CN106302510A - The authorization method of virtual key, system, mobile terminal and server - Google Patents
The authorization method of virtual key, system, mobile terminal and server Download PDFInfo
- Publication number
- CN106302510A CN106302510A CN201610792870.6A CN201610792870A CN106302510A CN 106302510 A CN106302510 A CN 106302510A CN 201610792870 A CN201610792870 A CN 201610792870A CN 106302510 A CN106302510 A CN 106302510A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- server
- sent
- authorization
- virtual key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides authorization method, system, mobile terminal and the server of a kind of virtual key, method includes: the first mobile terminal receives the authorization requests that the second mobile terminal sends;Authorization requests is sent to server, with after server authentication passes through, receives the loopback address and authorization code sent from server;By the first application program of the first mobile terminal, loopback address is sent to the second mobile terminal, in order to after the second mobile terminal is confirmed by the first application journey in the second mobile terminal, fed back to the first application program of the first mobile terminal by loopback address;Authorization code is sent to the second mobile terminal by the first application program, in order to the second mobile terminal accesses vehicle according to authorization code.The present invention reduces the interaction flow obtaining authorization code, improve efficiency, ensure that the safety of transmitting procedure simultaneously, it is possible to provide more preferable operating experience, convenience and safety guarantee to the both sides of key mandate.
Description
Technical field
The present invention relates to field of information security technology, particularly to the authorization method of a kind of virtual key, system, mobile eventually
End and server.
Background technology
Along with the fast development of electronics techniques, to convenient in life with safety requirements is more and more higher.As giving birth to
Requisite safety lock system in work, such as, apply the electronic lock system in the field such as automobile, household, and its design is the most increasingly
The expectation demand being close to the users.And using of normal key, need (material object is included mechanical key, electron key, non-contact magnetically
Card etc.) give borrower, cause time and inconvenience spatially.Nowadays the users that appear as of smart electronics key carry
Supply new key sharing platform, some communication modes can have been passed through between user, on an electronic device key is licensed to him
People, solves normal key share time and limitation spatially.
According to the demand of user, various smart electronics keys are devised, and mobile device such as mobile phone, by mobile phone and key
Spoon combines.Owing to mobile phone is as the one of convenience mobile device, it is widely used in daily life, using mobile phone as a kind of key
The platform using and authorizing of spoon has become as a kind of trend.
At present, correlation technique proposes a kind of vehicle operating authority and authorizes system, possesses: server, and it is from the 1st pocket
Electronic equipment receives the identification information that the 1st portable electronic device using the electron key as vehicle is identified,
And the legitimacy of the information of identification is confirmed, and action enabling signal is sent to vehicle, this action enabling signal pair is with next
Permit from the corresponding vehicle operating of requirement in the 1st portable electronic device;Key logging unit, is provided server
Key logs in the 1st portable electronic device;And access right authorizes portion, it logs in the 1st pocket electronics by use
The access right accessing server is granted to the 2nd portable electronic device by the key in equipment, and makes the 2nd pocket electronics set
For carrying out action as the electron key with vehicle operating authority.The method disadvantageously, there is key cipher simultaneously
The safety existed, if grantee is during driving, authorized person still has permission control automobile, can carry to grantee
Coming dangerous, grantee is often as interim user, and during using key, safety is experienced bad.
Correlation technique also discloses the authorization method of a kind of vehicle, system and terminal, and method includes: be authorized to mobile terminal
Generated by bluetooth key application program and borrow car solicited message, and will send to authorizing mobile terminal by means of car solicited message;Authorize
Mobile terminal receives borrows car solicited message;Authorize mobile terminal to import borrow car solicited message and arrange the borrowing time of vehicle, and
And be encrypted to generate authorization message by identification information, borrowing time and the account of vehicle bluetooth key and password;Authorize
Authorization message is sent to being authorized to mobile terminal by mobile terminal;It is authorized to mobile terminal and receives authorization message, and import mandate
Information, and obtain the identification information of self, and when the identification information of self is consistent with the identification information in authorization message, borrowing
With time internal control vehicle.Although the method disadvantageously, there is prompting to control the time used in mandate, but the most right
Access times or other authorities are explained, and more do not make scheme to how realizing similar restriction in authorizing.
Summary of the invention
In view of this, it is contemplated that propose the authorization method of a kind of virtual key, acquisition authorization code is the method reduced
Interaction flow, improve efficiency, ensure that the safety of transmitting procedure simultaneously, it is possible to provide more to the both sides of key mandate
Good operating experience, convenience and safety guarantee.
For reaching above-mentioned purpose, the technical scheme is that and be achieved in that:
The authorization method of a kind of virtual key, comprises the following steps: the first mobile terminal receives the second mobile terminal and sends
Authorization requests;Described authorization requests is sent to server, with after described server authentication passes through, receives from described clothes
The loopback address of business device transmission and authorization code;By the first application program of the first mobile terminal, described loopback address is sent to
Described second mobile terminal, in order to after described second mobile terminal is confirmed by the first application journey in the second mobile terminal, logical
Cross described loopback address and feed back to the first application program of described first mobile terminal;Described first application program is by described mandate
Code is sent to described second mobile terminal, in order to described second mobile terminal accesses vehicle according to described authorization code.
Further, the communication between described first mobile terminal and described server, and described first mobile terminal
And the communication between described second mobile terminal uses tunnel encryption.
Further, described first application program is APP, SMS or IE.
Further, when described authorization requests is sent to server by described first mobile terminal, it is additionally operable to move first
Dynamic terminal identity information is sent to described server, in order to described first mobile terminal is authenticated by described server.
Relative to prior art, the authorization method of virtual key of the present invention has the advantage that
The authorization method of the virtual key of the present invention, the first mobile terminal receives the authorization requests of the second mobile terminal, and
It is sent to server, and after the server testimony of a witness is passed through, receives loopback address and authorization code, and loopback address is sent to second
Mobile terminal, in order to the second mobile terminal after validation, feeds back to the first mobile terminal by loopback address, then first moves
Authorization code is sent to the second mobile terminal by terminal, completes licensing process.Therefore, the mutual of acquisition authorization code is the method reduced
Flow process, improves efficiency, uses tunnel encryption technology (TLS) to ensure the safety of transmitting procedure, energy in transmitting procedure simultaneously
Enough provide more preferable operating experience, convenience and safety guarantee to the both sides of key mandate.
Further object is that the authoring system proposing a kind of virtual key, the system reduces acquisition and authorize
The interaction flow of code, improves efficiency, ensure that the safety of transmitting procedure simultaneously, it is possible to provide to the both sides of key mandate
Preferably operating experience, convenience and safety guarantee.
For reaching above-mentioned purpose, the technical scheme is that and be achieved in that:
A kind of authoring system of virtual key, including: the first mobile terminal, the second mobile terminal and server, wherein, institute
State the first mobile terminal and receive the authorization requests that the second mobile terminal sends, and described authorization requests is sent to server, with
After described server authentication passes through, receive the loopback address and authorization code sent from described server, and by described
Described loopback address is sent to described second mobile terminal by the first application program in the first mobile terminal, in order to described second
After mobile terminal is confirmed by the first application program in the second mobile terminal, feed back to described first by described loopback address
First application program of mobile terminal, described authorization code is sent to described second mobile terminal by described first application program, with
Toilet is stated the second mobile terminal and is accessed vehicle according to described authorization code.
Further, the communication between described first mobile terminal and described server, and described first mobile terminal
And the communication between described second mobile terminal uses tunnel encryption.
Further, described first application program is APP, SMS or IE.
Further, when described authorization requests is sent to server by described first mobile terminal, it is additionally operable to move first
Dynamic terminal identity information is sent to described server, in order to described first mobile terminal is authenticated by described server.
The authoring system of described virtual key is had relative to prior art with the authorization method of above-mentioned virtual key
Some Dominant Facies are same, do not repeat them here.
Another object of the present invention is to propose a kind of mobile terminal, and this mobile terminal decreases the friendship obtaining authorization code
Flow process, improves efficiency, ensure that the safety of transmitting procedure simultaneously, it is possible to provide preferably to the both sides of key mandate mutually
Operating experience, convenience and safety guarantee.
For reaching above-mentioned purpose, the technical scheme is that and be achieved in that:
A kind of mobile terminal, described mobile terminal is in the authoring system of the virtual key described in the above embodiment of the present invention
The first mobile terminal.
The authoring system of described mobile terminal and above-mentioned virtual key is relative to prior art have the advantage that phase
With, do not repeat them here.
A further object of the present invention is to propose a kind of mobile terminal, and this mobile terminal decreases the friendship obtaining authorization code
Flow process, improves efficiency, ensure that the safety of transmitting procedure simultaneously, it is possible to provide preferably to the both sides of key mandate mutually
Operating experience, convenience and safety guarantee.
For reaching above-mentioned purpose, the technical scheme is that and be achieved in that:
A kind of mobile terminal, described mobile terminal is in the authoring system of the virtual key described in the above embodiment of the present invention
The second mobile terminal.
The authoring system of described mobile terminal and above-mentioned virtual key is relative to prior art have the advantage that phase
With, do not repeat them here.
A further object of the present invention is to propose a kind of server, and this server decreases the interactive stream obtaining authorization code
Journey, improves efficiency, ensure that the safety of transmitting procedure simultaneously, it is possible to provide preferably operation to the both sides of key mandate
Experience, convenience and safety guarantee.
For reaching above-mentioned purpose, the technical scheme is that and be achieved in that:
A kind of server, described server is the clothes in the authoring system of the virtual key described in the above embodiment of the present invention
Business device.
Described server is identical relative to prior art have the advantage that with the authoring system of above-mentioned virtual key,
Do not repeat them here.
Accompanying drawing explanation
The accompanying drawing of the part constituting the present invention is used for providing a further understanding of the present invention, and the present invention's is schematic real
Execute example and illustrate for explaining the present invention, being not intended that inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of the authorization method of the virtual key of the embodiment of the present invention;
Fig. 2 is the theory diagram of the authorization method of the virtual key of one embodiment of the invention;
Fig. 3 is that mandate schematic diagram shared by the virtual key of one embodiment of the invention;
Fig. 4 is that each module relationship schematic diagram in licensing process shared by the key of one embodiment of the invention;
Fig. 5 is the licensing scheme schematic diagram of the authorization method of the virtual key of one embodiment of the invention;And
Fig. 6 is the structured flowchart of the authoring system of the virtual key of the embodiment of the present invention.
Description of reference numerals:
The authoring system of the virtual key of 100-, 110-the first mobile terminal, 120-the second mobile terminal, 130-server.
Detailed description of the invention
It should be noted that in the case of not conflicting, the embodiment in the present invention and the feature in embodiment can phases
Combination mutually.
Describe the present invention below with reference to the accompanying drawings and in conjunction with the embodiments in detail.
Fig. 1 is the flow chart of the authorization method of the most virtual key.Fig. 2 is according to the present invention
The theory diagram of the authorization method of the virtual key of one embodiment.
As it is shown in figure 1, and combine Fig. 2, the authorization method of the virtual key of the embodiment of the present invention comprises the following steps:
Step S1: the first mobile terminal receives the authorization requests that the second mobile terminal sends.Specifically, the first mobile terminal
Being the smart mobile phone 1 shown in Fig. 2, the second mobile terminal is the smart mobile phone 2 shown in Fig. 2, and server is in Fig. 2
Cloud server.
Step S2: authorization requests is sent to server, with after server authentication passes through, receives and sends from server
Loopback address and authorization code.
Further, in one embodiment of the invention, when authorization requests is sent to server by the first mobile terminal,
It is additionally operable to the first mobile terminal identity information is sent to server, in order to the first mobile terminal is authenticated by server.
Step S3: loopback address is sent to the second mobile terminal by the first application program of the first mobile terminal, with
Just, after the second mobile terminal is confirmed by the first application journey in the second mobile terminal, feed back to first by loopback address and move
First application program of terminal.
Wherein, the first application program for example, APP, SMS or IE.
Step S4: authorization code is sent to the second mobile terminal by the first application program, in order to the second mobile terminal is according to awarding
Weighted code accesses vehicle.
In one embodiment of the invention, such as, the communication between the first mobile terminal and server, and the first shifting
Dynamic communication between terminal and the second mobile terminal uses tunnel encryption.
For the ease of being more fully understood that the present invention, below in conjunction with accompanying drawing, with the concrete example method to the embodiment of the present invention
Specifically specifically describe.
Shown in Fig. 2, the principle overview of the method for the embodiment of the present invention is: permit holder (owning of smart mobile phone 2
Person) send authorization requests to car owner (owner of smart mobile phone 1), after receiving the authorized certificate of car owner, the person of hiring a car is by car
The authorized certificate of main smart mobile phone 1 transmission is transferred to cloud server, receives key from server and accesses identifying code, should
Identifying code is saved in the smart mobile phone 2 of grantee (person of hiring a car), and grantee carries and is saved on authorized smart mobile phone 2
Locked resource, bluetooth module automobile integrated with PEPS mates, and completes the authentication communication process of key, concrete mandate
Journey example is as shown in Figure 3, specific as follows:
Permit holder initiates authorization requests to car owner, from the mobile device 1 (i.e. smart mobile phone 1 or the first mobile terminal) of car owner
Obtain authorized certificate.This authorized certificate is used to indicate that car owner to agree to this person of hiring a car and authorizes.The person of hiring a car obtains car owner
Authorized certificate after, then authorized certificate and the person's of hiring a car mobile device voucher are sent to cloud server, make requests on authorization code
Obtain final access credentials.Permit holder mobile device 2 (i.e. smart mobile phone 2 or the second mobile terminal) is recognized by cloud server
Card, and verify the effectiveness of authorized certificate, if after by checking, backward reference certificate authority code is given mobile by cloud server
Equipment 2.The person of hiring a car uses access credentials authorization code to represent car owner to carry out request of data to automobile PEPS.PEPS is verified mandate
After Ma, shielded resource being returned to permit holder mobile device 2, Fig. 4 lists in key licensing process between each correlation module
Relation, specific as follows:
(1) permit holder mobile device 2 need to ask access authorization code to car owner's mobile device 1 by intermediate system.
(2) after car owner's mobile device 1 authorizes according to user and passes through Subscriber Information certification, to permit holder mobile device
2 backward reference authorization codes.
(3) permit holder mobile device 2 uses access authorization code to call open platform data-interface and accesses shielded user
Resource, accesses and is caught by cloud server.
(4) cloud server obtains access authorization code, asks associated user's type of authorization code, authority information to car owner.
(5) car owner's mobile device 1 return authentication information.
(6) authority information that the authority information that authorization code in request is comprised by cloud server and resource check and approve needs enters
Row verification.
(7) for sufficiently asked by authority by cloud server to automobile PEPS carry out further data please
Ask.
(8) automobile PEPS returns shielded resource data.
Based on the relation between authorization flow mentioned above and each module, embodiments of the invention have employed awarding of implicit expression
Power mechanism pattern, the person that i.e. do not hires a car sends request by mobile device 2 to car owner's mobile device 1 and authorizes, and car owner is by equipment
APP, IE etc. application carry out account number cipher input and to the request selecting mandate of permit holder after, cloud server be not return
Interim token is to third-party application, but directly with the form of URI fragment, authorization code is returned to mobile device 2 client, in detail
Thin licensing scheme is such as shown in Fig. 5, specific as follows:
1) authorization data that the mobile device 2 of the person of hiring a car is guided to cloud server by self-defining APP etc. exchanges joint
Point opens authorization flow.The self-defined APP of mobile device 2, when cloud server is asked, can bring client id, client device
Id, request permissions scope, conditional code and carry out the loopback address adjusted back for cloud server.
2), after car owner's mobile device 1 service end beyond the clouds input user's voucher, car owner's identity is recognized by cloud server
Card, then is decided whether to authorize the request of mobile device 2 client by car owner.
3) assuming that car owner has passed through to authorize, cloud server starts corresponding handling process according to the licensing mode of car owner,
After the loopback address being attached to authorization code with the form of URI fragment afterwards to utilize step 1 incoming.
4) the self-defined APP of car owner need to retain authorization code in this locality, sends loopback address to the self-defined APP of permit holder simultaneously
The request of storage resource.
5) the self-defined APP of permit holder resolves with the complete readjustment having authorization code information that can return in obtaining step 3
The script of address.
6) the self-defined APP of car owner gets authorization code at local runtime script, and the authorization code obtained is returned mobile device
2。
To sum up, the authorization method of virtual key according to embodiments of the present invention, the first mobile terminal receives second and moves end
The authorization requests of end, and it is sent to server, and after the server testimony of a witness is passed through, receive loopback address and authorization code, and incite somebody to action back
Address is adjusted to be sent to the second mobile terminal, in order to the second mobile terminal after validation, feeds back to first by loopback address and moves
Terminal, then authorization code is sent to the second mobile terminal by the first mobile terminal, completes licensing process.Therefore, the method reduces
Obtain the interaction flow of authorization code, improve efficiency, use tunnel encryption technology (TLS) to ensure to pass simultaneously in transmitting procedure
The safety of defeated process, it is possible to provide more preferable operating experience, convenience and safety guarantee to the both sides of key mandate.
Further, as shown in Figure 6, embodiment of the invention discloses that the authoring system 100 of a kind of virtual key, bag
Include: the first mobile terminal the 110, second mobile terminal 120 and server 130.
First mobile terminal 110 receives the authorization requests that the second mobile terminal 120 sends, and authorization requests is sent to clothes
Business device 130, with after server 130 certification is passed through, receives the loopback address and authorization code sent from server 130, and
By the first application program in the first mobile terminal 110, loopback address is sent to the second mobile terminal 120, in order to second moves
After dynamic terminal 120 is confirmed by the first application program in the second mobile terminal 120, feed back to first by loopback address and move
First application program of terminal 110, authorization code is sent to the second mobile terminal 120 by the first application program, in order to second moves
Terminal 120 accesses vehicle according to authorization code.Wherein, the first application program for example, APP, SMS or IE.
In one embodiment of the invention, the communication between the first mobile terminal 110 and server 130, and first
Communication between mobile terminal 110 and the second mobile terminal 120 uses tunnel encryption.
In one embodiment of the invention, when authorization requests is sent to server 130 by the first mobile terminal 110, also
For the first mobile terminal 110 identity information is sent to server 130, in order to the first mobile terminal 110 is entered by server 130
Row certification.
To sum up, the authoring system of virtual key according to embodiments of the present invention, the first mobile terminal receives second and moves end
The authorization requests of end, and it is sent to server, and after the server testimony of a witness is passed through, receive loopback address and authorization code, and incite somebody to action back
Address is adjusted to be sent to the second mobile terminal, in order to the second mobile terminal after validation, feeds back to first by loopback address and moves
Terminal, then authorization code is sent to the second mobile terminal by the first mobile terminal, completes licensing process.Therefore, this system subtracts
Lack the interaction flow obtaining authorization code, improve efficiency, use tunnel encryption technology (TLS) to ensure simultaneously in transmitting procedure
The safety of transmitting procedure, it is possible to provide more preferable operating experience, convenience and safety guarantee to the both sides of key mandate.
It should be noted that the specific implementation of the authoring system of the virtual key of the embodiment of the present invention is real with the present invention
The specific implementation of the authorization method executing the virtual key of example is similar to, and specifically refers to the description of method part, in order to reduce
Redundancy, does not repeats.
Further, embodiment of the invention discloses that a kind of mobile terminal, for example, present invention is above-mentioned for this mobile terminal
The first mobile terminal in the authoring system of the virtual key described by embodiment.Accordingly, with respect to this mobile terminal concrete in detail
Thin description sees the above-mentioned description to the first mobile terminal part of the present invention.
Therefore, mobile terminal according to embodiments of the present invention, decrease the interaction flow obtaining authorization code, improve effect
Rate, ensure that the safety of transmitting procedure simultaneously, it is possible to provide more preferable operating experience, convenience to the both sides of key mandate
And safety guarantee.
Further, embodiment of the invention discloses that a kind of mobile terminal, for example, present invention is above-mentioned for this mobile terminal
The second mobile terminal in the authoring system of the virtual key described by embodiment.Accordingly, with respect to this mobile terminal concrete in detail
Thin description sees the above-mentioned description to the second mobile terminal part of the present invention.
Therefore, mobile terminal according to embodiments of the present invention, decrease the interaction flow obtaining authorization code, improve effect
Rate, ensure that the safety of transmitting procedure simultaneously, it is possible to provide more preferable operating experience, convenience to the both sides of key mandate
And safety guarantee.
Further, embodiment of the invention discloses that a kind of server, the above-mentioned enforcement of this server for example, present invention
Server in the authoring system of the virtual key described by example.Concrete detailed description in detail accordingly, with respect to this server sees this
Invent the above-mentioned description to server section.
Therefore, server according to embodiments of the present invention, decrease the interaction flow obtaining authorization code, improve efficiency,
Ensure that the safety of transmitting procedure simultaneously, it is possible to the both sides of key mandate provide more preferable operating experience, convenience and
Safety guarantee.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all essences in the present invention
Within god and principle, any modification, equivalent substitution and improvement etc. made, should be included within the scope of the present invention.
Claims (11)
1. the authorization method of a virtual key, it is characterised in that comprise the following steps:
First mobile terminal receives the authorization requests that the second mobile terminal sends;
Described authorization requests is sent to server, with after described server authentication passes through, receives and send out from described server
The loopback address sent and authorization code;
By the first application program of the first mobile terminal, described loopback address is sent to described second mobile terminal, in order to institute
After stating the first application journey confirmation that the second mobile terminal passes through in the second mobile terminal, fed back to described by described loopback address
First application program of the first mobile terminal;
Described authorization code is sent to described second mobile terminal by described first application program, in order to described second mobile terminal root
Vehicle is accessed according to described authorization code.
The authorization method of virtual key the most according to claim 1, it is characterised in that described first mobile terminal is with described
Communication between communication between server, and described first mobile terminal and described second mobile terminal uses tunnel to add
Close.
The authorization method of virtual key the most according to claim 1, it is characterised in that described first application program be APP,
SMS or IE.
The authorization method of virtual key the most according to claim 1, it is characterised in that described first mobile terminal is by described
When authorization requests is sent to server, it is additionally operable to the first mobile terminal identity information is sent to described server, in order to described
Described first mobile terminal is authenticated by server.
5. the authoring system of a virtual key, it is characterised in that including: the first mobile terminal, the second mobile terminal and service
Device, wherein,
Described first mobile terminal receives the authorization requests that the second mobile terminal sends, and described authorization requests is sent to service
Device, with after described server authentication passes through, receives the loopback address and authorization code sent from described server, and passes through
Described loopback address is sent to described second mobile terminal by the first application program in described first mobile terminal, in order to described
After second mobile terminal is confirmed by the first application program in the second mobile terminal, fed back to described by described loopback address
First application program of the first mobile terminal, described authorization code is sent to described second and moves end by described first application program
End, in order to described second mobile terminal accesses vehicle according to described authorization code.
The authoring system of virtual key the most according to claim 5, it is characterised in that described first mobile terminal is with described
Communication between communication between server, and described first mobile terminal and described second mobile terminal uses tunnel to add
Close.
The authoring system of virtual key the most according to claim 5, it is characterised in that described first application program be APP,
SMS or IE.
The authoring system of virtual key the most according to claim 5, it is characterised in that described first mobile terminal is by described
When authorization requests is sent to server, it is additionally operable to the first mobile terminal identity information is sent to described server, in order to described
Described first mobile terminal is authenticated by server.
9. a mobile terminal, it is characterised in that described mobile terminal is according to the virtual key described in any one of claim 5-8
First mobile terminal in the authoring system of spoon.
10. a mobile terminal, it is characterised in that described mobile terminal is virtual according to described in any one of claim 5-8
Second mobile terminal in the authoring system of key.
11. 1 kinds of servers, it is characterised in that described server is according to the virtual key described in any one of claim 5-8
Authoring system in server.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610792870.6A CN106302510B (en) | 2016-08-31 | 2016-08-31 | Authorization method, system, mobile terminal and the server of virtual key |
PCT/CN2017/086435 WO2018040639A1 (en) | 2016-08-31 | 2017-05-27 | Authorization method and system for virtual key, mobile terminal and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610792870.6A CN106302510B (en) | 2016-08-31 | 2016-08-31 | Authorization method, system, mobile terminal and the server of virtual key |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106302510A true CN106302510A (en) | 2017-01-04 |
CN106302510B CN106302510B (en) | 2019-07-26 |
Family
ID=57672410
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610792870.6A Active CN106302510B (en) | 2016-08-31 | 2016-08-31 | Authorization method, system, mobile terminal and the server of virtual key |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106302510B (en) |
WO (1) | WO2018040639A1 (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106671936A (en) * | 2017-01-17 | 2017-05-17 | 北京汽车研究总院有限公司 | Car starting method and device |
WO2018040639A1 (en) * | 2016-08-31 | 2018-03-08 | 长城汽车股份有限公司 | Authorization method and system for virtual key, mobile terminal and server |
CN109285252A (en) * | 2018-09-29 | 2019-01-29 | 百度在线网络技术(北京)有限公司 | Lock control method and device |
CN109286649A (en) * | 2017-07-19 | 2019-01-29 | 现代自动车株式会社 | Vehicular system and its control method |
CN110290525A (en) * | 2019-06-21 | 2019-09-27 | 湖北亿咖通科技有限公司 | A kind of sharing method and system, mobile terminal of vehicle number key |
CN110770800A (en) * | 2017-07-07 | 2020-02-07 | 胡夫·许尔斯贝克和福斯特有限及两合公司 | Method for granting access rights |
JP2020037296A (en) * | 2018-09-03 | 2020-03-12 | 笠▲衆▼實業有限公司 | Intelligent vehicle electronic key system |
CN111148075A (en) * | 2019-12-30 | 2020-05-12 | 上海博泰悦臻网络技术服务有限公司 | Bluetooth key configuration method and system for configuring Bluetooth key |
CN112153640A (en) * | 2020-06-24 | 2020-12-29 | 上汽通用五菱汽车股份有限公司 | Vehicle control method, system, user terminal, vehicle and readable storage medium |
CN112459617A (en) * | 2020-11-27 | 2021-03-09 | 黄志刚 | Remote controller control box, door lock control system and sharing system of automobile |
CN112572344A (en) * | 2020-11-27 | 2021-03-30 | 黄志刚 | Door lock control and sharing method for automobile |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110619221B (en) * | 2019-08-09 | 2023-10-31 | 深圳市轱辘车联数据技术有限公司 | Virtual authorization method, device, terminal equipment and storage medium |
CN113554786B (en) * | 2021-08-02 | 2023-05-30 | 广东南马智能技术有限公司 | Bluetooth car key car control method and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2743868A1 (en) * | 2012-12-14 | 2014-06-18 | Seven Principles AG | Virtual vehicle key |
CN104424679A (en) * | 2013-08-30 | 2015-03-18 | 比亚迪股份有限公司 | Authorization method and authorization system of intelligent key in wireless terminal as well as terminal and server |
CN103035054B (en) * | 2012-12-29 | 2015-04-08 | 江苏中科天安智联科技有限公司 | NFC intelligent automobile key system with permission and authorization functions |
CN105083214A (en) * | 2014-04-28 | 2015-11-25 | 比亚迪股份有限公司 | Authorization method, authorization system and authorization mobile terminal for vehicle and authorized mobile terminal |
CN105788037A (en) * | 2014-12-26 | 2016-07-20 | 比亚迪股份有限公司 | Vehicle intelligent key authorization system and method |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP6036638B2 (en) * | 2013-10-17 | 2016-11-30 | 株式会社デンソー | Electronic key system, in-vehicle device, and portable device |
CN105491228B (en) * | 2015-11-24 | 2019-04-19 | 大连楼兰科技股份有限公司 | Share the method and system of vehicle control power |
CN106375312B (en) * | 2016-08-31 | 2019-12-06 | 长城汽车股份有限公司 | Virtual key authorization method, system, mobile terminal and server |
CN106302510B (en) * | 2016-08-31 | 2019-07-26 | 长城汽车股份有限公司 | Authorization method, system, mobile terminal and the server of virtual key |
-
2016
- 2016-08-31 CN CN201610792870.6A patent/CN106302510B/en active Active
-
2017
- 2017-05-27 WO PCT/CN2017/086435 patent/WO2018040639A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2743868A1 (en) * | 2012-12-14 | 2014-06-18 | Seven Principles AG | Virtual vehicle key |
CN103035054B (en) * | 2012-12-29 | 2015-04-08 | 江苏中科天安智联科技有限公司 | NFC intelligent automobile key system with permission and authorization functions |
CN104424679A (en) * | 2013-08-30 | 2015-03-18 | 比亚迪股份有限公司 | Authorization method and authorization system of intelligent key in wireless terminal as well as terminal and server |
CN105083214A (en) * | 2014-04-28 | 2015-11-25 | 比亚迪股份有限公司 | Authorization method, authorization system and authorization mobile terminal for vehicle and authorized mobile terminal |
CN105788037A (en) * | 2014-12-26 | 2016-07-20 | 比亚迪股份有限公司 | Vehicle intelligent key authorization system and method |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018040639A1 (en) * | 2016-08-31 | 2018-03-08 | 长城汽车股份有限公司 | Authorization method and system for virtual key, mobile terminal and server |
CN106671936A (en) * | 2017-01-17 | 2017-05-17 | 北京汽车研究总院有限公司 | Car starting method and device |
CN110770800A (en) * | 2017-07-07 | 2020-02-07 | 胡夫·许尔斯贝克和福斯特有限及两合公司 | Method for granting access rights |
CN109286649B (en) * | 2017-07-19 | 2022-05-10 | 现代自动车株式会社 | Vehicle system and control method thereof |
CN109286649A (en) * | 2017-07-19 | 2019-01-29 | 现代自动车株式会社 | Vehicular system and its control method |
JP2020037296A (en) * | 2018-09-03 | 2020-03-12 | 笠▲衆▼實業有限公司 | Intelligent vehicle electronic key system |
CN109285252B (en) * | 2018-09-29 | 2021-08-10 | 百度在线网络技术(北京)有限公司 | Vehicle lock control method and device |
CN109285252A (en) * | 2018-09-29 | 2019-01-29 | 百度在线网络技术(北京)有限公司 | Lock control method and device |
CN110290525A (en) * | 2019-06-21 | 2019-09-27 | 湖北亿咖通科技有限公司 | A kind of sharing method and system, mobile terminal of vehicle number key |
CN111148075A (en) * | 2019-12-30 | 2020-05-12 | 上海博泰悦臻网络技术服务有限公司 | Bluetooth key configuration method and system for configuring Bluetooth key |
CN112153640A (en) * | 2020-06-24 | 2020-12-29 | 上汽通用五菱汽车股份有限公司 | Vehicle control method, system, user terminal, vehicle and readable storage medium |
CN112459617A (en) * | 2020-11-27 | 2021-03-09 | 黄志刚 | Remote controller control box, door lock control system and sharing system of automobile |
CN112572344A (en) * | 2020-11-27 | 2021-03-30 | 黄志刚 | Door lock control and sharing method for automobile |
Also Published As
Publication number | Publication date |
---|---|
CN106302510B (en) | 2019-07-26 |
WO2018040639A1 (en) | 2018-03-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106302510B (en) | Authorization method, system, mobile terminal and the server of virtual key | |
CN106375312A (en) | Virtual key authorization method and system, mobile terminal and server | |
CN109936833B (en) | Vehicle virtual key generation and use method and system and user terminal | |
CN110637328B (en) | Vehicle access method based on portable equipment | |
WO2018040641A1 (en) | Mobile terminal, vehicle terminal, and virtual key sharing method and system | |
CN106415674B (en) | System and method for access control | |
CN106373235B (en) | Authorization method, server and the authoring system of virtual key | |
JP6586446B2 (en) | Method for confirming identification information of user of communication terminal and related system | |
CN101336436B (en) | Security token and method for authentication of a user with the security token | |
WO2021135258A1 (en) | Method and apparatus for using vehicle based on smart key | |
CN109895734B (en) | Authorized Bluetooth key activation method and system, storage medium and T-BOX | |
TW201741922A (en) | Biological feature based safety certification method and device | |
JP2019537898A (en) | A physical key to provision communication devices with data that allows access to vehicle resources | |
CN110169031A (en) | Access control system with the distribution of local mobile cryptographic key | |
CN110178161A (en) | Using the access control system of safety | |
CN102217277A (en) | Method and system for token-based authentication | |
CN106408702A (en) | Authorization method of virtual keys, server and authorization system | |
WO2015019104A2 (en) | Access and control authorisation system | |
US11722529B2 (en) | Method and apparatus for policy-based management of assets | |
JP2005032241A (en) | Grant of permission to access resource | |
US20230133418A1 (en) | Personalised, server-specific authentication mechanism | |
CN110770800A (en) | Method for granting access rights | |
DE102018005038A1 (en) | Smart card as a security token | |
CN107609878B (en) | Security authentication method and system for shared automobile | |
CN109743283A (en) | A kind of information transferring method and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |