CN105187442A - Vehicle authorization method, device, vehicle-mounted terminal, terminal and system - Google Patents

Vehicle authorization method, device, vehicle-mounted terminal, terminal and system Download PDF

Info

Publication number
CN105187442A
CN105187442A CN201510627106.9A CN201510627106A CN105187442A CN 105187442 A CN105187442 A CN 105187442A CN 201510627106 A CN201510627106 A CN 201510627106A CN 105187442 A CN105187442 A CN 105187442A
Authority
CN
China
Prior art keywords
terminal
vehicle
authorization
response message
authorization response
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510627106.9A
Other languages
Chinese (zh)
Inventor
李洋
李永震
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201510627106.9A priority Critical patent/CN105187442A/en
Publication of CN105187442A publication Critical patent/CN105187442A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention proposes a vehicle authorization method, a vehicle authorization device, a vehicle-mounted terminal, a terminal and a vehicle authorization system. The vehicle authorization method comprises the following steps: receiving vehicle use request information sent by a first terminal; judging whether the vehicle use request information comprises authorization user identity information or not; if no, generating an encryption key; using the vehicle use request information and the encryption key as authorization request information and sending the authorization request information to a second terminal, so that the second terminal sends authorization response information to the first terminal; receiving the authorization response information sent by the first terminal; and performing a corresponding operation according to the authorization response information. Through the adoption of the technical solution of the present invention, an unauthorized terminal can be conveniently and rapidly authorized to use the vehicle, thereby promoting the user experience.

Description

The authorization method of vehicle, device, car-mounted terminal, terminal and system
Technical field
The present invention relates to communication technical field, in particular to the authoring system of the authorization device of a kind of authorization method of vehicle, a kind of vehicle, a kind of car-mounted terminal, a kind of terminal and a kind of vehicle.
Background technology
At present, user can carry out Long-distance Control and operation by the vehicle of terminal (as mobile phone, flat board) to networking, for the intellectuality of car networked system and networking provide feasible, reliable, safe and solution easily, bring great convenience to the daily life of user, also provide very high reliability at secure context.
But, the car networked system adopting biometric information to carry out authentication in prior art need the user of car owner's terminal for its mandate could to networking vehicle operate, namely for the unauthorized user of those vehicles needing Interim use to network, the authority that vehicle is operated just can only can be made it have by the subscriber authorisation of car owner's terminal, but, authorize when the user of car owner's terminal is not or not vehicle side the user of other-end to use vehicle very inconvenient, bring the experience of extreme difference to user.
Therefore, how convenient when the user of car owner's terminal is not at vehicle periphery, authorize the user of other-end to use vehicle to become problem demanding prompt solution quickly.
Summary of the invention
The present invention, just based on the problems referred to above, proposes a kind of new technical scheme, can the user of other-end be authorized convenient, quickly to use vehicle, thus improve Consumer's Experience when the user of car owner's terminal is not at vehicle periphery.
In view of this, a first aspect of the present invention proposes a kind of authorization method of vehicle, for car-mounted terminal, comprising: receive the vehicle use solicited message that first terminal sends; Judge that described vehicle uses solicited message whether to comprise authorized user identities information; If do not comprise, then generate encryption key; Use solicited message and described encryption key to be sent to the second terminal as authorization requests information on described vehicle, for described second terminal, authorization response message is sent to described first terminal; Receive the described authorization response message that described first terminal sends; Corresponding operation is performed according to described authorization response message.
In this technical scheme, when there being the user of first terminal (unauthorized terminal) to want the vehicle of the user of use second terminal (i.e. car owner's terminal), the vehicle sent by receiving first terminal uses solicited message, wherein, vehicle uses solicited message comprise but be not limited to the subscriber identity information of first terminal, such as, subscriber identity information can be the name of user, telephone number, identity card and address etc. in detail.Then judge vehicle uses in solicited message whether comprise authorized user identities information, such as, the subscriber identity information in solicited message is used by vehicle to mate with the authorized user identities information stored in the authorization user information storehouse in vehicle, if the match is successful, namely vehicle uses solicited message to comprise authorized user identities information, also just illustrate that the user of car owner's terminal of vehicle has authorized the user of first terminal to use vehicle, otherwise, generate encryption key.Further, if car-mounted terminal is after receiving the authorization response message from first terminal, such as authorization response message comprises the biometric information (as iris, fingerprint, palmmprint, sound etc.) of the user of the second terminal, thus can determine whether the user of the second terminal is validated user according to authorization response message, if validated user, car-mounted terminal can authorize first terminal to have the authority of operation vehicle.Therefore, by technique scheme, can the user of unauthorized terminal be authorized convenient, quickly to use vehicle when the user of car owner's terminal is not at vehicle periphery, thus improve Consumer's Experience.
Preferably, can arrange encryption key has ageing, namely encryption key is effective in Preset Time, also just illustrate to only have encryption key in preset time range, just can be decrypted authorization response message by encryption key, that is in Preset Time, the user of first terminal has the authority using this vehicle, to facilitate this vehicle of user's Interim use of unauthorized terminal.
In technique scheme, preferably, described execution according to described authorization response message operates accordingly, specifically comprises: judge that whether described authorization response message is legal; If legal, then solicited message is used to perform corresponding operating according to described vehicle.
In this technical scheme, by judging that whether authorization response message is legal, if legal, then solicited message is used to perform operation response according to vehicle, particularly, obtain the biometric information of the user of the second terminal (i.e. car owner's terminal) in authorization response message, judge according to biometric information whether the user of the second terminal is validated user, if so, then solicited message can be used to perform corresponding operating according to vehicle.Such as, vehicle use solicited message is the request of the car door opening vehicle, then the user of first terminal (unauthorized terminal) can open the car door of vehicle.So, the user avoiding illegal terminal uses vehicle, thus improves the safety and reliability of vehicle remote mandate.
In above-mentioned arbitrary technical scheme, preferably, judge that described vehicle uses after whether solicited message comprise authorized user identities information described, also comprise: described vehicle uses solicited message to comprise described authorized user identities information if judge, then use solicited message to perform corresponding operation according to described vehicle.
In this technical scheme, when judging that vehicle uses solicited message to comprise authorized user identities information, this subscriber identity information is had in the authorization user information storehouse of i.e. vehicle, also just illustrate that the user of car owner's terminal (i.e. the second terminal) of vehicle has authorized the user of first terminal to use vehicle, then solicited message can be used to perform corresponding operation according to vehicle, so, the user avoiding first terminal repeatedly uses during vehicle and needs to send the troublesome operation of repeatedly asking, improve the convenience of authorizing the user of first terminal to use vehicle further, thus improve Consumer's Experience.
A second aspect of the present invention proposes a kind of authorization method of vehicle, for first terminal, comprising: send vehicle and use solicited message to car-mounted terminal; Receive the authorization response message that the second terminal sends; Decipher described authorization response message; Send the authorization response message after deciphering to described car-mounted terminal.
In this technical scheme, sending vehicle by first terminal (i.e. unauthorized terminal) uses request to car-mounted terminal, request is used to be sent to the second terminal (i.e. car owner's terminal) on vehicle for car-mounted terminal, if receive the authorization response message that the second terminal sends, illustrate that the user of the second terminal allows the user of first terminal to use vehicle, then decrypt authorized response message, and the authorization response message after deciphering is sent to car-mounted terminal, judge whether to authorize the user of first terminal to use vehicle according to the authorization response message after deciphering for car-mounted terminal, so just make the user of car owner's terminal can be not convenient when vehicle periphery, the user of unauthorized terminal is authorized to use vehicle quickly, thus improve Consumer's Experience.
A third aspect of the present invention proposes a kind of authorization method of vehicle, for the second terminal, comprising: the authorization requests information receiving the use vehicle that car-mounted terminal sends; License the instruction of described vehicle if receive, gather the biometric information of the user of described second terminal; Described biometric information is sent to first terminal as authorization response message, obtains the authority using described vehicle for described second terminal according to described authorization response message.
In this technical scheme, by receiving the authorization requests information from the use vehicle of car-mounted terminal, and when receiving the instruction licensing vehicle, namely the user of the second terminal (car owner's terminal) allows the user of unauthorized terminal to use vehicle, gather the biometric information of the user of the second terminal (as iris, fingerprint, palmmprint, sound etc.), then biometric information is sent to first terminal (i.e. unauthorized terminal) as authorization response message, obtain the authority using vehicle according to authorization response message for first terminal, so, can be convenient when the user of car owner's terminal is not at vehicle periphery, the user of unauthorized terminal is authorized to use vehicle quickly, thus improve Consumer's Experience.
In technique scheme, preferably, described described biometric information is sent to the step of first terminal as authorization response message, specifically comprises: by the encryption key in described authorization requests information, described biometric information is encrypted; Described biometric information after encryption is sent to described first terminal as described authorization response message.
In this technical scheme, by the encryption key in authorization requests information, the biometric information collected is encrypted, and the biometric information after encryption is sent to first terminal as authorization response message, avoid authorization response message to be revealed when being sent to first terminal, thus effectively can guarantee the fail safe of authorization response message, it also avoid disabled user simultaneously and utilize artificial iris to obtain the authority using vehicle, thus improve the reliability that remote authorization uses vehicle.
A fourth aspect of the present invention proposes a kind of authorization device of vehicle, for car-mounted terminal, comprising: receiving element, and the vehicle sent for receiving first terminal uses solicited message; Judging unit, for judging that described vehicle uses solicited message whether to comprise authorized user identities information; Generation unit, if use solicited message not comprise described authorized user identities information for described vehicle, then generates encryption key; Transmitting element, for using solicited message and described encryption key to be sent to the second terminal as authorization requests information on described vehicle, is sent to described first terminal for described second terminal by authorization response message; Described receiving element, also for receiving the described authorization response message that described first terminal sends; Performance element, for performing corresponding operation according to described authorization response message.
In this technical scheme, when there being the user of first terminal (unauthorized terminal) to want the vehicle of the user of use second terminal (i.e. car owner's terminal), the vehicle sent by receiving first terminal uses solicited message, wherein, vehicle uses solicited message comprise but be not limited to the subscriber identity information of first terminal, such as, subscriber identity information can be the name of user, telephone number, identity card and address etc. in detail.Then judge vehicle uses in solicited message whether comprise authorized user identities information, such as, the subscriber identity information in solicited message is used by vehicle to mate with the authorized user identities information stored in the authorization user information storehouse in vehicle, if the match is successful, namely vehicle uses solicited message to comprise authorized user identities information, also just illustrate that the user of car owner's terminal of vehicle has authorized the user of first terminal to use vehicle, otherwise, generate encryption key.Further, if car-mounted terminal is after receiving the authorization response message from first terminal, such as authorization response message comprises the biometric information (as iris, fingerprint, palmmprint, sound etc.) of the user of the second terminal, thus can determine whether the user of the second terminal is validated user according to authorization response message, if validated user, car-mounted terminal can authorize first terminal to have the authority of operation vehicle.Therefore, by technique scheme, can the user of unauthorized terminal be authorized convenient, quickly to use vehicle when the user of car owner's terminal is not at vehicle periphery, thus improve Consumer's Experience.
Preferably, can arrange encryption key has ageing, namely encryption key is effective in Preset Time, also just illustrate to only have encryption key in preset time range, just can be decrypted authorization response message by encryption key, that is in Preset Time, the user of first terminal has the authority using this vehicle, to facilitate this vehicle of user's Interim use of unauthorized terminal.
In technique scheme, preferably, described performance element comprises: judgment sub-unit, for judging that whether described authorization response message is legal; Described performance element specifically for, if described authorization response message is legal, then use solicited message to perform corresponding operating according to described vehicle.
In this technical scheme, by judging that whether authorization response message is legal, if legal, then solicited message is used to perform operation response according to vehicle, particularly, obtain the biometric information of the user of the second terminal (i.e. car owner's terminal) in authorization response message, judge according to biometric information whether the user of the second terminal is validated user, if so, then solicited message can be used to perform corresponding operating according to vehicle.Such as, vehicle use solicited message is the request of the car door opening vehicle, then the user of first terminal (unauthorized terminal) can open the car door of vehicle.So, the user avoiding illegal terminal uses vehicle, thus improves the safety and reliability of vehicle remote mandate.
In above-mentioned arbitrary technical scheme, preferably, described performance element also for, if judge, described vehicle uses solicited message to comprise described authorized user identities information, then use solicited message to perform corresponding operation according to described vehicle.
In this technical scheme, when judging that vehicle uses solicited message to comprise authorized user identities information, this subscriber identity information is had in the authorization user information storehouse of i.e. vehicle, also just illustrate that the user of car owner's terminal (i.e. the second terminal) of vehicle has authorized the user of first terminal to use vehicle, then solicited message can be used to perform corresponding operation according to vehicle, so, the user avoiding first terminal repeatedly uses during vehicle and needs to send the troublesome operation of repeatedly asking, improve the convenience of authorizing the user of first terminal to use vehicle further, thus improve Consumer's Experience.
A fifth aspect of the present invention proposes a kind of car-mounted terminal, comprise the authorization device of the vehicle according to any one of technique scheme, therefore, this car-mounted terminal has the technique effect identical with the authorization device of the vehicle according to any one of technique scheme, does not repeat them here.
A sixth aspect of the present invention proposes a kind of authorization device of vehicle, for first terminal, comprising: sending module, uses solicited message to car-mounted terminal for sending vehicle; Receiver module, for receiving the authorization response message that the second terminal sends; Deciphering module, for deciphering described authorization response message; Described sending module is also for sending the authorization response message after deciphering to described car-mounted terminal.
In this technical scheme, sending vehicle by first terminal (i.e. unauthorized terminal) uses request to car-mounted terminal, request is used to be sent to the second terminal (i.e. car owner's terminal) on vehicle for car-mounted terminal, if receive the authorization response message that the second terminal sends, illustrate that the user of the second terminal allows the user of first terminal to use vehicle, then decrypt authorized response message, and the authorization response message after deciphering is sent to car-mounted terminal, judge whether to authorize the user of first terminal to use vehicle according to the authorization response message after deciphering for car-mounted terminal, so just make the user of car owner's terminal can be not convenient when vehicle periphery, the user of unauthorized terminal is authorized to use vehicle quickly, thus improve Consumer's Experience.
A seventh aspect of the present invention proposes a kind of terminal, comprise the authorization device of the vehicle in technique scheme described in the 5th aspect, therefore, this terminal has the technique effect identical with the authorization device of the vehicle according to any one of technique scheme, does not repeat them here.
A eighth aspect of the present invention proposes a kind of authorization device of vehicle, for the second terminal, comprising: receive module, for receiving the authorization requests information of the use vehicle that car-mounted terminal sends; Gathering module, if for receiving the instruction licensing described vehicle, gathering the biometric information of the user of described second terminal; Send module, for described biometric information is sent to first terminal as authorization response message, obtain the authority using described vehicle according to described authorization response message for described first terminal.
In this technical scheme, by receiving the authorization requests information from the use vehicle of car-mounted terminal, and when receiving the instruction licensing vehicle, namely the user of the second terminal (car owner's terminal) allows the user of unauthorized terminal to use vehicle, gather the biometric information of the user of the second terminal (as iris, fingerprint, palmmprint, sound etc.), then biometric information is sent to first terminal (i.e. unauthorized terminal) as authorization response message, obtain the authority using vehicle according to authorization response message for first terminal, so, can be convenient when the user of car owner's terminal is not at vehicle periphery, the user of unauthorized terminal is authorized to use vehicle quickly, thus improve Consumer's Experience.
In technique scheme, preferably, described transmission module comprises: encryption submodule group, for being encrypted described biometric information by the encryption key in described authorization requests information; Described transmission module specifically for, the described biometric information after encryption is sent to described first terminal as described authorization response message.
In this technical scheme, by the encryption key in authorization requests information, the biometric information collected is encrypted, and the biometric information after encryption is sent to first terminal as authorization response message, avoid authorization response message to be revealed when being sent to first terminal, thus effectively can guarantee the fail safe of authorization response message, it also avoid disabled user simultaneously and utilize artificial iris to obtain the authority using vehicle, thus improve the reliability that remote authorization uses vehicle.
A ninth aspect of the present invention proposes a kind of terminal, comprise the authorization device of the vehicle in above-mentioned any one technical scheme described in the 7th aspect, therefore, this car-mounted terminal has the technique effect identical with the authorization device of the vehicle according to any one of technique scheme, does not repeat them here.
A tenth aspect of the present invention proposes a kind of authoring system of vehicle, comprising: the car-mounted terminal in technique scheme described in the 5th aspect; Terminal in technique scheme described in the 7th aspect; And the terminal in technique scheme described in the 9th aspect, therefore, the authoring system of this vehicle has the technique effect identical with the terminal described in the 9th aspect with the terminal described in the car-mounted terminal in technique scheme described in the 5th aspect, the 7th aspect, does not repeat them here.
By technical scheme of the present invention, can the user of other-end be authorized convenient, quickly to use vehicle when the user of car owner's terminal is not at vehicle periphery, thus improve Consumer's Experience.
Accompanying drawing explanation
Fig. 1 shows the schematic flow sheet of the authorization method of the vehicle for car-mounted terminal according to an embodiment of the invention;
Fig. 2 shows the schematic flow sheet of the authorization method of the vehicle for unauthorized terminal according to an embodiment of the invention;
Fig. 3 shows the schematic flow sheet of the authorization method of the vehicle for car owner's terminal according to an embodiment of the invention;
Fig. 4 shows the structural representation of the authorization device of the vehicle for car-mounted terminal according to an embodiment of the invention;
Fig. 5 shows the structural representation of car-mounted terminal according to an embodiment of the invention;
Fig. 6 shows the structural representation of the authorization device of the vehicle for unauthorized terminal according to an embodiment of the invention;
Fig. 7 shows the structural representation of terminal according to an embodiment of the invention;
Fig. 8 shows the structural representation of the authorization device of the vehicle for car owner's terminal according to an embodiment of the invention;
Fig. 9 shows the structural representation of terminal according to another embodiment of the invention;
Figure 10 shows the structural representation of the authoring system of vehicle according to an embodiment of the invention;
Figure 11 shows the structural representation of the authoring system of vehicle according to another embodiment of the invention.
Embodiment
In order to more clearly understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments, the present invention is further described in detail.It should be noted that, when not conflicting, the feature in the embodiment of the application and embodiment can combine mutually.
Set forth a lot of detail in the following description so that fully understand the present invention; but; the present invention can also adopt other to be different from other modes described here and implement, and therefore, protection scope of the present invention is not by the restriction of following public specific embodiment.
Fig. 1 shows the schematic flow sheet of the authorization method of the vehicle for car-mounted terminal according to an embodiment of the invention.
As shown in Figure 1, the authorization method of the vehicle for car-mounted terminal according to an embodiment of the invention, comprising:
Step 102, receives the vehicle use solicited message that first terminal sends;
Step 104, judges that described vehicle uses solicited message whether to comprise authorized user identities information;
Step 106, if do not comprise, then generates encryption key;
Step 108, uses solicited message and described encryption key to be sent to the second terminal as authorization requests information on described vehicle, for described second terminal, authorization response message is sent to described first terminal;
Step 110, receives the described authorization response message that described first terminal sends;
Step 112, performs corresponding operation according to described authorization response message.
In this technical scheme, when there being the user of first terminal (unauthorized terminal) to want the vehicle of the user of use second terminal (i.e. car owner's terminal), the vehicle sent by receiving first terminal uses solicited message, wherein, vehicle uses solicited message comprise but be not limited to the subscriber identity information of first terminal, such as, subscriber identity information can be the name of user, telephone number, identity card and address etc. in detail.Then judge vehicle uses in solicited message whether comprise authorized user identities information, such as, the subscriber identity information in solicited message is used by vehicle to mate with the authorized user identities information stored in the authorization user information storehouse in vehicle, if the match is successful, namely vehicle uses solicited message to comprise authorized user identities information, also just illustrate that the user of car owner's terminal of vehicle has authorized the user of first terminal to use vehicle, otherwise, generate encryption key.Further, if car-mounted terminal is after receiving the authorization response message from first terminal, such as authorization response message comprises the biometric information (as iris, fingerprint, palmmprint, sound etc.) of the user of the second terminal, thus can determine whether the user of the second terminal is validated user according to authorization response message, if validated user, car-mounted terminal can authorize first terminal to have the authority of operation vehicle.Therefore, by technique scheme, can the user of unauthorized terminal be authorized convenient, quickly to use vehicle when the user of car owner's terminal is not at vehicle periphery, thus improve Consumer's Experience.
Preferably, can arrange encryption key has ageing, namely encryption key is effective in Preset Time, also just illustrate to only have encryption key in preset time range, just can be decrypted authorization response message by encryption key, that is in Preset Time, the user of first terminal has the authority using this vehicle, to facilitate this vehicle of user's Interim use of unauthorized terminal.
In technique scheme, preferably, step 112 comprises: judge that whether described authorization response message is legal; If legal, then solicited message is used to perform corresponding operating according to described vehicle.
In this technical scheme, by judging that whether authorization response message is legal, if legal, then solicited message is used to perform operation response according to vehicle, particularly, obtain the biometric information of the user of the second terminal (i.e. car owner's terminal) in authorization response message, judge according to biometric information whether the user of the second terminal is validated user, if so, then solicited message can be used to perform corresponding operating according to vehicle.Such as, vehicle use solicited message is the request of the car door opening vehicle, then the user of first terminal (unauthorized terminal) can open the car door of vehicle.So, the user avoiding illegal terminal uses vehicle, thus improves the safety and reliability of vehicle remote mandate.
In above-mentioned arbitrary technical scheme, preferably, after step 104, also comprise: described vehicle uses solicited message to comprise described authorized user identities information if judge, then use solicited message to perform corresponding operation according to described vehicle.
In this technical scheme, when judging that vehicle uses solicited message to comprise authorized user identities information, this subscriber identity information is had in the authorization user information storehouse of i.e. vehicle, also just illustrate that the user of car owner's terminal (i.e. the second terminal) of vehicle has authorized the user of first terminal to use vehicle, then solicited message can be used to perform corresponding operation according to vehicle, so, the user avoiding first terminal repeatedly uses during vehicle and needs to send the troublesome operation of repeatedly asking, improve the convenience of authorizing the user of first terminal to use vehicle further, thus improve Consumer's Experience.
Fig. 2 shows the schematic flow sheet of the authorization method of the vehicle for unauthorized terminal according to an embodiment of the invention.
As shown in Figure 2, the authorization method of the vehicle for unauthorized terminal (first terminal) according to an embodiment of the invention, comprising:
Step 202, sends vehicle and uses solicited message to car-mounted terminal;
Step 204, receives the authorization response message that the second terminal sends;
Step 206, deciphers described authorization response message;
Step 208, sends the authorization response message after deciphering to described car-mounted terminal.
In this technical scheme, sending vehicle by first terminal (i.e. unauthorized terminal) uses request to car-mounted terminal, request is used to be sent to the second terminal (i.e. car owner's terminal) on vehicle for car-mounted terminal, if receive the authorization response message that the second terminal sends, illustrate that the user of the second terminal allows the user of first terminal to use vehicle, then decrypt authorized response message, and the authorization response message after deciphering is sent to car-mounted terminal, judge whether to authorize the user of first terminal to use vehicle according to the authorization response message after deciphering for car-mounted terminal, so just make the user of car owner's terminal can be not convenient when vehicle periphery, the user of unauthorized terminal is authorized to use vehicle quickly, thus improve Consumer's Experience.
Fig. 3 shows the schematic flow sheet of the authorization method of the vehicle for car owner's terminal according to an embodiment of the invention.
As shown in Figure 3, the authorization method of the vehicle for car owner's terminal (the second terminal) according to an embodiment of the invention, comprising:
Step 302, receives the authorization requests information of the use vehicle that car-mounted terminal sends;
Step 304, licenses the instruction of described vehicle if receive, gather the biometric information of the user of described second terminal;
Step 306, is sent to first terminal using described biometric information as authorization response message, obtains the authority using described vehicle for described second terminal according to described authorization response message.
In this technical scheme, by receiving the authorization requests information from the use vehicle of car-mounted terminal, and when receiving the instruction licensing vehicle, namely the user of the second terminal (car owner's terminal) allows the user of unauthorized terminal to use vehicle, gather the biometric information of the user of the second terminal (as iris, fingerprint, palmmprint, sound etc.), then biometric information is sent to first terminal (i.e. unauthorized terminal) as authorization response message, obtain the authority using vehicle according to authorization response message for first terminal, so, can be convenient when the user of car owner's terminal is not at vehicle periphery, the user of unauthorized terminal is authorized to use vehicle quickly, thus improve Consumer's Experience.
In technique scheme, preferably, described described biometric information is sent to the step of first terminal as authorization response message, specifically comprises: by the encryption key in described authorization requests information, described biometric information is encrypted; Described biometric information after encryption is sent to described first terminal as described authorization response message.
In this technical scheme, by the encryption key in authorization requests information, the biometric information collected is encrypted, and the biometric information after encryption is sent to first terminal as authorization response message, avoid authorization response message to be revealed when being sent to first terminal, thus effectively can guarantee the fail safe of authorization response message, it also avoid disabled user simultaneously and utilize artificial iris to obtain the authority using vehicle, thus improve the reliability that remote authorization uses vehicle.
Fig. 4 shows the structural representation of the authorization device of the vehicle for car-mounted terminal according to an embodiment of the invention.
As shown in Figure 4, the authorization device 400 of the vehicle for car-mounted terminal according to an embodiment of the invention, comprise: receiving element 402, judging unit 404, generation unit 406, transmitting element 408 and performance element 410, wherein, described receiving element 402 uses solicited message for the vehicle receiving first terminal transmission; Described judging unit 404, for judging that described vehicle uses solicited message whether to comprise authorized user identities information; Described generation unit 406, if use solicited message not comprise described authorized user identities information for described vehicle, then generates encryption key; Described transmitting element 408, for using solicited message and described encryption key to be sent to the second terminal as authorization requests information on described vehicle, is sent to described first terminal for described second terminal by authorization response message; Described receiving element 402, also for receiving the described authorization response message that described first terminal sends; Described performance element 410, for performing corresponding operation according to described authorization response message.
In this technical scheme, when there being the user of first terminal (unauthorized terminal) to want the vehicle of the user of use second terminal (i.e. car owner's terminal), the vehicle sent by receiving first terminal uses solicited message, wherein, vehicle uses solicited message comprise but be not limited to the subscriber identity information of first terminal, such as, subscriber identity information can be the name of user, telephone number, identity card and address etc. in detail.Then judge vehicle uses in solicited message whether comprise authorized user identities information, such as, the subscriber identity information in solicited message is used by vehicle to mate with the authorized user identities information stored in the authorization user information storehouse in vehicle, if the match is successful, namely vehicle uses solicited message to comprise authorized user identities information, also just illustrate that the user of car owner's terminal of vehicle has authorized the user of first terminal to use vehicle, otherwise, generate encryption key.Further, if car-mounted terminal is after receiving the authorization response message from first terminal, such as authorization response message comprises the biometric information (as iris, fingerprint, palmmprint, sound etc.) of the user of the second terminal, thus can determine whether the user of the second terminal is validated user according to authorization response message, if validated user, car-mounted terminal can authorize first terminal to have the authority of operation vehicle.Therefore, by technique scheme, can the user of unauthorized terminal be authorized convenient, quickly to use vehicle when the user of car owner's terminal is not at vehicle periphery, thus improve Consumer's Experience.
Preferably, can arrange encryption key has ageing, namely encryption key is effective in Preset Time, also just illustrate to only have encryption key in preset time range, just can be decrypted authorization response message by encryption key, that is in Preset Time, the user of first terminal has the authority using this vehicle, to facilitate this vehicle of user's Interim use of unauthorized terminal.
In technique scheme, preferably, described performance element 410 comprises: judgment sub-unit 4102, for judging that whether described authorization response message is legal; Described performance element 410 specifically for, if described authorization response message is legal, then use solicited message to perform corresponding operating according to described vehicle.
In this technical scheme, by judging that whether authorization response message is legal, if legal, then solicited message is used to perform operation response according to vehicle, particularly, obtain the biometric information of the user of the second terminal (i.e. car owner's terminal) in authorization response message, judge according to biometric information whether the user of the second terminal is validated user, if so, then solicited message can be used to perform corresponding operating according to vehicle.Such as, vehicle use solicited message is the request of the car door opening vehicle, then the user of first terminal (unauthorized terminal) can open the car door of vehicle.So, the user avoiding illegal terminal uses vehicle, thus improves the safety and reliability of vehicle remote mandate.
In above-mentioned arbitrary technical scheme, preferably, described performance element 410 also for, if judge, described vehicle uses solicited message to comprise described authorized user identities information, then use solicited message to perform corresponding operation according to described vehicle.
In this technical scheme, when judging that vehicle uses solicited message to comprise authorized user identities information, this subscriber identity information is had in the authorization user information storehouse of i.e. vehicle, also just illustrate that the user of car owner's terminal (i.e. the second terminal) of vehicle has authorized the user of first terminal to use vehicle, then solicited message can be used to perform corresponding operation according to vehicle, so, the user avoiding first terminal repeatedly uses during vehicle and needs to send the troublesome operation of repeatedly asking, improve the convenience of authorizing the user of first terminal to use vehicle further, thus improve Consumer's Experience.
Fig. 5 shows the structural representation of car-mounted terminal according to an embodiment of the invention.
As shown in Figure 5, car-mounted terminal 500 according to an embodiment of the invention, comprise the authorization device 400 of the vehicle according to any one of technique scheme, therefore, this car-mounted terminal 500 has the technique effect identical with the authorization device 400 of the vehicle according to any one of technique scheme, does not repeat them here.
Fig. 6 shows the structural representation of the authorization device of the vehicle for unauthorized terminal according to an embodiment of the invention.
As shown in Figure 6, the authorization device 600 of the vehicle for unauthorized terminal (first terminal) according to an embodiment of the invention, comprise: sending module 602, receiver module 604 and deciphering module 606, wherein, described sending module 602 uses solicited message to car-mounted terminal for sending vehicle; Described receiver module 604, for receiving the authorization response message that the second terminal sends; Described deciphering module 606, for deciphering described authorization response message; Described sending module 602 is also for sending the authorization response message after deciphering to described car-mounted terminal.
In this technical scheme, sending vehicle by first terminal (i.e. unauthorized terminal) uses request to car-mounted terminal, request is used to be sent to the second terminal (i.e. car owner's terminal) on vehicle for car-mounted terminal, if receive the authorization response message that the second terminal sends, illustrate that the user of the second terminal allows the user of first terminal to use vehicle, then decrypt authorized response message, and the authorization response message after deciphering is sent to car-mounted terminal, judge whether to authorize the user of first terminal to use vehicle according to the authorization response message after deciphering for car-mounted terminal, so just make the user of car owner's terminal can be not convenient when vehicle periphery, the user of unauthorized terminal is authorized to use vehicle quickly, thus improve Consumer's Experience.
Fig. 7 shows the structural representation of terminal according to an embodiment of the invention.
As shown in Figure 7, terminal 700 according to an embodiment of the invention, comprise the authorization device 600 of the vehicle in technique scheme described in the 5th aspect, therefore, this terminal 700 has the technique effect identical with the authorization device 600 of the vehicle according to any one of technique scheme, does not repeat them here.
Fig. 8 shows the structural representation of the authorization device of the vehicle for car owner's terminal according to an embodiment of the invention.
As shown in Figure 8, the authorization device 800 of the vehicle for car owner's terminal (the second terminal) according to an embodiment of the invention, comprising: receive module 802, for receiving the authorization requests information of the use vehicle that car-mounted terminal sends; Gathering module 804, if for receiving the instruction licensing described vehicle, gathering the biometric information of the user of described second terminal; Send module 806, for described biometric information is sent to first terminal as authorization response message, obtain the authority using described vehicle according to described authorization response message for described first terminal.
In this technical scheme, by receiving the authorization requests information from the use vehicle of car-mounted terminal, and when receiving the instruction licensing vehicle, namely the user of the second terminal (car owner's terminal) allows the user of unauthorized terminal to use vehicle, gather the biometric information of the user of the second terminal (as iris, fingerprint, palmmprint, sound etc.), then biometric information is sent to first terminal (i.e. unauthorized terminal) as authorization response message, obtain the authority using vehicle according to authorization response message for first terminal, so, can be convenient when the user of car owner's terminal is not at vehicle periphery, the user of unauthorized terminal is authorized to use vehicle quickly, thus improve Consumer's Experience.
In technique scheme, preferably, described transmission module 806 comprises: encryption submodule group 8062, for being encrypted described biometric information by the encryption key in described authorization requests information; Described transmission module 806 specifically for, the described biometric information after encryption is sent to described first terminal as described authorization response message.
In this technical scheme, by the encryption key in authorization requests information, the biometric information collected is encrypted, and the biometric information after encryption is sent to first terminal as authorization response message, avoid authorization response message to be revealed when being sent to first terminal, thus effectively can guarantee the fail safe of authorization response message, it also avoid disabled user simultaneously and utilize artificial iris to obtain the authority using vehicle, thus improve the reliability that remote authorization uses vehicle.
Fig. 9 shows the structural representation of terminal according to another embodiment of the invention.
As shown in Figure 9, terminal 900 according to another embodiment of the invention, comprise the authorization device 800 of the vehicle in above-mentioned any one technical scheme described in the 7th aspect, therefore, this terminal 900 has the technique effect identical with the authorization device 800 of the vehicle according to any one of technique scheme, does not repeat them here.
Figure 10 shows the structural representation of the authoring system of vehicle according to an embodiment of the invention.
As shown in Figure 10, the authoring system 1000 of vehicle according to an embodiment of the invention, comprising: the car-mounted terminal 500 in technique scheme; Terminal 700 in technique scheme; And the terminal 900 in technique scheme, therefore, the authoring system 1000 of this vehicle has and the car-mounted terminal 500 in technique scheme, technique effect that terminal 700 is identical with terminal 900, does not repeat them here.
Figure 11 shows the structural representation of the authoring system of vehicle according to another embodiment of the invention.
As shown in figure 11, the authoring system 1100 of vehicle according to another embodiment of the invention, comprise: first terminal (unauthorized terminal) 1102, car-mounted terminal 1104 and the second terminal (car owner's terminal) 1106, the NFC set up between first terminal 1102 with car-mounted terminal 1104 by the first NFC module 11022 of first terminal 1102 and the second NFC module 11042 of car-mounted terminal 1104 is connected, with by first terminal 1102 subscriber identity information (as, name, telephone number, identity card and in detail address etc.) be sent to car-mounted terminal 1104, authentication module 11044 in car-mounted terminal 1104 is for judging whether there is userspersonal information in the authorization user information storehouse of car-mounted terminal 1104, if exist, namely first terminal 1102 is authorization terminal, the user then directly licensing to first terminal 1102 uses the authority of vehicle belonging to this car-mounted terminal 1104, if do not exist, illustrate that the user of first terminal 1102 is casual user, i.e. unauthorized user, then generate encryption key according to subscriber identity information.Then by the SIM (SubscriberIdentityModule of car-mounted terminal 1104, client identification module) subscriber identity information and encryption key be sent to the second terminal 1106 by card module 11046 jointly, second terminal 1106 shows the subscriber identity information from car-mounted terminal 1104 received, and determines whether the vehicle at subscriber authorisation use car-mounted terminal 1104 place to first terminal 1102 for user.If the second terminal 1106 receives the instruction of authorizing the user of first terminal 1102 to use vehicle, the iris image (biometric information) of the user of the second terminal 1106 is gathered by the iris capturing module 11062 of the second terminal 1106, encryption key according to receiving from car-mounted terminal 1104 is encrypted iris image, and the iris image after encryption is sent to first terminal 1102, and then be connected by the NFC that the first NFC module 11022 and the second NFC module 11042 are set up between first terminal 1102 with car-mounted terminal 1104, to make first terminal 1102, the iris image of encryption is sent to car-mounted terminal 1104, the iris processing module 11048 of car-mounted terminal 1104 is decrypted to carry out authentication to the user of the second terminal 1106 according to the iris image of encryption key to encryption, if authentication success, illustrates that the user of the second terminal 1106 is the user bound with the second terminal 1106, the user of first terminal 1102 is then authorized to use vehicle.
More than be described with reference to the accompanying drawings technical scheme of the present invention, can the user of other-end authorized convenient, quickly to use vehicle when the user of car owner's terminal is not at vehicle periphery, thus improve Consumer's Experience.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (16)

1. an authorization method for vehicle, for car-mounted terminal, is characterized in that, comprising:
Receive the vehicle use solicited message that first terminal sends;
Judge that described vehicle uses solicited message whether to comprise authorized user identities information;
If do not comprise, then generate encryption key;
Use solicited message and described encryption key to be sent to the second terminal as authorization requests information on described vehicle, for described second terminal, authorization response message is sent to described first terminal;
Receive the described authorization response message that described first terminal sends;
Corresponding operation is performed according to described authorization response message.
2. the authorization method of vehicle according to claim 1, is characterized in that, described execution according to described authorization response message operates accordingly, specifically comprises:
Judge that whether described authorization response message is legal;
If legal, then solicited message is used to perform corresponding operating according to described vehicle.
3. the authorization method of vehicle according to claim 1 and 2, is characterized in that, judges that described vehicle uses after whether solicited message comprise authorized user identities information, also comprise described:
If judge, described vehicle uses solicited message to comprise described authorized user identities information, then use solicited message to perform corresponding operation according to described vehicle.
4. an authorization method for vehicle, for first terminal, is characterized in that, comprising:
Sending vehicle uses solicited message to car-mounted terminal;
Receive the authorization response message that the second terminal sends;
Decipher described authorization response message;
Send the authorization response message after deciphering to described car-mounted terminal.
5. an authorization method for vehicle, for the second terminal, is characterized in that, comprising:
Receive the authorization requests information of the use vehicle that car-mounted terminal sends;
License the instruction of described vehicle if receive, gather the biometric information of the user of described second terminal;
Described biometric information is sent to first terminal as authorization response message, obtains the authority using described vehicle for described second terminal according to described authorization response message.
6. the authorization method of vehicle according to claim 5, is characterized in that, described described biometric information is sent to the step of first terminal as authorization response message, specifically comprises:
By the encryption key in described authorization requests information, described biometric information is encrypted;
Described biometric information after encryption is sent to described first terminal as described authorization response message.
7. an authorization device for vehicle, for car-mounted terminal, is characterized in that, comprising:
Receiving element, the vehicle sent for receiving first terminal uses solicited message;
Judging unit, for judging that described vehicle uses solicited message whether to comprise authorized user identities information;
Generation unit, if use solicited message not comprise described authorized user identities information for described vehicle, then generates encryption key;
Transmitting element, for using solicited message and described encryption key to be sent to the second terminal as authorization requests information on described vehicle, is sent to described first terminal for described second terminal by authorization response message;
Described receiving element, also for receiving the described authorization response message that described first terminal sends;
Performance element, for performing corresponding operation according to described authorization response message.
8. the authorization device of vehicle according to claim 7, is characterized in that, described performance element comprises:
Judgment sub-unit, for judging that whether described authorization response message is legal;
Described performance element specifically for, if described authorization response message is legal, then use solicited message to perform corresponding operating according to described vehicle.
9. the authorization device of the vehicle according to claim 7 or 8, is characterized in that,
Described performance element also for, if judge, described vehicle uses solicited message to comprise described authorized user identities information, then use solicited message to perform corresponding operation according to described vehicle.
10. a car-mounted terminal, is characterized in that, comprising: the authorization device of the vehicle according to any one of claim 7 to 9.
The authorization device of 11. 1 kinds of vehicles, for first terminal, is characterized in that, comprising:
Sending module, uses solicited message to car-mounted terminal for sending vehicle;
Receiver module, for receiving the authorization response message that the second terminal sends;
Deciphering module, for deciphering described authorization response message;
Described sending module is also for sending the authorization response message after deciphering to described car-mounted terminal.
12. 1 kinds of terminals, is characterized in that, comprise the authorization device of vehicle as claimed in claim 11.
The authorization device of 13. 1 kinds of vehicles, for the second terminal, is characterized in that, comprising:
Receive module, for receiving the authorization requests information of the use vehicle that car-mounted terminal sends;
Gathering module, if for receiving the instruction licensing described vehicle, gathering the biometric information of the user of described second terminal;
Send module, for described biometric information is sent to first terminal as authorization response message, obtain the authority using described vehicle according to described authorization response message for described first terminal.
The authorization device of 14. vehicles according to claim 13, is characterized in that, described transmission module comprises:
Encryption submodule group, for being encrypted described biometric information by the encryption key in described authorization requests information;
Described transmission module specifically for, the described biometric information after encryption is sent to described first terminal as described authorization response message.
15. 1 kinds of terminals, is characterized in that, comprising: the authorization device of the vehicle as described in claim 13 or 14.
The authoring system of 16. 1 kinds of vehicles, is characterized in that, comprising:
Car-mounted terminal as claimed in claim 10;
Terminal as claimed in claim 12; And
Terminal as claimed in claim 15.
CN201510627106.9A 2015-09-28 2015-09-28 Vehicle authorization method, device, vehicle-mounted terminal, terminal and system Pending CN105187442A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510627106.9A CN105187442A (en) 2015-09-28 2015-09-28 Vehicle authorization method, device, vehicle-mounted terminal, terminal and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510627106.9A CN105187442A (en) 2015-09-28 2015-09-28 Vehicle authorization method, device, vehicle-mounted terminal, terminal and system

Publications (1)

Publication Number Publication Date
CN105187442A true CN105187442A (en) 2015-12-23

Family

ID=54909286

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510627106.9A Pending CN105187442A (en) 2015-09-28 2015-09-28 Vehicle authorization method, device, vehicle-mounted terminal, terminal and system

Country Status (1)

Country Link
CN (1) CN105187442A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105550553A (en) * 2015-06-30 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Permission management method, terminal, device and system
CN105577689A (en) * 2016-01-29 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Authority management method and device and terminal
CN105976472A (en) * 2016-05-20 2016-09-28 科世达(上海)管理有限公司 Access control permission management method and access control permission system for automobiles
CN106561027A (en) * 2016-08-19 2017-04-12 上海喜泊客信息技术有限公司 Login method and system and applicable vehicle terminal and vehicle
CN107679488A (en) * 2017-09-28 2018-02-09 智车优行科技(北京)有限公司 Control terminal in control method for vehicle and system, cloud server, vehicle
CN108510356A (en) * 2018-03-14 2018-09-07 斑马网络技术有限公司 Vehicle lends method and its lends system
CN108643729A (en) * 2018-04-25 2018-10-12 威马智慧出行科技(上海)有限公司 A kind of control method and control system of car door unlock
CN110417907A (en) * 2019-08-05 2019-11-05 斑马网络技术有限公司 The management method and device of terminal device
CN110474923A (en) * 2019-09-12 2019-11-19 北京深思数盾科技股份有限公司 A kind of data grant method and device
CN111770469A (en) * 2019-04-02 2020-10-13 北京车和家信息技术有限公司 Vehicle control method, device, vehicle and computer readable storage medium
CN112585042A (en) * 2020-03-17 2021-03-30 华为技术有限公司 Vehicle control method, communication device, and computer-readable storage medium
CN115065517A (en) * 2022-05-31 2022-09-16 华人运通(上海)云计算科技有限公司 Vehicle business authorization method, device, cloud server and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101934779A (en) * 2010-08-31 2011-01-05 中山大学 Intelligent vehicle anti-theft method and system
CN102529888A (en) * 2012-03-13 2012-07-04 鸿富锦精密工业(深圳)有限公司 Automobile use permission control system and method
CN103035054A (en) * 2012-12-29 2013-04-10 江苏中科天安智联科技有限公司 NFC intelligent automobile key system with permission and authorization functions
CN104392165A (en) * 2014-11-10 2015-03-04 广州日滨科技发展有限公司 Identity authorization controlling method and system
CN104786991A (en) * 2015-04-21 2015-07-22 北京汽车股份有限公司 Car control method and system based on fingerprint identification
CN104842802A (en) * 2015-05-08 2015-08-19 深圳市家信信息科技开发有限公司 Vehicle controller system and electric vehicle

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101934779A (en) * 2010-08-31 2011-01-05 中山大学 Intelligent vehicle anti-theft method and system
CN102529888A (en) * 2012-03-13 2012-07-04 鸿富锦精密工业(深圳)有限公司 Automobile use permission control system and method
CN103035054A (en) * 2012-12-29 2013-04-10 江苏中科天安智联科技有限公司 NFC intelligent automobile key system with permission and authorization functions
CN104392165A (en) * 2014-11-10 2015-03-04 广州日滨科技发展有限公司 Identity authorization controlling method and system
CN104786991A (en) * 2015-04-21 2015-07-22 北京汽车股份有限公司 Car control method and system based on fingerprint identification
CN104842802A (en) * 2015-05-08 2015-08-19 深圳市家信信息科技开发有限公司 Vehicle controller system and electric vehicle

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105550553B (en) * 2015-06-30 2019-11-12 宇龙计算机通信科技(深圳)有限公司 A kind of right management method, terminal, equipment and system
CN105550553A (en) * 2015-06-30 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Permission management method, terminal, device and system
CN105577689A (en) * 2016-01-29 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Authority management method and device and terminal
CN105976472A (en) * 2016-05-20 2016-09-28 科世达(上海)管理有限公司 Access control permission management method and access control permission system for automobiles
CN106561027A (en) * 2016-08-19 2017-04-12 上海喜泊客信息技术有限公司 Login method and system and applicable vehicle terminal and vehicle
CN107679488A (en) * 2017-09-28 2018-02-09 智车优行科技(北京)有限公司 Control terminal in control method for vehicle and system, cloud server, vehicle
CN108510356A (en) * 2018-03-14 2018-09-07 斑马网络技术有限公司 Vehicle lends method and its lends system
CN108643729A (en) * 2018-04-25 2018-10-12 威马智慧出行科技(上海)有限公司 A kind of control method and control system of car door unlock
CN111770469A (en) * 2019-04-02 2020-10-13 北京车和家信息技术有限公司 Vehicle control method, device, vehicle and computer readable storage medium
CN110417907A (en) * 2019-08-05 2019-11-05 斑马网络技术有限公司 The management method and device of terminal device
CN110417907B (en) * 2019-08-05 2022-04-15 斑马网络技术有限公司 Management method and device of terminal equipment
CN110474923A (en) * 2019-09-12 2019-11-19 北京深思数盾科技股份有限公司 A kind of data grant method and device
CN110474923B (en) * 2019-09-12 2021-01-22 北京深思数盾科技股份有限公司 Data authorization method and device
CN112585042A (en) * 2020-03-17 2021-03-30 华为技术有限公司 Vehicle control method, communication device, and computer-readable storage medium
WO2021184182A1 (en) * 2020-03-17 2021-09-23 华为技术有限公司 Vehicle control method, communication apparatus, and computer readable storage medium
CN112585042B (en) * 2020-03-17 2021-12-14 华为技术有限公司 Vehicle control method, communication device, and computer-readable storage medium
CN115065517A (en) * 2022-05-31 2022-09-16 华人运通(上海)云计算科技有限公司 Vehicle business authorization method, device, cloud server and system

Similar Documents

Publication Publication Date Title
CN105187442A (en) Vehicle authorization method, device, vehicle-mounted terminal, terminal and system
CN107085870B (en) Regulating vehicle access using encryption methods
CN107650863B (en) Vehicle sharing method and system
CN106851629B (en) Method for low power consumption Bluetooth communication between mobile equipment and vehicle
CN108512862B (en) Internet of things terminal security authentication management and control platform based on certificate-free identification authentication technology
CN102546155B (en) On-demand safe key generates method and system
CN111194028B (en) Safety control method based on vehicle
JP5999108B2 (en) Vehicle remote operation information providing device, in-vehicle remote operation information acquisition device, and vehicle remote operation system including these devices
CN106850680B (en) Intelligent identity authentication method and device for rail transit equipment
US20150045013A1 (en) Multi-level vehicle remote start authentication method & system
CN108471610B (en) Bluetooth connection control system
CN105635147A (en) Vehicle-mounted-special-equipment-system-based secure data transmission method and system
CN107277033B (en) Charging and battery replacing equipment and authentication method and system for object to be charged and battery replaced
CN110995710B (en) Smart home authentication method based on eUICC
CN107733636B (en) Authentication method and authentication system
CN111845624B (en) Method for starting vehicle without key
CN112396735B (en) Internet automobile digital key safety authentication method and device
CN113114668B (en) Information transmission method, mobile terminal, storage medium and electronic equipment
CN110121170B (en) Mobile network identity authentication method based on encryption technology
CN107733652B (en) Unlocking method and system for shared vehicle and vehicle lock
CN109041263B (en) TBox Bluetooth connection method and device
CN105100102A (en) Authority configuration method and device as well as information configuration method and device
CN107612949B (en) Wireless intelligent terminal access authentication method and system based on radio frequency fingerprint
CN111083696B (en) Communication verification method and system, mobile terminal and vehicle machine side
CN115396121A (en) Security authentication method for security chip OTA data packet and security chip device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20151223