CN106302510A - The authorization method of virtual key, system, mobile terminal and server - Google Patents

The authorization method of virtual key, system, mobile terminal and server Download PDF

Info

Publication number
CN106302510A
CN106302510A CN201610792870.6A CN201610792870A CN106302510A CN 106302510 A CN106302510 A CN 106302510A CN 201610792870 A CN201610792870 A CN 201610792870A CN 106302510 A CN106302510 A CN 106302510A
Authority
CN
China
Prior art keywords
mobile terminal
server
sent
authorization
virtual key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610792870.6A
Other languages
Chinese (zh)
Other versions
CN106302510B (en
Inventor
应世明
牛域辉
李琦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Great Wall Motor Co Ltd
Original Assignee
Great Wall Motor Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Great Wall Motor Co Ltd filed Critical Great Wall Motor Co Ltd
Priority to CN201610792870.6A priority Critical patent/CN106302510B/en
Publication of CN106302510A publication Critical patent/CN106302510A/en
Priority to PCT/CN2017/086435 priority patent/WO2018040639A1/en
Application granted granted Critical
Publication of CN106302510B publication Critical patent/CN106302510B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides authorization method, system, mobile terminal and the server of a kind of virtual key, method includes: the first mobile terminal receives the authorization requests that the second mobile terminal sends;Authorization requests is sent to server, with after server authentication passes through, receives the loopback address and authorization code sent from server;By the first application program of the first mobile terminal, loopback address is sent to the second mobile terminal, in order to after the second mobile terminal is confirmed by the first application journey in the second mobile terminal, fed back to the first application program of the first mobile terminal by loopback address;Authorization code is sent to the second mobile terminal by the first application program, in order to the second mobile terminal accesses vehicle according to authorization code.The present invention reduces the interaction flow obtaining authorization code, improve efficiency, ensure that the safety of transmitting procedure simultaneously, it is possible to provide more preferable operating experience, convenience and safety guarantee to the both sides of key mandate.

Description

The authorization method of virtual key, system, mobile terminal and server
Technical field
The present invention relates to field of information security technology, particularly to the authorization method of a kind of virtual key, system, mobile eventually End and server.
Background technology
Along with the fast development of electronics techniques, to convenient in life with safety requirements is more and more higher.As giving birth to Requisite safety lock system in work, such as, apply the electronic lock system in the field such as automobile, household, and its design is the most increasingly The expectation demand being close to the users.And using of normal key, need (material object is included mechanical key, electron key, non-contact magnetically Card etc.) give borrower, cause time and inconvenience spatially.Nowadays the users that appear as of smart electronics key carry Supply new key sharing platform, some communication modes can have been passed through between user, on an electronic device key is licensed to him People, solves normal key share time and limitation spatially.
According to the demand of user, various smart electronics keys are devised, and mobile device such as mobile phone, by mobile phone and key Spoon combines.Owing to mobile phone is as the one of convenience mobile device, it is widely used in daily life, using mobile phone as a kind of key The platform using and authorizing of spoon has become as a kind of trend.
At present, correlation technique proposes a kind of vehicle operating authority and authorizes system, possesses: server, and it is from the 1st pocket Electronic equipment receives the identification information that the 1st portable electronic device using the electron key as vehicle is identified, And the legitimacy of the information of identification is confirmed, and action enabling signal is sent to vehicle, this action enabling signal pair is with next Permit from the corresponding vehicle operating of requirement in the 1st portable electronic device;Key logging unit, is provided server Key logs in the 1st portable electronic device;And access right authorizes portion, it logs in the 1st pocket electronics by use The access right accessing server is granted to the 2nd portable electronic device by the key in equipment, and makes the 2nd pocket electronics set For carrying out action as the electron key with vehicle operating authority.The method disadvantageously, there is key cipher simultaneously The safety existed, if grantee is during driving, authorized person still has permission control automobile, can carry to grantee Coming dangerous, grantee is often as interim user, and during using key, safety is experienced bad.
Correlation technique also discloses the authorization method of a kind of vehicle, system and terminal, and method includes: be authorized to mobile terminal Generated by bluetooth key application program and borrow car solicited message, and will send to authorizing mobile terminal by means of car solicited message;Authorize Mobile terminal receives borrows car solicited message;Authorize mobile terminal to import borrow car solicited message and arrange the borrowing time of vehicle, and And be encrypted to generate authorization message by identification information, borrowing time and the account of vehicle bluetooth key and password;Authorize Authorization message is sent to being authorized to mobile terminal by mobile terminal;It is authorized to mobile terminal and receives authorization message, and import mandate Information, and obtain the identification information of self, and when the identification information of self is consistent with the identification information in authorization message, borrowing With time internal control vehicle.Although the method disadvantageously, there is prompting to control the time used in mandate, but the most right Access times or other authorities are explained, and more do not make scheme to how realizing similar restriction in authorizing.
Summary of the invention
In view of this, it is contemplated that propose the authorization method of a kind of virtual key, acquisition authorization code is the method reduced Interaction flow, improve efficiency, ensure that the safety of transmitting procedure simultaneously, it is possible to provide more to the both sides of key mandate Good operating experience, convenience and safety guarantee.
For reaching above-mentioned purpose, the technical scheme is that and be achieved in that:
The authorization method of a kind of virtual key, comprises the following steps: the first mobile terminal receives the second mobile terminal and sends Authorization requests;Described authorization requests is sent to server, with after described server authentication passes through, receives from described clothes The loopback address of business device transmission and authorization code;By the first application program of the first mobile terminal, described loopback address is sent to Described second mobile terminal, in order to after described second mobile terminal is confirmed by the first application journey in the second mobile terminal, logical Cross described loopback address and feed back to the first application program of described first mobile terminal;Described first application program is by described mandate Code is sent to described second mobile terminal, in order to described second mobile terminal accesses vehicle according to described authorization code.
Further, the communication between described first mobile terminal and described server, and described first mobile terminal And the communication between described second mobile terminal uses tunnel encryption.
Further, described first application program is APP, SMS or IE.
Further, when described authorization requests is sent to server by described first mobile terminal, it is additionally operable to move first Dynamic terminal identity information is sent to described server, in order to described first mobile terminal is authenticated by described server.
Relative to prior art, the authorization method of virtual key of the present invention has the advantage that
The authorization method of the virtual key of the present invention, the first mobile terminal receives the authorization requests of the second mobile terminal, and It is sent to server, and after the server testimony of a witness is passed through, receives loopback address and authorization code, and loopback address is sent to second Mobile terminal, in order to the second mobile terminal after validation, feeds back to the first mobile terminal by loopback address, then first moves Authorization code is sent to the second mobile terminal by terminal, completes licensing process.Therefore, the mutual of acquisition authorization code is the method reduced Flow process, improves efficiency, uses tunnel encryption technology (TLS) to ensure the safety of transmitting procedure, energy in transmitting procedure simultaneously Enough provide more preferable operating experience, convenience and safety guarantee to the both sides of key mandate.
Further object is that the authoring system proposing a kind of virtual key, the system reduces acquisition and authorize The interaction flow of code, improves efficiency, ensure that the safety of transmitting procedure simultaneously, it is possible to provide to the both sides of key mandate Preferably operating experience, convenience and safety guarantee.
For reaching above-mentioned purpose, the technical scheme is that and be achieved in that:
A kind of authoring system of virtual key, including: the first mobile terminal, the second mobile terminal and server, wherein, institute State the first mobile terminal and receive the authorization requests that the second mobile terminal sends, and described authorization requests is sent to server, with After described server authentication passes through, receive the loopback address and authorization code sent from described server, and by described Described loopback address is sent to described second mobile terminal by the first application program in the first mobile terminal, in order to described second After mobile terminal is confirmed by the first application program in the second mobile terminal, feed back to described first by described loopback address First application program of mobile terminal, described authorization code is sent to described second mobile terminal by described first application program, with Toilet is stated the second mobile terminal and is accessed vehicle according to described authorization code.
Further, the communication between described first mobile terminal and described server, and described first mobile terminal And the communication between described second mobile terminal uses tunnel encryption.
Further, described first application program is APP, SMS or IE.
Further, when described authorization requests is sent to server by described first mobile terminal, it is additionally operable to move first Dynamic terminal identity information is sent to described server, in order to described first mobile terminal is authenticated by described server.
The authoring system of described virtual key is had relative to prior art with the authorization method of above-mentioned virtual key Some Dominant Facies are same, do not repeat them here.
Another object of the present invention is to propose a kind of mobile terminal, and this mobile terminal decreases the friendship obtaining authorization code Flow process, improves efficiency, ensure that the safety of transmitting procedure simultaneously, it is possible to provide preferably to the both sides of key mandate mutually Operating experience, convenience and safety guarantee.
For reaching above-mentioned purpose, the technical scheme is that and be achieved in that:
A kind of mobile terminal, described mobile terminal is in the authoring system of the virtual key described in the above embodiment of the present invention The first mobile terminal.
The authoring system of described mobile terminal and above-mentioned virtual key is relative to prior art have the advantage that phase With, do not repeat them here.
A further object of the present invention is to propose a kind of mobile terminal, and this mobile terminal decreases the friendship obtaining authorization code Flow process, improves efficiency, ensure that the safety of transmitting procedure simultaneously, it is possible to provide preferably to the both sides of key mandate mutually Operating experience, convenience and safety guarantee.
For reaching above-mentioned purpose, the technical scheme is that and be achieved in that:
A kind of mobile terminal, described mobile terminal is in the authoring system of the virtual key described in the above embodiment of the present invention The second mobile terminal.
The authoring system of described mobile terminal and above-mentioned virtual key is relative to prior art have the advantage that phase With, do not repeat them here.
A further object of the present invention is to propose a kind of server, and this server decreases the interactive stream obtaining authorization code Journey, improves efficiency, ensure that the safety of transmitting procedure simultaneously, it is possible to provide preferably operation to the both sides of key mandate Experience, convenience and safety guarantee.
For reaching above-mentioned purpose, the technical scheme is that and be achieved in that:
A kind of server, described server is the clothes in the authoring system of the virtual key described in the above embodiment of the present invention Business device.
Described server is identical relative to prior art have the advantage that with the authoring system of above-mentioned virtual key, Do not repeat them here.
Accompanying drawing explanation
The accompanying drawing of the part constituting the present invention is used for providing a further understanding of the present invention, and the present invention's is schematic real Execute example and illustrate for explaining the present invention, being not intended that inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of the authorization method of the virtual key of the embodiment of the present invention;
Fig. 2 is the theory diagram of the authorization method of the virtual key of one embodiment of the invention;
Fig. 3 is that mandate schematic diagram shared by the virtual key of one embodiment of the invention;
Fig. 4 is that each module relationship schematic diagram in licensing process shared by the key of one embodiment of the invention;
Fig. 5 is the licensing scheme schematic diagram of the authorization method of the virtual key of one embodiment of the invention;And
Fig. 6 is the structured flowchart of the authoring system of the virtual key of the embodiment of the present invention.
Description of reference numerals:
The authoring system of the virtual key of 100-, 110-the first mobile terminal, 120-the second mobile terminal, 130-server.
Detailed description of the invention
It should be noted that in the case of not conflicting, the embodiment in the present invention and the feature in embodiment can phases Combination mutually.
Describe the present invention below with reference to the accompanying drawings and in conjunction with the embodiments in detail.
Fig. 1 is the flow chart of the authorization method of the most virtual key.Fig. 2 is according to the present invention The theory diagram of the authorization method of the virtual key of one embodiment.
As it is shown in figure 1, and combine Fig. 2, the authorization method of the virtual key of the embodiment of the present invention comprises the following steps:
Step S1: the first mobile terminal receives the authorization requests that the second mobile terminal sends.Specifically, the first mobile terminal Being the smart mobile phone 1 shown in Fig. 2, the second mobile terminal is the smart mobile phone 2 shown in Fig. 2, and server is in Fig. 2 Cloud server.
Step S2: authorization requests is sent to server, with after server authentication passes through, receives and sends from server Loopback address and authorization code.
Further, in one embodiment of the invention, when authorization requests is sent to server by the first mobile terminal, It is additionally operable to the first mobile terminal identity information is sent to server, in order to the first mobile terminal is authenticated by server.
Step S3: loopback address is sent to the second mobile terminal by the first application program of the first mobile terminal, with Just, after the second mobile terminal is confirmed by the first application journey in the second mobile terminal, feed back to first by loopback address and move First application program of terminal.
Wherein, the first application program for example, APP, SMS or IE.
Step S4: authorization code is sent to the second mobile terminal by the first application program, in order to the second mobile terminal is according to awarding Weighted code accesses vehicle.
In one embodiment of the invention, such as, the communication between the first mobile terminal and server, and the first shifting Dynamic communication between terminal and the second mobile terminal uses tunnel encryption.
For the ease of being more fully understood that the present invention, below in conjunction with accompanying drawing, with the concrete example method to the embodiment of the present invention Specifically specifically describe.
Shown in Fig. 2, the principle overview of the method for the embodiment of the present invention is: permit holder (owning of smart mobile phone 2 Person) send authorization requests to car owner (owner of smart mobile phone 1), after receiving the authorized certificate of car owner, the person of hiring a car is by car The authorized certificate of main smart mobile phone 1 transmission is transferred to cloud server, receives key from server and accesses identifying code, should Identifying code is saved in the smart mobile phone 2 of grantee (person of hiring a car), and grantee carries and is saved on authorized smart mobile phone 2 Locked resource, bluetooth module automobile integrated with PEPS mates, and completes the authentication communication process of key, concrete mandate Journey example is as shown in Figure 3, specific as follows:
Permit holder initiates authorization requests to car owner, from the mobile device 1 (i.e. smart mobile phone 1 or the first mobile terminal) of car owner Obtain authorized certificate.This authorized certificate is used to indicate that car owner to agree to this person of hiring a car and authorizes.The person of hiring a car obtains car owner Authorized certificate after, then authorized certificate and the person's of hiring a car mobile device voucher are sent to cloud server, make requests on authorization code Obtain final access credentials.Permit holder mobile device 2 (i.e. smart mobile phone 2 or the second mobile terminal) is recognized by cloud server Card, and verify the effectiveness of authorized certificate, if after by checking, backward reference certificate authority code is given mobile by cloud server Equipment 2.The person of hiring a car uses access credentials authorization code to represent car owner to carry out request of data to automobile PEPS.PEPS is verified mandate After Ma, shielded resource being returned to permit holder mobile device 2, Fig. 4 lists in key licensing process between each correlation module Relation, specific as follows:
(1) permit holder mobile device 2 need to ask access authorization code to car owner's mobile device 1 by intermediate system.
(2) after car owner's mobile device 1 authorizes according to user and passes through Subscriber Information certification, to permit holder mobile device 2 backward reference authorization codes.
(3) permit holder mobile device 2 uses access authorization code to call open platform data-interface and accesses shielded user Resource, accesses and is caught by cloud server.
(4) cloud server obtains access authorization code, asks associated user's type of authorization code, authority information to car owner.
(5) car owner's mobile device 1 return authentication information.
(6) authority information that the authority information that authorization code in request is comprised by cloud server and resource check and approve needs enters Row verification.
(7) for sufficiently asked by authority by cloud server to automobile PEPS carry out further data please Ask.
(8) automobile PEPS returns shielded resource data.
Based on the relation between authorization flow mentioned above and each module, embodiments of the invention have employed awarding of implicit expression Power mechanism pattern, the person that i.e. do not hires a car sends request by mobile device 2 to car owner's mobile device 1 and authorizes, and car owner is by equipment APP, IE etc. application carry out account number cipher input and to the request selecting mandate of permit holder after, cloud server be not return Interim token is to third-party application, but directly with the form of URI fragment, authorization code is returned to mobile device 2 client, in detail Thin licensing scheme is such as shown in Fig. 5, specific as follows:
1) authorization data that the mobile device 2 of the person of hiring a car is guided to cloud server by self-defining APP etc. exchanges joint Point opens authorization flow.The self-defined APP of mobile device 2, when cloud server is asked, can bring client id, client device Id, request permissions scope, conditional code and carry out the loopback address adjusted back for cloud server.
2), after car owner's mobile device 1 service end beyond the clouds input user's voucher, car owner's identity is recognized by cloud server Card, then is decided whether to authorize the request of mobile device 2 client by car owner.
3) assuming that car owner has passed through to authorize, cloud server starts corresponding handling process according to the licensing mode of car owner, After the loopback address being attached to authorization code with the form of URI fragment afterwards to utilize step 1 incoming.
4) the self-defined APP of car owner need to retain authorization code in this locality, sends loopback address to the self-defined APP of permit holder simultaneously The request of storage resource.
5) the self-defined APP of permit holder resolves with the complete readjustment having authorization code information that can return in obtaining step 3 The script of address.
6) the self-defined APP of car owner gets authorization code at local runtime script, and the authorization code obtained is returned mobile device 2。
To sum up, the authorization method of virtual key according to embodiments of the present invention, the first mobile terminal receives second and moves end The authorization requests of end, and it is sent to server, and after the server testimony of a witness is passed through, receive loopback address and authorization code, and incite somebody to action back Address is adjusted to be sent to the second mobile terminal, in order to the second mobile terminal after validation, feeds back to first by loopback address and moves Terminal, then authorization code is sent to the second mobile terminal by the first mobile terminal, completes licensing process.Therefore, the method reduces Obtain the interaction flow of authorization code, improve efficiency, use tunnel encryption technology (TLS) to ensure to pass simultaneously in transmitting procedure The safety of defeated process, it is possible to provide more preferable operating experience, convenience and safety guarantee to the both sides of key mandate.
Further, as shown in Figure 6, embodiment of the invention discloses that the authoring system 100 of a kind of virtual key, bag Include: the first mobile terminal the 110, second mobile terminal 120 and server 130.
First mobile terminal 110 receives the authorization requests that the second mobile terminal 120 sends, and authorization requests is sent to clothes Business device 130, with after server 130 certification is passed through, receives the loopback address and authorization code sent from server 130, and By the first application program in the first mobile terminal 110, loopback address is sent to the second mobile terminal 120, in order to second moves After dynamic terminal 120 is confirmed by the first application program in the second mobile terminal 120, feed back to first by loopback address and move First application program of terminal 110, authorization code is sent to the second mobile terminal 120 by the first application program, in order to second moves Terminal 120 accesses vehicle according to authorization code.Wherein, the first application program for example, APP, SMS or IE.
In one embodiment of the invention, the communication between the first mobile terminal 110 and server 130, and first Communication between mobile terminal 110 and the second mobile terminal 120 uses tunnel encryption.
In one embodiment of the invention, when authorization requests is sent to server 130 by the first mobile terminal 110, also For the first mobile terminal 110 identity information is sent to server 130, in order to the first mobile terminal 110 is entered by server 130 Row certification.
To sum up, the authoring system of virtual key according to embodiments of the present invention, the first mobile terminal receives second and moves end The authorization requests of end, and it is sent to server, and after the server testimony of a witness is passed through, receive loopback address and authorization code, and incite somebody to action back Address is adjusted to be sent to the second mobile terminal, in order to the second mobile terminal after validation, feeds back to first by loopback address and moves Terminal, then authorization code is sent to the second mobile terminal by the first mobile terminal, completes licensing process.Therefore, this system subtracts Lack the interaction flow obtaining authorization code, improve efficiency, use tunnel encryption technology (TLS) to ensure simultaneously in transmitting procedure The safety of transmitting procedure, it is possible to provide more preferable operating experience, convenience and safety guarantee to the both sides of key mandate.
It should be noted that the specific implementation of the authoring system of the virtual key of the embodiment of the present invention is real with the present invention The specific implementation of the authorization method executing the virtual key of example is similar to, and specifically refers to the description of method part, in order to reduce Redundancy, does not repeats.
Further, embodiment of the invention discloses that a kind of mobile terminal, for example, present invention is above-mentioned for this mobile terminal The first mobile terminal in the authoring system of the virtual key described by embodiment.Accordingly, with respect to this mobile terminal concrete in detail Thin description sees the above-mentioned description to the first mobile terminal part of the present invention.
Therefore, mobile terminal according to embodiments of the present invention, decrease the interaction flow obtaining authorization code, improve effect Rate, ensure that the safety of transmitting procedure simultaneously, it is possible to provide more preferable operating experience, convenience to the both sides of key mandate And safety guarantee.
Further, embodiment of the invention discloses that a kind of mobile terminal, for example, present invention is above-mentioned for this mobile terminal The second mobile terminal in the authoring system of the virtual key described by embodiment.Accordingly, with respect to this mobile terminal concrete in detail Thin description sees the above-mentioned description to the second mobile terminal part of the present invention.
Therefore, mobile terminal according to embodiments of the present invention, decrease the interaction flow obtaining authorization code, improve effect Rate, ensure that the safety of transmitting procedure simultaneously, it is possible to provide more preferable operating experience, convenience to the both sides of key mandate And safety guarantee.
Further, embodiment of the invention discloses that a kind of server, the above-mentioned enforcement of this server for example, present invention Server in the authoring system of the virtual key described by example.Concrete detailed description in detail accordingly, with respect to this server sees this Invent the above-mentioned description to server section.
Therefore, server according to embodiments of the present invention, decrease the interaction flow obtaining authorization code, improve efficiency, Ensure that the safety of transmitting procedure simultaneously, it is possible to the both sides of key mandate provide more preferable operating experience, convenience and Safety guarantee.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all essences in the present invention Within god and principle, any modification, equivalent substitution and improvement etc. made, should be included within the scope of the present invention.

Claims (11)

1. the authorization method of a virtual key, it is characterised in that comprise the following steps:
First mobile terminal receives the authorization requests that the second mobile terminal sends;
Described authorization requests is sent to server, with after described server authentication passes through, receives and send out from described server The loopback address sent and authorization code;
By the first application program of the first mobile terminal, described loopback address is sent to described second mobile terminal, in order to institute After stating the first application journey confirmation that the second mobile terminal passes through in the second mobile terminal, fed back to described by described loopback address First application program of the first mobile terminal;
Described authorization code is sent to described second mobile terminal by described first application program, in order to described second mobile terminal root Vehicle is accessed according to described authorization code.
The authorization method of virtual key the most according to claim 1, it is characterised in that described first mobile terminal is with described Communication between communication between server, and described first mobile terminal and described second mobile terminal uses tunnel to add Close.
The authorization method of virtual key the most according to claim 1, it is characterised in that described first application program be APP, SMS or IE.
The authorization method of virtual key the most according to claim 1, it is characterised in that described first mobile terminal is by described When authorization requests is sent to server, it is additionally operable to the first mobile terminal identity information is sent to described server, in order to described Described first mobile terminal is authenticated by server.
5. the authoring system of a virtual key, it is characterised in that including: the first mobile terminal, the second mobile terminal and service Device, wherein,
Described first mobile terminal receives the authorization requests that the second mobile terminal sends, and described authorization requests is sent to service Device, with after described server authentication passes through, receives the loopback address and authorization code sent from described server, and passes through Described loopback address is sent to described second mobile terminal by the first application program in described first mobile terminal, in order to described After second mobile terminal is confirmed by the first application program in the second mobile terminal, fed back to described by described loopback address First application program of the first mobile terminal, described authorization code is sent to described second and moves end by described first application program End, in order to described second mobile terminal accesses vehicle according to described authorization code.
The authoring system of virtual key the most according to claim 5, it is characterised in that described first mobile terminal is with described Communication between communication between server, and described first mobile terminal and described second mobile terminal uses tunnel to add Close.
The authoring system of virtual key the most according to claim 5, it is characterised in that described first application program be APP, SMS or IE.
The authoring system of virtual key the most according to claim 5, it is characterised in that described first mobile terminal is by described When authorization requests is sent to server, it is additionally operable to the first mobile terminal identity information is sent to described server, in order to described Described first mobile terminal is authenticated by server.
9. a mobile terminal, it is characterised in that described mobile terminal is according to the virtual key described in any one of claim 5-8 First mobile terminal in the authoring system of spoon.
10. a mobile terminal, it is characterised in that described mobile terminal is virtual according to described in any one of claim 5-8 Second mobile terminal in the authoring system of key.
11. 1 kinds of servers, it is characterised in that described server is according to the virtual key described in any one of claim 5-8 Authoring system in server.
CN201610792870.6A 2016-08-31 2016-08-31 Authorization method, system, mobile terminal and the server of virtual key Active CN106302510B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610792870.6A CN106302510B (en) 2016-08-31 2016-08-31 Authorization method, system, mobile terminal and the server of virtual key
PCT/CN2017/086435 WO2018040639A1 (en) 2016-08-31 2017-05-27 Authorization method and system for virtual key, mobile terminal and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610792870.6A CN106302510B (en) 2016-08-31 2016-08-31 Authorization method, system, mobile terminal and the server of virtual key

Publications (2)

Publication Number Publication Date
CN106302510A true CN106302510A (en) 2017-01-04
CN106302510B CN106302510B (en) 2019-07-26

Family

ID=57672410

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610792870.6A Active CN106302510B (en) 2016-08-31 2016-08-31 Authorization method, system, mobile terminal and the server of virtual key

Country Status (2)

Country Link
CN (1) CN106302510B (en)
WO (1) WO2018040639A1 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106671936A (en) * 2017-01-17 2017-05-17 北京汽车研究总院有限公司 Car starting method and device
WO2018040639A1 (en) * 2016-08-31 2018-03-08 长城汽车股份有限公司 Authorization method and system for virtual key, mobile terminal and server
CN109285252A (en) * 2018-09-29 2019-01-29 百度在线网络技术(北京)有限公司 Lock control method and device
CN109286649A (en) * 2017-07-19 2019-01-29 现代自动车株式会社 Vehicular system and its control method
CN110290525A (en) * 2019-06-21 2019-09-27 湖北亿咖通科技有限公司 A kind of sharing method and system, mobile terminal of vehicle number key
CN110770800A (en) * 2017-07-07 2020-02-07 胡夫·许尔斯贝克和福斯特有限及两合公司 Method for granting access rights
JP2020037296A (en) * 2018-09-03 2020-03-12 笠▲衆▼實業有限公司 Intelligent vehicle electronic key system
CN111148075A (en) * 2019-12-30 2020-05-12 上海博泰悦臻网络技术服务有限公司 Bluetooth key configuration method and system for configuring Bluetooth key
CN112153640A (en) * 2020-06-24 2020-12-29 上汽通用五菱汽车股份有限公司 Vehicle control method, system, user terminal, vehicle and readable storage medium
CN112459617A (en) * 2020-11-27 2021-03-09 黄志刚 Remote controller control box, door lock control system and sharing system of automobile
CN112572344A (en) * 2020-11-27 2021-03-30 黄志刚 Door lock control and sharing method for automobile

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110619221B (en) * 2019-08-09 2023-10-31 深圳市轱辘车联数据技术有限公司 Virtual authorization method, device, terminal equipment and storage medium
CN113554786B (en) * 2021-08-02 2023-05-30 广东南马智能技术有限公司 Bluetooth car key car control method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2743868A1 (en) * 2012-12-14 2014-06-18 Seven Principles AG Virtual vehicle key
CN104424679A (en) * 2013-08-30 2015-03-18 比亚迪股份有限公司 Authorization method and authorization system of intelligent key in wireless terminal as well as terminal and server
CN103035054B (en) * 2012-12-29 2015-04-08 江苏中科天安智联科技有限公司 NFC intelligent automobile key system with permission and authorization functions
CN105083214A (en) * 2014-04-28 2015-11-25 比亚迪股份有限公司 Authorization method, authorization system and authorization mobile terminal for vehicle and authorized mobile terminal
CN105788037A (en) * 2014-12-26 2016-07-20 比亚迪股份有限公司 Vehicle intelligent key authorization system and method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6036638B2 (en) * 2013-10-17 2016-11-30 株式会社デンソー Electronic key system, in-vehicle device, and portable device
CN105491228B (en) * 2015-11-24 2019-04-19 大连楼兰科技股份有限公司 Share the method and system of vehicle control power
CN106375312B (en) * 2016-08-31 2019-12-06 长城汽车股份有限公司 Virtual key authorization method, system, mobile terminal and server
CN106302510B (en) * 2016-08-31 2019-07-26 长城汽车股份有限公司 Authorization method, system, mobile terminal and the server of virtual key

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2743868A1 (en) * 2012-12-14 2014-06-18 Seven Principles AG Virtual vehicle key
CN103035054B (en) * 2012-12-29 2015-04-08 江苏中科天安智联科技有限公司 NFC intelligent automobile key system with permission and authorization functions
CN104424679A (en) * 2013-08-30 2015-03-18 比亚迪股份有限公司 Authorization method and authorization system of intelligent key in wireless terminal as well as terminal and server
CN105083214A (en) * 2014-04-28 2015-11-25 比亚迪股份有限公司 Authorization method, authorization system and authorization mobile terminal for vehicle and authorized mobile terminal
CN105788037A (en) * 2014-12-26 2016-07-20 比亚迪股份有限公司 Vehicle intelligent key authorization system and method

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018040639A1 (en) * 2016-08-31 2018-03-08 长城汽车股份有限公司 Authorization method and system for virtual key, mobile terminal and server
CN106671936A (en) * 2017-01-17 2017-05-17 北京汽车研究总院有限公司 Car starting method and device
CN110770800A (en) * 2017-07-07 2020-02-07 胡夫·许尔斯贝克和福斯特有限及两合公司 Method for granting access rights
CN109286649B (en) * 2017-07-19 2022-05-10 现代自动车株式会社 Vehicle system and control method thereof
CN109286649A (en) * 2017-07-19 2019-01-29 现代自动车株式会社 Vehicular system and its control method
JP2020037296A (en) * 2018-09-03 2020-03-12 笠▲衆▼實業有限公司 Intelligent vehicle electronic key system
CN109285252B (en) * 2018-09-29 2021-08-10 百度在线网络技术(北京)有限公司 Vehicle lock control method and device
CN109285252A (en) * 2018-09-29 2019-01-29 百度在线网络技术(北京)有限公司 Lock control method and device
CN110290525A (en) * 2019-06-21 2019-09-27 湖北亿咖通科技有限公司 A kind of sharing method and system, mobile terminal of vehicle number key
CN111148075A (en) * 2019-12-30 2020-05-12 上海博泰悦臻网络技术服务有限公司 Bluetooth key configuration method and system for configuring Bluetooth key
CN112153640A (en) * 2020-06-24 2020-12-29 上汽通用五菱汽车股份有限公司 Vehicle control method, system, user terminal, vehicle and readable storage medium
CN112459617A (en) * 2020-11-27 2021-03-09 黄志刚 Remote controller control box, door lock control system and sharing system of automobile
CN112572344A (en) * 2020-11-27 2021-03-30 黄志刚 Door lock control and sharing method for automobile

Also Published As

Publication number Publication date
CN106302510B (en) 2019-07-26
WO2018040639A1 (en) 2018-03-08

Similar Documents

Publication Publication Date Title
CN106302510B (en) Authorization method, system, mobile terminal and the server of virtual key
CN106375312A (en) Virtual key authorization method and system, mobile terminal and server
CN109936833B (en) Vehicle virtual key generation and use method and system and user terminal
CN110637328B (en) Vehicle access method based on portable equipment
WO2018040641A1 (en) Mobile terminal, vehicle terminal, and virtual key sharing method and system
CN106415674B (en) System and method for access control
CN106373235B (en) Authorization method, server and the authoring system of virtual key
JP6586446B2 (en) Method for confirming identification information of user of communication terminal and related system
CN101336436B (en) Security token and method for authentication of a user with the security token
WO2021135258A1 (en) Method and apparatus for using vehicle based on smart key
CN109895734B (en) Authorized Bluetooth key activation method and system, storage medium and T-BOX
TW201741922A (en) Biological feature based safety certification method and device
JP2019537898A (en) A physical key to provision communication devices with data that allows access to vehicle resources
CN110169031A (en) Access control system with the distribution of local mobile cryptographic key
CN110178161A (en) Using the access control system of safety
CN102217277A (en) Method and system for token-based authentication
CN106408702A (en) Authorization method of virtual keys, server and authorization system
WO2015019104A2 (en) Access and control authorisation system
US11722529B2 (en) Method and apparatus for policy-based management of assets
JP2005032241A (en) Grant of permission to access resource
US20230133418A1 (en) Personalised, server-specific authentication mechanism
CN110770800A (en) Method for granting access rights
DE102018005038A1 (en) Smart card as a security token
CN107609878B (en) Security authentication method and system for shared automobile
CN109743283A (en) A kind of information transferring method and equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant