CN110111472A - Vehicle key control method and device - Google Patents

Vehicle key control method and device Download PDF

Info

Publication number
CN110111472A
CN110111472A CN201910410316.0A CN201910410316A CN110111472A CN 110111472 A CN110111472 A CN 110111472A CN 201910410316 A CN201910410316 A CN 201910410316A CN 110111472 A CN110111472 A CN 110111472A
Authority
CN
China
Prior art keywords
key
request
nfc
information
vehicle end
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910410316.0A
Other languages
Chinese (zh)
Other versions
CN110111472B (en
Inventor
刘毅林
李向荣
陆宇哲
周波
何光波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Xiaopeng Motors Technology Co Ltd
Original Assignee
Guangzhou Xiaopeng Motors Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Xiaopeng Motors Technology Co Ltd filed Critical Guangzhou Xiaopeng Motors Technology Co Ltd
Priority to CN201910410316.0A priority Critical patent/CN110111472B/en
Publication of CN110111472A publication Critical patent/CN110111472A/en
Application granted granted Critical
Publication of CN110111472B publication Critical patent/CN110111472B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00412Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00825Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The embodiment of the application provides a vehicle key control method and device, and the method comprises the following steps: receiving a key generation request sent by a read-write client; the key generation request comprises key information corresponding to the NFC entity key and a vehicle identifier; generating a service key corresponding to the key information and the vehicle identifier; the key information comprises a key identification corresponding to the NFC entity key; packaging the key identification and the service key into an encryption instruction, and sending the encryption instruction to the read-write client so as to write the NFC entity key in the read-write client; and generating key information corresponding to the key identification and the service key, and sending the key information to the vehicle end corresponding to the vehicle identification so as to synchronize to a white list of the NFC security module in the vehicle end. Through this application embodiment, realized the control to NFC entity key, solved the condition that can't carry out high in the clouds management to entity key, promoted convenience, the security of entity key control.

Description

A kind of control method and device of car key
Technical field
This application involves automotive fields, more particularly to the control method and device of a kind of car key.
Background technique
With the development of science and technology, automobile has become the vehicles that cannot lack in life, in the use of automobile In the process, it to use key to carry out out/lock door, start/and close the operation such as engine, existing automobile key usually has machinery Key, integral remote-controlled key etc..
Mechanical key, also referred to as blade key are only used for basic enabling and lock a door function, and integral remote-controlled key, are It is made of blade key and chip key, due to increasing chip key, improves blade key anti-theft, and can also use Chip key carries out whistle and looks for the functions such as vehicle, but can not be both managed by cloud, and there is the big carrying of volume not Just the problem of.
Summary of the invention
In view of the above problems, it proposes in order to provide overcoming the above problem or at least being partially solved the one of the above problem The control method and device of kind car key, comprising:
A kind of control method of car key is related to NFC physical key, read-write client, Service Provider Platform, Yi Jiche End, which comprises
It receives the key that the read-write client is sent and generates request;Wherein, it includes the NFC that the key, which generates request, The corresponding key information of physical key and a vehicles identifications;
Generate business cipher key corresponding with the key information and the vehicles identifications;Wherein, the key information includes The corresponding key identification of the NFC physical key;
The key identification and the business cipher key are packaged as encrypted instruction, and are sent to the read-write client, with The NFC physical key is written by the read-write client;
Key information corresponding with the key identification and the business cipher key is generated, and is sent to the vehicles identifications pair In the vehicle end answered, to be synchronized to the white list of NFC security module in the vehicle end.
Optionally, the NFC physical key is numbered with a key, the method also includes:
Receive key controller request;Wherein, the key controller request includes that the key is numbered;
Determine that the key numbers corresponding key identification and vehicles identifications;
It is requested according to the key controller, controls NFC security module in the corresponding vehicle end of the vehicles identifications and update institute State the key information in white list.
Optionally, the method further relates to user terminal, and the user terminal is deployed with and the Service Provider Platform Corresponding first application, the key controller request include the request that first application is sent.
Optionally, it is requested described according to the key controller, controls NFC in the corresponding vehicle end of the vehicles identifications and pacify Before the step of full module updates the key information in the white list, further includes:
Verify whether active user is the corresponding car owner user of the vehicles identifications or administrator;
When the active user is car owner user or administrator, execution is described to request according to the key controller, Control the step of NFC security module updates the key information in the white list in the corresponding vehicle end of the vehicles identifications.
Optionally, further includes:
When receiving the response message that the vehicle end is reported for key controller request, by the NFC entity Key identification is that the key controller requests corresponding state of a control;
To one control completion notice of user terminal feedback.
Optionally, the key controller request includes reporting the loss request, described to be requested according to the key controller, described in control The step of NFC security module updates the key information in the white list in the corresponding vehicle end of vehicles identifications include:
The corresponding loss reporting command of request is reported the loss described in generation;
The loss reporting command is sent to the vehicle end, it is corresponding in the white list, to remove the key identification Key information.
Optionally, the key controller request includes locking request, described to be requested according to the key controller, described in control The step of NFC security module updates the key information in the white list in the corresponding vehicle end of vehicles identifications include:
Generate the corresponding lock instruction of the locking request;
The lock instruction is sent to the vehicle end, it is in the white list, the key identification is corresponding Key information is set as locking mark;Wherein, in the case where setting locking mark, the control vehicle of the NFC physical key Function is limited.
Optionally, the key controller request includes unlocking request, described to be requested according to the key controller, described in control The step of NFC security module updates the key information in the white list in the corresponding vehicle end of vehicles identifications include:
Generate the corresponding unlock instruction of the unlocking request;
The vehicle end is sent to by the unlock is specified, it is in the white list, the key identification is corresponding Key information is set as unlock mark;Wherein, in the case where setting unlock mark, the control vehicle of the NFC physical key Function is resumed.
Optionally, the key controller request includes validity period setting request, and the validity period setting request further includes having Effect phase information, it is described to be requested according to the key controller, control in the corresponding vehicle end of the vehicles identifications NFC security module more The step of key information in the new white list includes:
It generates the validity period setting and requests corresponding validity period setting instruction;
Validity period setting instruction is sent to the vehicle end, in the white list, using the validity period Information update key information.
Optionally, the key controller request includes permission control request, and the permission control request further includes permission letter Breath, it is described to be requested according to the key controller, it controls in the corresponding vehicle end of the vehicles identifications described in the update of NFC security module The step of key information in white list includes:
It generates the permission control and requests corresponding permission control instruction;
The permission control instruction is sent to the vehicle end, in the white list, using the authority information Update key information.
A kind of control device of car key is related to NFC physical key, read-write client, Service Provider Platform, Yi Jiche End, described device includes:
Key generates request receiving module, generates request for receiving the key that the read-write client is sent;Wherein, institute Stating key and generating request includes the corresponding key information of the NFC physical key and a vehicles identifications;
Business cipher key generation module, for generating business cipher key corresponding with the key information and the vehicles identifications; Wherein, the key information includes the corresponding key identification of the NFC physical key;
Encrypted instruction sending module, for the key identification and the business cipher key to be packaged as encrypted instruction, concurrently It send to the read-write client, the NFC physical key is written by the read-write client;
Key information sending module, for generating key information corresponding with the key identification and the business cipher key, And be sent in the corresponding vehicle end of the vehicles identifications, to be synchronized to the white list of NFC security module in the vehicle end.
Optionally, the NFC physical key is numbered with a key, described device further include:
Key controller request receiving module, for receiving key controller request;Wherein, the key controller request includes institute State key number;
Determining module is identified, for determining that the key numbers corresponding key identification and vehicles identifications;
Key information update module controls the corresponding vehicle of the vehicles identifications for requesting according to the key controller NFC security module updates the key information in the white list in end.
Optionally, described device further relates to user terminal, and the user terminal is deployed with and the Service Provider Platform Corresponding first application, the key controller request include the request that first application is sent.
Optionally, further includes:
Subscriber authentication module, for verifying whether active user is the corresponding car owner user of the vehicles identifications or administrator User;When the active user is car owner user or administrator, the key information update module is called.
Optionally, further includes:
State of a control mark module, for working as the response for receiving the vehicle end and reporting for key controller request When message, the NFC physical key is identified as the key controller and requests corresponding state of a control;
Feedback module is completed in control, for controlling completion notice to user terminal feedback one.
Optionally, the key controller request includes reporting the loss request, and the key information update module includes:
Loss reporting command generates submodule, requests corresponding loss reporting command for generating described report the loss;
Loss reporting command sending submodule, for the loss reporting command to be sent to the vehicle end, in the white list In, remove the corresponding key information of the key identification.
Optionally, the key controller request includes locking request, and the key information update module includes:
Lock instruction generates submodule, for generating the corresponding lock instruction of the locking request;
Lock instruction sending submodule, for the lock instruction to be sent to the vehicle end, in the white list In, locking mark is set by the corresponding key information of the key identification;Wherein, in the case where setting locking mark, institute The control vehicle functions for stating NFC physical key are limited.
Optionally, the key controller request includes unlocking request, and the key information update module includes:
Unlocking request generates submodule, for generating the corresponding unlock instruction of the unlocking request;
Unlocking request sending submodule is sent to the vehicle end for specifying the unlock, in the white list In, unlock mark is set by the corresponding key information of the key identification;Wherein, in the case where setting unlock mark, institute The control vehicle functions for stating NFC physical key are resumed.
Optionally, the key controller request includes validity period setting request, and the validity period setting request further includes having Effect phase information, the key information update module include:
Validity period setting instruction generates submodule, requests corresponding validity period setting to refer to for generating the validity period setting It enables;
Validity period setting instruction sending submodule, for validity period setting instruction to be sent to the vehicle end, with In the white list, using the validity period information update key information.
Optionally, the key controller request includes permission control request, and the permission control request further includes permission letter Breath, the key information update module include:
Permission control instruction generates submodule, requests corresponding permission control instruction for generating the permission control;
Permission control instruction sending submodule, for the permission control instruction to be sent to the vehicle end, in institute It states in white list, key information is updated using the authority information.
A kind of vehicle, including processor, memory and be stored on the memory and can transport on the processor Capable computer program, the computer program realize the control method of car key as described above when being executed by the processor The step of.
A kind of computer readable storage medium stores computer program, the meter on the computer readable storage medium The step of calculation machine program realizes the control method of car key as described above when being executed by processor.
The embodiment of the present application has the advantage that
In the embodiment of the present application, request is generated by receiving the key that read-write client is sent, key generates request packet The corresponding key information of NFC physical key and a vehicles identifications are included, it is close to generate business corresponding with key information and vehicles identifications Key, key information include the corresponding key identification of NFC physical key, and key identification and business cipher key are packaged as encrypted instruction, And it is sent to read-write client, NFC physical key is written by read-write client, generate and key identification and business cipher key pair The key information answered, and be sent in the corresponding vehicle end of vehicles identifications, to be synchronized to the white name of NFC security module in vehicle end It is single, the control to NFC physical key is realized, the case where can not carrying out cloud management to physical key is solved, improves reality The convenience of body key controller, safety.
Detailed description of the invention
It, below will be to attached needed in the description of the present application in order to illustrate more clearly of the technical solution of the application Figure is briefly described, it should be apparent that, the drawings in the following description are only some examples of the present application, for this field For those of ordinary skill, without any creative labor, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is a kind of step flow chart of the control method for car key that one embodiment of the application provides;
Fig. 2 is a kind of structural schematic diagram of the control system for car key that one embodiment of the application provides;
Fig. 3 is the step flow chart of the control method for another car key that one embodiment of the application provides;
Fig. 4 is a kind of structural schematic diagram of the control device for car key that one embodiment of the application provides.
Specific embodiment
In order to make the above objects, features, and advantages of the present application more apparent, with reference to the accompanying drawing and it is specific real Applying mode, the present application will be further described in detail.Obviously, described embodiment is some embodiments of the present application, without It is whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not before making creative work Every other embodiment obtained is put, shall fall in the protection scope of this application.
Referring to Fig.1, a kind of step flow chart of the control method of car key of one embodiment of the application offer is provided, it should Method can be related to NFC (NearField Communication, near-field communication) physical key, read-write client, service offer Quotient's (SP, Service Provider) platform and vehicle end.
Such as Fig. 2, NFC physical key 201 can be communicated with read-write client 202, and read-write client 202 can be with clothes Business provider's platform 203 is communicated, and Service Provider Platform 203 can also be communicated with vehicle end 204.
Wherein, NFC physical key can be the key with NFC chip, can be card key, or other The physical key of form is such as embedded in a NFC chip in integral remote-controlled key, can be made by third-party vendor.For The NFC physical key of key is not written, i.e. " white card ", surface can be imprinted with unique key number, internal NFC chip With unique chip identification, and memory block has unique key identification (NFC_Card_ID).
Read-write client may include the visitor of read-write equipment and the deployment being connected with the read-write equipment on computer terminals Family end program, client-side program are connected by network with Service Provider Platform.
Service Provider Platform can be communicated with vehicle end, be provided with SP TSM (Trusted Service Management, trusted service management) server.
Vehicle end is deployed in vehicle side, can have NFC security module, and NFC security module can be used as the lock core of vehicle, Can integrate inside it safety chip (SE, Secure Element), and NFC security module can be deployed in vehicle side NFC inductor is connected with communication module, and NFC security module can be led to by communication module and Service Provider Platform Letter, when NFC physical key is close to NFC inductor, NFC inductor can carry out reading data, Jin Eryu for NFC physical key The data stored in NFC security module are verified.
Specifically, may include steps of:
Step 101, it receives the key that the read-write client is sent and generates request;Wherein, the key generates request packet Include the corresponding key information of the NFC physical key and a vehicles identifications;
When needing that key is written to NFC physical key, NFC physical key can be in contact with read-write equipment, be read and write Equipment can scan the corresponding key information of NFC physical key, as the key marked in NFC physical key is numbered, NFC chip Chip identification, and the key identification of storage.
After scanning key information, it can be shown by client-side program in terminal or other mobile terminals Show, user can input or scan the vehicles identifications of vehicle to be bound, such as Vehicle Identify Number (VIN, Vehicle IdentificationNumber), vehicles identifications can be generated in client-side program and the corresponding key of key information generates request, And key is generated into request and is sent to Service Provider Platform, Service Provider Platform can receive key and generate request.
Step 102, business cipher key corresponding with the key information and the vehicles identifications is generated;Wherein, the key Information includes the corresponding key identification of the NFC physical key;
After receiving key and generating request, Service Provider Platform be can be generated a business cipher key (Key_Card), and It can store the corresponding relationship of key information, vehicles identifications and business cipher key, that is, establish NFC physical key and vehicle end Incidence relation.
Specifically, business cipher key can be by AES (Advanced Encryption Standard, Advanced Encryption Standard) 128 algorithms, combining encryption machine generate, and can be used for carrying out response challenge with the NFC security module of vehicle end, complete key mirror Power.
Step 103, the key identification and the business cipher key are packaged as encrypted instruction, and are sent to the read-write visitor Family end, the NFC physical key is written by the read-write client;
It, can be by TSM server in Service Provider Platform, by key identification and business cipher key after generating business cipher key It is packaged as the encrypted instruction based on APDU (ApplicationProtocolDataUnit, Application Protocol Data Unit), then will The encrypted instruction is sent to read-write client.
After receiving encrypted instruction, reading and writing client-side program in client can be by read-write equipment by the encrypted instruction NFC physical key is written, there is Applet component in NFC physical key, business cipher key can be carried out using Applet component Burning, then NFC physical key and vehicle end binding are completed.
Step 104, key information corresponding with the key identification and the business cipher key is generated, and is sent to the vehicle In the corresponding vehicle end of mark, to be synchronized to the white list of NFC security module in the vehicle end.
After the completion of binding, key identification and business cipher key can be organized into key information by service supplier's platform, will Key information is sent to vehicle end, and the key information can be stored in white list by NFC security module in vehicle end, completes The activation of NFC physical key, then key is in initiate mode.
After activating NFC physical key, when NFC physical key is close to vehicle end, the two can carry out near-field communication, then may be used To be verified by vehicle end to NFC physical key, after being verified, it can be unlocked in vehicle end, start engine Deng operation, specific verifying is as follows:
1, whether the corresponding key identification of verifying NFC physical key is in white list;
2, whether effective the corresponding token of key identification (Token) information in white list is verified;
3, random number challenge response is carried out by interim conversation key, verifies business cipher key.
When verifying key identification in white list, token information effectively and business cipher key be verified, then determine vehicle end NFC physical key is verified.
In the embodiment of the present application, request is generated by receiving the key that read-write client is sent, key generates request packet The corresponding key information of NFC physical key and a vehicles identifications are included, it is close to generate business corresponding with key information and vehicles identifications Key, key information include the corresponding key identification of NFC physical key, and key identification and business cipher key are packaged as encrypted instruction, And it is sent to read-write client, NFC physical key is written by read-write client, generate and key identification and business cipher key pair The key information answered, and be sent in the corresponding vehicle end of vehicles identifications, to be synchronized to the white name of NFC security module in vehicle end It is single, the control to NFC physical key is realized, the case where can not carrying out cloud management to physical key is solved, improves reality The convenience of body key controller, safety.
Referring to Fig. 3, the step flow chart of the control method of another car key of one embodiment of the application offer is shown, It can specifically include following steps:
Step 301, key controller request is received;Wherein, the key controller request includes that the key is numbered;
After activating NFC physical key, since NFC physical key is numbered with a key, it can number and give birth to according to key It is requested at key controller, Service Provider Platform can receive key controller request.
In one embodiment of the application, this method can also relate to user terminal, and user terminal can be deployed with and service Corresponding first application of provider's platform, then key controller request may include the request that the first application is sent, and detailed process is such as Under:
1, it opens first to apply, and the input key number in the first application, and then can add in the first application should NFC physical key;
2, in the key that active user's triggering controls NFC physical key, then identity is carried out to active user and tested Card, such as issues identifying code to the corresponding car owner of NFC physical key/administrator's phone, inputs identifying code by active user and tests Card for another example can also input car owner/administrator ID card No. (latter six) by active user, by the ID card No. of input It is compared with the ID card No. of pre-acquired;
3, after authentication passes through, the first application can be generated key and number corresponding key controller request, and send To service supplier's platform.
It is of course also possible to which the first application is not used to carry out key controller, active user can directly send a telegraph after-sale service, After carrying out authentication, key controller request is sent from background end to service supplier's platform.
Step 302, determine that the key numbers corresponding key identification and vehicles identifications;
Due to storing the incidence relation with NFC physical key and vehicle end during activating NFC physical key, then Key can be searched in Service Provider Platform and number corresponding key identification, and can search key number binding vehicle end Vehicles identifications.
Certainly, key controller request can also directly carrying keys identify, then can be directly from key controller request really Key identification is determined, without being searched in platform.
Step 303, it is requested according to the key controller, controls the safe mould of NFC in the corresponding vehicle end of the vehicles identifications Block updates the key information in the white list.
After determining key identification and vehicles identifications, can in the NFC security module of vehicle end, update white list in The corresponding key information of key identification as updated token information in key information, and then may be implemented by updating vehicle end " lock core " controls NFC physical key.
In one example, if vehicle end is since network cause is in off-line state, if platform ping was operated in 10 seconds, vehicle End then determines that vehicle end is in off-line state without response, active synchronization can update key information after networking vehicle end next time, Complete key controller.
In one embodiment of the application, key controller request may include reporting the loss request, then step 303 may include as follows Sub-step:
The corresponding loss reporting command of request is reported the loss described in generation;The loss reporting command is sent to the vehicle end, in institute It states in white list, removes the corresponding key information of the key identification.
After receiving and reporting the loss request, which can be recorded as having reported the loss by Service Provider Platform, write-in In car key blacklist, and it can be generated and report the loss the corresponding loss reporting command of request, loss reporting command may include key identification, then Loss reporting command can be sent to vehicle end.
After receiving loss reporting command, vehicle end it is corresponding can to search key identification in the white list of NFC security module Key information, then can remove the corresponding key information of key identification, then key be in reported the loss state, can not be further It uses.
In one embodiment of the application, key controller request may include locking request, then step 303 may include as follows Sub-step:
Generate the corresponding lock instruction of the locking request;The lock instruction is sent to the vehicle end, in institute It states in white list, sets locking mark for the corresponding key information of the key identification.
After receiving locking request, the corresponding lock instruction of locking request is can be generated in Service Provider Platform, locking Instruction may include key identification, then lock instruction can be sent to vehicle end.
After receiving lock instruction, vehicle end it is corresponding can to search key identification in the white list of NFC security module Key information, then can in the Token information of key information, be set as locking mark, such as the value of relevant field is had " 1 " is updated to " 0 ", then key is in locked state, in the case where setting locking mark, the control vehicle of NFC physical key Function is limited.
In one example, due to a variety of vehicle control permissions, such as unlocking vehicle permission, locking vehicle permission, starting Vehicle permission, automatic Pilot permission etc., then locking mark can be corresponding with vehicle control permission, and such as locking mark A characterization is all Vehicle control permission is all limited, and locking mark B characterization part control vehicle control permission is limited, such as automatic Pilot permission quilt Limitation.
In one embodiment of the application, key controller request may include unlocking request, then step 303 may include as follows Sub-step:
Generate the corresponding unlock instruction of the unlocking request;The unlock is specified and is sent to the vehicle end, in institute It states in white list, sets unlock mark for the corresponding key information of the key identification.
After receiving unlocking request, the corresponding unlock instruction of unlocking request is can be generated in Service Provider Platform, unlock Instruction may include key identification, then unlock instruction can be sent to vehicle end.
After receiving unlock instruction, vehicle end it is corresponding can to search key identification in the white list of NFC security module Key information, then can in the Token information of key information, be set as unlock mark, such as the value of relevant field is had " 0 " is updated to " 1 ", then key reverts to initiate mode, in the case where setting unlock mark, the control of NFC physical key Vehicle functions are resumed.
In one embodiment of the application, key controller request may include validity period setting request, validity period setting request It can also include validity period information, it is effective in a length of 100 hours when vehicle travels that NFC physical key is such as set, alternatively, being arranged For NFC physical key in VMT Vehicle-Miles of Travel to be effective in 1000KM, validity period information can also be a fix information, such as be arranged Before the year two thousand twenty January 1 effectively, then step 303 may include following sub-step to NFC physical key:
It generates the validity period setting and requests corresponding validity period setting instruction;Validity period setting instruction is sent to The vehicle end, in the white list, using the validity period information update key information.
After receiving validity period setting request, validity period setting request, which can be generated, in Service Provider Platform corresponding has The setting instruction of effect phase, validity period setting instruction may include key identification and validity period information, then can will be arranged validity period Instruction is sent to vehicle end.
After receiving validity period setting instruction, vehicle end can search key mark in the white list of NFC security module Know corresponding key information, then can use validity period information, be updated, then exist in the Token information of key information When the current time limit is more than the time limit in validity period information, key is in state out of date, can not further use.
In one embodiment of the application, key controller request may include permission control request, and permission control request may be used also To include authority information, such as unlock vehicle permission, locking vehicle permission, starting vehicle permission, then step 303 may include as Lower sub-step:
It generates the permission control and requests corresponding permission control instruction;The permission control instruction is sent to the vehicle End updates key information using the authority information in the white list.
After receiving permission control request, Service Provider Platform can be generated permission control and request corresponding permission control System instruction, permission control instruction may include key identification and authority information, then permission control instruction can be sent to vehicle End.
After receiving permission control instruction, vehicle end can search key identification in the white list of NFC security module Then corresponding key information can use authority information, be updated in the token information of key information.
In one embodiment of the application, before step 303, it can also include the following steps:
Verify whether active user is the corresponding car owner user of the vehicles identifications or administrator;In the current use When family is car owner user or administrator, step 303 is executed.
Before carrying out vehicle control, service management platform can verify whether active user is the corresponding vehicle of vehicles identifications Primary user or administrator are not car owner user or administrator in active user, then without subsequent vehicle control Process then allows to carry out subsequent vehicle control process when active user is car owner user or administrator.
For example, identifying code can be issued to the corresponding car owner of NFC physical key/administrator's phone, is inputted and verified by user Code is verified, and for another example car owner/administrator ID card No. (latter six) can also be inputted by user, by the identity card of input Number is compared with ID card No. gathered in advance.
In one embodiment of the application, it can also include the following steps:
When receiving the response message that the vehicle end is reported for key controller request, by the NFC entity Key identification is that the key controller requests corresponding state of a control;To one control completion notice of user terminal feedback.
After vehicle end updates key information success, a response message can be fed back to Service Provider Platform, service mentions NFC physical key is identified as key controller for quotient's platform and requests corresponding state of a control, such as lock state, reports the loss state.
After updating state of a control, Service Provider Platform can feed back a control completion notice, user to user terminal First applies the corresponding status information of update NFC physical key in display interface in terminal, alternatively, can also pass through short message etc. Mode is to car owner's feedback control completion notice.
It should be noted that for simple description, therefore, it is stated as a series of action groups for embodiment of the method It closes, but those skilled in the art should understand that, the embodiment of the present application is not limited by the described action sequence, because according to According to the embodiment of the present application, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art also should Know, the embodiments described in the specification are all preferred embodiments, and related movement not necessarily the application is implemented Necessary to example.
Referring to Fig. 4, a kind of structural schematic diagram of the control device of car key of one embodiment of the application offer is provided, is related to And NFC physical key, read-write client, Service Provider Platform and vehicle end, it can specifically include following module:
Key generates request receiving module 401, generates request for receiving the key that the read-write client is sent;Its In, it includes the corresponding key information of the NFC physical key and a vehicles identifications that the key, which generates request,;
Business cipher key generation module 402, it is close for generating business corresponding with the key information and the vehicles identifications Key;Wherein, the key information includes the corresponding key identification of the NFC physical key;
Encrypted instruction sending module 403, for the key identification and the business cipher key to be packaged as encrypted instruction, and It is sent to the read-write client, the NFC physical key is written by the read-write client;
Key information sending module 404, for generating key letter corresponding with the key identification and the business cipher key Breath, and be sent in the corresponding vehicle end of the vehicles identifications, to be synchronized to the white name of NFC security module in the vehicle end It is single.
In one embodiment of the application, the NFC physical key is numbered with a key, described device further include:
Key controller request receiving module, for receiving key controller request;Wherein, the key controller request includes institute State key number;
Determining module is identified, for determining that the key numbers corresponding key identification and vehicles identifications;
Key information update module controls the corresponding vehicle of the vehicles identifications for requesting according to the key controller NFC security module updates the key information in the white list in end.
In one embodiment of the application, described device further relates to user terminal, and the user terminal is deployed with and the clothes Corresponding first application of business provider's platform, the key controller request include the request of the first application transmission.
In one embodiment of the application, further includes:
Subscriber authentication module, for verifying whether active user is the corresponding car owner user of the vehicles identifications or administrator User;When the active user is car owner user or administrator, the key information update module is called.
In one embodiment of the application, further includes:
State of a control mark module, for working as the response for receiving the vehicle end and reporting for key controller request When message, the NFC physical key is identified as the key controller and requests corresponding state of a control;
Feedback module is completed in control, for controlling completion notice to user terminal feedback one.
In one embodiment of the application, the key controller request includes reporting the loss request, the key information update module Include:
Loss reporting command generates submodule, requests corresponding loss reporting command for generating described report the loss;
Loss reporting command sending submodule, for the loss reporting command to be sent to the vehicle end, in the white list In, remove the corresponding key information of the key identification.
In one embodiment of the application, the key controller request includes locking request, the key information update module Include:
Lock instruction generates submodule, for generating the corresponding lock instruction of the locking request;
Lock instruction sending submodule, for the lock instruction to be sent to the vehicle end, in the white list In, locking mark is set by the corresponding key information of the key identification;Wherein, in the case where setting locking mark, institute The control vehicle functions for stating NFC physical key are limited.
In one embodiment of the application, the key controller request includes unlocking request, the key information update module Include:
Unlocking request generates submodule, for generating the corresponding unlock instruction of the unlocking request;
Unlocking request sending submodule is sent to the vehicle end for specifying the unlock, in the white list In, unlock mark is set by the corresponding key information of the key identification;Wherein, in the case where setting unlock mark, institute The control vehicle functions for stating NFC physical key are resumed.
In one embodiment of the application, the key controller request includes validity period setting request, the validity period setting Request further includes validity period information, and the key information update module includes:
Validity period setting instruction generates submodule, requests corresponding validity period setting to refer to for generating the validity period setting It enables;
Validity period setting instruction sending submodule, for validity period setting instruction to be sent to the vehicle end, with In the white list, using the validity period information update key information.
In one embodiment of the application, the key controller request includes permission control request, the permission control request It further include authority information, the key information update module includes:
Permission control instruction generates submodule, requests corresponding permission control instruction for generating the permission control;
Permission control instruction sending submodule, for the permission control instruction to be sent to the vehicle end, in institute It states in white list, key information is updated using the authority information.
For device embodiment, since it is basically similar to the method embodiment, related so being described relatively simple Place illustrates referring to the part of embodiment of the method.
One embodiment of the application additionally provides a kind of vehicle, may include processor, memory and storage on a memory And the computer program that can be run on a processor, the control of car key as above is realized when computer program is executed by processor The step of method.
One embodiment of the application additionally provides a kind of computer readable storage medium, stores on computer readable storage medium Computer program, the step of control method of car key as above is realized when computer program is executed by processor.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
It should be understood by those skilled in the art that, the embodiment of the present application can provide as method, apparatus or computer program production Product.Therefore, in terms of the embodiment of the present application can be used complete hardware embodiment, complete software embodiment or combine software and hardware Embodiment form.Moreover, it wherein includes computer available programs generation that the embodiment of the present application, which can be used in one or more, The meter implemented in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of code The form of calculation machine program product.
The embodiment of the present application is referring to according to the method for the embodiment of the present application, terminal device (system) and computer program The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions In each flow and/or block and flowchart and/or the block diagram in process and/or box combination.It can provide these Computer program instructions are set to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminals Standby processor is to generate a machine, so that being held by the processor of computer or other programmable data processing terminal devices Capable instruction generates for realizing in one or more flows of the flowchart and/or one or more blocks of the block diagram The device of specified function.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing terminal devices In computer-readable memory operate in a specific manner, so that instruction stored in the computer readable memory generates packet The manufacture of command device is included, which realizes in one side of one or more flows of the flowchart and/or block diagram The function of being specified in frame or multiple boxes.
These computer program instructions can also be loaded into computer or other programmable data processing terminal devices, so that Series of operation steps are executed on computer or other programmable terminal equipments to generate computer implemented processing, thus The instruction executed on computer or other programmable terminal equipments is provided for realizing in one or more flows of the flowchart And/or in one or more blocks of the block diagram specify function the step of.
Although preferred embodiments of the embodiments of the present application have been described, once a person skilled in the art knows bases This creative concept, then additional changes and modifications can be made to these embodiments.So the following claims are intended to be interpreted as Including preferred embodiment and all change and modification within the scope of the embodiments of the present application.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements not only wrap Those elements are included, but also including other elements that are not explicitly listed, or further includes for this process, method, article Or the element that terminal device is intrinsic.In the absence of more restrictions, being wanted by what sentence "including a ..." limited Element, it is not excluded that there is also other identical elements in process, method, article or the terminal device for including the element.
Above to the control method and device of provided car key, it is described in detail, it is used herein specifically The principle and implementation of this application are described for a example, the application that the above embodiments are only used to help understand Method and its core concept;At the same time, for those skilled in the art is being embodied according to the thought of the application There will be changes in mode and application range, in conclusion the contents of this specification should not be construed as limiting the present application.

Claims (22)

1. a kind of control method of car key, which is characterized in that it is flat to be related to NFC physical key, read-write client, service provider Platform and vehicle end, which comprises
It receives the key that the read-write client is sent and generates request;Wherein, it includes the NFC entity that the key, which generates request, The corresponding key information of key and a vehicles identifications;
Generate business cipher key corresponding with the key information and the vehicles identifications;Wherein, the key information includes described The corresponding key identification of NFC physical key;
The key identification and the business cipher key are packaged as encrypted instruction, and are sent to the read-write client, to pass through The NFC physical key is written in the read-write client;
Key information corresponding with the key identification and the business cipher key is generated, and it is corresponding to be sent to the vehicles identifications In vehicle end, to be synchronized to the white list of NFC security module in the vehicle end.
2. the method according to claim 1, wherein the NFC physical key is with key number, the side Method further include:
Receive key controller request;Wherein, the key controller request includes that the key is numbered;
Determine that the key numbers corresponding key identification and vehicles identifications;
It is requested according to the key controller, it is described white to control NFC security module update in the corresponding vehicle end of the vehicles identifications Key information in list.
3. according to the method described in claim 2, it is characterized in that, the method further relates to user terminal, the user terminal It is deployed with the first application corresponding with the Service Provider Platform, the key controller request includes that first application is sent Request.
4. according to the method described in claim 3, it is characterized in that, being requested described according to the key controller, described in control Before the step of NFC security module updates the key information in the white list in the corresponding vehicle end of vehicles identifications, further includes:
Verify whether active user is the corresponding car owner user of the vehicles identifications or administrator;
When the active user is car owner user or administrator, execute described according to key controller request, control The step of NFC security module updates the key information in the white list in the corresponding vehicle end of the vehicles identifications.
5. according to the method described in claim 3, it is characterized by further comprising:
When receiving the response message that the vehicle end is reported for key controller request, by the NFC physical key It is identified as the key controller and requests corresponding state of a control;
To one control completion notice of user terminal feedback.
6. according to method described in Claims 2 or 3 or 4 or 5, which is characterized in that the key controller request includes reporting the loss to ask It asks, it is described to be requested according to the key controller, it controls in the corresponding vehicle end of the vehicles identifications described in the update of NFC security module The step of key information in white list includes:
The corresponding loss reporting command of request is reported the loss described in generation;
The loss reporting command is sent to the vehicle end, it is corresponding close to remove the key identification in the white list Key information.
7. according to method described in Claims 2 or 3 or 4 or 5, which is characterized in that the key controller request includes that locking is asked It asks, it is described to be requested according to the key controller, it controls in the corresponding vehicle end of the vehicles identifications described in the update of NFC security module The step of key information in white list includes:
Generate the corresponding lock instruction of the locking request;
The lock instruction is sent to the vehicle end, in the white list, by the corresponding key of the key identification Information is set as locking mark;Wherein, in the case where setting locking mark, the control vehicle functions of the NFC physical key It is limited.
8. the method according to the description of claim 7 is characterized in that the key controller request include unlocking request, described It is requested according to the key controller, controls NFC security module in the corresponding vehicle end of the vehicles identifications and update in the white list Key information the step of include:
Generate the corresponding unlock instruction of the unlocking request;
The vehicle end is sent to by the unlock is specified, in the white list, by the corresponding key of the key identification Information is set as unlock mark;Wherein, in the case where setting unlock mark, the control vehicle functions of the NFC physical key It is resumed.
9. according to method described in Claims 2 or 3 or 4 or 5, which is characterized in that the key controller request includes validity period Setting request, the validity period setting request further includes validity period information, described to be requested according to the key controller, described in control The step of NFC security module updates the key information in the white list in the corresponding vehicle end of vehicles identifications include:
It generates the validity period setting and requests corresponding validity period setting instruction;
Validity period setting instruction is sent to the vehicle end, in the white list, using the validity period information Update key information.
10. according to method described in Claims 2 or 3 or 4 or 5, which is characterized in that the key controller request includes permission control System request, the permission control request further includes authority information, described to be requested according to the key controller, controls the vehicle mark Knowing the step of NFC security module updates the key information in the white list in corresponding vehicle end includes:
It generates the permission control and requests corresponding permission control instruction;
The permission control instruction is sent to the vehicle end, updated in the white list using the authority information Key information.
11. a kind of control device of car key, which is characterized in that be related to NFC physical key, read-write client, service provider Platform and vehicle end, described device include:
Key generates request receiving module, generates request for receiving the key that the read-write client is sent;Wherein, described close It includes the corresponding key information of the NFC physical key and a vehicles identifications that key, which generates request,;
Business cipher key generation module, for generating business cipher key corresponding with the key information and the vehicles identifications;Wherein, The key information includes the corresponding key identification of the NFC physical key;
Encrypted instruction sending module for the key identification and the business cipher key to be packaged as encrypted instruction, and is sent to The read-write client, the NFC physical key is written by the read-write client;
Key information sending module, for generating key information corresponding with the key identification and the business cipher key, concurrently It send into the corresponding vehicle end of the vehicles identifications, to be synchronized to the white list of NFC security module in the vehicle end.
12. device according to claim 11, which is characterized in that the NFC physical key is numbered with a key, described Device further include:
Key controller request receiving module, for receiving key controller request;Wherein, the key controller request includes the key Spoon number;
Determining module is identified, for determining that the key numbers corresponding key identification and vehicles identifications;
Key information update module controls in the corresponding vehicle end of the vehicles identifications for being requested according to the key controller NFC security module updates the key information in the white list.
13. device according to claim 12, which is characterized in that described device further relates to user terminal, and the user is whole End is deployed with the first application corresponding with the Service Provider Platform, and the key controller request includes the first application hair The request sent.
14. device according to claim 13, which is characterized in that further include:
Subscriber authentication module, for verifying whether active user is that the corresponding car owner user of the vehicles identifications or administrator use Family;When the active user is car owner user or administrator, the key information update module is called.
15. device according to claim 13, which is characterized in that further include:
State of a control mark module, for working as the response message for receiving the vehicle end and reporting for key controller request When, the NFC physical key is identified as the key controller and requests corresponding state of a control;
Feedback module is completed in control, for controlling completion notice to user terminal feedback one.
16. device described in 2 or 13 or 14 or 15 according to claim 1, which is characterized in that the key controller request includes hanging Request is lost, the key information update module includes:
Loss reporting command generates submodule, requests corresponding loss reporting command for generating described report the loss;
Loss reporting command sending submodule, for the loss reporting command to be sent to the vehicle end, in the white list, clearly Except the corresponding key information of the key identification.
17. device described in 2 or 13 or 14 or 15 according to claim 1, which is characterized in that the key controller request includes lock Fixed request, the key information update module include:
Lock instruction generates submodule, for generating the corresponding lock instruction of the locking request;
Lock instruction sending submodule, for the lock instruction to be sent to the vehicle end, to incite somebody to action in the white list The corresponding key information of the key identification is set as locking mark;Wherein, in the case where setting locking mark, the NFC The control vehicle functions of physical key are limited.
18. device according to claim 17, which is characterized in that the key controller request includes unlocking request, described Key information update module includes:
Unlocking request generates submodule, for generating the corresponding unlock instruction of the unlocking request;
Unlocking request sending submodule is sent to the vehicle end for specifying the unlock, to incite somebody to action in the white list The corresponding key information of the key identification is set as unlock mark;Wherein, in the case where setting unlock mark, the NFC The control vehicle functions of physical key are resumed.
19. device described in 2 or 13 or 14 or 15 according to claim 1, which is characterized in that key controller request includes The setting request of effect phase, the validity period setting request further includes validity period information, and the key information update module includes:
Validity period setting instruction generates submodule, requests corresponding validity period setting instruction for generating the validity period setting;
Validity period setting instruction sending submodule, for validity period setting instruction to be sent to the vehicle end, in institute It states in white list, using the validity period information update key information.
20. device described in 2 or 13 or 14 or 15 according to claim 1, which is characterized in that the key controller request includes power Limit control request, the permission control request further includes authority information, and the key information update module includes:
Permission control instruction generates submodule, requests corresponding permission control instruction for generating the permission control;
Permission control instruction sending submodule, for the permission control instruction to be sent to the vehicle end, described white In list, key information is updated using the authority information.
21. a kind of vehicle, which is characterized in that including processor, memory and be stored on the memory and can be described The computer program run on processor realizes such as claims 1 to 10 when the computer program is executed by the processor Any one of described in car key control method the step of.
22. a kind of computer readable storage medium, which is characterized in that store computer journey on the computer readable storage medium Sequence realizes the control of the car key as described in any one of claims 1 to 10 when the computer program is executed by processor The step of method.
CN201910410316.0A 2019-05-16 2019-05-16 Vehicle key control method and device Active CN110111472B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910410316.0A CN110111472B (en) 2019-05-16 2019-05-16 Vehicle key control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910410316.0A CN110111472B (en) 2019-05-16 2019-05-16 Vehicle key control method and device

Publications (2)

Publication Number Publication Date
CN110111472A true CN110111472A (en) 2019-08-09
CN110111472B CN110111472B (en) 2022-05-13

Family

ID=67490636

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910410316.0A Active CN110111472B (en) 2019-05-16 2019-05-16 Vehicle key control method and device

Country Status (1)

Country Link
CN (1) CN110111472B (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110503758A (en) * 2019-08-23 2019-11-26 上海元城汽车技术有限公司 Control method, device, electronic equipment and the computer-readable medium of vehicle
CN111127709A (en) * 2019-12-17 2020-05-08 重庆邮电大学 Method for preparing automobile door lock key
CN111402464A (en) * 2020-03-20 2020-07-10 科世达(上海)机电有限公司 Method, device and system for updating vehicle electronic key
CN111554008A (en) * 2020-04-22 2020-08-18 支付宝(杭州)信息技术有限公司 Digital key binding method, digital key verification method, mobile electronic equipment and near field communication device
CN112967429A (en) * 2021-03-12 2021-06-15 青岛中瑞车联电子科技有限公司 NFC lock control system and method
CN113129483A (en) * 2020-01-13 2021-07-16 阿里巴巴集团控股有限公司 System and method for managing working condition of lock box
CN113561934A (en) * 2020-04-29 2021-10-29 广州汽车集团股份有限公司 Vehicle anti-theft matching method, system, diagnostic instrument and storage medium
CN114466357A (en) * 2022-02-28 2022-05-10 重庆长安汽车股份有限公司 Vehicle-mounted NFC card key binding system and method
WO2022095789A1 (en) * 2020-11-05 2022-05-12 深圳市道通科技股份有限公司 Automobile key matching method and apparatus, and automobile communication interface device
CN114582048A (en) * 2020-12-01 2022-06-03 比亚迪股份有限公司 NFC-based vehicle door control method, mobile terminal and vehicle
CN114582049A (en) * 2021-02-05 2022-06-03 长城汽车股份有限公司 Calibration parameter transmission method, mobile terminal and cloud server
CN114598459A (en) * 2022-01-29 2022-06-07 上海钧正网络科技有限公司 Communication method, device and storage medium based on remote control equipment
CN114670779A (en) * 2022-04-07 2022-06-28 浙江极氪智能科技有限公司 Digital key sharing method and system
CN114684070A (en) * 2022-03-23 2022-07-01 中汽创智科技有限公司 Safe vehicle control method and device, vehicle system and storage medium
CN114830619A (en) * 2021-02-19 2022-07-29 深圳市汇顶科技股份有限公司 Vehicle key control method and device, vehicle and vehicle key body
CN115019423A (en) * 2022-06-27 2022-09-06 无锡融卡科技有限公司 Bluetooth vehicle key distribution system and implementation method thereof
CN115273289A (en) * 2022-09-20 2022-11-01 上海银基信息安全技术股份有限公司 Physical key activation method, system, device, equipment and medium
CN115527294A (en) * 2022-11-28 2022-12-27 广州万协通信息技术有限公司 NFC signal vehicle unlocking method of security chip and security chip device
CN115565268A (en) * 2022-08-30 2023-01-03 星汉智能科技股份有限公司 Automobile control method and system based on wireless automobile key, electronic equipment and storage medium
CN115909550A (en) * 2022-10-20 2023-04-04 远峰科技股份有限公司 NFC key verification method, device and system and computer readable storage medium
CN115915131A (en) * 2022-10-20 2023-04-04 远峰科技股份有限公司 Vehicle key bidirectional encryption authentication method and system, vehicle binding device and NFC card
CN115938022A (en) * 2022-12-12 2023-04-07 远峰科技股份有限公司 Vehicle entity key safety authentication method and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2513843Y (en) * 2001-12-20 2002-10-02 蒋楚明 Intelligent IC identifying anti-theft lock device for automobile
CN101343961A (en) * 2008-07-29 2009-01-14 上海世科嘉车辆技术研发有限公司 Non-key gate control system
CN105959277A (en) * 2016-04-27 2016-09-21 四川效率源信息安全技术股份有限公司 Method of locking/unlocking computer screen based on NFC terminal
CN107393079A (en) * 2017-07-26 2017-11-24 北京小米移动软件有限公司 Management method, device and the storage medium of virtual car key
CN107685714A (en) * 2017-08-30 2018-02-13 上海博泰悦臻电子设备制造有限公司 Intelligent vehicle key system and its control method
US20180061155A1 (en) * 2016-09-01 2018-03-01 Mastercard International Incorporated Method and system for access control
CN108108598A (en) * 2017-12-15 2018-06-01 蔚来汽车有限公司 Vehicle authorization management method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2513843Y (en) * 2001-12-20 2002-10-02 蒋楚明 Intelligent IC identifying anti-theft lock device for automobile
CN101343961A (en) * 2008-07-29 2009-01-14 上海世科嘉车辆技术研发有限公司 Non-key gate control system
CN105959277A (en) * 2016-04-27 2016-09-21 四川效率源信息安全技术股份有限公司 Method of locking/unlocking computer screen based on NFC terminal
US20180061155A1 (en) * 2016-09-01 2018-03-01 Mastercard International Incorporated Method and system for access control
CN107393079A (en) * 2017-07-26 2017-11-24 北京小米移动软件有限公司 Management method, device and the storage medium of virtual car key
CN107685714A (en) * 2017-08-30 2018-02-13 上海博泰悦臻电子设备制造有限公司 Intelligent vehicle key system and its control method
CN108108598A (en) * 2017-12-15 2018-06-01 蔚来汽车有限公司 Vehicle authorization management method and system

Cited By (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110503758A (en) * 2019-08-23 2019-11-26 上海元城汽车技术有限公司 Control method, device, electronic equipment and the computer-readable medium of vehicle
CN111127709B (en) * 2019-12-17 2022-03-29 重庆邮电大学 Method for preparing automobile door lock key
CN111127709A (en) * 2019-12-17 2020-05-08 重庆邮电大学 Method for preparing automobile door lock key
CN113129483A (en) * 2020-01-13 2021-07-16 阿里巴巴集团控股有限公司 System and method for managing working condition of lock box
CN111402464A (en) * 2020-03-20 2020-07-10 科世达(上海)机电有限公司 Method, device and system for updating vehicle electronic key
CN111554008A (en) * 2020-04-22 2020-08-18 支付宝(杭州)信息技术有限公司 Digital key binding method, digital key verification method, mobile electronic equipment and near field communication device
CN111554008B (en) * 2020-04-22 2024-01-16 支付宝(杭州)信息技术有限公司 Digital key binding method, digital key verification method, mobile electronic equipment and near field communication device
CN113561934B (en) * 2020-04-29 2022-07-15 广州汽车集团股份有限公司 Vehicle anti-theft matching method, system, diagnostic instrument and storage medium
CN113561934A (en) * 2020-04-29 2021-10-29 广州汽车集团股份有限公司 Vehicle anti-theft matching method, system, diagnostic instrument and storage medium
WO2022095789A1 (en) * 2020-11-05 2022-05-12 深圳市道通科技股份有限公司 Automobile key matching method and apparatus, and automobile communication interface device
CN114582048B (en) * 2020-12-01 2023-09-05 比亚迪股份有限公司 NFC-based vehicle door control method, mobile terminal and vehicle
CN114582048A (en) * 2020-12-01 2022-06-03 比亚迪股份有限公司 NFC-based vehicle door control method, mobile terminal and vehicle
CN114582049A (en) * 2021-02-05 2022-06-03 长城汽车股份有限公司 Calibration parameter transmission method, mobile terminal and cloud server
WO2022174391A1 (en) * 2021-02-19 2022-08-25 深圳市汇顶科技股份有限公司 Vehicle key control method and apparatus, and vehicle and vehicle key body
CN114830619A (en) * 2021-02-19 2022-07-29 深圳市汇顶科技股份有限公司 Vehicle key control method and device, vehicle and vehicle key body
CN114830619B (en) * 2021-02-19 2024-04-26 深圳市汇顶科技股份有限公司 Vehicle key control method and device, vehicle and vehicle key body
CN112967429A (en) * 2021-03-12 2021-06-15 青岛中瑞车联电子科技有限公司 NFC lock control system and method
CN114598459A (en) * 2022-01-29 2022-06-07 上海钧正网络科技有限公司 Communication method, device and storage medium based on remote control equipment
CN114598459B (en) * 2022-01-29 2024-04-19 上海钧正网络科技有限公司 Communication method, device and storage medium based on remote control equipment
CN114466357A (en) * 2022-02-28 2022-05-10 重庆长安汽车股份有限公司 Vehicle-mounted NFC card key binding system and method
CN114466357B (en) * 2022-02-28 2024-04-19 重庆长安汽车股份有限公司 Vehicle-mounted NFC card key binding system and method
CN114684070A (en) * 2022-03-23 2022-07-01 中汽创智科技有限公司 Safe vehicle control method and device, vehicle system and storage medium
CN114670779A (en) * 2022-04-07 2022-06-28 浙江极氪智能科技有限公司 Digital key sharing method and system
CN115019423A (en) * 2022-06-27 2022-09-06 无锡融卡科技有限公司 Bluetooth vehicle key distribution system and implementation method thereof
CN115019423B (en) * 2022-06-27 2023-10-24 无锡融卡科技有限公司 Bluetooth car key distribution system and implementation method thereof
CN115565268B (en) * 2022-08-30 2024-04-05 星汉智能科技股份有限公司 Automobile control method and system based on wireless automobile key, electronic equipment and storage medium
CN115565268A (en) * 2022-08-30 2023-01-03 星汉智能科技股份有限公司 Automobile control method and system based on wireless automobile key, electronic equipment and storage medium
WO2024060673A1 (en) * 2022-09-20 2024-03-28 上海银基信息安全技术股份有公司 Method, system and apparatus for activating physical key, and device and medium
CN115273289A (en) * 2022-09-20 2022-11-01 上海银基信息安全技术股份有限公司 Physical key activation method, system, device, equipment and medium
CN115915131A (en) * 2022-10-20 2023-04-04 远峰科技股份有限公司 Vehicle key bidirectional encryption authentication method and system, vehicle binding device and NFC card
CN115909550A (en) * 2022-10-20 2023-04-04 远峰科技股份有限公司 NFC key verification method, device and system and computer readable storage medium
CN115915131B (en) * 2022-10-20 2023-11-10 远峰科技股份有限公司 Vehicle key bidirectional encryption authentication method and system, vehicle binding device and NFC card
CN115527294B (en) * 2022-11-28 2023-03-24 广州万协通信息技术有限公司 NFC signal vehicle unlocking method of security chip and security chip device
CN115527294A (en) * 2022-11-28 2022-12-27 广州万协通信息技术有限公司 NFC signal vehicle unlocking method of security chip and security chip device
CN115938022A (en) * 2022-12-12 2023-04-07 远峰科技股份有限公司 Vehicle entity key safety authentication method and system
CN115938022B (en) * 2022-12-12 2023-11-24 远峰科技股份有限公司 Vehicle entity key safety authentication method and system

Also Published As

Publication number Publication date
CN110111472B (en) 2022-05-13

Similar Documents

Publication Publication Date Title
CN110111472A (en) Vehicle key control method and device
CN110091828A (en) A kind of control method and device of car key
CN110136306A (en) Vehicle key control method and system
CN110103883A (en) A kind of control method and device of car key
EP3089494B1 (en) Trusted execution environment initialization method and mobile terminal
CN110065470A (en) Automobile control method, device, automobile and storage medium based on NFC car key
CN105516948B (en) A kind of apparatus control method and device
CN108173662A (en) The authentication method and device of a kind of equipment
CN108462710B (en) Authentication and authorization method, device, authentication server and machine-readable storage medium
CN110111459B (en) Virtual key management method and system
CN105704131A (en) Vehicle lock control method and cloud management server
CN109314703A (en) Method for managing the state of connection equipment
CN109379336A (en) A kind of uniform authentication method, distributed system and computer readable storage medium
CN113781678A (en) Vehicle Bluetooth key generation and authentication method and system under network-free environment
CN109587164A (en) A kind of information encrypting transmission method, device, equipment and storage medium
CN112291071B (en) Password management method and system suitable for zero trust network
CN109698834A (en) A kind of encrypted transmission method and system
CN113016201A (en) Key provisioning method and related product
CN106302428B (en) A kind of automatic deployment method and device of encryption level
CN108121904B (en) Unlocking method, device, electronic equipment and server
CN104735064B (en) The method that safety is cancelled and updated is identified in a kind of id password system
CN110091829A (en) A kind of control method and device of car key
KR20190038632A (en) Method for provisioning a first communication device using a second communication device
US11829481B2 (en) Method of verifying the integrity of an electronic device, and a corresponding electronic device
CN103559430B (en) application account management method and device based on Android system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant