feature value, thesecond feature value and the digital key downloaded from the server bythe Bluetooth key are configured for the Bluetooth key to perform keyauthentication on the vehicle Bluetooth module.

In particular, the vehicle Bluetooth module encrypts the second featurevalue according to the generated digital key and the preset encryptionalgorithm to obtain the second encryption feature value. After receivingthe second encryption feature value, the Bluetooth key decrypts thesecond encryption feature value according to the digital key (key)downloaded from the server and the preset decryption algorithm to obtainthe second verification feature value, and compares the secondverification feature value with the second feature value previouslyreceived from the vehicle Bluetooth module. When the second verificationfeature value is consistent with the second feature value, the keyauthentication of the Bluetooth key to the vehicle Bluetooth module ispassed, and when the second verification feature value is inconsistentwith the second feature value, the key authentication of the Bluetoothkey to the vehicle Bluetooth module fails.

It should be noted that the preset encryption algorithm and presetdecryption algorithm used by the vehicle Bluetooth module and theBluetooth key are the same, so that the data obtained by the encryptionand decryption of the two are consistent. The specific contents of thepreset encryption algorithm and the preset decryption algorithm are notlimited.

In particular, the specific process of the vehicle Bluetooth moduleperforming security authentication on the Bluetooth key according to thecommon authentication manner can be referred to FIG. 4 .

In a specific embodiment, the vehicle Bluetooth module performs securityauthentication with the Bluetooth key according to a commonauthentication manner, iand also updates the digital key, whichspecifically includes:

When the vehicle Bluetooth module and the Bluetooth key are successfullyauthenticated according to the common authentication manner, the digitalkey at this time should be based on the latest digital key downloadedfrom the server by the Bluetooth key.

If there is no key whitelist, the vehicle Bluetooth module generates akey whitelist, and stores the digital key in the key whitelist, andestablishes a matching relationship between the digital key and thedevice information of the currently connected mobile terminal.

Or, if there is a key whitelist and there is no digital key matching thedevice information in the key whitelist, the vehicle Bluetooth modulestores the digital key in the key whitelist, and establishes a matchingrelationship between the digital key and the device information of thecurrently connected mobile terminal.

Or, if there is a key whitelist and there is a digital key matching thedevice information in the key whitelist, the vehicle Bluetooth modulereplaces the digital key matching the device information in the keywhitelist with the generated digital key, and establishes a matchingrelationship between the digital key and the device information of thecurrently connected mobile terminal.

In particular, in this embodiment, different methods for updating thedigital key are adopted according to different failure reasons in theprocess of safety authentication of the vehicle Bluetooth module by thevehicle Bluetooth module according to the simple authentication manner.

By applying the method of the first embodiment, the connection betweenthe vehicle Bluetooth module and the Bluetooth key can be stable and notrestricted by the mobile terminal, the security authentication time isfast and sufficient security is ensured, the connection is fast, and theconnection can be achieved in seconds.

Embodiment 2

Referring to FIG. 5 , an embodiment of the present invention provides avehicle Bluetooth module, which is configured to perform the steps ofthe method described in the embodiment 1 above, including:

A request receiving unit 11, configured for the vehicle Bluetooth moduleto receive an authentication request from the Bluetooth key when avehicle Bluetooth module successfully establishes a Bluetoothcommunication connection with a mobile terminal installed with aBluetooth key, wherein the authentication manner of the authenticationrequest is a simple authentication or an common authentication;

A simple authentication unit 12, configured for the vehicle Bluetoothmodule to perform security authentication on the Bluetooth key accordingto the simple authentication manner, and send the authentication resultto the Bluetooth key when the authentication manner of theauthentication request is the simple authentication; Wherein, when theauthentication result is authentication passed, the vehicle Bluetoothmodule is securely connected with the Bluetooth key;

A common authentication unit 13, configured to for the vehicle Bluetoothmodule to perform security authentication with the Bluetooth keyaccording to the common authentication manner when the authenticationresult indicates that authentication fails, or the authentication mannerof the authentication request is common authentication.

The system embodiments described above are only illustrative, whereinthe units described as separate components may or may not be physicallyseparated, and the components shown as units may or may not be physicalunits, that is, they may be located in one place, or it can bedistributed over multiple network elements. Some or all of the modulesmay be selected according to actual needs to achieve the purpose of thesolution in this embodiment.

It should be noted that the system described in the second embodimentabove corresponds to the method described in the first embodiment above.Therefore, the undescribed part of the system described in the secondembodiment above can be obtained by referring to the content of themethod described in the first embodiment above, which will not berepeated here.

Moreover, if the system of the second embodiment is implemented in theform of software functional units and sold or used as an independentproduct, it can be stored in a computer-readable storage medium.

In particular, the computer-readable storage medium may include: anyentity or device capable of carrying the computer program code, arecording medium, a USB flash drive, a removable hard disk, a magneticdisk, an optical disk, a computer memory, a read-only memory (ROM,Read-Only Memory), random access memory (RAM, Random Access Memory),electric carrier signal, telecommunication signal and softwaredistribution medium, etc.

Embodiment 3

Refer to FIG. 6 , the third embodiment of the present invention providesa method for securely connecting a vehicle and a Bluetooth key,including the following steps S21˜S25:

Step S21, when a mobile terminal installed with a Bluetooth key and avehicle Bluetooth module successfully establish a Bluetooth connection,the Bluetooth key obtains the security information of the mobileterminal, and determines the authentication manner of the securityauthentication according to the security information; wherein theauthentication manner is simple authentication or common authentication;

In particular, the Bluetooth key is generally an APP. The method in thisembodiment is suitable for the scenario where the mobile terminal andthe vehicle Bluetooth module have successfully established a Bluetoothcommunication connection at least once. If the mobile terminal and thevehicle Bluetooth module are connected for the first time, then It isnecessary to manually operate the Bluetooth key of the mobile terminalto complete the Bluetooth connection and pairing operation between themobile terminal and the vehicle Bluetooth module. When the connectionand pairing is successful, the mobile terminal and the vehicle Bluetoothmodule will record their pairing status respectively. The next time themobile terminal and the vehicle Bluetooth module are close to each otherto a certain range and the both Bluetooth switches are turned on, theBluetooth connection operation will be completed automatically.

Wherein, the mobile terminal includes, but is not limited to, a mobilesmart terminal such as a mobile phone, a tablet computer, and a smartbracelet.

This embodiment proposes a security authentication manner combiningsimple authentication and common authentication, and the simpleauthentication manner is used first for security authentication. TheSimple authentication means that the vehicle Bluetooth module performsone-way authentication on the Bluetooth key of the mobile terminalaccording to the preset authentication rules, and when the informationsecurity situation in the mobile terminal does not meet the requirementsof simple authentication, or when the simple authentication manner forsecurity authentication fails, the common authentication manner is usedto conduct the two-way authentication between the vehicle Bluetoothmodule and the Bluetooth key of the mobile terminal.

It can be understood that the specific authentication rules of thesimple authentication manner and the common authentication manner inthis embodiment can be specifically configured. As long as thecharacteristics that the common authentication manner is morecomplicated but also safer than the simple authentication manner aresatisfied, the purpose and effect of this embodiment can be achieved.

Step S22, the Bluetooth key generates an authentication requestaccording to the determined authentication manner, and sends theauthentication request to the vehicle Bluetooth module;

Step S23, when the authentication manner of the authentication requestis simple authentication, the Bluetooth key receives the authenticationresult returned by the vehicle Bluetooth module; the authenticationrequest is configured for the vehicle Bluetooth module to performsecurity authentication on the Bluetooth key according to the simplemethod;

In particular, the authentication result is authentication passed orauthentication failed.

Step S24, when the authentication result is authentication passed, theBluetooth key is securely connected with the vehicle Bluetooth module;

Step S25, when the authentication result indicates that authenticationfails, or the authentication manner of the authentication request iscommon authentication, the Bluetooth key performs securityauthentication with the vehicle Bluetooth module according to the commonauthentication manner.

In particular, the selection of the authentication manner in thisembodiment needs to be confirmed by both the vehicle Bluetooth moduleand the Bluetooth key. When either party determines to adopt the commonauthentication manner for safety authentication, the currentauthentication manner is determined to be the common authenticationmanner. Only when both parties decide to use the simple authenticationmanner for security authentication, the current authentication manner isdetermined as the simple authentication manner. It can be understoodthat the process of determining the security authentication manner isthe authentication manner negotiation process.

Among them, the flow of the initial Bluetooth connection between thevehicle Bluetooth module and the Bluetooth key of the mobile terminal,can be seen in FIG. 2 .

In summary, the method of this embodiment adopts a securityauthentication manner combining simple authentication and commonauthentication, and adopts different security authentication mannersaccording to different security states, which can ensure the safetywhile also ensuring the stability of the connection and improve theconnection speed between the vehicle and the Bluetooth key.

In a specific embodiment, the security information includes devicechange information of the mobile terminal, user change information,digital key change information and time information when the user logsin the Bluetooth key;

When the device change information of the mobile terminal, user changeinformation, digital key change information and the time informationwhen the user logs in the Bluetooth key meet the preset securityconditions, the Bluetooth key determines that the authentication mannerof the security authentication is the simple authentication; when thedevice change information of the mobile terminal, user changeinformation, digital key change information and the time informationwhen the user logs in the Bluetooth key do not meet the preset securityconditions, the Bluetooth key determines that the authentication mannerof security authentication is the ordinary authentication.

In particular, when any one of the mobile terminal device information,user information, key data, etc. is changed, the preset securityconditions are not met. In addition, when the user has not logged in tothe Bluetooth key App for a long time, the preset security conditionsare also not met. Otherwise, the preset safety conditions are met. Ascan be appreciated, the time of logging into the Bluetooth key App canbe set by user themselves.

Of course, in addition to the security information listed above, othersecurity factors of the mobile terminal may be included.

In a specific embodiment, when the authentication manner of theauthentication request is the simple authentication, the authenticationrequest is In particular configured for the vehicle Bluetooth module toobtain the digital key that matches the device information from the keywhitelist according to the device information, and verify the digitalkey for simple authentication of the Bluetooth key.

In particular, the vehicle Bluetooth module performs securityauthentication on the Bluetooth key according to the simpleauthentication manner, including the following steps:

the vehicle Bluetooth module determines whether there is a keywhitelist;

In particular, the key whitelist refers to the list in which one or moredigital keys are stored. Each digital key in the key whitelist isassociated with and matched with the device information of a mobileterminal. In particular, the device information can be the MAC addressof the mobile terminal and other information that can identify themobile terminal. It can be understood that when the vehicle terminaldoes not have any matching digital keys, there is no key whitelist.

If there is a key whitelist, the vehicle Bluetooth module obtains thedevice information of the currently connected mobile terminal, anddetermines whether there is a digital key matching the deviceinformation in the key whitelist;

In particular, when it is determined that there is a key whitelist atthe vehicle side, it is further necessary to determine whether there isa digital key matching the device information in the key whitelist. Itcan be understood that the digital key that can be matched here can beconsidered to have been used at least once, the security is high, butthe verification of the digital key is also required.

If there is a digital key matching the device information in the keywhitelist, the vehicle Bluetooth module verifies the digital keyaccording to a preset verification rule, and determines whether thesecurity authentication is passed according to the verification result.

In particular, in the step, the digital key obtained by the search isverified according to the preset verification rules, and theverification content includes but is not limited to the valid time andauthority of the digital key. It can be understood that the verificationof the digital key is to verify the correctness of the key data, and theverification method can be specifically limited according to the actualsecurity requirements.

In particular, the specific process for the authentication of thevehicle Bluetooth module according to the simple method can be referredto FIG. 3 .

In a specific embodiment, the Bluetooth key performs securityauthentication with the vehicle Bluetooth module according to the commonauthentication manner, including:

Step S251, the vehicle Bluetooth key sends a key download request to theserver, and receives the digital key returned by the server;

In particular, when the vehicle Bluetooth module negotiates with theBluetooth key and determines to use the common method for securityauthentication, it means that there is no digital key in the vehicleBluetooth module or there is a security problem with the digital key,and it is necessary to re-update the digital key and perform securityauthentication. The Bluetooth key therefore initiates a digital keydownload request to the server that provides the digital key. Afterreceiving the digital key download request, the server verifies thedownload authority of the Bluetooth key according to the digital keydownload request. After the verification is passed, it returns thedigital key to the Bluetooth key, at this time, the Bluetooth keycompletes the download of the digital key. It can be understood thatthere are many ways for the server to verify the download authority, forexample, determining whether the user information of the Bluetooth keyis a registered account, which is not specifically limited in thisembodiment.

Among them, the Bluetooth key, after downloading the digital key,processes the digital key to obtain key authority data that can be usedto generate the digital key. Of course, the key authority data forgenerating the digital key can also be directly provided by the server.The vehicle Bluetooth module on the vehicle side that the key authoritydata is used for can generate the same digital key as the digital keydownloaded by the Bluetooth key according to the key authority data.

In particular, the vehicle side also stores a corresponding algorithmthat can be used to generate the digital key according to the keyauthority data. The specific content of the algorithm is not limited toa certain one, as long as the vehicle Bluetooth module can generate thesame digital key as the digital key downloaded by the Bluetooth keyaccording to the key authority data provided by the Bluetooth key.

Step S252, the Bluetooth key sends a second characteristic value, asecond random number, and key authority data for generating the digitalkey to the vehicle Bluetooth module, and receives a first characteristicvalue and a first random number sent by the vehicle Bluetooth module;

In particular, in the step, the Bluetooth key generates a second featurevalue and a second random number, and sends the second feature value,the second random number and the key authority data configured togenerate the digital key sent by the Bluetooth key to the vehicleBluetooth module, the vehicle Bluetooth module generates a first featurevalue and a first random number, and sends them to the Bluetooth key, atthis time, the exchange of identity feature values between the twoparties is completed.

Step S253, the Bluetooth key encrypts the first feature value accordingto the downloaded digital key to obtain the first encrypted featurevalue, and sends the first encrypted feature value to the vehicleBluetooth module;

In particular, the digital key downloaded by the Bluetooth key from theserver in the step is a key, and the Bluetooth key can encrypt the firstfeature value according to the preset encryption algorithm and the keyto obtain the first encrypted feature value.

Step S254, the Bluetooth key receives the second encrypted feature valuesent by the vehicle Bluetooth module, and decrypts the second featurevalue according to the digital key to obtain the second verificationfeature value;

In detail, the vehicle Bluetooth module generates a digital keyaccording to the key authority data and the preset algorithm, and thedigital key generated by the vehicle Bluetooth module should beconsistent with the digital key downloaded from the server by theBluetooth key. The vehicle Bluetooth module encrypts the second featurevalue according to the generated digital key and the preset encryptionalgorithm to obtain the second encryption feature value. After receivingthe second encryption feature value, the Bluetooth key decrypts thesecond encryption feature value according to the digital key (key)downloaded from the server and the preset decryption algorithm to obtainthe second verification feature value.

Step S255, the Bluetooth key determines whether the key authenticationof the vehicle Bluetooth module is passed according to the matchingresult between the second verification feature value and the secondfeature value;

In particular, the Bluetooth key compares the second verificationfeature value with the second feature value previously received from thevehicle Bluetooth module. When the second verification feature value isconsistent with the second feature value, the key authentication of theBluetooth key to the vehicle Bluetooth module is passed, and when thesecond verification feature value is inconsistent with the secondfeature value, the key authentication of the Bluetooth key to thevehicle Bluetooth module fails.

Step S256, the Bluetooth key generates a session key according to thefirst random number and the second random number;

Wherein, the first feature value, the key authority data, and the firstencrypted feature value are configured for the vehicle Bluetooth moduleto perform key authentication on the Bluetooth key according to a commonauthentication manner; In particular, the vehicle Bluetooth moduledecrypts the first encrypted feature value according to the generateddigital key and the preset decryption algorithm to obtain the firstverification feature value, and finally determine whether the keyauthentication of the Bluetooth key is passed according to the matchingresult of the first verification feature value and the first featurevalue. In detail, when the first verification feature value isconsistent with the first feature value, the key authentication of theBluetooth key by the vehicle Bluetooth module is passed, and when thefirst verification feature value is inconsistent with the first featurevalue, the key authentication of the Bluetooth key by the vehicleBluetooth module fails.

It should be noted that the preset encryption algorithm and presetdecryption algorithm used by the vehicle Bluetooth module and theBluetooth key are the same, so that the data obtained by the encryptionand decryption of the two are consistent. The specific contents of thepreset encryption algorithm and the preset decryption algorithm are notlimited.

Wherein, when both the Bluetooth key and the vehicle Bluetooth modulepass the key authentication of each other according to the commonauthentication manner and the session key is successfully generated, theBluetooth key and the vehicle Bluetooth module and the vehicle Bluetoothmodule are securely connected.

Wherein, the specific process of the Bluetooth key performing securityauthentication with the vehicle Bluetooth module according to the commonauthentication manner can be referred to FIG. 4 .

In particular, the method described in third embodiment abovecorresponds to the method described in first embodiment above. Themethod described in third embodiment above is an authentication processdescribed with a Bluetooth key as the subject, and the method describedin first embodiment above is an authentication process described withthe vehicle Bluetooth module as the subject. Therefore, the relateddescriptions of the method described in the third embodiment and themethod described in the first embodiment can be referred to each otherto better explain the concept of the present application.

Embodiment 4

Referring to FIG. 7 , the fourth embodiment of the present inventionprovides a Bluetooth key, which is configured to perform the steps ofthe method described in the third embodiment above, including:

An authentication manner determination unit 21, configured to obtain thesecurity information of the mobile terminal, and determine theauthentication manner of the security authentication according to thesecurity information when a mobile terminal installed with a Bluetoothkey and a vehicle Bluetooth module successfully establish a Bluetoothconnection; wherein the authentication manner is simple authenticationor common authentication;

An authentication request generating unit 22, configured for theBluetooth key to generate an authentication request according to thedetermined authentication manner, and send the authentication request tothe vehicle Bluetooth module;

An authentication result receiving unit 23, configured for the Bluetoothkey to receive the authentication result returned by the vehicleBluetooth module when the authentication manner of the authenticationrequest is simple authentication; Wherein, the authentication request isconfigured for the vehicle Bluetooth module to perform securityauthentication on the Bluetooth key according to the simple method; whenthe authentication result is that the authentication is passed, theBluetooth key is securely connected with the vehicle Bluetooth module;

A common authentication unit 24, configured for the Bluetooth key toperform security authentication with the vehicle Bluetooth moduleaccording to the common authentication manner when the authenticationresult indicates that authentication fails, or the authentication mannerof the authentication request is common authentication.

The system embodiments described above are only illustrative, whereinthe units described as separate components may or may not be physicallyseparated, and the components shown as units may or may not be physicalunits, that is, they may be located in one place, or it can bedistributed over multiple network elements. Some or all of the modulesmay be selected according to actual needs to achieve the purpose of thesolution in this embodiment.

It should be noted that the system described in the fourth embodimentabove corresponds to the method described in the third embodiment above.Therefore, the undescribed part of the system described in the fourthembodiment above can be obtained by referring to the content of themethod described in the third embodiment above, which will not berepeated here.

Moreover, if the system of the fourth embodiment is implemented in theform of software functional units and sold or used as an independentproduct, it can be stored in a computer-readable storage medium.

In particular, the computer-readable storage medium may include: anyentity or device capable of carrying the computer program code, arecording medium, a USB flash drive, a removable hard disk, a magneticdisk, an optical disk, a computer memory, a read-only memory (ROM,Read-Only Memory), random access memory (RAM, Random Access Memory),electric carrier signal, telecommunication signal and softwaredistribution medium, etc.

Various embodiments of the present invention have been described above,and the foregoing descriptions are exemplary, not exhaustive, and notlimiting of the disclosed embodiments. Numerous modifications andvariations will be apparent to those skilled in the art withoutdeparting from the scope and spirit of the described embodiments. Theterminology used herein was chosen to best explain the principles of thevarious embodiments, the practical application or technical improvementin the marketplace, or to enable others of ordinary skill in the art tounderstand the various embodiments disclosed herein.

1. A method for securely connecting a vehicle and a Bluetooth key,comprises: Receiving, by the vehicle Bluetooth module, an authenticationrequest from the Bluetooth key, wherein the authentication manner of theauthentication request is a simple authentication or an commonauthentication when a vehicle Bluetooth module successfully establishesa Bluetooth communication connection with a mobile terminal installedwith a Bluetooth key; Performing, by the vehicle Bluetooth module,security authentication on the Bluetooth key according to the simpleauthentication manner, and sending the authentication result to theBluetooth key when the authentication manner of the authenticationrequest is the simple authentication; Securely connecting, by thevehicle Bluetooth module, with the Bluetooth key when the authenticationresult is authentication passed; Performing, by the vehicle Bluetoothmodule, security authentication with the Bluetooth key according to thecommon authentication manner when the authentication result indicatesthat authentication fails, or the authentication manner of theauthentication request is common authentication.
 2. The method forsecurely connecting a vehicle with a Bluetooth key according to claim 1,wherein performing, by the vehicle Bluetooth module, securityauthentication on the Bluetooth key according to the simpleauthentication manner, comprises: Determining, by the vehicle Bluetoothmodule, whether there is a key whitelist; Obtaining, by the vehicleBluetooth module, the device information of the currently connectedmobile terminal if there is a key whitelist, and determining whetherthere is a digital key matching the device information in the keywhitelist; Verifying, by the vehicle Bluetooth module, the digital keyaccording to a preset verification rule if there is a digital keymatching the device information in the key whitelist, and determiningwhether the security authentication is passed according to theverification result.
 3. The method for securely connecting a vehiclewith a Bluetooth key according to claim 2, wherein performing, by thevehicle Bluetooth module, security authentication with the Bluetooth keyaccording to the common authentication manner, comprises: Sending, bythe vehicle Bluetooth module, a first feature value and a first randomnumber to the Bluetooth key, and receiving a second feature value, asecond random number, and key authority data configured to generate thedigital key sent by the Bluetooth key; Receiving, by the vehicleBluetooth module, a first encrypted feature value sent by the Bluetoothkey, and performing key authentication on the Bluetooth key according tothe first feature value, the key authority data, and the first encryptedfeature value; wherein, the first encrypted feature value is obtained byencrypting the first feature value by the Bluetooth key according to thedigital key downloaded from the server; the second feature value and thedigital key downloaded by the Bluetooth key from the server areconfigured for the Bluetooth key to perform key authentication on thevehicle Bluetooth module; Generating, by the vehicle Bluetooth module, asession key according to the first random number and the second randomnumber after the key authentication is passed; Wherein, when both thevehicle Bluetooth module and the Bluetooth key pass the keyauthentication of each other and the session key is successfullygenerated, the vehicle Bluetooth module and the Bluetooth key aresecurely connected.
 4. The method for securely connecting a vehicle witha Bluetooth key according to claim 3, wherein receiving, by the vehicleBluetooth module, a first encrypted feature value sent by the Bluetoothkey, and performing key authentication on the Bluetooth key according tothe first feature value, the key authority data, and the first encryptedfeature value, comprises: Generating, by the vehicle Bluetooth module, adigital key according to the key authority data, and receiving the firstencrypted feature value sent by the Bluetooth key; Decrypting, by thevehicle Bluetooth module, the first encrypted feature value according tothe generated digital key to obtain a first verification feature value,and determining whether the key authentication is passed according tothe matching result between the first verification feature value and thefirst feature value; Encrypting, by the vehicle Bluetooth module, thesecond feature value according to the generated digital key to obtain asecond encrypted feature value, and sending the second encrypted featurevalue to the Bluetooth key; wherein the second encrypted feature value,the second feature value and the digital key downloaded from the serverby the Bluetooth key are configured for the Bluetooth key to perform keyauthentication on the vehicle Bluetooth module.
 5. The method forsecurely connecting a vehicle with a Bluetooth key according to claim 4,wherein performing, by the vehicle Bluetooth module, securityauthentication with the Bluetooth key according to the commonauthentication manner, further comprises: Generating, by the vehicleBluetooth module, a key whitelist, and storing the digital key in thekey whitelist when the vehicle Bluetooth module and the Bluetooth keyare successfully authenticated according to the common authenticationmanner, and if there is no key whitelist; Or, storing, by the vehicleBluetooth module, the digital key in the key whitelist if there is a keywhitelist and there is no digital key matching the device information inthe key whitelist; Or, replacing, by the vehicle Bluetooth module, thedigital key matching the device information in the key whitelist withthe generated digital key if there is a key whitelist and there is adigital key matching the device information in the key whitelist. 6.(canceled)
 7. A method for securely connecting a vehicle and a Bluetoothkey, wherein comprises: Obtaining, by the Bluetooth key, the securityinformation of the mobile terminal, and determining the authenticationmanner of the security authentication according to the securityinformation; When a mobile terminal installed with a Bluetooth key and avehicle Bluetooth module successfully establish a Bluetooth connectionwherein the authentication manner is simple authentication or commonauthentication; Generating, by the Bluetooth key, an authenticationrequest according to the determined authentication manner, and sendingthe authentication request to the vehicle Bluetooth module; Receiving,by the Bluetooth key, the authentication result returned by the vehicleBluetooth module when the authentication manner of the authenticationrequest is simple authentication; the authentication request isconfigured for the vehicle Bluetooth module to perform securityauthentication on the Bluetooth key according to the simple method;Securely connecting, by the Bluetooth key, with the vehicle Bluetoothmodule when the authentication result is authentication passed;Performing, by the Bluetooth key, security authentication with thevehicle Bluetooth module according to the common authentication mannerwhen the authentication result indicates that authentication fails, orthe authentication manner of the authentication request is commonauthentication,.
 8. The method for securely connecting a vehicle with aBluetooth key according to claim 7, wherein the security informationincludes device change information of the mobile terminal, user changeinformation, digital key change information and time information whenthe user logs in the Bluetooth key; determining, by the Bluetooth key,that the authentication manner of the security authentication is thesimple authentication when the device change information of the mobileterminal, user change information, digital key change information andthe time information when the user logs in the Bluetooth key meet thepreset security conditions; determining, by the Bluetooth key, that theauthentication manner of security authentication is the ordinaryauthentication when the device change information of the mobileterminal, user change information, digital key change information andthe time information when the user logs in the Bluetooth key do not meetthe preset security conditions.
 9. The method for securely connecting avehicle with a Bluetooth key according to claim 7, wherein when theauthentication manner of the authentication request is the simpleauthentication, the authentication request is in particular configuredfor the vehicle Bluetooth module to obtain the digital key that matchesthe device information from the key whitelist according to the deviceinformation, and verify the digital key for simple authentication of theBluetooth key.
 10. The method for securely connecting a vehicle with aBluetooth key according to claim 7, wherein Performing, by the Bluetoothkey, security authentication with the vehicle Bluetooth module accordingto the common authentication manner, comprises: Sending, by the vehicleBluetooth key, a key download request to the server, and receives thedigital key returned by the server; Sending, by the Bluetooth key, asecond characteristic value, a second random number, and key authoritydata for generating the digital key to the vehicle Bluetooth module, andreceives a first characteristic value and a first random number sent bythe vehicle Bluetooth module; Encrypting, by the Bluetooth key, thefirst feature value according to the downloaded digital key to obtainthe first encrypted feature value, and sends the first encrypted featurevalue to the vehicle Bluetooth module; Receiving, by the Bluetooth key,the second encrypted feature value sent by the vehicle Bluetooth module,and decrypts the second feature value according to the digital key toobtain the second verification feature value; Determining, by theBluetooth key, whether the key authentication of the vehicle Bluetoothmodule is passed according to the matching result between the secondverification feature value and the second feature value; Generating, bythe Bluetooth key, a session key according to the first random numberand the second random number; Wherein, the first feature value, the keyauthority data, and the first encryption feature value are configuredfor the vehicle Bluetooth module to perform key authentication on theBluetooth key according to the common authentication manner; the secondencryption feature value is configured for the vehicle Bluetooth moduleto generates a digital key according to the key authority data, andencrypts the second feature value according to the generated digitalkey; when the Bluetooth key and the vehicle Bluetooth module pass thekey authentication of each other according to the common authenticationmanner and the session key is successfully generated, the Bluetooth keyis securely connected with the vehicle Bluetooth module.
 11. (canceled)12. A computer-readable storage medium having stored thereininstructions that, when executed by a processor of a device, causes thedevice to perform a method for generating driving suggestions, themethod comprises: Receiving, by the vehicle Bluetooth module, anauthentication request from the Bluetooth key, wherein theauthentication manner of the authentication request is a simpleauthentication or an common authentication when a vehicle Bluetoothmodule successfully establishes a Bluetooth communication connectionwith a mobile terminal installed with a Bluetooth key; Performing, bythe vehicle Bluetooth module, security authentication on the Bluetoothkey according to the simple authentication manner, and sending theauthentication result to the Bluetooth key when the authenticationmanner of the authentication request is the simple authentication;Securely connecting, by the vehicle Bluetooth module, with the Bluetoothkey when the authentication result is authentication passed; Performing,by the vehicle Bluetooth module, security authentication with theBluetooth key according to the common authentication manner when theauthentication result indicates that authentication fails, or theauthentication manner of the authentication request is commonauthentication.
 13. The computer-readable storage medium according toclaim 12, wherein the vehicle Bluetooth module performs securityauthentication on the Bluetooth key according to the simpleauthentication manner, comprises: Determining, by the vehicle Bluetoothmodule, whether there is a key whitelist; Obtaining, by the vehicleBluetooth module, the device information of the currently connectedmobile terminal if there is a key whitelist, and determining whetherthere is a digital key matching the device information in the keywhitelist; Verifying, by the vehicle Bluetooth module, the digital keyaccording to a preset verification rule if there is a digital keymatching the device information in the key whitelist, and determiningwhether the security authentication is passed according to theverification result.
 14. The computer-readable storage medium accordingto claim 13, wherein the vehicle Bluetooth module performs securityauthentication with the Bluetooth key according to the commonauthentication manner, comprises: Sending, by the vehicle Bluetoothmodule, a first feature value and a first random number to the Bluetoothkey, and receiving a second feature value, a second random number, andkey authority data configured to generate the digital key sent by theBluetooth key; Receiving, by the vehicle Bluetooth module, a firstencrypted feature value sent by the Bluetooth key, and performing keyauthentication on the Bluetooth key according to the first featurevalue, the key authority data, and the first encrypted feature value;wherein, the first encrypted feature value is obtained by encrypting thefirst feature value by the Bluetooth key according to the digital keydownloaded from the server; the second feature value and the digital keydownloaded by the Bluetooth key from the server are configured for theBluetooth key to perform key authentication on the vehicle Bluetoothmodule; Generating, by the vehicle Bluetooth module, a session keyaccording to the first random number and the second random number afterthe key authentication is passed; Wherein, when both the vehicleBluetooth module and the Bluetooth key pass the key authentication ofeach other and the session key is successfully generated, the vehicleBluetooth module and the Bluetooth key are securely connected.
 15. Thecomputer-readable storage medium according to claim 14, wherein thevehicle Bluetooth module receives a first encrypted feature value sentby the Bluetooth key, and performs key authentication on the Bluetoothkey according to the first feature value, the key authority data, andthe first encrypted feature value, comprises: Generating, by the vehicleBluetooth module, a digital key according to the key authority data, andreceiving the first encrypted feature value sent by the Bluetooth key;Decrypting, by the vehicle Bluetooth module, the first encrypted featurevalue according to the generated digital key to obtain a firstverification feature value, and determining whether the keyauthentication is passed according to the matching result between thefirst verification feature value and the first feature value;Encrypting, by the vehicle Bluetooth module, the second feature valueaccording to the generated digital key to obtain a second encryptedfeature value, and sending the second encrypted feature value to theBluetooth key; wherein the second encrypted feature value, the secondfeature value and the digital key downloaded from the server by theBluetooth key are configured for the Bluetooth key to perform keyauthentication on the vehicle Bluetooth module.
 16. Thecomputer-readable storage medium according to claim 15, wherein thevehicle Bluetooth module performs security authentication with theBluetooth key according to the common authentication manner, furthercomprises: Generating, by the vehicle Bluetooth module, a key whitelist,and storing the digital key in the key whitelist when the vehicleBluetooth module and the Bluetooth key are successfully authenticatedaccording to the common authentication manner, and if there is no keywhitelist; Or, storing, by the vehicle Bluetooth module, the digital keyin the key whitelist if there is a key whitelist and there is no digitalkey matching the device information in the key whitelist; Or, replacing,by the vehicle Bluetooth module, the digital key matching the deviceinformation in the key whitelist with the generated digital key if thereis a key whitelist and there is a digital key matching the deviceinformation in the key whitelist.