CN105187442A - Vehicle authorization method, device, vehicle-mounted terminal, terminal and system - Google Patents
Vehicle authorization method, device, vehicle-mounted terminal, terminal and system Download PDFInfo
- Publication number
- CN105187442A CN105187442A CN201510627106.9A CN201510627106A CN105187442A CN 105187442 A CN105187442 A CN 105187442A CN 201510627106 A CN201510627106 A CN 201510627106A CN 105187442 A CN105187442 A CN 105187442A
- Authority
- CN
- China
- Prior art keywords
- terminal
- vehicle
- authorization
- response message
- authorization response
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention proposes a vehicle authorization method, a vehicle authorization device, a vehicle-mounted terminal, a terminal and a vehicle authorization system. The vehicle authorization method comprises the following steps: receiving vehicle use request information sent by a first terminal; judging whether the vehicle use request information comprises authorization user identity information or not; if no, generating an encryption key; using the vehicle use request information and the encryption key as authorization request information and sending the authorization request information to a second terminal, so that the second terminal sends authorization response information to the first terminal; receiving the authorization response information sent by the first terminal; and performing a corresponding operation according to the authorization response information. Through the adoption of the technical solution of the present invention, an unauthorized terminal can be conveniently and rapidly authorized to use the vehicle, thereby promoting the user experience.
Description
Technical field
The present invention relates to communication technical field, in particular to the authoring system of the authorization device of a kind of authorization method of vehicle, a kind of vehicle, a kind of car-mounted terminal, a kind of terminal and a kind of vehicle.
Background technology
At present, user can carry out Long-distance Control and operation by the vehicle of terminal (as mobile phone, flat board) to networking, for the intellectuality of car networked system and networking provide feasible, reliable, safe and solution easily, bring great convenience to the daily life of user, also provide very high reliability at secure context.
But, the car networked system adopting biometric information to carry out authentication in prior art need the user of car owner's terminal for its mandate could to networking vehicle operate, namely for the unauthorized user of those vehicles needing Interim use to network, the authority that vehicle is operated just can only can be made it have by the subscriber authorisation of car owner's terminal, but, authorize when the user of car owner's terminal is not or not vehicle side the user of other-end to use vehicle very inconvenient, bring the experience of extreme difference to user.
Therefore, how convenient when the user of car owner's terminal is not at vehicle periphery, authorize the user of other-end to use vehicle to become problem demanding prompt solution quickly.
Summary of the invention
The present invention, just based on the problems referred to above, proposes a kind of new technical scheme, can the user of other-end be authorized convenient, quickly to use vehicle, thus improve Consumer's Experience when the user of car owner's terminal is not at vehicle periphery.
In view of this, a first aspect of the present invention proposes a kind of authorization method of vehicle, for car-mounted terminal, comprising: receive the vehicle use solicited message that first terminal sends; Judge that described vehicle uses solicited message whether to comprise authorized user identities information; If do not comprise, then generate encryption key; Use solicited message and described encryption key to be sent to the second terminal as authorization requests information on described vehicle, for described second terminal, authorization response message is sent to described first terminal; Receive the described authorization response message that described first terminal sends; Corresponding operation is performed according to described authorization response message.
In this technical scheme, when there being the user of first terminal (unauthorized terminal) to want the vehicle of the user of use second terminal (i.e. car owner's terminal), the vehicle sent by receiving first terminal uses solicited message, wherein, vehicle uses solicited message comprise but be not limited to the subscriber identity information of first terminal, such as, subscriber identity information can be the name of user, telephone number, identity card and address etc. in detail.Then judge vehicle uses in solicited message whether comprise authorized user identities information, such as, the subscriber identity information in solicited message is used by vehicle to mate with the authorized user identities information stored in the authorization user information storehouse in vehicle, if the match is successful, namely vehicle uses solicited message to comprise authorized user identities information, also just illustrate that the user of car owner's terminal of vehicle has authorized the user of first terminal to use vehicle, otherwise, generate encryption key.Further, if car-mounted terminal is after receiving the authorization response message from first terminal, such as authorization response message comprises the biometric information (as iris, fingerprint, palmmprint, sound etc.) of the user of the second terminal, thus can determine whether the user of the second terminal is validated user according to authorization response message, if validated user, car-mounted terminal can authorize first terminal to have the authority of operation vehicle.Therefore, by technique scheme, can the user of unauthorized terminal be authorized convenient, quickly to use vehicle when the user of car owner's terminal is not at vehicle periphery, thus improve Consumer's Experience.
Preferably, can arrange encryption key has ageing, namely encryption key is effective in Preset Time, also just illustrate to only have encryption key in preset time range, just can be decrypted authorization response message by encryption key, that is in Preset Time, the user of first terminal has the authority using this vehicle, to facilitate this vehicle of user's Interim use of unauthorized terminal.
In technique scheme, preferably, described execution according to described authorization response message operates accordingly, specifically comprises: judge that whether described authorization response message is legal; If legal, then solicited message is used to perform corresponding operating according to described vehicle.
In this technical scheme, by judging that whether authorization response message is legal, if legal, then solicited message is used to perform operation response according to vehicle, particularly, obtain the biometric information of the user of the second terminal (i.e. car owner's terminal) in authorization response message, judge according to biometric information whether the user of the second terminal is validated user, if so, then solicited message can be used to perform corresponding operating according to vehicle.Such as, vehicle use solicited message is the request of the car door opening vehicle, then the user of first terminal (unauthorized terminal) can open the car door of vehicle.So, the user avoiding illegal terminal uses vehicle, thus improves the safety and reliability of vehicle remote mandate.
In above-mentioned arbitrary technical scheme, preferably, judge that described vehicle uses after whether solicited message comprise authorized user identities information described, also comprise: described vehicle uses solicited message to comprise described authorized user identities information if judge, then use solicited message to perform corresponding operation according to described vehicle.
In this technical scheme, when judging that vehicle uses solicited message to comprise authorized user identities information, this subscriber identity information is had in the authorization user information storehouse of i.e. vehicle, also just illustrate that the user of car owner's terminal (i.e. the second terminal) of vehicle has authorized the user of first terminal to use vehicle, then solicited message can be used to perform corresponding operation according to vehicle, so, the user avoiding first terminal repeatedly uses during vehicle and needs to send the troublesome operation of repeatedly asking, improve the convenience of authorizing the user of first terminal to use vehicle further, thus improve Consumer's Experience.
A second aspect of the present invention proposes a kind of authorization method of vehicle, for first terminal, comprising: send vehicle and use solicited message to car-mounted terminal; Receive the authorization response message that the second terminal sends; Decipher described authorization response message; Send the authorization response message after deciphering to described car-mounted terminal.
In this technical scheme, sending vehicle by first terminal (i.e. unauthorized terminal) uses request to car-mounted terminal, request is used to be sent to the second terminal (i.e. car owner's terminal) on vehicle for car-mounted terminal, if receive the authorization response message that the second terminal sends, illustrate that the user of the second terminal allows the user of first terminal to use vehicle, then decrypt authorized response message, and the authorization response message after deciphering is sent to car-mounted terminal, judge whether to authorize the user of first terminal to use vehicle according to the authorization response message after deciphering for car-mounted terminal, so just make the user of car owner's terminal can be not convenient when vehicle periphery, the user of unauthorized terminal is authorized to use vehicle quickly, thus improve Consumer's Experience.
A third aspect of the present invention proposes a kind of authorization method of vehicle, for the second terminal, comprising: the authorization requests information receiving the use vehicle that car-mounted terminal sends; License the instruction of described vehicle if receive, gather the biometric information of the user of described second terminal; Described biometric information is sent to first terminal as authorization response message, obtains the authority using described vehicle for described second terminal according to described authorization response message.
In this technical scheme, by receiving the authorization requests information from the use vehicle of car-mounted terminal, and when receiving the instruction licensing vehicle, namely the user of the second terminal (car owner's terminal) allows the user of unauthorized terminal to use vehicle, gather the biometric information of the user of the second terminal (as iris, fingerprint, palmmprint, sound etc.), then biometric information is sent to first terminal (i.e. unauthorized terminal) as authorization response message, obtain the authority using vehicle according to authorization response message for first terminal, so, can be convenient when the user of car owner's terminal is not at vehicle periphery, the user of unauthorized terminal is authorized to use vehicle quickly, thus improve Consumer's Experience.
In technique scheme, preferably, described described biometric information is sent to the step of first terminal as authorization response message, specifically comprises: by the encryption key in described authorization requests information, described biometric information is encrypted; Described biometric information after encryption is sent to described first terminal as described authorization response message.
In this technical scheme, by the encryption key in authorization requests information, the biometric information collected is encrypted, and the biometric information after encryption is sent to first terminal as authorization response message, avoid authorization response message to be revealed when being sent to first terminal, thus effectively can guarantee the fail safe of authorization response message, it also avoid disabled user simultaneously and utilize artificial iris to obtain the authority using vehicle, thus improve the reliability that remote authorization uses vehicle.
A fourth aspect of the present invention proposes a kind of authorization device of vehicle, for car-mounted terminal, comprising: receiving element, and the vehicle sent for receiving first terminal uses solicited message; Judging unit, for judging that described vehicle uses solicited message whether to comprise authorized user identities information; Generation unit, if use solicited message not comprise described authorized user identities information for described vehicle, then generates encryption key; Transmitting element, for using solicited message and described encryption key to be sent to the second terminal as authorization requests information on described vehicle, is sent to described first terminal for described second terminal by authorization response message; Described receiving element, also for receiving the described authorization response message that described first terminal sends; Performance element, for performing corresponding operation according to described authorization response message.
In this technical scheme, when there being the user of first terminal (unauthorized terminal) to want the vehicle of the user of use second terminal (i.e. car owner's terminal), the vehicle sent by receiving first terminal uses solicited message, wherein, vehicle uses solicited message comprise but be not limited to the subscriber identity information of first terminal, such as, subscriber identity information can be the name of user, telephone number, identity card and address etc. in detail.Then judge vehicle uses in solicited message whether comprise authorized user identities information, such as, the subscriber identity information in solicited message is used by vehicle to mate with the authorized user identities information stored in the authorization user information storehouse in vehicle, if the match is successful, namely vehicle uses solicited message to comprise authorized user identities information, also just illustrate that the user of car owner's terminal of vehicle has authorized the user of first terminal to use vehicle, otherwise, generate encryption key.Further, if car-mounted terminal is after receiving the authorization response message from first terminal, such as authorization response message comprises the biometric information (as iris, fingerprint, palmmprint, sound etc.) of the user of the second terminal, thus can determine whether the user of the second terminal is validated user according to authorization response message, if validated user, car-mounted terminal can authorize first terminal to have the authority of operation vehicle.Therefore, by technique scheme, can the user of unauthorized terminal be authorized convenient, quickly to use vehicle when the user of car owner's terminal is not at vehicle periphery, thus improve Consumer's Experience.
Preferably, can arrange encryption key has ageing, namely encryption key is effective in Preset Time, also just illustrate to only have encryption key in preset time range, just can be decrypted authorization response message by encryption key, that is in Preset Time, the user of first terminal has the authority using this vehicle, to facilitate this vehicle of user's Interim use of unauthorized terminal.
In technique scheme, preferably, described performance element comprises: judgment sub-unit, for judging that whether described authorization response message is legal; Described performance element specifically for, if described authorization response message is legal, then use solicited message to perform corresponding operating according to described vehicle.
In this technical scheme, by judging that whether authorization response message is legal, if legal, then solicited message is used to perform operation response according to vehicle, particularly, obtain the biometric information of the user of the second terminal (i.e. car owner's terminal) in authorization response message, judge according to biometric information whether the user of the second terminal is validated user, if so, then solicited message can be used to perform corresponding operating according to vehicle.Such as, vehicle use solicited message is the request of the car door opening vehicle, then the user of first terminal (unauthorized terminal) can open the car door of vehicle.So, the user avoiding illegal terminal uses vehicle, thus improves the safety and reliability of vehicle remote mandate.
In above-mentioned arbitrary technical scheme, preferably, described performance element also for, if judge, described vehicle uses solicited message to comprise described authorized user identities information, then use solicited message to perform corresponding operation according to described vehicle.
In this technical scheme, when judging that vehicle uses solicited message to comprise authorized user identities information, this subscriber identity information is had in the authorization user information storehouse of i.e. vehicle, also just illustrate that the user of car owner's terminal (i.e. the second terminal) of vehicle has authorized the user of first terminal to use vehicle, then solicited message can be used to perform corresponding operation according to vehicle, so, the user avoiding first terminal repeatedly uses during vehicle and needs to send the troublesome operation of repeatedly asking, improve the convenience of authorizing the user of first terminal to use vehicle further, thus improve Consumer's Experience.
A fifth aspect of the present invention proposes a kind of car-mounted terminal, comprise the authorization device of the vehicle according to any one of technique scheme, therefore, this car-mounted terminal has the technique effect identical with the authorization device of the vehicle according to any one of technique scheme, does not repeat them here.
A sixth aspect of the present invention proposes a kind of authorization device of vehicle, for first terminal, comprising: sending module, uses solicited message to car-mounted terminal for sending vehicle; Receiver module, for receiving the authorization response message that the second terminal sends; Deciphering module, for deciphering described authorization response message; Described sending module is also for sending the authorization response message after deciphering to described car-mounted terminal.
In this technical scheme, sending vehicle by first terminal (i.e. unauthorized terminal) uses request to car-mounted terminal, request is used to be sent to the second terminal (i.e. car owner's terminal) on vehicle for car-mounted terminal, if receive the authorization response message that the second terminal sends, illustrate that the user of the second terminal allows the user of first terminal to use vehicle, then decrypt authorized response message, and the authorization response message after deciphering is sent to car-mounted terminal, judge whether to authorize the user of first terminal to use vehicle according to the authorization response message after deciphering for car-mounted terminal, so just make the user of car owner's terminal can be not convenient when vehicle periphery, the user of unauthorized terminal is authorized to use vehicle quickly, thus improve Consumer's Experience.
A seventh aspect of the present invention proposes a kind of terminal, comprise the authorization device of the vehicle in technique scheme described in the 5th aspect, therefore, this terminal has the technique effect identical with the authorization device of the vehicle according to any one of technique scheme, does not repeat them here.
A eighth aspect of the present invention proposes a kind of authorization device of vehicle, for the second terminal, comprising: receive module, for receiving the authorization requests information of the use vehicle that car-mounted terminal sends; Gathering module, if for receiving the instruction licensing described vehicle, gathering the biometric information of the user of described second terminal; Send module, for described biometric information is sent to first terminal as authorization response message, obtain the authority using described vehicle according to described authorization response message for described first terminal.
In this technical scheme, by receiving the authorization requests information from the use vehicle of car-mounted terminal, and when receiving the instruction licensing vehicle, namely the user of the second terminal (car owner's terminal) allows the user of unauthorized terminal to use vehicle, gather the biometric information of the user of the second terminal (as iris, fingerprint, palmmprint, sound etc.), then biometric information is sent to first terminal (i.e. unauthorized terminal) as authorization response message, obtain the authority using vehicle according to authorization response message for first terminal, so, can be convenient when the user of car owner's terminal is not at vehicle periphery, the user of unauthorized terminal is authorized to use vehicle quickly, thus improve Consumer's Experience.
In technique scheme, preferably, described transmission module comprises: encryption submodule group, for being encrypted described biometric information by the encryption key in described authorization requests information; Described transmission module specifically for, the described biometric information after encryption is sent to described first terminal as described authorization response message.
In this technical scheme, by the encryption key in authorization requests information, the biometric information collected is encrypted, and the biometric information after encryption is sent to first terminal as authorization response message, avoid authorization response message to be revealed when being sent to first terminal, thus effectively can guarantee the fail safe of authorization response message, it also avoid disabled user simultaneously and utilize artificial iris to obtain the authority using vehicle, thus improve the reliability that remote authorization uses vehicle.
A ninth aspect of the present invention proposes a kind of terminal, comprise the authorization device of the vehicle in above-mentioned any one technical scheme described in the 7th aspect, therefore, this car-mounted terminal has the technique effect identical with the authorization device of the vehicle according to any one of technique scheme, does not repeat them here.
A tenth aspect of the present invention proposes a kind of authoring system of vehicle, comprising: the car-mounted terminal in technique scheme described in the 5th aspect; Terminal in technique scheme described in the 7th aspect; And the terminal in technique scheme described in the 9th aspect, therefore, the authoring system of this vehicle has the technique effect identical with the terminal described in the 9th aspect with the terminal described in the car-mounted terminal in technique scheme described in the 5th aspect, the 7th aspect, does not repeat them here.
By technical scheme of the present invention, can the user of other-end be authorized convenient, quickly to use vehicle when the user of car owner's terminal is not at vehicle periphery, thus improve Consumer's Experience.
Accompanying drawing explanation
Fig. 1 shows the schematic flow sheet of the authorization method of the vehicle for car-mounted terminal according to an embodiment of the invention;
Fig. 2 shows the schematic flow sheet of the authorization method of the vehicle for unauthorized terminal according to an embodiment of the invention;
Fig. 3 shows the schematic flow sheet of the authorization method of the vehicle for car owner's terminal according to an embodiment of the invention;
Fig. 4 shows the structural representation of the authorization device of the vehicle for car-mounted terminal according to an embodiment of the invention;
Fig. 5 shows the structural representation of car-mounted terminal according to an embodiment of the invention;
Fig. 6 shows the structural representation of the authorization device of the vehicle for unauthorized terminal according to an embodiment of the invention;
Fig. 7 shows the structural representation of terminal according to an embodiment of the invention;
Fig. 8 shows the structural representation of the authorization device of the vehicle for car owner's terminal according to an embodiment of the invention;
Fig. 9 shows the structural representation of terminal according to another embodiment of the invention;
Figure 10 shows the structural representation of the authoring system of vehicle according to an embodiment of the invention;
Figure 11 shows the structural representation of the authoring system of vehicle according to another embodiment of the invention.
Embodiment
In order to more clearly understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments, the present invention is further described in detail.It should be noted that, when not conflicting, the feature in the embodiment of the application and embodiment can combine mutually.
Set forth a lot of detail in the following description so that fully understand the present invention; but; the present invention can also adopt other to be different from other modes described here and implement, and therefore, protection scope of the present invention is not by the restriction of following public specific embodiment.
Fig. 1 shows the schematic flow sheet of the authorization method of the vehicle for car-mounted terminal according to an embodiment of the invention.
As shown in Figure 1, the authorization method of the vehicle for car-mounted terminal according to an embodiment of the invention, comprising:
Step 102, receives the vehicle use solicited message that first terminal sends;
Step 104, judges that described vehicle uses solicited message whether to comprise authorized user identities information;
Step 106, if do not comprise, then generates encryption key;
Step 108, uses solicited message and described encryption key to be sent to the second terminal as authorization requests information on described vehicle, for described second terminal, authorization response message is sent to described first terminal;
Step 110, receives the described authorization response message that described first terminal sends;
Step 112, performs corresponding operation according to described authorization response message.
In this technical scheme, when there being the user of first terminal (unauthorized terminal) to want the vehicle of the user of use second terminal (i.e. car owner's terminal), the vehicle sent by receiving first terminal uses solicited message, wherein, vehicle uses solicited message comprise but be not limited to the subscriber identity information of first terminal, such as, subscriber identity information can be the name of user, telephone number, identity card and address etc. in detail.Then judge vehicle uses in solicited message whether comprise authorized user identities information, such as, the subscriber identity information in solicited message is used by vehicle to mate with the authorized user identities information stored in the authorization user information storehouse in vehicle, if the match is successful, namely vehicle uses solicited message to comprise authorized user identities information, also just illustrate that the user of car owner's terminal of vehicle has authorized the user of first terminal to use vehicle, otherwise, generate encryption key.Further, if car-mounted terminal is after receiving the authorization response message from first terminal, such as authorization response message comprises the biometric information (as iris, fingerprint, palmmprint, sound etc.) of the user of the second terminal, thus can determine whether the user of the second terminal is validated user according to authorization response message, if validated user, car-mounted terminal can authorize first terminal to have the authority of operation vehicle.Therefore, by technique scheme, can the user of unauthorized terminal be authorized convenient, quickly to use vehicle when the user of car owner's terminal is not at vehicle periphery, thus improve Consumer's Experience.
Preferably, can arrange encryption key has ageing, namely encryption key is effective in Preset Time, also just illustrate to only have encryption key in preset time range, just can be decrypted authorization response message by encryption key, that is in Preset Time, the user of first terminal has the authority using this vehicle, to facilitate this vehicle of user's Interim use of unauthorized terminal.
In technique scheme, preferably, step 112 comprises: judge that whether described authorization response message is legal; If legal, then solicited message is used to perform corresponding operating according to described vehicle.
In this technical scheme, by judging that whether authorization response message is legal, if legal, then solicited message is used to perform operation response according to vehicle, particularly, obtain the biometric information of the user of the second terminal (i.e. car owner's terminal) in authorization response message, judge according to biometric information whether the user of the second terminal is validated user, if so, then solicited message can be used to perform corresponding operating according to vehicle.Such as, vehicle use solicited message is the request of the car door opening vehicle, then the user of first terminal (unauthorized terminal) can open the car door of vehicle.So, the user avoiding illegal terminal uses vehicle, thus improves the safety and reliability of vehicle remote mandate.
In above-mentioned arbitrary technical scheme, preferably, after step 104, also comprise: described vehicle uses solicited message to comprise described authorized user identities information if judge, then use solicited message to perform corresponding operation according to described vehicle.
In this technical scheme, when judging that vehicle uses solicited message to comprise authorized user identities information, this subscriber identity information is had in the authorization user information storehouse of i.e. vehicle, also just illustrate that the user of car owner's terminal (i.e. the second terminal) of vehicle has authorized the user of first terminal to use vehicle, then solicited message can be used to perform corresponding operation according to vehicle, so, the user avoiding first terminal repeatedly uses during vehicle and needs to send the troublesome operation of repeatedly asking, improve the convenience of authorizing the user of first terminal to use vehicle further, thus improve Consumer's Experience.
Fig. 2 shows the schematic flow sheet of the authorization method of the vehicle for unauthorized terminal according to an embodiment of the invention.
As shown in Figure 2, the authorization method of the vehicle for unauthorized terminal (first terminal) according to an embodiment of the invention, comprising:
Step 202, sends vehicle and uses solicited message to car-mounted terminal;
Step 204, receives the authorization response message that the second terminal sends;
Step 206, deciphers described authorization response message;
Step 208, sends the authorization response message after deciphering to described car-mounted terminal.
In this technical scheme, sending vehicle by first terminal (i.e. unauthorized terminal) uses request to car-mounted terminal, request is used to be sent to the second terminal (i.e. car owner's terminal) on vehicle for car-mounted terminal, if receive the authorization response message that the second terminal sends, illustrate that the user of the second terminal allows the user of first terminal to use vehicle, then decrypt authorized response message, and the authorization response message after deciphering is sent to car-mounted terminal, judge whether to authorize the user of first terminal to use vehicle according to the authorization response message after deciphering for car-mounted terminal, so just make the user of car owner's terminal can be not convenient when vehicle periphery, the user of unauthorized terminal is authorized to use vehicle quickly, thus improve Consumer's Experience.
Fig. 3 shows the schematic flow sheet of the authorization method of the vehicle for car owner's terminal according to an embodiment of the invention.
As shown in Figure 3, the authorization method of the vehicle for car owner's terminal (the second terminal) according to an embodiment of the invention, comprising:
Step 302, receives the authorization requests information of the use vehicle that car-mounted terminal sends;
Step 304, licenses the instruction of described vehicle if receive, gather the biometric information of the user of described second terminal;
Step 306, is sent to first terminal using described biometric information as authorization response message, obtains the authority using described vehicle for described second terminal according to described authorization response message.
In this technical scheme, by receiving the authorization requests information from the use vehicle of car-mounted terminal, and when receiving the instruction licensing vehicle, namely the user of the second terminal (car owner's terminal) allows the user of unauthorized terminal to use vehicle, gather the biometric information of the user of the second terminal (as iris, fingerprint, palmmprint, sound etc.), then biometric information is sent to first terminal (i.e. unauthorized terminal) as authorization response message, obtain the authority using vehicle according to authorization response message for first terminal, so, can be convenient when the user of car owner's terminal is not at vehicle periphery, the user of unauthorized terminal is authorized to use vehicle quickly, thus improve Consumer's Experience.
In technique scheme, preferably, described described biometric information is sent to the step of first terminal as authorization response message, specifically comprises: by the encryption key in described authorization requests information, described biometric information is encrypted; Described biometric information after encryption is sent to described first terminal as described authorization response message.
In this technical scheme, by the encryption key in authorization requests information, the biometric information collected is encrypted, and the biometric information after encryption is sent to first terminal as authorization response message, avoid authorization response message to be revealed when being sent to first terminal, thus effectively can guarantee the fail safe of authorization response message, it also avoid disabled user simultaneously and utilize artificial iris to obtain the authority using vehicle, thus improve the reliability that remote authorization uses vehicle.
Fig. 4 shows the structural representation of the authorization device of the vehicle for car-mounted terminal according to an embodiment of the invention.
As shown in Figure 4, the authorization device 400 of the vehicle for car-mounted terminal according to an embodiment of the invention, comprise: receiving element 402, judging unit 404, generation unit 406, transmitting element 408 and performance element 410, wherein, described receiving element 402 uses solicited message for the vehicle receiving first terminal transmission; Described judging unit 404, for judging that described vehicle uses solicited message whether to comprise authorized user identities information; Described generation unit 406, if use solicited message not comprise described authorized user identities information for described vehicle, then generates encryption key; Described transmitting element 408, for using solicited message and described encryption key to be sent to the second terminal as authorization requests information on described vehicle, is sent to described first terminal for described second terminal by authorization response message; Described receiving element 402, also for receiving the described authorization response message that described first terminal sends; Described performance element 410, for performing corresponding operation according to described authorization response message.
In this technical scheme, when there being the user of first terminal (unauthorized terminal) to want the vehicle of the user of use second terminal (i.e. car owner's terminal), the vehicle sent by receiving first terminal uses solicited message, wherein, vehicle uses solicited message comprise but be not limited to the subscriber identity information of first terminal, such as, subscriber identity information can be the name of user, telephone number, identity card and address etc. in detail.Then judge vehicle uses in solicited message whether comprise authorized user identities information, such as, the subscriber identity information in solicited message is used by vehicle to mate with the authorized user identities information stored in the authorization user information storehouse in vehicle, if the match is successful, namely vehicle uses solicited message to comprise authorized user identities information, also just illustrate that the user of car owner's terminal of vehicle has authorized the user of first terminal to use vehicle, otherwise, generate encryption key.Further, if car-mounted terminal is after receiving the authorization response message from first terminal, such as authorization response message comprises the biometric information (as iris, fingerprint, palmmprint, sound etc.) of the user of the second terminal, thus can determine whether the user of the second terminal is validated user according to authorization response message, if validated user, car-mounted terminal can authorize first terminal to have the authority of operation vehicle.Therefore, by technique scheme, can the user of unauthorized terminal be authorized convenient, quickly to use vehicle when the user of car owner's terminal is not at vehicle periphery, thus improve Consumer's Experience.
Preferably, can arrange encryption key has ageing, namely encryption key is effective in Preset Time, also just illustrate to only have encryption key in preset time range, just can be decrypted authorization response message by encryption key, that is in Preset Time, the user of first terminal has the authority using this vehicle, to facilitate this vehicle of user's Interim use of unauthorized terminal.
In technique scheme, preferably, described performance element 410 comprises: judgment sub-unit 4102, for judging that whether described authorization response message is legal; Described performance element 410 specifically for, if described authorization response message is legal, then use solicited message to perform corresponding operating according to described vehicle.
In this technical scheme, by judging that whether authorization response message is legal, if legal, then solicited message is used to perform operation response according to vehicle, particularly, obtain the biometric information of the user of the second terminal (i.e. car owner's terminal) in authorization response message, judge according to biometric information whether the user of the second terminal is validated user, if so, then solicited message can be used to perform corresponding operating according to vehicle.Such as, vehicle use solicited message is the request of the car door opening vehicle, then the user of first terminal (unauthorized terminal) can open the car door of vehicle.So, the user avoiding illegal terminal uses vehicle, thus improves the safety and reliability of vehicle remote mandate.
In above-mentioned arbitrary technical scheme, preferably, described performance element 410 also for, if judge, described vehicle uses solicited message to comprise described authorized user identities information, then use solicited message to perform corresponding operation according to described vehicle.
In this technical scheme, when judging that vehicle uses solicited message to comprise authorized user identities information, this subscriber identity information is had in the authorization user information storehouse of i.e. vehicle, also just illustrate that the user of car owner's terminal (i.e. the second terminal) of vehicle has authorized the user of first terminal to use vehicle, then solicited message can be used to perform corresponding operation according to vehicle, so, the user avoiding first terminal repeatedly uses during vehicle and needs to send the troublesome operation of repeatedly asking, improve the convenience of authorizing the user of first terminal to use vehicle further, thus improve Consumer's Experience.
Fig. 5 shows the structural representation of car-mounted terminal according to an embodiment of the invention.
As shown in Figure 5, car-mounted terminal 500 according to an embodiment of the invention, comprise the authorization device 400 of the vehicle according to any one of technique scheme, therefore, this car-mounted terminal 500 has the technique effect identical with the authorization device 400 of the vehicle according to any one of technique scheme, does not repeat them here.
Fig. 6 shows the structural representation of the authorization device of the vehicle for unauthorized terminal according to an embodiment of the invention.
As shown in Figure 6, the authorization device 600 of the vehicle for unauthorized terminal (first terminal) according to an embodiment of the invention, comprise: sending module 602, receiver module 604 and deciphering module 606, wherein, described sending module 602 uses solicited message to car-mounted terminal for sending vehicle; Described receiver module 604, for receiving the authorization response message that the second terminal sends; Described deciphering module 606, for deciphering described authorization response message; Described sending module 602 is also for sending the authorization response message after deciphering to described car-mounted terminal.
In this technical scheme, sending vehicle by first terminal (i.e. unauthorized terminal) uses request to car-mounted terminal, request is used to be sent to the second terminal (i.e. car owner's terminal) on vehicle for car-mounted terminal, if receive the authorization response message that the second terminal sends, illustrate that the user of the second terminal allows the user of first terminal to use vehicle, then decrypt authorized response message, and the authorization response message after deciphering is sent to car-mounted terminal, judge whether to authorize the user of first terminal to use vehicle according to the authorization response message after deciphering for car-mounted terminal, so just make the user of car owner's terminal can be not convenient when vehicle periphery, the user of unauthorized terminal is authorized to use vehicle quickly, thus improve Consumer's Experience.
Fig. 7 shows the structural representation of terminal according to an embodiment of the invention.
As shown in Figure 7, terminal 700 according to an embodiment of the invention, comprise the authorization device 600 of the vehicle in technique scheme described in the 5th aspect, therefore, this terminal 700 has the technique effect identical with the authorization device 600 of the vehicle according to any one of technique scheme, does not repeat them here.
Fig. 8 shows the structural representation of the authorization device of the vehicle for car owner's terminal according to an embodiment of the invention.
As shown in Figure 8, the authorization device 800 of the vehicle for car owner's terminal (the second terminal) according to an embodiment of the invention, comprising: receive module 802, for receiving the authorization requests information of the use vehicle that car-mounted terminal sends; Gathering module 804, if for receiving the instruction licensing described vehicle, gathering the biometric information of the user of described second terminal; Send module 806, for described biometric information is sent to first terminal as authorization response message, obtain the authority using described vehicle according to described authorization response message for described first terminal.
In this technical scheme, by receiving the authorization requests information from the use vehicle of car-mounted terminal, and when receiving the instruction licensing vehicle, namely the user of the second terminal (car owner's terminal) allows the user of unauthorized terminal to use vehicle, gather the biometric information of the user of the second terminal (as iris, fingerprint, palmmprint, sound etc.), then biometric information is sent to first terminal (i.e. unauthorized terminal) as authorization response message, obtain the authority using vehicle according to authorization response message for first terminal, so, can be convenient when the user of car owner's terminal is not at vehicle periphery, the user of unauthorized terminal is authorized to use vehicle quickly, thus improve Consumer's Experience.
In technique scheme, preferably, described transmission module 806 comprises: encryption submodule group 8062, for being encrypted described biometric information by the encryption key in described authorization requests information; Described transmission module 806 specifically for, the described biometric information after encryption is sent to described first terminal as described authorization response message.
In this technical scheme, by the encryption key in authorization requests information, the biometric information collected is encrypted, and the biometric information after encryption is sent to first terminal as authorization response message, avoid authorization response message to be revealed when being sent to first terminal, thus effectively can guarantee the fail safe of authorization response message, it also avoid disabled user simultaneously and utilize artificial iris to obtain the authority using vehicle, thus improve the reliability that remote authorization uses vehicle.
Fig. 9 shows the structural representation of terminal according to another embodiment of the invention.
As shown in Figure 9, terminal 900 according to another embodiment of the invention, comprise the authorization device 800 of the vehicle in above-mentioned any one technical scheme described in the 7th aspect, therefore, this terminal 900 has the technique effect identical with the authorization device 800 of the vehicle according to any one of technique scheme, does not repeat them here.
Figure 10 shows the structural representation of the authoring system of vehicle according to an embodiment of the invention.
As shown in Figure 10, the authoring system 1000 of vehicle according to an embodiment of the invention, comprising: the car-mounted terminal 500 in technique scheme; Terminal 700 in technique scheme; And the terminal 900 in technique scheme, therefore, the authoring system 1000 of this vehicle has and the car-mounted terminal 500 in technique scheme, technique effect that terminal 700 is identical with terminal 900, does not repeat them here.
Figure 11 shows the structural representation of the authoring system of vehicle according to another embodiment of the invention.
As shown in figure 11, the authoring system 1100 of vehicle according to another embodiment of the invention, comprise: first terminal (unauthorized terminal) 1102, car-mounted terminal 1104 and the second terminal (car owner's terminal) 1106, the NFC set up between first terminal 1102 with car-mounted terminal 1104 by the first NFC module 11022 of first terminal 1102 and the second NFC module 11042 of car-mounted terminal 1104 is connected, with by first terminal 1102 subscriber identity information (as, name, telephone number, identity card and in detail address etc.) be sent to car-mounted terminal 1104, authentication module 11044 in car-mounted terminal 1104 is for judging whether there is userspersonal information in the authorization user information storehouse of car-mounted terminal 1104, if exist, namely first terminal 1102 is authorization terminal, the user then directly licensing to first terminal 1102 uses the authority of vehicle belonging to this car-mounted terminal 1104, if do not exist, illustrate that the user of first terminal 1102 is casual user, i.e. unauthorized user, then generate encryption key according to subscriber identity information.Then by the SIM (SubscriberIdentityModule of car-mounted terminal 1104, client identification module) subscriber identity information and encryption key be sent to the second terminal 1106 by card module 11046 jointly, second terminal 1106 shows the subscriber identity information from car-mounted terminal 1104 received, and determines whether the vehicle at subscriber authorisation use car-mounted terminal 1104 place to first terminal 1102 for user.If the second terminal 1106 receives the instruction of authorizing the user of first terminal 1102 to use vehicle, the iris image (biometric information) of the user of the second terminal 1106 is gathered by the iris capturing module 11062 of the second terminal 1106, encryption key according to receiving from car-mounted terminal 1104 is encrypted iris image, and the iris image after encryption is sent to first terminal 1102, and then be connected by the NFC that the first NFC module 11022 and the second NFC module 11042 are set up between first terminal 1102 with car-mounted terminal 1104, to make first terminal 1102, the iris image of encryption is sent to car-mounted terminal 1104, the iris processing module 11048 of car-mounted terminal 1104 is decrypted to carry out authentication to the user of the second terminal 1106 according to the iris image of encryption key to encryption, if authentication success, illustrates that the user of the second terminal 1106 is the user bound with the second terminal 1106, the user of first terminal 1102 is then authorized to use vehicle.
More than be described with reference to the accompanying drawings technical scheme of the present invention, can the user of other-end authorized convenient, quickly to use vehicle when the user of car owner's terminal is not at vehicle periphery, thus improve Consumer's Experience.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (16)
1. an authorization method for vehicle, for car-mounted terminal, is characterized in that, comprising:
Receive the vehicle use solicited message that first terminal sends;
Judge that described vehicle uses solicited message whether to comprise authorized user identities information;
If do not comprise, then generate encryption key;
Use solicited message and described encryption key to be sent to the second terminal as authorization requests information on described vehicle, for described second terminal, authorization response message is sent to described first terminal;
Receive the described authorization response message that described first terminal sends;
Corresponding operation is performed according to described authorization response message.
2. the authorization method of vehicle according to claim 1, is characterized in that, described execution according to described authorization response message operates accordingly, specifically comprises:
Judge that whether described authorization response message is legal;
If legal, then solicited message is used to perform corresponding operating according to described vehicle.
3. the authorization method of vehicle according to claim 1 and 2, is characterized in that, judges that described vehicle uses after whether solicited message comprise authorized user identities information, also comprise described:
If judge, described vehicle uses solicited message to comprise described authorized user identities information, then use solicited message to perform corresponding operation according to described vehicle.
4. an authorization method for vehicle, for first terminal, is characterized in that, comprising:
Sending vehicle uses solicited message to car-mounted terminal;
Receive the authorization response message that the second terminal sends;
Decipher described authorization response message;
Send the authorization response message after deciphering to described car-mounted terminal.
5. an authorization method for vehicle, for the second terminal, is characterized in that, comprising:
Receive the authorization requests information of the use vehicle that car-mounted terminal sends;
License the instruction of described vehicle if receive, gather the biometric information of the user of described second terminal;
Described biometric information is sent to first terminal as authorization response message, obtains the authority using described vehicle for described second terminal according to described authorization response message.
6. the authorization method of vehicle according to claim 5, is characterized in that, described described biometric information is sent to the step of first terminal as authorization response message, specifically comprises:
By the encryption key in described authorization requests information, described biometric information is encrypted;
Described biometric information after encryption is sent to described first terminal as described authorization response message.
7. an authorization device for vehicle, for car-mounted terminal, is characterized in that, comprising:
Receiving element, the vehicle sent for receiving first terminal uses solicited message;
Judging unit, for judging that described vehicle uses solicited message whether to comprise authorized user identities information;
Generation unit, if use solicited message not comprise described authorized user identities information for described vehicle, then generates encryption key;
Transmitting element, for using solicited message and described encryption key to be sent to the second terminal as authorization requests information on described vehicle, is sent to described first terminal for described second terminal by authorization response message;
Described receiving element, also for receiving the described authorization response message that described first terminal sends;
Performance element, for performing corresponding operation according to described authorization response message.
8. the authorization device of vehicle according to claim 7, is characterized in that, described performance element comprises:
Judgment sub-unit, for judging that whether described authorization response message is legal;
Described performance element specifically for, if described authorization response message is legal, then use solicited message to perform corresponding operating according to described vehicle.
9. the authorization device of the vehicle according to claim 7 or 8, is characterized in that,
Described performance element also for, if judge, described vehicle uses solicited message to comprise described authorized user identities information, then use solicited message to perform corresponding operation according to described vehicle.
10. a car-mounted terminal, is characterized in that, comprising: the authorization device of the vehicle according to any one of claim 7 to 9.
The authorization device of 11. 1 kinds of vehicles, for first terminal, is characterized in that, comprising:
Sending module, uses solicited message to car-mounted terminal for sending vehicle;
Receiver module, for receiving the authorization response message that the second terminal sends;
Deciphering module, for deciphering described authorization response message;
Described sending module is also for sending the authorization response message after deciphering to described car-mounted terminal.
12. 1 kinds of terminals, is characterized in that, comprise the authorization device of vehicle as claimed in claim 11.
The authorization device of 13. 1 kinds of vehicles, for the second terminal, is characterized in that, comprising:
Receive module, for receiving the authorization requests information of the use vehicle that car-mounted terminal sends;
Gathering module, if for receiving the instruction licensing described vehicle, gathering the biometric information of the user of described second terminal;
Send module, for described biometric information is sent to first terminal as authorization response message, obtain the authority using described vehicle according to described authorization response message for described first terminal.
The authorization device of 14. vehicles according to claim 13, is characterized in that, described transmission module comprises:
Encryption submodule group, for being encrypted described biometric information by the encryption key in described authorization requests information;
Described transmission module specifically for, the described biometric information after encryption is sent to described first terminal as described authorization response message.
15. 1 kinds of terminals, is characterized in that, comprising: the authorization device of the vehicle as described in claim 13 or 14.
The authoring system of 16. 1 kinds of vehicles, is characterized in that, comprising:
Car-mounted terminal as claimed in claim 10;
Terminal as claimed in claim 12; And
Terminal as claimed in claim 15.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510627106.9A CN105187442A (en) | 2015-09-28 | 2015-09-28 | Vehicle authorization method, device, vehicle-mounted terminal, terminal and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510627106.9A CN105187442A (en) | 2015-09-28 | 2015-09-28 | Vehicle authorization method, device, vehicle-mounted terminal, terminal and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105187442A true CN105187442A (en) | 2015-12-23 |
Family
ID=54909286
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510627106.9A Pending CN105187442A (en) | 2015-09-28 | 2015-09-28 | Vehicle authorization method, device, vehicle-mounted terminal, terminal and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105187442A (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105550553A (en) * | 2015-06-30 | 2016-05-04 | 宇龙计算机通信科技(深圳)有限公司 | Permission management method, terminal, device and system |
CN105577689A (en) * | 2016-01-29 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | Authority management method and device and terminal |
CN105976472A (en) * | 2016-05-20 | 2016-09-28 | 科世达(上海)管理有限公司 | Access control permission management method and access control permission system for automobiles |
CN106561027A (en) * | 2016-08-19 | 2017-04-12 | 上海喜泊客信息技术有限公司 | Login method and system and applicable vehicle terminal and vehicle |
CN107679488A (en) * | 2017-09-28 | 2018-02-09 | 智车优行科技(北京)有限公司 | Control terminal in control method for vehicle and system, cloud server, vehicle |
CN108510356A (en) * | 2018-03-14 | 2018-09-07 | 斑马网络技术有限公司 | Vehicle lends method and its lends system |
CN108643729A (en) * | 2018-04-25 | 2018-10-12 | 威马智慧出行科技(上海)有限公司 | A kind of control method and control system of car door unlock |
CN110417907A (en) * | 2019-08-05 | 2019-11-05 | 斑马网络技术有限公司 | The management method and device of terminal device |
CN110474923A (en) * | 2019-09-12 | 2019-11-19 | 北京深思数盾科技股份有限公司 | A kind of data grant method and device |
CN111770469A (en) * | 2019-04-02 | 2020-10-13 | 北京车和家信息技术有限公司 | Vehicle control method, device, vehicle and computer readable storage medium |
CN112585042A (en) * | 2020-03-17 | 2021-03-30 | 华为技术有限公司 | Vehicle control method, communication device, and computer-readable storage medium |
CN115065517A (en) * | 2022-05-31 | 2022-09-16 | 华人运通(上海)云计算科技有限公司 | Vehicle business authorization method, device, cloud server and system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101934779A (en) * | 2010-08-31 | 2011-01-05 | 中山大学 | Intelligent vehicle anti-theft method and system |
CN102529888A (en) * | 2012-03-13 | 2012-07-04 | 鸿富锦精密工业(深圳)有限公司 | Automobile use permission control system and method |
CN103035054A (en) * | 2012-12-29 | 2013-04-10 | 江苏中科天安智联科技有限公司 | NFC intelligent automobile key system with permission and authorization functions |
CN104392165A (en) * | 2014-11-10 | 2015-03-04 | 广州日滨科技发展有限公司 | Identity authorization controlling method and system |
CN104786991A (en) * | 2015-04-21 | 2015-07-22 | 北京汽车股份有限公司 | Car control method and system based on fingerprint identification |
CN104842802A (en) * | 2015-05-08 | 2015-08-19 | 深圳市家信信息科技开发有限公司 | Vehicle controller system and electric vehicle |
-
2015
- 2015-09-28 CN CN201510627106.9A patent/CN105187442A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101934779A (en) * | 2010-08-31 | 2011-01-05 | 中山大学 | Intelligent vehicle anti-theft method and system |
CN102529888A (en) * | 2012-03-13 | 2012-07-04 | 鸿富锦精密工业(深圳)有限公司 | Automobile use permission control system and method |
CN103035054A (en) * | 2012-12-29 | 2013-04-10 | 江苏中科天安智联科技有限公司 | NFC intelligent automobile key system with permission and authorization functions |
CN104392165A (en) * | 2014-11-10 | 2015-03-04 | 广州日滨科技发展有限公司 | Identity authorization controlling method and system |
CN104786991A (en) * | 2015-04-21 | 2015-07-22 | 北京汽车股份有限公司 | Car control method and system based on fingerprint identification |
CN104842802A (en) * | 2015-05-08 | 2015-08-19 | 深圳市家信信息科技开发有限公司 | Vehicle controller system and electric vehicle |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105550553B (en) * | 2015-06-30 | 2019-11-12 | 宇龙计算机通信科技(深圳)有限公司 | A kind of right management method, terminal, equipment and system |
CN105550553A (en) * | 2015-06-30 | 2016-05-04 | 宇龙计算机通信科技(深圳)有限公司 | Permission management method, terminal, device and system |
CN105577689A (en) * | 2016-01-29 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | Authority management method and device and terminal |
CN105976472A (en) * | 2016-05-20 | 2016-09-28 | 科世达(上海)管理有限公司 | Access control permission management method and access control permission system for automobiles |
CN106561027A (en) * | 2016-08-19 | 2017-04-12 | 上海喜泊客信息技术有限公司 | Login method and system and applicable vehicle terminal and vehicle |
CN107679488A (en) * | 2017-09-28 | 2018-02-09 | 智车优行科技(北京)有限公司 | Control terminal in control method for vehicle and system, cloud server, vehicle |
CN108510356A (en) * | 2018-03-14 | 2018-09-07 | 斑马网络技术有限公司 | Vehicle lends method and its lends system |
CN108643729A (en) * | 2018-04-25 | 2018-10-12 | 威马智慧出行科技(上海)有限公司 | A kind of control method and control system of car door unlock |
CN111770469A (en) * | 2019-04-02 | 2020-10-13 | 北京车和家信息技术有限公司 | Vehicle control method, device, vehicle and computer readable storage medium |
CN110417907A (en) * | 2019-08-05 | 2019-11-05 | 斑马网络技术有限公司 | The management method and device of terminal device |
CN110417907B (en) * | 2019-08-05 | 2022-04-15 | 斑马网络技术有限公司 | Management method and device of terminal equipment |
CN110474923A (en) * | 2019-09-12 | 2019-11-19 | 北京深思数盾科技股份有限公司 | A kind of data grant method and device |
CN110474923B (en) * | 2019-09-12 | 2021-01-22 | 北京深思数盾科技股份有限公司 | Data authorization method and device |
CN112585042A (en) * | 2020-03-17 | 2021-03-30 | 华为技术有限公司 | Vehicle control method, communication device, and computer-readable storage medium |
WO2021184182A1 (en) * | 2020-03-17 | 2021-09-23 | 华为技术有限公司 | Vehicle control method, communication apparatus, and computer readable storage medium |
CN112585042B (en) * | 2020-03-17 | 2021-12-14 | 华为技术有限公司 | Vehicle control method, communication device, and computer-readable storage medium |
CN115065517A (en) * | 2022-05-31 | 2022-09-16 | 华人运通(上海)云计算科技有限公司 | Vehicle business authorization method, device, cloud server and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105187442A (en) | Vehicle authorization method, device, vehicle-mounted terminal, terminal and system | |
CN107085870B (en) | Regulating vehicle access using encryption methods | |
CN107650863B (en) | Vehicle sharing method and system | |
CN106851629B (en) | Method for low power consumption Bluetooth communication between mobile equipment and vehicle | |
CN108512862B (en) | Internet of things terminal security authentication management and control platform based on certificate-free identification authentication technology | |
CN102546155B (en) | On-demand safe key generates method and system | |
CN111194028B (en) | Safety control method based on vehicle | |
JP5999108B2 (en) | Vehicle remote operation information providing device, in-vehicle remote operation information acquisition device, and vehicle remote operation system including these devices | |
CN106850680B (en) | Intelligent identity authentication method and device for rail transit equipment | |
US20150045013A1 (en) | Multi-level vehicle remote start authentication method & system | |
CN108471610B (en) | Bluetooth connection control system | |
CN105635147A (en) | Vehicle-mounted-special-equipment-system-based secure data transmission method and system | |
CN107277033B (en) | Charging and battery replacing equipment and authentication method and system for object to be charged and battery replaced | |
CN110995710B (en) | Smart home authentication method based on eUICC | |
CN107733636B (en) | Authentication method and authentication system | |
CN111845624B (en) | Method for starting vehicle without key | |
CN112396735B (en) | Internet automobile digital key safety authentication method and device | |
CN113114668B (en) | Information transmission method, mobile terminal, storage medium and electronic equipment | |
CN110121170B (en) | Mobile network identity authentication method based on encryption technology | |
CN107733652B (en) | Unlocking method and system for shared vehicle and vehicle lock | |
CN109041263B (en) | TBox Bluetooth connection method and device | |
CN105100102A (en) | Authority configuration method and device as well as information configuration method and device | |
CN107612949B (en) | Wireless intelligent terminal access authentication method and system based on radio frequency fingerprint | |
CN111083696B (en) | Communication verification method and system, mobile terminal and vehicle machine side | |
CN115396121A (en) | Security authentication method for security chip OTA data packet and security chip device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20151223 |