CN109067548A - Virtual key share system and method - Google Patents

Virtual key share system and method Download PDF

Info

Publication number
CN109067548A
CN109067548A CN201811105961.3A CN201811105961A CN109067548A CN 109067548 A CN109067548 A CN 109067548A CN 201811105961 A CN201811105961 A CN 201811105961A CN 109067548 A CN109067548 A CN 109067548A
Authority
CN
China
Prior art keywords
target terminal
lock end
key
sent
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811105961.3A
Other languages
Chinese (zh)
Other versions
CN109067548B (en
Inventor
罗燕京
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xinchangcheng Technology Development Co ltd
Xinchangcheng Shanghai Technology Co ltd
Original Assignee
Beijing Ren Letter Card Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Ren Letter Card Technology Co Ltd filed Critical Beijing Ren Letter Card Technology Co Ltd
Priority to CN201811105961.3A priority Critical patent/CN109067548B/en
Publication of CN109067548A publication Critical patent/CN109067548A/en
Application granted granted Critical
Publication of CN109067548B publication Critical patent/CN109067548B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00412Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/84Vehicles

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention relates to field of communication technology more particularly to a kind of virtual key share system and methods.The system includes: user terminal, for interacting public key with target terminal, and generates target terminal authentication information and user terminal identity verification information;Target terminal is sent to for verifying received user terminal identity verification information, generation target terminal session key, and using session key editor's unlock instruction by lock end;It is generated by lock end session key, and unlocked according to the unlock instruction that target terminal is sent by lock end for verifying the received target terminal authentication information with user terminal private key;Offline communications module, for terminal and by the transmission of information between lock end.User terminal and target terminal of the invention passes through the verifying that interaction public key carries out identity information, is only proved to be successful, and target terminal could be unlocked using the identity information of user terminal by lock end, has the advantages that structures and methods are simple, safe and convenient to use.

Description

Virtual key share system and method
Technical field
The present invention relates to field of communication technology more particularly to a kind of virtual key share system and methods.
Background technique
Internet of Things is considered as the third time revolution that IT industry develops after computer, internet by people, general Make it possible all things on earth interconnection in the network characteristic of change.Smart home, car networking, artificial intelligence everything behind just It is that Internet of Things is accelerating landing, fast-ripenin, the arrival of the internet of things era is unquestionable.The basis of Internet of Things and core are still It is so internet, is extension and expansion based on the internet, and cloud computing, mobile Internet, intelligent terminal etc. then exist The architectural framework of help Internet of Things becomes more to enrich full.Internet of Things has become our times new round economy and development in science and technology One of strategic high ground, develop Internet of Things and have important practical significance for promoting economic development with social progress.However, Just because of internet of things for the natural inheritance of internet, so that all kinds of malicious attacks initiated for internet start Internet of things field is spread to.
By taking car networking as an example, car networking is core application of the Internet of Things in intelligent transportation field, and car networking project is intelligence The important component of traffic system.Car networking be by the sensing equipment, mobile unit and communication module being installed on vehicle, Using mobile communication technology, auto-navigation system, intelligent terminal and information network platform etc., realize the road Che Yu, Che Yuche, Vehicle is connect with the overall network of people and vehicle and application platform, and is analyzed by business platform information, handled and dug More abundant, comfortable, safe and efficient vehicle operation and integrated information service are realized in pick.
As the acceleration of mobile Internet and car networking technology is universal, bluetooth is led to offline as a kind of short distance, low-power consumption Letter technology, has at low cost, realizes and is easy, the characteristics of convenient for promoting, the life of the combination of Bluetooth technology and automotive engineering to automobile Production, use, service band carry out bigger convenience, and Bluetooth technology has very big in the efficiency of communication and low-power consumption, security fields Progress.
The one kind of bluetooth key as virtual key will become the standard configuration of next-generation automobile.Virtual key can also be with It is called digital key, mainly utilizes near-field communication technology, user is allowed to pass through smart phone or wearable smart machine Unlocking, locking etc. to carry out car door, door etc. operate.Digital key in addition to bigger convenience can be brought to user, The digitized essence of body is but also digital key becomes the infrastructure of many new car networking application and service, such as automobile is total to It enjoys, timesharing lease, business of hiring a car is delivered to boot etc. fastly.Current many automakers are constructing digital key solution When there is no adequately it is considered that bluetooth key is a very important service in fact.And how to ensure this and service Safety, then need automaker just to pass through the different use-cases under structured walk-through scene in the initial design phase, analyze Specific demand for security, to select suitable technology and standard to construct safe digital key system.There are also critically important Any is that the life cycle of bluetooth key service is longer (5~10 years), if bluetooth will also be determined by having complete updating ability Safety of the key service in whole life cycle.
The technical solution of the virtual key of current research is based primarily upon PKI (Public Key Infrastructure, public key Infrastructure) technical system design, this design needs by the way that under the conditions of online, mobile terminal is obtained by the number of lock end such as automobile Word certificate, automobile obtain the digital certificate of mobile terminal, realize the two-way authentication of mobile terminal and vehicle, the key that then conversates association The interaction of quotient, operation system.Virtual key in the prior art, which has the disadvantage in that, needs the online exchange for carrying out certificate, right The sensibility of network is higher;It is higher to CA system (certificate center) server requirement;It will appear man-in-the-middle attack, certificate carried out It kidnaps;With the increase of number of users, construction and operating cost are high, system complex.In addition, the sharing based on this virtual key System is also dangerous.
Therefore, it is badly in need of a kind of highly-safe virtual key share system and method.
Summary of the invention
The present invention provides a kind of virtual key share system and methods, are being shared with solving virtual key in the prior art When the low problem of safety.
One aspect of the present invention provides a kind of virtual key share system, comprising:
User terminal is generated for interacting public key with target terminal, and using target terminal public key and user terminal private key Target terminal authentication information and user terminal identity verification information, are sent to target terminal;
Target terminal, if being verified, will have for verifying to received user terminal identity verification information The target terminal authentication information of user terminal private key is sent to be verified by lock end, if being verified, generates target Terminal session key is sent to be verified by lock end, if being verified, is sent using session key editor's unlock instruction To by lock end;
By lock end, for being verified to the received target terminal authentication information with user terminal private key, if It is verified, then generates using target terminal public key and by lock end private key by lock end authentication information, and be sent to target end End is verified, if being verified, generation is sent to target terminal by lock end session key and is verified, if being verified, Then unlocked according to the unlock instruction that target terminal is sent;
Offline communications module, for terminal and by the transmission of information between lock end.
It further, further include key management apparatus, for generating user terminal identification key pair according to user terminal ID, And it is sent to the user terminal;It is also used to generate according to by lock end ID by lock end tagged keys pair, and is sent to by lock end;It is also used to Target terminal tagged keys pair are generated according to target terminal ID, and are sent to target terminal;
User terminal, be also used to carry out received user terminal identification key pair with the key pair that itself generates it is compound, Obtain user terminal key pair;
It by lock end, is also used to be carried out received by lock end tagged keys pair with the key pair that itself generates compound, obtains By lock end key pair;
Target terminal, be also used to carry out received target terminal tagged keys pair with the key pair that itself generates it is compound, Obtain target terminal key pair.
Further, ID is substituted into default matrix by key management apparatus, generates key pair using CPK Encryption Algorithm.
Further, offline communications module is bluetooth module.
Further, user terminal includes user terminal public key interactive unit, authentication information generation unit, and target is whole End includes target terminal public key interactive unit, target terminal authentication unit, target terminal session key generation unit, instruction editor Unit includes giving birth to by lock end authentication request information compiling unit, by lock end authentication unit, by lock end session key by lock end At unit and unlocking unit, wherein
User terminal public key interactive unit, for interacting public key, and the mesh that will be obtained with target terminal public key interactive unit Mark terminal public key is sent to authentication information generation unit;
Target terminal public key interactive unit, for interacting public key, and the use that will be obtained with user terminal public key interactive unit Family terminal public key is sent to target terminal authentication request information compiling unit;
Authentication information generation unit, for generating target terminal body using target terminal public key and user terminal private key Part verification information and user terminal identity verification information, are sent to target terminal authentication unit;
Target terminal authentication unit, for being verified to received user terminal identity verification information, if being verified, Then received target terminal authentication information is sent to by lock end authentication unit;It is also used to verify received by lock end identity Whether containing preset by lock end ID in checking solicited message, and signed by lock end it is whether correct, if being locked containing preset It end ID and is signed by lock end errorless, then the verification result being verified is sent to target terminal session key generation unit; Be also used to verify it is received by lock end session key whether containing preset by lock end ID, and whether just by lock end signature Really, if containing it is preset sign by lock end ID and by lock end it is errorless, by the verification result being verified be sent to instruction compile Collect unit;
By lock end authentication unit, for whether verifying the user terminal private key in received target terminal authentication information It is identical as preset family terminal secret key, if they are the same, then the information being verified is sent to by lock end authentication request information Edit cell;It is also used to verify in received target terminal session key and whether contains preset target terminal ID and target Whether terminal signature is correct, if containing preset target terminal ID and errorless, the letter that will be verified of target terminal signature Breath is sent to by lock end session key generation unit;
By lock end authentication request information compiling unit, for generating quilt according to target terminal public key and by lock end private key Lock end authentication request information, and it is sent to target terminal authentication unit;
Target terminal session key generation unit, for generating random number, and according to generating random number target terminal session Key is sent to by lock end authentication unit;
By lock end session key generation unit, for generating random number, and according to generating random number by lock end session key It is sent to by target terminal authentication unit;
Edit cell is instructed, for being sent to unlocking unit according to target terminal session key editor's unlock instruction;
Unlocking unit is unlocked for unlock instruction based on the received.
The second aspect of the invention provides a kind of void realized based on the virtual key share system described among the above Quasi- key sharing method, comprising the following steps:
Public key is interacted with target terminal using user terminal, and generates mesh using target terminal public key and user terminal private key Terminal identity verification information and user terminal identity verification information are marked, target terminal is sent to;
It is verified using target terminal in received user terminal identity verification information, if being verified, by band There is the target terminal authentication information of user's terminal secret key to be sent to be verified by lock end, if being verified, generates mesh Mark terminal session key is sent to be verified by lock end, if being verified, is sent out using session key editor's unlock instruction It send to by lock end;
The received target terminal authentication information with user terminal private key is verified using by lock end, if testing Card passes through, then generates using target terminal public key and by lock end private key by lock end authentication information, and be sent to target terminal It is verified, if being verified, generation is sent to target terminal by lock end session key and is verified, if being verified, The unlock instruction unlock sent according to target terminal;
Terminal is carried out using offline communications module and by the transmission of information between lock end.
Further, further comprising the steps of:
User terminal identification key pair is generated according to user terminal ID using key management apparatus, and is sent to user's end End;It generates according to by lock end ID by lock end tagged keys pair, and is sent to by lock end;Target terminal is generated according to target terminal ID Tagged keys pair, and it is sent to target terminal;
Received user terminal identification key pair carried out using user terminal compound with the key pair that itself generates, obtained User terminal key pair;
Using being carried out with the key pair that itself generates by lock end tagged keys pair compound by received by lock end, obtain being locked Hold key pair;
Received target terminal tagged keys pair are carried out using target terminal compound with the key pair that itself generates, obtained Target terminal key pair.
Further, ID is substituted into default matrix by key management apparatus, generates key pair using CPK Encryption Algorithm.
Further, offline communications module is bluetooth module.
Further, user terminal includes user terminal public key interactive unit, authentication information generation unit, and target is whole End includes target terminal public key interactive unit, target terminal authentication unit, target terminal session key generation unit, instruction editor Unit includes giving birth to by lock end authentication request information compiling unit, by lock end authentication unit, by lock end session key by lock end At unit and unlocking unit, wherein
Public key, and the target that will be obtained are interacted with target terminal public key interactive unit using user terminal public key interactive unit Terminal public key is sent to authentication information generation unit;
Public key, and the user that will be obtained are interacted with user terminal public key interactive unit using target terminal public key interactive unit Terminal public key is sent to target terminal authentication request information compiling unit;
Target terminal body is generated using target terminal public key and user terminal private key using authentication information generation unit Part verification information and user terminal identity verification information, are sent to target terminal authentication unit;
Received user terminal identity verification information is verified using target terminal authentication unit, if being verified, Then received target terminal authentication information is sent to by lock end authentication unit;It verifies and received is asked by lock end authentication Whether ask in information containing preset by lock end ID, and signed by lock end it is whether correct, if containing preset by lock end ID, with And signed by lock end errorless, then the verification result being verified is sent to target terminal session key generation unit;Verifying connects Whether whether being contained in lock end session key for receiving be preset by lock end ID and correct by lock end signature, if containing default By lock end ID, and signed by lock end errorless, then the verification result being verified be sent to instruction edit cell;
Using the user terminal private key verified by lock end authentication unit in received target terminal authentication information whether It is identical as preset family terminal secret key, if they are the same, then the information being verified is sent to by lock end authentication request information Edit cell;It verifies in received target terminal session key and whether contains preset target terminal ID and target terminal label Whether name is correct, if errorless containing preset target terminal ID and target terminal signature, the information being verified is sent To by lock end session key generation unit;
Quilt is generated using by lock end authentication request information compiling unit according to target terminal public key and by lock end private key Lock end authentication request information, and it is sent to target terminal authentication unit;
Random number is generated using target terminal session key generation unit, and close according to generating random number target terminal session Key is sent to by lock end authentication unit;
Random number is generated using by lock end session key generation unit, and is sent out according to generating random number by lock end session key It send to by target terminal authentication unit;
Unlocking unit is sent to according to target terminal session key editor's unlock instruction using instruction edit cell;
Using unlocking unit, unlock instruction is unlocked based on the received.
Virtual key share system provided by the invention and method have following progress compared with prior art:
(1) user terminal and target terminal pass through the verifying that interaction public key carries out identity information, are only proved to be successful, target Terminal could be unlocked using the identity information of user terminal by lock end, have structures and methods simple, safe and convenient to use The advantages of.
(2) target terminal and by lock end when carrying out information transmission, do not need third-party on-line authentication, but target is whole It holds and information transmission is directly carried out by lock end, reduce interactive step, interaction data amount and operand, by double verifying, really Protect the safety of unlock;Target terminal is carried out using offline communications module simultaneously and by the transmission of information between lock end, is reduced Whole system and method improve the safety and reliability in use process to the sensibility of network.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention, And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
By reading the following detailed description of the preferred embodiment, various other advantages and benefits are common for this field Technical staff will become clear.The drawings are only for the purpose of illustrating a preferred embodiment, and is not considered as to the present invention Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 is that the device of virtual key share system in the embodiment of the present invention connects block diagram;
The step of Fig. 2 is virtual key sharing method in the embodiment of the present invention is schemed.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure It is fully disclosed to those skilled in the art.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art Language and scientific term), there is meaning identical with the general understanding of those of ordinary skill in fields of the present invention.Should also Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art The consistent meaning of meaning, and unless otherwise will not be explained in an idealized or overly formal meaning by specific definitions.
Present embodiments provide a kind of virtual key share system and method.
Such as Fig. 1, the virtual key share system of the present embodiment, comprising:
User terminal is generated for interacting public key with target terminal, and using target terminal public key and user terminal private key Target terminal authentication information and user terminal identity verification information, are sent to target terminal;
Target terminal, if being verified, will have for verifying to received user terminal identity verification information The target terminal authentication information of user terminal private key is sent to be verified by lock end, if being verified, generates target Terminal session key is sent to be verified by lock end, if being verified, is sent using session key editor's unlock instruction To by lock end;
By lock end, for being verified to the received target terminal authentication information with user terminal private key, if It is verified, then generates using target terminal public key and by lock end private key by lock end authentication information, and be sent to target end End is verified, if being verified, generation is sent to target terminal by lock end session key and is verified, if being verified, Then unlocked according to the unlock instruction that target terminal is sent;
Offline communications module, for terminal and by the transmission of information between lock end.
The virtual key share system of the present embodiment, user terminal and target terminal pass through interaction public key and carry out identity information Verifying, be only proved to be successful, target terminal could be unlocked using the identity information of user terminal by lock end, have structure Simple, the safe and convenient to use advantage with method.
As Fig. 1 is used for root when it is implemented, the virtual key share system of the present embodiment further includes key management apparatus User terminal identification key pair is generated according to user terminal ID, and is sent to the user terminal;It is also used to generate quilt according to by lock end ID Lock end tagged keys pair, and be sent to by lock end;It is also used to generate target terminal tagged keys pair according to target terminal ID, concurrently It send to target terminal;
User terminal, be also used to carry out received user terminal identification key pair with the key pair that itself generates it is compound, Obtain user terminal key pair;
It by lock end, is also used to be carried out received by lock end tagged keys pair with the key pair that itself generates compound, obtains By lock end key pair;
Target terminal, be also used to carry out received target terminal tagged keys pair with the key pair that itself generates it is compound, Obtain target terminal key pair.
It is to add to the public key point of cipher key pair that key pair, which carries out compound mode, and private key mould adds.
In the virtual key share system of the present embodiment, target terminal and by lock end when carrying out information transmission, do not need Third-party on-line authentication, but target terminal and information transmission is directly carried out by lock end, reduce interactive step, interaction data Amount and operand, pass through identity, the double verifying of session key, it is ensured that the safety of unlock;Offline communications module is used simultaneously It carries out target terminal and by the transmission of information between lock end, reduces whole system to the sensibility of network, improve and used Safety and reliability in journey.
When it is implemented, key management apparatus is by user terminal ID or target terminal ID or by any in lock end ID Default matrix is substituted into, which includes matrix public key and matrix private key, is respectively used to generate public key and private key, forms key It is right;User terminal key pair, target terminal mark are generated using CPK (Combined Public Key, Conbined public or double key) Encryption Algorithm Know key pair or by any of lock end tagged keys centering.CPK Encryption Algorithm specifically can be the close SM2/SM3/SM4 of state and It is any one or more in AES/DES/ECC/SHA1/SHA256, it is selected as needed.It may be implemented to surpass using these algorithms The production and distribution of extensive tagged keys can satisfy the needs of more users with the resource of very little;Also there is memory space Need less, the advantages that operational efficiency is high, processing energy is big.
When it is implemented, offline communications module is bluetooth module.Bluetooth module can be realized short distance, low-power consumption it is offline Communication has the advantages that at low cost, realization is easy, convenient for popularization.
Such as Fig. 1, the virtual key share system of the present embodiment, when it is implemented, user terminal includes user terminal public key Interactive unit, authentication information generation unit, target terminal include target terminal public key interactive unit, target terminal verifying list Member, target terminal session key generation unit, instruction edit cell, include by lock end authentication request information editing by lock end Unit, by lock end authentication unit, by lock end session key generation unit and unlocking unit, wherein
User terminal public key interactive unit, for interacting public key, and the mesh that will be obtained with target terminal public key interactive unit Mark terminal public key is sent to authentication information generation unit;
Target terminal public key interactive unit, for interacting public key, and the use that will be obtained with user terminal public key interactive unit Family terminal public key is sent to target terminal authentication request information compiling unit;
Authentication information generation unit, for generating target terminal body using target terminal public key and user terminal private key Part verification information and user terminal identity verification information, are sent to target terminal authentication unit;
Target terminal authentication unit, for being verified to received user terminal identity verification information, if being verified, Then received target terminal authentication information is sent to by lock end authentication unit;It is also used to verify received by lock end identity Whether containing preset by lock end ID in checking solicited message, and signed by lock end it is whether correct, if being locked containing preset ID is held, and is signed by lock end errorless, then the verification result being verified is sent to target terminal session key generation unit; Be also used to verify it is received by lock end session key whether containing preset by lock end ID, and whether just by lock end signature Really, it if containing preset by lock end ID, and is signed by lock end errorless, then the verification result being verified is sent to instruction and compiled Collect unit;
By lock end authentication unit, for whether verifying the user terminal private key in received target terminal authentication information It is identical as preset family terminal secret key, if they are the same, then the information being verified is sent to by lock end authentication request information Edit cell;It is also used to verify in received target terminal session key and whether contains preset target terminal ID and target Whether terminal signature is correct, if containing preset target terminal ID and errorless, the letter that will be verified of target terminal signature Breath is sent to by lock end session key generation unit;
By lock end authentication request information compiling unit, for generating quilt according to target terminal public key and by lock end private key Lock end authentication request information, and it is sent to target terminal authentication unit;
Target terminal session key generation unit, for generating random number, and according to generating random number target terminal session Key is sent to by lock end authentication unit;
By lock end session key generation unit, for generating random number, and according to generating random number by lock end session key It is sent to by target terminal authentication unit;
Edit cell is instructed, for being sent to unlocking unit according to target terminal session key editor's unlock instruction;
Unlocking unit is unlocked for unlock instruction based on the received.
Wherein, target terminal public key interactive unit, target terminal authentication unit, target terminal session key generation unit, Instruction edit cell is generated by lock end authentication request information compiling unit, by lock end authentication unit, by lock end session key Unit and unlocking unit are electrically connected with offline communications module, key management apparatus respectively with user terminal public key interactive unit, Target terminal public key interactive unit is electrically connected by lock end authentication request information compiling unit, and authentication information generates single Member is electrically connected with user terminal public key interactive unit, target terminal authentication unit respectively.Target terminal can make with user terminal It is connected with cable, radio connection can also be used, the mode of radio connection can be the side such as bluetooth, wifi, nfc, 3G, 4G Formula.Specific connection type can be selected according to demand.
Such as Fig. 2, the present embodiment additionally provides what a kind of virtual key share system based on the above embodiment was realized Virtual key sharing method, comprising the following steps:
Public key is interacted with target terminal using user terminal, and generates mesh using target terminal public key and user terminal private key Terminal identity verification information and user terminal identity verification information are marked, target terminal is sent to;
It is verified using target terminal in received user terminal identity verification information, if being verified, by band There is the target terminal authentication information of user's terminal secret key to be sent to be verified by lock end, if being verified, generates mesh Mark terminal session key is sent to be verified by lock end, if being verified, is sent out using session key editor's unlock instruction It send to by lock end;
The received target terminal authentication information with user terminal private key is verified using by lock end, if testing Card passes through, then generates using target terminal public key and by lock end private key by lock end authentication information, and be sent to target terminal It is verified, if being verified, generation is sent to target terminal by lock end session key and is verified, if being verified, The unlock instruction unlock sent according to target terminal;
Terminal is carried out using offline communications module and by the transmission of information between lock end.
The virtual key sharing method of the present embodiment, user terminal and target terminal pass through interaction public key and carry out identity information Verifying, be only proved to be successful, target terminal could be unlocked using the identity information of user terminal by lock end, have structure Simple, the safe and convenient to use advantage with method.
The virtual key sharing method of the present embodiment, further comprising the steps of:
User terminal identification key pair is generated according to user terminal ID using key management apparatus, and is sent to user's end End;It generates according to by lock end ID by lock end tagged keys pair, and is sent to by lock end;Target terminal is generated according to target terminal ID Tagged keys pair, and it is sent to target terminal;
Received user terminal identification key pair carried out using user terminal compound with the key pair that itself generates, obtained User terminal key pair;
Using being carried out with the key pair that itself generates by lock end tagged keys pair compound by received by lock end, obtain being locked Hold key pair;
Received target terminal tagged keys pair are carried out using target terminal compound with the key pair that itself generates, obtained Target terminal key pair.
It is to add to the public key point of cipher key pair that key pair, which carries out compound mode, and private key mould adds.
In the virtual key sharing method of the present embodiment, target terminal and by lock end when carrying out information transmission, do not need Third-party on-line authentication, but target terminal and information transmission is directly carried out by lock end, reduce interactive step, interaction data Amount and operand, pass through identity, the double verifying of session key, it is ensured that the safety of unlock;Offline communications module is used simultaneously It carries out target terminal and by the transmission of information between lock end, reduces entire method to the sensibility of network, improve and used Safety and reliability in journey.
When it is implemented, key management apparatus is by user terminal ID or target terminal ID or by any in lock end ID Default matrix is substituted into, which includes matrix public key and matrix private key, is respectively used to generate public key and private key, forms key It is right;User terminal key pair, target terminal mark are generated using CPK (Combined Public Key, Conbined public or double key) Encryption Algorithm Know key pair or by any of lock end tagged keys centering.CPK Encryption Algorithm specifically can be the close SM2/SM3/SM4 of state and It is any one or more in AES/DES/ECC/SHA1/SHA256, it is selected as needed.It may be implemented to surpass using these algorithms The production and distribution of extensive tagged keys can satisfy the needs of more users with the resource of very little;Also there is memory space Need less, the advantages that operational efficiency is high, processing energy is big.
When it is implemented, offline communications module is bluetooth module.Bluetooth module can be realized short distance, low-power consumption it is offline Communication has the advantages that at low cost, realization is easy, convenient for popularization.
The virtual key share system of the present embodiment, when it is implemented, user terminal includes that the interaction of user terminal public key is single Member, authentication information generation unit, target terminal includes target terminal public key interactive unit, target terminal authentication unit, mesh Mark terminal session Key generating unit, instruction edit cell, by lock end include by lock end authentication request information compiling unit, By lock end authentication unit, by lock end session key generation unit and unlocking unit, wherein
Step 100 is interacted public key with target terminal public key interactive unit using user terminal public key interactive unit, and incited somebody to action To target terminal public key be sent to authentication information generation unit;Utilize target terminal public key interactive unit and user terminal Public key interactive unit interacts public key, and obtained user terminal public key is sent to target terminal authentication request information editing Unit;
Step 200 generates mesh using target terminal public key and user terminal private key using authentication information generation unit Terminal identity verification information and user terminal identity verification information are marked, target terminal authentication unit is sent to;
Step 300 verifies received user terminal identity verification information using target terminal authentication unit, if testing Card passes through, then received target terminal authentication information is sent to by lock end authentication unit;It verifies received by lock end body Whether containing preset by lock end ID in part checking solicited message, and signed by lock end it is whether correct, if containing preset quilt Lock end ID, and signed by lock end it is errorless, then by the verification result being verified be sent to target terminal session key generate it is single Member;Verify it is received by lock end session key whether containing preset by lock end ID, and signed by lock end it is whether correct, if It containing preset by lock end ID, and is signed by lock end errorless, then it is single the verification result being verified to be sent to instruction editor Member;
Step 400 utilizes the user terminal verified in received target terminal authentication information by lock end authentication unit Whether private key is identical as preset family terminal secret key, if they are the same, then the information being verified is sent to by lock end authentication Solicited message edit cell;It verifies in received target terminal session key and whether contains preset target terminal ID and mesh Whether correct terminal signature is marked, if errorless containing preset target terminal ID and target terminal signature, by what is be verified Information is sent to by lock end session key generation unit;
Step 500, using by lock end authentication request information compiling unit according to target terminal public key and by lock end private Key is generated by lock end authentication request information, and is sent to target terminal authentication unit;
Step 600 generates random number using target terminal session key generation unit, and whole according to generating random number target End session key is sent to by lock end authentication unit;Using by lock end session key generation unit generate random number, and according to The generation of machine number is sent to by lock end session key by target terminal authentication unit;
Step 700 is sent to unlock list according to target terminal session key editor's unlock instruction using instruction edit cell Member;Using unlocking unit, unlock instruction is unlocked based on the received.
The virtual key share system and method for the present embodiment by user terminal and by lock end before use, first tie up Fixed, user terminal and target terminal first carry out public key interaction, obtain user terminal by lock end, the public key of target terminal, are locked End obtains the public key of terminal, and target terminal obtains the public key of user terminal, uses key to be encrypted, verified in order to subsequent. When specifically used, user terminal and target terminal may each be the mobile terminal that user holds, and specifically can be vapour by lock end The authentication information of oneself is utilized target terminal public key encryption first by vehicle, user terminal, and the mode of own private key signature is sent out Target terminal is given, target terminal is verified using the public key of user terminal, again by self-identity information, use after being proved to be successful Family terminal identity is sent to be verified by lock end, only verifies user terminal identity and preset user terminal ID phase by lock end Meanwhile the verifying of identity information can be just carried out with target terminal.Offline letter is carried out between mobile terminal and automobile by bluetooth Breath transmission, such as authentication information, the transmission for carrying out using session key encrypted unlock instruction.Terminal can be electricity Brain, mobile phone etc. are also possible to that the door lock etc. of information off-line transmission can be carried out using bluetooth by lock end.Termination ID can be hand Any in machine number or mobile phone factory code, can be VIN code (the Vehicle Identification of automobile by lock end ID Number, vehicle identification code).ID, which is also possible to other, can be used to identification terminal and other numbers by lock end.Bluetooth module In counter can be set, counted when offline data are transmitted for target terminal and by lock end, reach certain When number such as 65535, restarts verifying and consult session key, improve the safety and reliability of system and method.
For embodiment of the method, for simple description, therefore, it is stated as a series of action combinations, but this field Technical staff should be aware of, and embodiment of that present invention are not limited by the describe sequence of actions, because implementing according to the present invention Example, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know that, specification Described in embodiment belong to preferred embodiment, the actions involved are not necessarily necessary for embodiments of the present invention.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although Present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: it still may be used To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features; And these are modified or replaceed, technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution spirit and Range.

Claims (10)

1. a kind of virtual key share system characterized by comprising
User terminal generates target for interacting public key with target terminal, and using target terminal public key and user terminal private key Terminal identity verification information and user terminal identity verification information, are sent to target terminal;
Target terminal, if being verified, will have user for verifying to received user terminal identity verification information The target terminal authentication information of terminal secret key is sent to be verified by lock end, if being verified, generates target terminal Session key is sent to be verified by lock end, if being verified, using session key editor's unlock instruction be sent to by Lock end;
By lock end, for being verified to the received target terminal authentication information with user terminal private key, if verifying Pass through, then using target terminal public key and by lock end private key generate by lock end authentication information, and be sent to target terminal into Row verifying, if being verified, generation is sent to target terminal by lock end session key and is verified, if being verified, root The unlock instruction unlock sent according to target terminal;
Offline communications module, for terminal and by the transmission of information between lock end.
2. virtual key share system according to claim 1, which is characterized in that further include key management apparatus, be used for User terminal identification key pair is generated according to user terminal ID, and is sent to the user terminal;It is also used to generate according to by lock end ID By lock end tagged keys pair, and it is sent to by lock end;It is also used to generate target terminal tagged keys pair according to target terminal ID, and It is sent to target terminal;
User terminal, is also used to carry out received user terminal identification key pair with the key pair that itself generates compound, obtains User terminal key pair;
It by lock end, is also used to be carried out received by lock end tagged keys pair with the key pair that itself generates compound, obtains being locked Hold key pair;
Target terminal, is also used to carry out received target terminal tagged keys pair with the key pair that itself generates compound, obtains Target terminal key pair.
3. virtual key share system according to claim 2, which is characterized in that key management apparatus substitutes into ID default Matrix generates key pair using CPK Encryption Algorithm.
4. virtual key share system according to claim 3, which is characterized in that offline communications module is bluetooth module.
5. virtual key share system according to claim 4, which is characterized in that user terminal includes user terminal public key Interactive unit, authentication information generation unit, target terminal include target terminal public key interactive unit, target terminal verifying list Member, target terminal session key generation unit, instruction edit cell, include by lock end authentication request information editing by lock end Unit, by lock end authentication unit, by lock end session key generation unit and unlocking unit, wherein
User terminal public key interactive unit, for interacting public key with target terminal public key interactive unit, and obtained target is whole End public key is sent to authentication information generation unit;
Target terminal public key interactive unit, for interacting public key with user terminal public key interactive unit, and obtained user is whole End public key is sent to target terminal authentication request information compiling unit;
Authentication information generation unit is tested for generating target terminal identity using target terminal public key and user terminal private key Information and user terminal identity verification information are demonstrate,proved, target terminal authentication unit is sent to;
Target terminal authentication unit, will if being verified for verifying to received user terminal identity verification information Received target terminal authentication information is sent to by lock end authentication unit;It is also used to verify received by lock end authentication Whether containing preset by lock end ID in solicited message, and signed by lock end it is whether correct, if containing preset by lock end ID, And signed by lock end errorless, then the verification result being verified is sent to target terminal session key generation unit;Also use In verify it is received by lock end session key whether containing preset by lock end ID, and signed by lock end it is whether correct, if It containing preset by lock end ID, and is signed by lock end errorless, then it is single the verification result being verified to be sent to instruction editor Member;
By lock end authentication unit, for verify the user terminal private key in received target terminal authentication information whether in advance If family terminal secret key it is identical, if they are the same, then the information being verified is sent to by lock end authentication request information editing Unit;It is also used to verify in received target terminal session key and whether contains preset target terminal ID and target terminal It whether correct signs, if errorless containing preset target terminal I D and target terminal signature, the information being verified is sent out It send to by lock end session key generation unit;
By lock end authentication request information compiling unit, for generating according to target terminal public key and by lock end private key by lock end Authentication request information, and it is sent to target terminal authentication unit;
Target terminal session key generation unit, for generating random number, and according to generating random number target terminal session key It is sent to by lock end authentication unit;
By lock end session key generation unit, sent for generating random number, and according to generating random number by lock end session key To by target terminal authentication unit;
Edit cell is instructed, for being sent to unlocking unit according to target terminal session key editor's unlock instruction;
Unlocking unit is unlocked for unlock instruction based on the received.
6. a kind of virtual key sharing method realized based on virtual key share system described in claim 1, feature are existed In, comprising the following steps:
Public key is interacted with target terminal using user terminal, and generates target end using target terminal public key and user terminal private key Authentication information and user terminal identity verification information are held, target terminal is sent to;
It is verified using target terminal in received user terminal identity verification information, it, will be with useful if being verified The target terminal authentication information of family terminal secret key is sent to be verified by lock end, if being verified, generates target end End session key is sent to be verified by lock end, if being verified, is sent to using session key editor's unlock instruction By lock end;
The received target terminal authentication information with user terminal private key is verified using by lock end, if verifying is logical It crosses, then generates using target terminal public key and by lock end private key by lock end authentication information, and be sent to target terminal progress Verifying, if being verified, generation is sent to target terminal by lock end session key and is verified, if being verified, basis The unlock instruction unlock that target terminal is sent;
Terminal is carried out using offline communications module and by the transmission of information between lock end.
7. virtual key sharing method according to claim 6, which is characterized in that further comprising the steps of:
User terminal identification key pair is generated according to user terminal ID using key management apparatus, and is sent to the user terminal;Root It generates according to by lock end ID by lock end tagged keys pair, and is sent to by lock end;Target terminal mark is generated according to target terminal ID Key pair, and it is sent to target terminal;
Received user terminal identification key pair carried out using user terminal compound with the key pair that itself generates, obtains user Terminal key pair;
Using being carried out with the key pair that itself generates by lock end tagged keys pair compound by received by lock end, obtain close by lock end Key pair;
Received target terminal tagged keys pair are carried out using target terminal compound with the key pair that itself generates, obtains target Terminal key pair.
8. virtual key sharing method according to claim 7, which is characterized in that key management apparatus substitutes into ID default Matrix generates key pair using CPK Encryption Algorithm.
9. virtual key sharing method according to claim 8, which is characterized in that offline communications module is bluetooth module.
10. virtual key sharing method according to claim 9, which is characterized in that user terminal includes user terminal public affairs Key interactive unit, authentication information generation unit, target terminal include target terminal public key interactive unit, target terminal verifying Unit, target terminal session key generation unit, instruction edit cell, include being compiled by lock end authentication request information by lock end Volume unit, by lock end authentication unit, by lock end session key generation unit and unlocking unit, wherein
Public key, and the target terminal that will be obtained are interacted with target terminal public key interactive unit using user terminal public key interactive unit Public key is sent to authentication information generation unit;
Public key, and the user terminal that will be obtained are interacted with user terminal public key interactive unit using target terminal public key interactive unit Public key is sent to target terminal authentication request information compiling unit;
Target terminal identity is generated using target terminal public key and user terminal private key using authentication information generation unit to test Information and user terminal identity verification information are demonstrate,proved, target terminal authentication unit is sent to;
Received user terminal identity verification information is verified using target terminal authentication unit, it, will if being verified Received target terminal authentication information is sent to by lock end authentication unit;It verifies and received is believed by lock end authentication request Whether containing preset by lock end ID in breath, and signed by lock end it is whether correct, if containing preset by lock end ID, and by Lock end signature is errorless, then the verification result being verified is sent to target terminal session key generation unit;It verifies received It is preset by lock end ID by whether containing in lock end session key and whether correct by lock end signature, if containing preset quilt Lock end ID, and signed by lock end errorless, then the verification result being verified is sent to instruction edit cell;
Using the user terminal private key verified by lock end authentication unit in received target terminal authentication information whether in advance If family terminal secret key it is identical, if they are the same, then the information being verified is sent to by lock end authentication request information editing Unit;Whether verify to sign containing preset target terminal ID and target terminal in received target terminal session key is It is no correct, if errorless containing preset target terminal ID and target terminal signature, by the information being verified be sent to by Lock end session key generation unit;
It generates using by lock end authentication request information compiling unit according to target terminal public key and by lock end private key by lock end Authentication request information, and it is sent to target terminal authentication unit;
Random number is generated using target terminal session key generation unit, and is sent out according to generating random number target terminal session key It send to by lock end authentication unit;
Random number is generated using by lock end session key generation unit, and is sent to according to generating random number by lock end session key By target terminal authentication unit;
Unlocking unit is sent to according to target terminal session key editor's unlock instruction using instruction edit cell;
Using unlocking unit, unlock instruction is unlocked based on the received.
CN201811105961.3A 2018-09-21 2018-09-21 Virtual key sharing system and method Active CN109067548B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811105961.3A CN109067548B (en) 2018-09-21 2018-09-21 Virtual key sharing system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811105961.3A CN109067548B (en) 2018-09-21 2018-09-21 Virtual key sharing system and method

Publications (2)

Publication Number Publication Date
CN109067548A true CN109067548A (en) 2018-12-21
CN109067548B CN109067548B (en) 2021-10-22

Family

ID=64763350

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811105961.3A Active CN109067548B (en) 2018-09-21 2018-09-21 Virtual key sharing system and method

Country Status (1)

Country Link
CN (1) CN109067548B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109895734A (en) * 2019-01-29 2019-06-18 上海博泰悦臻网络技术服务有限公司 Authorized bluetooth key Activiation method and system, storage medium and T-BOX
CN110167021A (en) * 2019-04-29 2019-08-23 江苏大学 A kind of Vehicular virtual key is realized and communication means
CN110766834A (en) * 2019-10-31 2020-02-07 上海博泰悦臻网络技术服务有限公司 Vehicle-mounted intelligent computing device and management and maintenance method of vehicle Bluetooth key
CN111065081A (en) * 2019-12-30 2020-04-24 上海博泰悦臻网络技术服务有限公司 Bluetooth-based information interaction method and device
CN111200807A (en) * 2019-12-30 2020-05-26 上海博泰悦臻网络技术服务有限公司 Bluetooth-based information interaction method and device
CN114120498A (en) * 2022-01-27 2022-03-01 云丁网络技术(北京)有限公司 Method and related device for migrating data
CN114401515A (en) * 2022-03-25 2022-04-26 斯润天朗(北京)科技有限公司 Method for controlling vehicle based on digital key
CN115675361A (en) * 2022-11-30 2023-02-03 成都赛力斯科技有限公司 Cabin state adjusting method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105788037A (en) * 2014-12-26 2016-07-20 比亚迪股份有限公司 Vehicle intelligent key authorization system and method
CN108248548A (en) * 2018-01-08 2018-07-06 东南(福建)汽车工业有限公司 A kind of long-range method and device for sharing automobile key
CN108573550A (en) * 2017-03-09 2018-09-25 丰田自动车株式会社 It locks and system for unlocking and key unit

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105788037A (en) * 2014-12-26 2016-07-20 比亚迪股份有限公司 Vehicle intelligent key authorization system and method
CN108573550A (en) * 2017-03-09 2018-09-25 丰田自动车株式会社 It locks and system for unlocking and key unit
CN108248548A (en) * 2018-01-08 2018-07-06 东南(福建)汽车工业有限公司 A kind of long-range method and device for sharing automobile key

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109895734A (en) * 2019-01-29 2019-06-18 上海博泰悦臻网络技术服务有限公司 Authorized bluetooth key Activiation method and system, storage medium and T-BOX
CN109895734B (en) * 2019-01-29 2021-11-02 上海博泰悦臻网络技术服务有限公司 Authorized Bluetooth key activation method and system, storage medium and T-BOX
CN110167021A (en) * 2019-04-29 2019-08-23 江苏大学 A kind of Vehicular virtual key is realized and communication means
CN110766834A (en) * 2019-10-31 2020-02-07 上海博泰悦臻网络技术服务有限公司 Vehicle-mounted intelligent computing device and management and maintenance method of vehicle Bluetooth key
CN110766834B (en) * 2019-10-31 2023-09-26 上海博泰悦臻网络技术服务有限公司 Vehicle-mounted intelligent computing device and vehicle Bluetooth key management and maintenance method
CN111065081A (en) * 2019-12-30 2020-04-24 上海博泰悦臻网络技术服务有限公司 Bluetooth-based information interaction method and device
CN111200807A (en) * 2019-12-30 2020-05-26 上海博泰悦臻网络技术服务有限公司 Bluetooth-based information interaction method and device
CN111200807B (en) * 2019-12-30 2024-03-29 上海博泰悦臻网络技术服务有限公司 Bluetooth-based information interaction method and device
CN114120498A (en) * 2022-01-27 2022-03-01 云丁网络技术(北京)有限公司 Method and related device for migrating data
CN114401515A (en) * 2022-03-25 2022-04-26 斯润天朗(北京)科技有限公司 Method for controlling vehicle based on digital key
CN114401515B (en) * 2022-03-25 2022-08-12 斯润天朗(北京)科技有限公司 Method for controlling vehicle based on digital key
CN115675361A (en) * 2022-11-30 2023-02-03 成都赛力斯科技有限公司 Cabin state adjusting method and system

Also Published As

Publication number Publication date
CN109067548B (en) 2021-10-22

Similar Documents

Publication Publication Date Title
CN109067549A (en) Virtual key two-way authentication system and method
CN109067548A (en) Virtual key share system and method
Dorri et al. Blockchain: A distributed solution to automotive security and privacy
CN112055952B (en) Vehicle-mounted equipment upgrading method and related equipment
CN110336774B (en) Mixed encryption and decryption method, equipment and system
CN109379369A (en) Single-point logging method, device, server and storage medium
CN109005538B (en) Message authentication method between unmanned vehicle and multi-mobile-edge computing server
CN110381075B (en) Block chain-based equipment identity authentication method and device
CN109039628A (en) Cryptographic key negotiation method, Cloud Server, equipment, storage medium and system
CN113965328B (en) Authority transfer method and system for digital key offline condition of trusted execution environment
US11228453B2 (en) Secure provisioning of electronic lock controllers
CN113114699A (en) Vehicle terminal identity certificate application method
CN112165382A (en) Software authorization method and device, authorization server and terminal equipment
CN109617675A (en) Both sides' identification authentication method and system between a kind of charge-discharge facility and user terminal
CN114696998B (en) Identity authentication method, device and system
CN102546172A (en) Access control method of intelligent card, intelligent card, terminal and system
Hou et al. Lightweight and privacy-preserving charging reservation authentication protocol for 5G-V2G
CN111786785B (en) Block chain-based power distribution Internet of things node switching method and device
CN115378681A (en) Cross-domain identity authentication method, system and equipment based on block chain
CN110266653A (en) A kind of method for authenticating, system and terminal device
CN114666040A (en) Radio frequency identification authentication system and method based on quantum cryptography network
CN113591103A (en) Identity authentication method and system between intelligent terminals of power internet of things
Shi et al. QKBAKA: A Quantum-Key-Based Authentication and Key Agreement Scheme for Internet of Vehicles
CN109547404A (en) The acquisition methods and server of data
CN112738751B (en) Wireless sensor access authentication method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Luo Yanjing

Inventor after: Liu Peng

Inventor before: Luo Yanjing

GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: A1501, 15 / F, No. 22, Zhongguancun Street, Haidian District, Beijing 100089

Patentee after: Beijing xinchangcheng Technology Development Co.,Ltd.

Address before: 100080 room 1505, 15 / F, block B, 3 Haidian Street, Haidian District, Beijing

Patentee before: BEIJING RENXINZHENG TECHNOLOGY CO.,LTD.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20231101

Address after: A1501, 15 / F, No. 22, Zhongguancun Street, Haidian District, Beijing 100089

Patentee after: Beijing xinchangcheng Technology Development Co.,Ltd.

Patentee after: Xinchangcheng (Shanghai) Technology Co.,Ltd.

Address before: A1501, 15 / F, No. 22, Zhongguancun Street, Haidian District, Beijing 100089

Patentee before: Beijing xinchangcheng Technology Development Co.,Ltd.

CP03 Change of name, title or address

Address after: 738, 7th Floor, Building 10, No. 6, 8, 10, 12, 16, 18 Xuanwumen Outer Street, Xicheng District, Beijing 100053

Patentee after: Beijing xinchangcheng Technology Development Co.,Ltd.

Country or region after: China

Patentee after: Xinchangcheng (Shanghai) Technology Co.,Ltd.

Address before: A1501, 15 / F, No. 22, Zhongguancun Street, Haidian District, Beijing 100089

Patentee before: Beijing xinchangcheng Technology Development Co.,Ltd.

Country or region before: China

Patentee before: Xinchangcheng (Shanghai) Technology Co.,Ltd.