CN106302510B - Authorization method, system, mobile terminal and the server of virtual key - Google Patents

Authorization method, system, mobile terminal and the server of virtual key Download PDF

Info

Publication number
CN106302510B
CN106302510B CN201610792870.6A CN201610792870A CN106302510B CN 106302510 B CN106302510 B CN 106302510B CN 201610792870 A CN201610792870 A CN 201610792870A CN 106302510 B CN106302510 B CN 106302510B
Authority
CN
China
Prior art keywords
mobile terminal
server
authorization
sent
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610792870.6A
Other languages
Chinese (zh)
Other versions
CN106302510A (en
Inventor
应世明
牛域辉
李琦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Great Wall Motor Co Ltd
Original Assignee
Great Wall Motor Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Great Wall Motor Co Ltd filed Critical Great Wall Motor Co Ltd
Priority to CN201610792870.6A priority Critical patent/CN106302510B/en
Publication of CN106302510A publication Critical patent/CN106302510A/en
Priority to PCT/CN2017/086435 priority patent/WO2018040639A1/en
Application granted granted Critical
Publication of CN106302510B publication Critical patent/CN106302510B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention provides authorization method, system, mobile terminal and the server of a kind of virtual key, method includes: that first movement terminal receives the authorization requests that the second mobile terminal is sent;Authorization requests are sent to server, to receive the loopback address and authorization code sent from server after server authentication passes through;Loopback address is sent to the second mobile terminal by the first application program of first movement terminal, after confirming so as to the second mobile terminal by the first application journey in the second mobile terminal, the first application program of first movement terminal is fed back to by loopback address;Authorization code is sent to the second mobile terminal by the first application program, so that the second mobile terminal accesses vehicle according to authorization code.The present invention reduces the interaction flows for obtaining authorization code, improve efficiency, while ensure that the safety of transmission process, can provide better operating experience, convenience and safety guarantee to the both sides of key authorization.

Description

Authorization method, system, mobile terminal and the server of virtual key
Technical field
The present invention relates to field of information security technology, in particular to a kind of authorization method of virtual key, system, movement are eventually End and server.
Background technique
It is higher and higher to the convenient and safety requirements in life with the fast development of electronics techniques.As in life Essential safety lock system in work, such as the electronic lock system in fields such as automobile, households is applied, it has designed increasingly The expectation demand being close to the users.And the borrow of normal key, it needs in kind (including mechanical key, electron key, non-contact magnetically Card etc.) borrower is given, cause time and inconvenience spatially.Nowadays the appearance of smart electronics key mentions for users New key sharing platform has been supplied, key can have been licensed to him on an electronic device by certain communication modes between user People solves normal key share time and limitation spatially.
According to the demand of user, various smart electronics keys are devised, mobile device such as mobile phone, by mobile phone and key Spoon combines.One kind due to mobile phone as convenience mobile device, is widely used in daily life, using mobile phone as a kind of key The platform for using and authorizing of spoon has become a kind of trend.
Currently, the relevant technologies, which propose a kind of vehicle operating permission, authorizes system, have: server, from the 1st pocket Electronic equipment receive to the electron key as vehicle come using the identification information that is identified of the 1st portable electronic device, And the legitimacy of identification information is confirmed, and by movement enabling signal be sent to vehicle, the movement enabling signal pair and come Permitted from the corresponding vehicle operating of requirement in the 1st portable electronic device;Key logging unit, will be provided by the server Key logs in the 1st portable electronic device;And access right authorizes portion, by using logging in the 1st pocket electronics The access right for accessing server is granted to the 2nd portable electronic device by the key in equipment, and sets the 2nd pocket electronics It is standby to act as having the electron key of vehicle operating permission.The disadvantages of this method is that there are a key ciphers simultaneously Existing safety, if grantee, during driving, authorized person still has permission control automobile, can to grantee with Next dangerous, grantee is often used as interim user, experiences safely during using key bad.
The relevant technologies also disclose authorization method, system and the terminal of a kind of vehicle, and method includes: authorized mobile terminal It is generated by bluetooth key application program and borrows vehicle solicited message, and vehicle solicited message will be borrowed to be sent to authorization mobile terminal;Authorization Mobile terminal, which receives, borrows vehicle solicited message;Authorization mobile terminal imports the borrowing time borrowed vehicle solicited message and vehicle is arranged, and And identification information, the account of borrowing time and vehicle bluetooth key and password are encrypted to generate authorization message;Authorization Authorization message is sent to authorized mobile terminal by mobile terminal;It is authorized to mobile terminal and receives authorization message, and imports authorization Information, and the identification information of itself is obtained, and when the identification information of itself is consistent with the identification information in authorization message, borrowing With time internal control vehicle.The disadvantages of this method is, although there is prompt to control the time used in authorization, there is no right Access times or other permissions are explained, more not to how realizing that similar limitation makes scheme in authorization.
Summary of the invention
In view of this, the present invention is directed to propose a kind of authorization method of virtual key, the method reduce obtain authorization code Interaction flow, improve efficiency, while ensure that the safety of transmission process, can be provided more to the both sides of key authorization Good operating experience, convenience and safety guarantee.
In order to achieve the above objectives, the technical scheme of the present invention is realized as follows:
A kind of authorization method of virtual key, comprising the following steps: first movement terminal receives the second mobile terminal and sends Authorization requests;The authorization requests are sent to server, to receive and come from the clothes after the server authentication passes through The loopback address and authorization code that business device is sent;The loopback address is sent to by the first application program of first movement terminal Second mobile terminal leads to after being confirmed so as to second mobile terminal by the first application journey in the second mobile terminal Cross the first application program that the loopback address feeds back to the first movement terminal;First application program is by the authorization Code is sent to second mobile terminal, so that second mobile terminal accesses vehicle according to the authorization code.
Further, the communication between the first movement terminal and the server and the first movement terminal Communication between second mobile terminal uses tunnel encryption.
Further, first application program is APP, SMS or IE.
Further, it when the authorization requests are sent to server by the first movement terminal, is also used to move first Dynamic terminal identity information is sent to the server, so that the server authenticates the first movement terminal.
Compared with the existing technology, the authorization method of virtual key of the present invention has the advantage that
The authorization method of virtual key of the invention, first movement terminal receive the authorization requests of the second mobile terminal, and It is sent to server, and after server authentication passes through, receives loopback address and authorization code, and loopback address is sent to second Mobile terminal after validation so as to the second mobile terminal feeds back to first movement terminal by loopback address, then first movement Authorization code is sent to the second mobile terminal by terminal, completes licensing process.Therefore, the method reduce the interactions for obtaining authorization code Process improves efficiency, while guaranteeing the safety of transmission process, energy using tunnel encryption technology (TLS) in transmission process Enough both sides to key authorization provide better operating experience, convenience and safety guarantee.
It is another object of the present invention to the authoring systems for proposing a kind of virtual key, and the system reduces obtain to authorize The interaction flow of code, improves efficiency, while ensure that the safety of transmission process, can provide to the both sides of key authorization Better operating experience, convenience and safety guarantee.
In order to achieve the above objectives, the technical scheme of the present invention is realized as follows:
A kind of authoring system of virtual key, comprising: first movement terminal, the second mobile terminal and server, wherein institute It states first movement terminal and receives the authorization requests that the second mobile terminal is sent, and the authorization requests are sent to server, with After the server authentication passes through, the loopback address and authorization code sent from the server is received, and by described The loopback address is sent to second mobile terminal by the first application program in first movement terminal, so as to described second After mobile terminal is by the first application program confirmation in the second mobile terminal, described first is fed back to by the loopback address The authorization code is sent to second mobile terminal by the first application program of mobile terminal, first application program, with Toilet states the second mobile terminal and accesses vehicle according to the authorization code.
Further, the communication between the first movement terminal and the server and the first movement terminal Communication between second mobile terminal uses tunnel encryption.
Further, first application program is APP, SMS or IE.
Further, it when the authorization requests are sent to server by the first movement terminal, is also used to move first Dynamic terminal identity information is sent to the server, so that the server authenticates the first movement terminal.
The authoring system of the virtual key and the authorization method of above-mentioned virtual key are had compared with the existing technology Some advantages are identical, and details are not described herein.
Another object of the present invention is to propose a kind of mobile terminal, which reduces the friendship for obtaining authorization code Mutual process improves efficiency, while ensure that the safety of transmission process, can provide preferably to the both sides of key authorization Operating experience, convenience and safety guarantee.
In order to achieve the above objectives, the technical scheme of the present invention is realized as follows:
A kind of mobile terminal, the mobile terminal are in the authoring system of virtual key described in the above embodiment of the present invention First movement terminal.
The authoring system of the mobile terminal and above-mentioned virtual key compared with the existing technology possessed by advantage phase Together, details are not described herein.
Yet another object of the invention is that proposing a kind of mobile terminal, which reduces the friendship for obtaining authorization code Mutual process improves efficiency, while ensure that the safety of transmission process, can provide preferably to the both sides of key authorization Operating experience, convenience and safety guarantee.
In order to achieve the above objectives, the technical scheme of the present invention is realized as follows:
A kind of mobile terminal, the mobile terminal are in the authoring system of virtual key described in the above embodiment of the present invention The second mobile terminal.
The authoring system of the mobile terminal and above-mentioned virtual key compared with the existing technology possessed by advantage phase Together, details are not described herein.
Yet another object of the invention is that proposing a kind of server, which reduces the interactive stream for obtaining authorization code Journey improves efficiency, while ensure that the safety of transmission process, can provide better operation to the both sides of key authorization Experience, convenience and safety guarantee.
In order to achieve the above objectives, the technical scheme of the present invention is realized as follows:
A kind of server, the server are the clothes in the authoring system of virtual key described in the above embodiment of the present invention Business device.
Possessed advantage is identical compared with the existing technology with the authoring system of above-mentioned virtual key for the server, Details are not described herein.
Detailed description of the invention
The attached drawing for constituting a part of the invention is used to provide further understanding of the present invention, schematic reality of the invention It applies example and its explanation is used to explain the present invention, do not constitute improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of the authorization method of the virtual key of the embodiment of the present invention;
Fig. 2 is the functional block diagram of the authorization method of the virtual key of one embodiment of the invention;
Fig. 3 is that the virtual key of one embodiment of the invention shares authorization schematic diagram;
Fig. 4 is that the key of one embodiment of the invention shares each module relationship schematic diagram in licensing process;
Fig. 5 is the licensing scheme schematic diagram of the authorization method of the virtual key of one embodiment of the invention;And
Fig. 6 is the structural block diagram of the authoring system of the virtual key of the embodiment of the present invention.
Description of symbols:
Authoring system, 110- first movement terminal, the second mobile terminal of 120-, 130- server of the virtual key of 100-.
Specific embodiment
It should be noted that in the absence of conflict, the feature in embodiment and embodiment in the present invention can phase Mutually combination.
The present invention will be described in detail below with reference to the accompanying drawings and embodiments.
Fig. 1 is the flow chart of the authorization method of virtual key according to an embodiment of the invention.Fig. 2 is according to the present invention The functional block diagram of the authorization method of the virtual key of one embodiment.
As shown in Figure 1, and combine Fig. 2, the authorization method of the virtual key of the embodiment of the present invention the following steps are included:
Step S1: first movement terminal receives the authorization requests that the second mobile terminal is sent.Specifically, first movement terminal Smart phone 1 as shown in Fig. 2, the second mobile terminal are smart phone 2 shown in Fig. 2, and server is in Fig. 2 Cloud server.
Step S2: being sent to server for authorization requests, to receive and send from server after server authentication passes through Loopback address and authorization code.
Further, in one embodiment of the invention, when authorization requests are sent to server by first movement terminal, It is also used to first movement terminal identity information being sent to server, so that server authenticates first movement terminal.
Step S3: being sent to the second mobile terminal for loopback address by the first application program of first movement terminal, with Just after the second mobile terminal is by the first application journey confirmation in the second mobile terminal, first movement is fed back to by loopback address First application program of terminal.
Wherein, the first application program is, for example, APP, SMS or IE.
Authorization code is sent to the second mobile terminal by the S4: the first application program of step, so that the second mobile terminal is according to awarding Weighted code accesses vehicle.
In one embodiment of the invention, for example, communication and first between first movement terminal and server move Communication between dynamic terminal and the second mobile terminal uses tunnel encryption.
For the ease of more fully understanding the present invention, below in conjunction with attached drawing, with specific example to the method for the embodiment of the present invention Specifically specifically described.
As shown in connection with fig. 2, the principle overview of the method for the embodiment of the present invention are as follows: permit holder (smart phone 2 it is all Person) to car owner (owner of smart phone 1) authorization requests are sent, after receiving the authorized certificate of car owner, the person of hiring a car is by vehicle The authorized certificate that main smart phone 1 transmits is transferred to cloud server, key access identifying code is received from server, by this Identifying code is saved in the smart phone 2 of grantee (person of hiring a car), and grantee carries and is saved on authorized smart phone 2 Locked resource integrates bluetooth module automobile with PEPS and is matched, and completes the authentication communication process of key, specifically authorized Journey example is as shown in Figure 3, specific as follows:
Permit holder initiates authorization requests to car owner, from the mobile device 1 (i.e. smart phone 1 or first movement terminal) of car owner Obtain authorized certificate.This authorized certificate is used to indicate that car owner agrees to authorize the person of hiring a car.The person of hiring a car obtains car owner Authorized certificate after, then by authorized certificate and the person's of hiring a car mobile device voucher send cloud server, make requests authorization code Obtain final access credentials.Cloud server recognizes permit holder mobile device 2 (i.e. smart phone 2 or the second mobile terminal) Card, and the validity of authorized certificate is verified, if after by verifying, cloud server is by backward reference certificate authority code to movement Equipment 2.The person of hiring a car represents car owner using access credentials authorization code and carries out request of data to automobile PEPS.PEPS is verified authorization Shielded resource is returned into permit holder mobile device 2 after code, Fig. 4 is listed in key licensing process between each correlation module Relationship, it is specific as follows:
(1) permit holder mobile device 2 need to request access to authorization code to car owner's mobile device 1 by intermediate system.
(2) after car owner's mobile device 1 authorizes according to user and passes through to Subscriber Information certification, to permit holder mobile device 2 backward reference authorization codes.
(3) permit holder mobile device 2 calls open platform data-interface to access shielded user using access authorization code Resource, access are captured by cloud server.
(4) cloud server obtains access authorization code, and associated user's type, the authority information of authorization code are requested to car owner.
(5) 1 return authentication information of car owner's mobile device.
(6) authority information and resource that cloud server is included to authorization code in request check and approve the authority information that needs into Row verification.
(7) for adequately requesting to ask to the further data of automobile PEPS progress by cloud server by permission It asks.
(8) automobile PEPS returns to shielded resource data.
Based on the relationship between authorization flow and each module mentioned above, the embodiment of the present invention uses implicit award Mechanism pattern is weighed, that is, the person that do not hire a car sends request authorization to car owner's mobile device 1 by mobile device 2, car owner passes through in equipment APP, IE etc. application carry out account number cipher input and to the request selecting authorization of permit holder after, cloud server be not return Authorization code is directly returned to 2 client of mobile device to third-party application by interim token in the form of URI segment, in detail Thin licensing scheme is specific as follows for example shown in Fig. 5:
1) mobile device 2 for the person of hiring a car exchanges section by the authorization data of the guidance such as customized APP to cloud server Point opens authorization flow.When the customized APP of mobile device 2 is requested to cloud server, client id, client device can be taken Id, request permissions range, status code and the loopback address adjusted back for cloud server.
2) car owner's mobile device 1 beyond the clouds server-side input user credential after, cloud server recognizes owner identity Card, then decides whether that the request to 2 client of mobile device authorizes by car owner.
3) assume that car owner has passed through authorization, cloud server starts corresponding process flow according to the licensing mode of car owner, Authorization code is attached to behind the loopback address being passed to using step 1 in the form of URI segment later.
4) the customized APP of car owner need to retain authorization code in local, while send loopback address to the customized APP of permit holder Storage resource request.
5) permit holder customized APP parsing is with the complete readjustment for having authorization code information that can be returned in obtaining step 3 The script of address.
6) the customized APP of car owner gets authorization code in local runtime script, and the authorization code that will acquire returns to mobile device 2。
To sum up, the authorization method of virtual key according to an embodiment of the present invention, it is mobile whole that first movement terminal receives second The authorization requests at end, and it is sent to server, and after server authentication passes through, loopback address and authorization code are received, and will return It adjusts address to be sent to the second mobile terminal, after validation so as to the second mobile terminal, first movement is fed back to by loopback address Terminal, then authorization code is sent to the second mobile terminal by first movement terminal, completes licensing process.Therefore, this method is reduced The interaction flow for obtaining authorization code, improves efficiency, while guaranteeing to pass using tunnel encryption technology (TLS) in transmission process The safety of defeated process can provide better operating experience, convenience and safety guarantee to the both sides of key authorization.
Further, as shown in fig. 6, embodiment of the invention discloses a kind of authoring system 100 of virtual key, packet It includes: first movement terminal 110, the second mobile terminal 120 and server 130.
First movement terminal 110 receives the authorization requests that the second mobile terminal 120 is sent, and authorization requests are sent to clothes Business device 130, to receive the loopback address and authorization code sent from server 130 after the certification of server 130 passes through, and Loopback address is sent to the second mobile terminal 120 by the first application program in first movement terminal 110, so as to the second shifting After dynamic terminal 120 is by the first application program confirmation in the second mobile terminal 120, first movement is fed back to by loopback address Authorization code is sent to the second mobile terminal 120 by the first application program of terminal 110, the first application program, so as to the second movement Terminal 120 accesses vehicle according to authorization code.Wherein, the first application program is, for example, APP, SMS or IE.
In one embodiment of the invention, the communication between first movement terminal 110 and server 130 and first Communication between mobile terminal 110 and the second mobile terminal 120 uses tunnel encryption.
In one embodiment of the invention, when authorization requests are sent to server 130 by first movement terminal 110, also For 110 identity information of first movement terminal to be sent to server 130, so as to server 130 to first movement terminal 110 into Row certification.
To sum up, the authoring system of virtual key according to an embodiment of the present invention, it is mobile whole that first movement terminal receives second The authorization requests at end, and it is sent to server, and after server authentication passes through, loopback address and authorization code are received, and will return It adjusts address to be sent to the second mobile terminal, after validation so as to the second mobile terminal, first movement is fed back to by loopback address Terminal, then authorization code is sent to the second mobile terminal by first movement terminal, completes licensing process.Therefore, which subtracts The interaction flow for obtaining authorization code is lacked, has improved efficiency, while having been guaranteed in transmission process using tunnel encryption technology (TLS) The safety of transmission process can provide better operating experience, convenience and safety guarantee to the both sides of key authorization.
It should be noted that the specific implementation of the authoring system of the virtual key of the embodiment of the present invention and the present invention are real The specific implementation for applying the authorization method of the virtual key of example is similar, specifically refers to the description of method part, in order to reduce Redundancy is not repeated herein.
Further, embodiment of the invention discloses a kind of mobile terminal, which is, for example, that the present invention is above-mentioned First movement terminal in the authoring system of virtual key described in embodiment.Accordingly, with respect to the specific detailed of the mobile terminal Thin description is referring to the above-mentioned description to first movement terminal part of the present invention.
Therefore, mobile terminal according to an embodiment of the present invention reduces the interaction flow for obtaining authorization code, improves effect Rate, while ensure that the safety of transmission process, better operating experience, convenience can be provided to the both sides of key authorization And safety guarantee.
Further, embodiment of the invention discloses a kind of mobile terminal, which is, for example, that the present invention is above-mentioned The second mobile terminal in the authoring system of virtual key described in embodiment.Accordingly, with respect to the specific detailed of the mobile terminal Thin description is referring to the above-mentioned description to the second mobile terminal part of the present invention.
Therefore, mobile terminal according to an embodiment of the present invention reduces the interaction flow for obtaining authorization code, improves effect Rate, while ensure that the safety of transmission process, better operating experience, convenience can be provided to the both sides of key authorization And safety guarantee.
Further, embodiment of the invention discloses a kind of server, which is, for example, the above-mentioned implementation of the present invention Server in the authoring system of virtual key described in example.Specific accordingly, with respect to the server is described in detail referring to this Invent the above-mentioned description to server section.
Therefore, server according to an embodiment of the present invention reduces the interaction flow for obtaining authorization code, improves efficiency, Ensure that the safety of transmission process simultaneously, can be provided better operating experience to the both sides of key authorization, convenience and Safety guarantee.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention Within mind and principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.

Claims (11)

1. a kind of authorization method of virtual key, which comprises the following steps:
First movement terminal receives the authorization requests that the second mobile terminal is sent;
The authorization requests are sent to server by the first movement terminal, and after the server authentication passes through, and are received The loopback address and authorization code sent from the server;
The loopback address is sent to second mobile terminal by the first application program of first movement terminal, with toilet After the second mobile terminal is stated by the first application journey confirmation in the second mobile terminal, fed back to by the loopback address described First application program of first movement terminal;
The authorization code is sent to second mobile terminal by first application program, so as to the second mobile terminal root Vehicle is accessed according to the authorization code.
2. the authorization method of virtual key according to claim 1, which is characterized in that the first movement terminal with it is described The communication between communication and the first movement terminal and second mobile terminal between server is added using tunnel It is close.
3. the authorization method of virtual key according to claim 1, which is characterized in that first application program be APP, SMS or IE.
4. the authorization method of virtual key according to claim 1, which is characterized in that the first movement terminal will be described When authorization requests are sent to server, it is also used to first movement terminal identity information being sent to the server, so as to described Server authenticates the first movement terminal.
5. a kind of authoring system of virtual key characterized by comprising first movement terminal, the second mobile terminal and service Device, wherein
The first movement terminal receives the authorization requests that the second mobile terminal is sent, and the authorization requests are sent to service Device, to receive the loopback address and authorization code sent from the server, and pass through after the server authentication passes through The loopback address is sent to second mobile terminal by the first application program in the first movement terminal, so as to described After second mobile terminal is by the first application program confirmation in the second mobile terminal, fed back to by the loopback address described The authorization code is sent to second movement eventually by the first application program of first movement terminal, first application program End, so that second mobile terminal accesses vehicle according to the authorization code.
6. the authoring system of virtual key according to claim 5, which is characterized in that the first movement terminal with it is described The communication between communication and the first movement terminal and second mobile terminal between server is added using tunnel It is close.
7. the authoring system of virtual key according to claim 5, which is characterized in that first application program be APP, SMS or IE.
8. the authoring system of virtual key according to claim 5, which is characterized in that the first movement terminal will be described When authorization requests are sent to server, it is also used to first movement terminal identity information being sent to the server, so as to described Server authenticates the first movement terminal.
9. a kind of mobile terminal, which is characterized in that the mobile terminal is according to the described in any item virtual keys of claim 5-8 First movement terminal in the authoring system of spoon.
10. a kind of mobile terminal, which is characterized in that the mobile terminal is described in any item virtual according to claim 5-8 Second mobile terminal in the authoring system of key.
11. a kind of server, which is characterized in that the server is according to the described in any item virtual keys of claim 5-8 Authoring system in server.
CN201610792870.6A 2016-08-31 2016-08-31 Authorization method, system, mobile terminal and the server of virtual key Active CN106302510B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610792870.6A CN106302510B (en) 2016-08-31 2016-08-31 Authorization method, system, mobile terminal and the server of virtual key
PCT/CN2017/086435 WO2018040639A1 (en) 2016-08-31 2017-05-27 Authorization method and system for virtual key, mobile terminal and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610792870.6A CN106302510B (en) 2016-08-31 2016-08-31 Authorization method, system, mobile terminal and the server of virtual key

Publications (2)

Publication Number Publication Date
CN106302510A CN106302510A (en) 2017-01-04
CN106302510B true CN106302510B (en) 2019-07-26

Family

ID=57672410

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610792870.6A Active CN106302510B (en) 2016-08-31 2016-08-31 Authorization method, system, mobile terminal and the server of virtual key

Country Status (2)

Country Link
CN (1) CN106302510B (en)
WO (1) WO2018040639A1 (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106302510B (en) * 2016-08-31 2019-07-26 长城汽车股份有限公司 Authorization method, system, mobile terminal and the server of virtual key
CN106671936A (en) * 2017-01-17 2017-05-17 北京汽车研究总院有限公司 Car starting method and device
DE102017115298A1 (en) * 2017-07-07 2019-01-10 Huf Hülsbeck & Fürst Gmbh & Co. Kg Procedure for Delegation of Access Rights
KR102385474B1 (en) * 2017-07-19 2022-04-13 현대자동차주식회사 Vehicle system and control method thereof
JP6571847B1 (en) * 2018-09-03 2019-09-04 笠▲衆▼實業有限公司 Intelligent vehicle electronic key system
CN109285252B (en) * 2018-09-29 2021-08-10 百度在线网络技术(北京)有限公司 Vehicle lock control method and device
CN110290525A (en) * 2019-06-21 2019-09-27 湖北亿咖通科技有限公司 A kind of sharing method and system, mobile terminal of vehicle number key
CN110619221B (en) * 2019-08-09 2023-10-31 深圳市轱辘车联数据技术有限公司 Virtual authorization method, device, terminal equipment and storage medium
CN111148075A (en) * 2019-12-30 2020-05-12 上海博泰悦臻网络技术服务有限公司 Bluetooth key configuration method and system for configuring Bluetooth key
CN112153640A (en) * 2020-06-24 2020-12-29 上汽通用五菱汽车股份有限公司 Vehicle control method, system, user terminal, vehicle and readable storage medium
CN112133002A (en) * 2020-09-16 2020-12-25 四川天翼网络服务有限公司 Bus key supervisory systems
CN112459617A (en) * 2020-11-27 2021-03-09 黄志刚 Remote controller control box, door lock control system and sharing system of automobile
CN112572344A (en) * 2020-11-27 2021-03-30 黄志刚 Door lock control and sharing method for automobile
CN113554786B (en) * 2021-08-02 2023-05-30 广东南马智能技术有限公司 Bluetooth car key car control method and system

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2743868A1 (en) * 2012-12-14 2014-06-18 Seven Principles AG Virtual vehicle key
CN103035054B (en) * 2012-12-29 2015-04-08 江苏中科天安智联科技有限公司 NFC intelligent automobile key system with permission and authorization functions
CN104424679B (en) * 2013-08-30 2017-04-12 比亚迪股份有限公司 Authorization method and authorization system of intelligent key in wireless terminal as well as terminal and server
JP6036638B2 (en) * 2013-10-17 2016-11-30 株式会社デンソー Electronic key system, in-vehicle device, and portable device
CN105083214B (en) * 2014-04-28 2018-09-11 比亚迪股份有限公司 The authorization method of vehicle, authorizes mobile terminal and authorized mobile terminal at system
CN105788037B (en) * 2014-12-26 2018-12-21 比亚迪股份有限公司 The authoring system and method for Vehicular intelligent key
CN105491228B (en) * 2015-11-24 2019-04-19 大连楼兰科技股份有限公司 Share the method and system of vehicle control power
CN106302510B (en) * 2016-08-31 2019-07-26 长城汽车股份有限公司 Authorization method, system, mobile terminal and the server of virtual key
CN106375312B (en) * 2016-08-31 2019-12-06 长城汽车股份有限公司 Virtual key authorization method, system, mobile terminal and server

Also Published As

Publication number Publication date
WO2018040639A1 (en) 2018-03-08
CN106302510A (en) 2017-01-04

Similar Documents

Publication Publication Date Title
CN106302510B (en) Authorization method, system, mobile terminal and the server of virtual key
CN106375312A (en) Virtual key authorization method and system, mobile terminal and server
CN109936833B (en) Vehicle virtual key generation and use method and system and user terminal
CN111628971B (en) Trust login method
WO2021135258A1 (en) Method and apparatus for using vehicle based on smart key
JP6586446B2 (en) Method for confirming identification information of user of communication terminal and related system
CN106373235B (en) Authorization method, server and the authoring system of virtual key
CN102217277B (en) Method and system for token-based authentication
CN106394486A (en) Authorization method and system of virtual key and server
CN108141444B (en) Improved authentication method and authentication device
CN113572718B (en) Login method, login device, electronic equipment and storage medium
CN101262342A (en) Distributed authorization and validation method, device and system
US20150294309A1 (en) Method, Device and Service Provision Unit for Authenticating a Customer for a Service to be Provided by the Service Provision Unit
CN104660412A (en) Password-less security authentication method and system for mobile equipment
US11722529B2 (en) Method and apparatus for policy-based management of assets
US20230133418A1 (en) Personalised, server-specific authentication mechanism
DE102018005038A1 (en) Smart card as a security token
CN105703910A (en) Dynamic password verifying method based on Wechat service number
US10305878B2 (en) Virtual device authorization method and device
EP1898349A1 (en) Method and system for providing a service to a subscriber of a mobile network operator
JP2004533730A (en) Process and apparatus for improving security of digital signature and public key infrastructure for real world applications
CN111681009B (en) Multi-platform centralized authentication and authorization system and method, authentication and authorization and service device
KR20190001243A (en) Server independent chat system
Gadacz Evaluation of electric mobility authentication approaches
CN117240516A (en) Signing method and device based on alliance chain, electronic equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant