CN106302510B - Authorization method, system, mobile terminal and the server of virtual key - Google Patents
Authorization method, system, mobile terminal and the server of virtual key Download PDFInfo
- Publication number
- CN106302510B CN106302510B CN201610792870.6A CN201610792870A CN106302510B CN 106302510 B CN106302510 B CN 106302510B CN 201610792870 A CN201610792870 A CN 201610792870A CN 106302510 B CN106302510 B CN 106302510B
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- server
- authorization
- sent
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
The present invention provides authorization method, system, mobile terminal and the server of a kind of virtual key, method includes: that first movement terminal receives the authorization requests that the second mobile terminal is sent;Authorization requests are sent to server, to receive the loopback address and authorization code sent from server after server authentication passes through;Loopback address is sent to the second mobile terminal by the first application program of first movement terminal, after confirming so as to the second mobile terminal by the first application journey in the second mobile terminal, the first application program of first movement terminal is fed back to by loopback address;Authorization code is sent to the second mobile terminal by the first application program, so that the second mobile terminal accesses vehicle according to authorization code.The present invention reduces the interaction flows for obtaining authorization code, improve efficiency, while ensure that the safety of transmission process, can provide better operating experience, convenience and safety guarantee to the both sides of key authorization.
Description
Technical field
The present invention relates to field of information security technology, in particular to a kind of authorization method of virtual key, system, movement are eventually
End and server.
Background technique
It is higher and higher to the convenient and safety requirements in life with the fast development of electronics techniques.As in life
Essential safety lock system in work, such as the electronic lock system in fields such as automobile, households is applied, it has designed increasingly
The expectation demand being close to the users.And the borrow of normal key, it needs in kind (including mechanical key, electron key, non-contact magnetically
Card etc.) borrower is given, cause time and inconvenience spatially.Nowadays the appearance of smart electronics key mentions for users
New key sharing platform has been supplied, key can have been licensed to him on an electronic device by certain communication modes between user
People solves normal key share time and limitation spatially.
According to the demand of user, various smart electronics keys are devised, mobile device such as mobile phone, by mobile phone and key
Spoon combines.One kind due to mobile phone as convenience mobile device, is widely used in daily life, using mobile phone as a kind of key
The platform for using and authorizing of spoon has become a kind of trend.
Currently, the relevant technologies, which propose a kind of vehicle operating permission, authorizes system, have: server, from the 1st pocket
Electronic equipment receive to the electron key as vehicle come using the identification information that is identified of the 1st portable electronic device,
And the legitimacy of identification information is confirmed, and by movement enabling signal be sent to vehicle, the movement enabling signal pair and come
Permitted from the corresponding vehicle operating of requirement in the 1st portable electronic device;Key logging unit, will be provided by the server
Key logs in the 1st portable electronic device;And access right authorizes portion, by using logging in the 1st pocket electronics
The access right for accessing server is granted to the 2nd portable electronic device by the key in equipment, and sets the 2nd pocket electronics
It is standby to act as having the electron key of vehicle operating permission.The disadvantages of this method is that there are a key ciphers simultaneously
Existing safety, if grantee, during driving, authorized person still has permission control automobile, can to grantee with
Next dangerous, grantee is often used as interim user, experiences safely during using key bad.
The relevant technologies also disclose authorization method, system and the terminal of a kind of vehicle, and method includes: authorized mobile terminal
It is generated by bluetooth key application program and borrows vehicle solicited message, and vehicle solicited message will be borrowed to be sent to authorization mobile terminal;Authorization
Mobile terminal, which receives, borrows vehicle solicited message;Authorization mobile terminal imports the borrowing time borrowed vehicle solicited message and vehicle is arranged, and
And identification information, the account of borrowing time and vehicle bluetooth key and password are encrypted to generate authorization message;Authorization
Authorization message is sent to authorized mobile terminal by mobile terminal;It is authorized to mobile terminal and receives authorization message, and imports authorization
Information, and the identification information of itself is obtained, and when the identification information of itself is consistent with the identification information in authorization message, borrowing
With time internal control vehicle.The disadvantages of this method is, although there is prompt to control the time used in authorization, there is no right
Access times or other permissions are explained, more not to how realizing that similar limitation makes scheme in authorization.
Summary of the invention
In view of this, the present invention is directed to propose a kind of authorization method of virtual key, the method reduce obtain authorization code
Interaction flow, improve efficiency, while ensure that the safety of transmission process, can be provided more to the both sides of key authorization
Good operating experience, convenience and safety guarantee.
In order to achieve the above objectives, the technical scheme of the present invention is realized as follows:
A kind of authorization method of virtual key, comprising the following steps: first movement terminal receives the second mobile terminal and sends
Authorization requests;The authorization requests are sent to server, to receive and come from the clothes after the server authentication passes through
The loopback address and authorization code that business device is sent;The loopback address is sent to by the first application program of first movement terminal
Second mobile terminal leads to after being confirmed so as to second mobile terminal by the first application journey in the second mobile terminal
Cross the first application program that the loopback address feeds back to the first movement terminal;First application program is by the authorization
Code is sent to second mobile terminal, so that second mobile terminal accesses vehicle according to the authorization code.
Further, the communication between the first movement terminal and the server and the first movement terminal
Communication between second mobile terminal uses tunnel encryption.
Further, first application program is APP, SMS or IE.
Further, it when the authorization requests are sent to server by the first movement terminal, is also used to move first
Dynamic terminal identity information is sent to the server, so that the server authenticates the first movement terminal.
Compared with the existing technology, the authorization method of virtual key of the present invention has the advantage that
The authorization method of virtual key of the invention, first movement terminal receive the authorization requests of the second mobile terminal, and
It is sent to server, and after server authentication passes through, receives loopback address and authorization code, and loopback address is sent to second
Mobile terminal after validation so as to the second mobile terminal feeds back to first movement terminal by loopback address, then first movement
Authorization code is sent to the second mobile terminal by terminal, completes licensing process.Therefore, the method reduce the interactions for obtaining authorization code
Process improves efficiency, while guaranteeing the safety of transmission process, energy using tunnel encryption technology (TLS) in transmission process
Enough both sides to key authorization provide better operating experience, convenience and safety guarantee.
It is another object of the present invention to the authoring systems for proposing a kind of virtual key, and the system reduces obtain to authorize
The interaction flow of code, improves efficiency, while ensure that the safety of transmission process, can provide to the both sides of key authorization
Better operating experience, convenience and safety guarantee.
In order to achieve the above objectives, the technical scheme of the present invention is realized as follows:
A kind of authoring system of virtual key, comprising: first movement terminal, the second mobile terminal and server, wherein institute
It states first movement terminal and receives the authorization requests that the second mobile terminal is sent, and the authorization requests are sent to server, with
After the server authentication passes through, the loopback address and authorization code sent from the server is received, and by described
The loopback address is sent to second mobile terminal by the first application program in first movement terminal, so as to described second
After mobile terminal is by the first application program confirmation in the second mobile terminal, described first is fed back to by the loopback address
The authorization code is sent to second mobile terminal by the first application program of mobile terminal, first application program, with
Toilet states the second mobile terminal and accesses vehicle according to the authorization code.
Further, the communication between the first movement terminal and the server and the first movement terminal
Communication between second mobile terminal uses tunnel encryption.
Further, first application program is APP, SMS or IE.
Further, it when the authorization requests are sent to server by the first movement terminal, is also used to move first
Dynamic terminal identity information is sent to the server, so that the server authenticates the first movement terminal.
The authoring system of the virtual key and the authorization method of above-mentioned virtual key are had compared with the existing technology
Some advantages are identical, and details are not described herein.
Another object of the present invention is to propose a kind of mobile terminal, which reduces the friendship for obtaining authorization code
Mutual process improves efficiency, while ensure that the safety of transmission process, can provide preferably to the both sides of key authorization
Operating experience, convenience and safety guarantee.
In order to achieve the above objectives, the technical scheme of the present invention is realized as follows:
A kind of mobile terminal, the mobile terminal are in the authoring system of virtual key described in the above embodiment of the present invention
First movement terminal.
The authoring system of the mobile terminal and above-mentioned virtual key compared with the existing technology possessed by advantage phase
Together, details are not described herein.
Yet another object of the invention is that proposing a kind of mobile terminal, which reduces the friendship for obtaining authorization code
Mutual process improves efficiency, while ensure that the safety of transmission process, can provide preferably to the both sides of key authorization
Operating experience, convenience and safety guarantee.
In order to achieve the above objectives, the technical scheme of the present invention is realized as follows:
A kind of mobile terminal, the mobile terminal are in the authoring system of virtual key described in the above embodiment of the present invention
The second mobile terminal.
The authoring system of the mobile terminal and above-mentioned virtual key compared with the existing technology possessed by advantage phase
Together, details are not described herein.
Yet another object of the invention is that proposing a kind of server, which reduces the interactive stream for obtaining authorization code
Journey improves efficiency, while ensure that the safety of transmission process, can provide better operation to the both sides of key authorization
Experience, convenience and safety guarantee.
In order to achieve the above objectives, the technical scheme of the present invention is realized as follows:
A kind of server, the server are the clothes in the authoring system of virtual key described in the above embodiment of the present invention
Business device.
Possessed advantage is identical compared with the existing technology with the authoring system of above-mentioned virtual key for the server,
Details are not described herein.
Detailed description of the invention
The attached drawing for constituting a part of the invention is used to provide further understanding of the present invention, schematic reality of the invention
It applies example and its explanation is used to explain the present invention, do not constitute improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of the authorization method of the virtual key of the embodiment of the present invention;
Fig. 2 is the functional block diagram of the authorization method of the virtual key of one embodiment of the invention;
Fig. 3 is that the virtual key of one embodiment of the invention shares authorization schematic diagram;
Fig. 4 is that the key of one embodiment of the invention shares each module relationship schematic diagram in licensing process;
Fig. 5 is the licensing scheme schematic diagram of the authorization method of the virtual key of one embodiment of the invention;And
Fig. 6 is the structural block diagram of the authoring system of the virtual key of the embodiment of the present invention.
Description of symbols:
Authoring system, 110- first movement terminal, the second mobile terminal of 120-, 130- server of the virtual key of 100-.
Specific embodiment
It should be noted that in the absence of conflict, the feature in embodiment and embodiment in the present invention can phase
Mutually combination.
The present invention will be described in detail below with reference to the accompanying drawings and embodiments.
Fig. 1 is the flow chart of the authorization method of virtual key according to an embodiment of the invention.Fig. 2 is according to the present invention
The functional block diagram of the authorization method of the virtual key of one embodiment.
As shown in Figure 1, and combine Fig. 2, the authorization method of the virtual key of the embodiment of the present invention the following steps are included:
Step S1: first movement terminal receives the authorization requests that the second mobile terminal is sent.Specifically, first movement terminal
Smart phone 1 as shown in Fig. 2, the second mobile terminal are smart phone 2 shown in Fig. 2, and server is in Fig. 2
Cloud server.
Step S2: being sent to server for authorization requests, to receive and send from server after server authentication passes through
Loopback address and authorization code.
Further, in one embodiment of the invention, when authorization requests are sent to server by first movement terminal,
It is also used to first movement terminal identity information being sent to server, so that server authenticates first movement terminal.
Step S3: being sent to the second mobile terminal for loopback address by the first application program of first movement terminal, with
Just after the second mobile terminal is by the first application journey confirmation in the second mobile terminal, first movement is fed back to by loopback address
First application program of terminal.
Wherein, the first application program is, for example, APP, SMS or IE.
Authorization code is sent to the second mobile terminal by the S4: the first application program of step, so that the second mobile terminal is according to awarding
Weighted code accesses vehicle.
In one embodiment of the invention, for example, communication and first between first movement terminal and server move
Communication between dynamic terminal and the second mobile terminal uses tunnel encryption.
For the ease of more fully understanding the present invention, below in conjunction with attached drawing, with specific example to the method for the embodiment of the present invention
Specifically specifically described.
As shown in connection with fig. 2, the principle overview of the method for the embodiment of the present invention are as follows: permit holder (smart phone 2 it is all
Person) to car owner (owner of smart phone 1) authorization requests are sent, after receiving the authorized certificate of car owner, the person of hiring a car is by vehicle
The authorized certificate that main smart phone 1 transmits is transferred to cloud server, key access identifying code is received from server, by this
Identifying code is saved in the smart phone 2 of grantee (person of hiring a car), and grantee carries and is saved on authorized smart phone 2
Locked resource integrates bluetooth module automobile with PEPS and is matched, and completes the authentication communication process of key, specifically authorized
Journey example is as shown in Figure 3, specific as follows:
Permit holder initiates authorization requests to car owner, from the mobile device 1 (i.e. smart phone 1 or first movement terminal) of car owner
Obtain authorized certificate.This authorized certificate is used to indicate that car owner agrees to authorize the person of hiring a car.The person of hiring a car obtains car owner
Authorized certificate after, then by authorized certificate and the person's of hiring a car mobile device voucher send cloud server, make requests authorization code
Obtain final access credentials.Cloud server recognizes permit holder mobile device 2 (i.e. smart phone 2 or the second mobile terminal)
Card, and the validity of authorized certificate is verified, if after by verifying, cloud server is by backward reference certificate authority code to movement
Equipment 2.The person of hiring a car represents car owner using access credentials authorization code and carries out request of data to automobile PEPS.PEPS is verified authorization
Shielded resource is returned into permit holder mobile device 2 after code, Fig. 4 is listed in key licensing process between each correlation module
Relationship, it is specific as follows:
(1) permit holder mobile device 2 need to request access to authorization code to car owner's mobile device 1 by intermediate system.
(2) after car owner's mobile device 1 authorizes according to user and passes through to Subscriber Information certification, to permit holder mobile device
2 backward reference authorization codes.
(3) permit holder mobile device 2 calls open platform data-interface to access shielded user using access authorization code
Resource, access are captured by cloud server.
(4) cloud server obtains access authorization code, and associated user's type, the authority information of authorization code are requested to car owner.
(5) 1 return authentication information of car owner's mobile device.
(6) authority information and resource that cloud server is included to authorization code in request check and approve the authority information that needs into
Row verification.
(7) for adequately requesting to ask to the further data of automobile PEPS progress by cloud server by permission
It asks.
(8) automobile PEPS returns to shielded resource data.
Based on the relationship between authorization flow and each module mentioned above, the embodiment of the present invention uses implicit award
Mechanism pattern is weighed, that is, the person that do not hire a car sends request authorization to car owner's mobile device 1 by mobile device 2, car owner passes through in equipment
APP, IE etc. application carry out account number cipher input and to the request selecting authorization of permit holder after, cloud server be not return
Authorization code is directly returned to 2 client of mobile device to third-party application by interim token in the form of URI segment, in detail
Thin licensing scheme is specific as follows for example shown in Fig. 5:
1) mobile device 2 for the person of hiring a car exchanges section by the authorization data of the guidance such as customized APP to cloud server
Point opens authorization flow.When the customized APP of mobile device 2 is requested to cloud server, client id, client device can be taken
Id, request permissions range, status code and the loopback address adjusted back for cloud server.
2) car owner's mobile device 1 beyond the clouds server-side input user credential after, cloud server recognizes owner identity
Card, then decides whether that the request to 2 client of mobile device authorizes by car owner.
3) assume that car owner has passed through authorization, cloud server starts corresponding process flow according to the licensing mode of car owner,
Authorization code is attached to behind the loopback address being passed to using step 1 in the form of URI segment later.
4) the customized APP of car owner need to retain authorization code in local, while send loopback address to the customized APP of permit holder
Storage resource request.
5) permit holder customized APP parsing is with the complete readjustment for having authorization code information that can be returned in obtaining step 3
The script of address.
6) the customized APP of car owner gets authorization code in local runtime script, and the authorization code that will acquire returns to mobile device
2。
To sum up, the authorization method of virtual key according to an embodiment of the present invention, it is mobile whole that first movement terminal receives second
The authorization requests at end, and it is sent to server, and after server authentication passes through, loopback address and authorization code are received, and will return
It adjusts address to be sent to the second mobile terminal, after validation so as to the second mobile terminal, first movement is fed back to by loopback address
Terminal, then authorization code is sent to the second mobile terminal by first movement terminal, completes licensing process.Therefore, this method is reduced
The interaction flow for obtaining authorization code, improves efficiency, while guaranteeing to pass using tunnel encryption technology (TLS) in transmission process
The safety of defeated process can provide better operating experience, convenience and safety guarantee to the both sides of key authorization.
Further, as shown in fig. 6, embodiment of the invention discloses a kind of authoring system 100 of virtual key, packet
It includes: first movement terminal 110, the second mobile terminal 120 and server 130.
First movement terminal 110 receives the authorization requests that the second mobile terminal 120 is sent, and authorization requests are sent to clothes
Business device 130, to receive the loopback address and authorization code sent from server 130 after the certification of server 130 passes through, and
Loopback address is sent to the second mobile terminal 120 by the first application program in first movement terminal 110, so as to the second shifting
After dynamic terminal 120 is by the first application program confirmation in the second mobile terminal 120, first movement is fed back to by loopback address
Authorization code is sent to the second mobile terminal 120 by the first application program of terminal 110, the first application program, so as to the second movement
Terminal 120 accesses vehicle according to authorization code.Wherein, the first application program is, for example, APP, SMS or IE.
In one embodiment of the invention, the communication between first movement terminal 110 and server 130 and first
Communication between mobile terminal 110 and the second mobile terminal 120 uses tunnel encryption.
In one embodiment of the invention, when authorization requests are sent to server 130 by first movement terminal 110, also
For 110 identity information of first movement terminal to be sent to server 130, so as to server 130 to first movement terminal 110 into
Row certification.
To sum up, the authoring system of virtual key according to an embodiment of the present invention, it is mobile whole that first movement terminal receives second
The authorization requests at end, and it is sent to server, and after server authentication passes through, loopback address and authorization code are received, and will return
It adjusts address to be sent to the second mobile terminal, after validation so as to the second mobile terminal, first movement is fed back to by loopback address
Terminal, then authorization code is sent to the second mobile terminal by first movement terminal, completes licensing process.Therefore, which subtracts
The interaction flow for obtaining authorization code is lacked, has improved efficiency, while having been guaranteed in transmission process using tunnel encryption technology (TLS)
The safety of transmission process can provide better operating experience, convenience and safety guarantee to the both sides of key authorization.
It should be noted that the specific implementation of the authoring system of the virtual key of the embodiment of the present invention and the present invention are real
The specific implementation for applying the authorization method of the virtual key of example is similar, specifically refers to the description of method part, in order to reduce
Redundancy is not repeated herein.
Further, embodiment of the invention discloses a kind of mobile terminal, which is, for example, that the present invention is above-mentioned
First movement terminal in the authoring system of virtual key described in embodiment.Accordingly, with respect to the specific detailed of the mobile terminal
Thin description is referring to the above-mentioned description to first movement terminal part of the present invention.
Therefore, mobile terminal according to an embodiment of the present invention reduces the interaction flow for obtaining authorization code, improves effect
Rate, while ensure that the safety of transmission process, better operating experience, convenience can be provided to the both sides of key authorization
And safety guarantee.
Further, embodiment of the invention discloses a kind of mobile terminal, which is, for example, that the present invention is above-mentioned
The second mobile terminal in the authoring system of virtual key described in embodiment.Accordingly, with respect to the specific detailed of the mobile terminal
Thin description is referring to the above-mentioned description to the second mobile terminal part of the present invention.
Therefore, mobile terminal according to an embodiment of the present invention reduces the interaction flow for obtaining authorization code, improves effect
Rate, while ensure that the safety of transmission process, better operating experience, convenience can be provided to the both sides of key authorization
And safety guarantee.
Further, embodiment of the invention discloses a kind of server, which is, for example, the above-mentioned implementation of the present invention
Server in the authoring system of virtual key described in example.Specific accordingly, with respect to the server is described in detail referring to this
Invent the above-mentioned description to server section.
Therefore, server according to an embodiment of the present invention reduces the interaction flow for obtaining authorization code, improves efficiency,
Ensure that the safety of transmission process simultaneously, can be provided better operating experience to the both sides of key authorization, convenience and
Safety guarantee.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention
Within mind and principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.
Claims (11)
1. a kind of authorization method of virtual key, which comprises the following steps:
First movement terminal receives the authorization requests that the second mobile terminal is sent;
The authorization requests are sent to server by the first movement terminal, and after the server authentication passes through, and are received
The loopback address and authorization code sent from the server;
The loopback address is sent to second mobile terminal by the first application program of first movement terminal, with toilet
After the second mobile terminal is stated by the first application journey confirmation in the second mobile terminal, fed back to by the loopback address described
First application program of first movement terminal;
The authorization code is sent to second mobile terminal by first application program, so as to the second mobile terminal root
Vehicle is accessed according to the authorization code.
2. the authorization method of virtual key according to claim 1, which is characterized in that the first movement terminal with it is described
The communication between communication and the first movement terminal and second mobile terminal between server is added using tunnel
It is close.
3. the authorization method of virtual key according to claim 1, which is characterized in that first application program be APP,
SMS or IE.
4. the authorization method of virtual key according to claim 1, which is characterized in that the first movement terminal will be described
When authorization requests are sent to server, it is also used to first movement terminal identity information being sent to the server, so as to described
Server authenticates the first movement terminal.
5. a kind of authoring system of virtual key characterized by comprising first movement terminal, the second mobile terminal and service
Device, wherein
The first movement terminal receives the authorization requests that the second mobile terminal is sent, and the authorization requests are sent to service
Device, to receive the loopback address and authorization code sent from the server, and pass through after the server authentication passes through
The loopback address is sent to second mobile terminal by the first application program in the first movement terminal, so as to described
After second mobile terminal is by the first application program confirmation in the second mobile terminal, fed back to by the loopback address described
The authorization code is sent to second movement eventually by the first application program of first movement terminal, first application program
End, so that second mobile terminal accesses vehicle according to the authorization code.
6. the authoring system of virtual key according to claim 5, which is characterized in that the first movement terminal with it is described
The communication between communication and the first movement terminal and second mobile terminal between server is added using tunnel
It is close.
7. the authoring system of virtual key according to claim 5, which is characterized in that first application program be APP,
SMS or IE.
8. the authoring system of virtual key according to claim 5, which is characterized in that the first movement terminal will be described
When authorization requests are sent to server, it is also used to first movement terminal identity information being sent to the server, so as to described
Server authenticates the first movement terminal.
9. a kind of mobile terminal, which is characterized in that the mobile terminal is according to the described in any item virtual keys of claim 5-8
First movement terminal in the authoring system of spoon.
10. a kind of mobile terminal, which is characterized in that the mobile terminal is described in any item virtual according to claim 5-8
Second mobile terminal in the authoring system of key.
11. a kind of server, which is characterized in that the server is according to the described in any item virtual keys of claim 5-8
Authoring system in server.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610792870.6A CN106302510B (en) | 2016-08-31 | 2016-08-31 | Authorization method, system, mobile terminal and the server of virtual key |
PCT/CN2017/086435 WO2018040639A1 (en) | 2016-08-31 | 2017-05-27 | Authorization method and system for virtual key, mobile terminal and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610792870.6A CN106302510B (en) | 2016-08-31 | 2016-08-31 | Authorization method, system, mobile terminal and the server of virtual key |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106302510A CN106302510A (en) | 2017-01-04 |
CN106302510B true CN106302510B (en) | 2019-07-26 |
Family
ID=57672410
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610792870.6A Active CN106302510B (en) | 2016-08-31 | 2016-08-31 | Authorization method, system, mobile terminal and the server of virtual key |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106302510B (en) |
WO (1) | WO2018040639A1 (en) |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106302510B (en) * | 2016-08-31 | 2019-07-26 | 长城汽车股份有限公司 | Authorization method, system, mobile terminal and the server of virtual key |
CN106671936A (en) * | 2017-01-17 | 2017-05-17 | 北京汽车研究总院有限公司 | Car starting method and device |
DE102017115298A1 (en) * | 2017-07-07 | 2019-01-10 | Huf Hülsbeck & Fürst Gmbh & Co. Kg | Procedure for Delegation of Access Rights |
KR102385474B1 (en) * | 2017-07-19 | 2022-04-13 | 현대자동차주식회사 | Vehicle system and control method thereof |
JP6571847B1 (en) * | 2018-09-03 | 2019-09-04 | 笠▲衆▼實業有限公司 | Intelligent vehicle electronic key system |
CN109285252B (en) * | 2018-09-29 | 2021-08-10 | 百度在线网络技术(北京)有限公司 | Vehicle lock control method and device |
CN110290525A (en) * | 2019-06-21 | 2019-09-27 | 湖北亿咖通科技有限公司 | A kind of sharing method and system, mobile terminal of vehicle number key |
CN110619221B (en) * | 2019-08-09 | 2023-10-31 | 深圳市轱辘车联数据技术有限公司 | Virtual authorization method, device, terminal equipment and storage medium |
CN111148075A (en) * | 2019-12-30 | 2020-05-12 | 上海博泰悦臻网络技术服务有限公司 | Bluetooth key configuration method and system for configuring Bluetooth key |
CN112153640A (en) * | 2020-06-24 | 2020-12-29 | 上汽通用五菱汽车股份有限公司 | Vehicle control method, system, user terminal, vehicle and readable storage medium |
CN112133002A (en) * | 2020-09-16 | 2020-12-25 | 四川天翼网络服务有限公司 | Bus key supervisory systems |
CN112459617A (en) * | 2020-11-27 | 2021-03-09 | 黄志刚 | Remote controller control box, door lock control system and sharing system of automobile |
CN112572344A (en) * | 2020-11-27 | 2021-03-30 | 黄志刚 | Door lock control and sharing method for automobile |
CN113554786B (en) * | 2021-08-02 | 2023-05-30 | 广东南马智能技术有限公司 | Bluetooth car key car control method and system |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2743868A1 (en) * | 2012-12-14 | 2014-06-18 | Seven Principles AG | Virtual vehicle key |
CN103035054B (en) * | 2012-12-29 | 2015-04-08 | 江苏中科天安智联科技有限公司 | NFC intelligent automobile key system with permission and authorization functions |
CN104424679B (en) * | 2013-08-30 | 2017-04-12 | 比亚迪股份有限公司 | Authorization method and authorization system of intelligent key in wireless terminal as well as terminal and server |
JP6036638B2 (en) * | 2013-10-17 | 2016-11-30 | 株式会社デンソー | Electronic key system, in-vehicle device, and portable device |
CN105083214B (en) * | 2014-04-28 | 2018-09-11 | 比亚迪股份有限公司 | The authorization method of vehicle, authorizes mobile terminal and authorized mobile terminal at system |
CN105788037B (en) * | 2014-12-26 | 2018-12-21 | 比亚迪股份有限公司 | The authoring system and method for Vehicular intelligent key |
CN105491228B (en) * | 2015-11-24 | 2019-04-19 | 大连楼兰科技股份有限公司 | Share the method and system of vehicle control power |
CN106302510B (en) * | 2016-08-31 | 2019-07-26 | 长城汽车股份有限公司 | Authorization method, system, mobile terminal and the server of virtual key |
CN106375312B (en) * | 2016-08-31 | 2019-12-06 | 长城汽车股份有限公司 | Virtual key authorization method, system, mobile terminal and server |
-
2016
- 2016-08-31 CN CN201610792870.6A patent/CN106302510B/en active Active
-
2017
- 2017-05-27 WO PCT/CN2017/086435 patent/WO2018040639A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2018040639A1 (en) | 2018-03-08 |
CN106302510A (en) | 2017-01-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106302510B (en) | Authorization method, system, mobile terminal and the server of virtual key | |
CN106375312A (en) | Virtual key authorization method and system, mobile terminal and server | |
CN109936833B (en) | Vehicle virtual key generation and use method and system and user terminal | |
CN111628971B (en) | Trust login method | |
WO2021135258A1 (en) | Method and apparatus for using vehicle based on smart key | |
JP6586446B2 (en) | Method for confirming identification information of user of communication terminal and related system | |
CN106373235B (en) | Authorization method, server and the authoring system of virtual key | |
CN102217277B (en) | Method and system for token-based authentication | |
CN106394486A (en) | Authorization method and system of virtual key and server | |
CN108141444B (en) | Improved authentication method and authentication device | |
CN113572718B (en) | Login method, login device, electronic equipment and storage medium | |
CN101262342A (en) | Distributed authorization and validation method, device and system | |
US20150294309A1 (en) | Method, Device and Service Provision Unit for Authenticating a Customer for a Service to be Provided by the Service Provision Unit | |
CN104660412A (en) | Password-less security authentication method and system for mobile equipment | |
US11722529B2 (en) | Method and apparatus for policy-based management of assets | |
US20230133418A1 (en) | Personalised, server-specific authentication mechanism | |
DE102018005038A1 (en) | Smart card as a security token | |
CN105703910A (en) | Dynamic password verifying method based on Wechat service number | |
US10305878B2 (en) | Virtual device authorization method and device | |
EP1898349A1 (en) | Method and system for providing a service to a subscriber of a mobile network operator | |
JP2004533730A (en) | Process and apparatus for improving security of digital signature and public key infrastructure for real world applications | |
CN111681009B (en) | Multi-platform centralized authentication and authorization system and method, authentication and authorization and service device | |
KR20190001243A (en) | Server independent chat system | |
Gadacz | Evaluation of electric mobility authentication approaches | |
CN117240516A (en) | Signing method and device based on alliance chain, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |