CN110111472A - Vehicle key control method and device - Google Patents
Vehicle key control method and device Download PDFInfo
- Publication number
- CN110111472A CN110111472A CN201910410316.0A CN201910410316A CN110111472A CN 110111472 A CN110111472 A CN 110111472A CN 201910410316 A CN201910410316 A CN 201910410316A CN 110111472 A CN110111472 A CN 110111472A
- Authority
- CN
- China
- Prior art keywords
- key
- request
- nfc
- information
- vehicle end
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/24—Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00412—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
- G07C2009/00825—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Mechanical Engineering (AREA)
- Computer Networks & Wireless Communication (AREA)
- Lock And Its Accessories (AREA)
Abstract
The embodiment of the application provides a vehicle key control method and device, and the method comprises the following steps: receiving a key generation request sent by a read-write client; the key generation request comprises key information corresponding to the NFC entity key and a vehicle identifier; generating a service key corresponding to the key information and the vehicle identifier; the key information comprises a key identification corresponding to the NFC entity key; packaging the key identification and the service key into an encryption instruction, and sending the encryption instruction to the read-write client so as to write the NFC entity key in the read-write client; and generating key information corresponding to the key identification and the service key, and sending the key information to the vehicle end corresponding to the vehicle identification so as to synchronize to a white list of the NFC security module in the vehicle end. Through this application embodiment, realized the control to NFC entity key, solved the condition that can't carry out high in the clouds management to entity key, promoted convenience, the security of entity key control.
Description
Technical field
This application involves automotive fields, more particularly to the control method and device of a kind of car key.
Background technique
With the development of science and technology, automobile has become the vehicles that cannot lack in life, in the use of automobile
In the process, it to use key to carry out out/lock door, start/and close the operation such as engine, existing automobile key usually has machinery
Key, integral remote-controlled key etc..
Mechanical key, also referred to as blade key are only used for basic enabling and lock a door function, and integral remote-controlled key, are
It is made of blade key and chip key, due to increasing chip key, improves blade key anti-theft, and can also use
Chip key carries out whistle and looks for the functions such as vehicle, but can not be both managed by cloud, and there is the big carrying of volume not
Just the problem of.
Summary of the invention
In view of the above problems, it proposes in order to provide overcoming the above problem or at least being partially solved the one of the above problem
The control method and device of kind car key, comprising:
A kind of control method of car key is related to NFC physical key, read-write client, Service Provider Platform, Yi Jiche
End, which comprises
It receives the key that the read-write client is sent and generates request;Wherein, it includes the NFC that the key, which generates request,
The corresponding key information of physical key and a vehicles identifications;
Generate business cipher key corresponding with the key information and the vehicles identifications;Wherein, the key information includes
The corresponding key identification of the NFC physical key;
The key identification and the business cipher key are packaged as encrypted instruction, and are sent to the read-write client, with
The NFC physical key is written by the read-write client;
Key information corresponding with the key identification and the business cipher key is generated, and is sent to the vehicles identifications pair
In the vehicle end answered, to be synchronized to the white list of NFC security module in the vehicle end.
Optionally, the NFC physical key is numbered with a key, the method also includes:
Receive key controller request;Wherein, the key controller request includes that the key is numbered;
Determine that the key numbers corresponding key identification and vehicles identifications;
It is requested according to the key controller, controls NFC security module in the corresponding vehicle end of the vehicles identifications and update institute
State the key information in white list.
Optionally, the method further relates to user terminal, and the user terminal is deployed with and the Service Provider Platform
Corresponding first application, the key controller request include the request that first application is sent.
Optionally, it is requested described according to the key controller, controls NFC in the corresponding vehicle end of the vehicles identifications and pacify
Before the step of full module updates the key information in the white list, further includes:
Verify whether active user is the corresponding car owner user of the vehicles identifications or administrator;
When the active user is car owner user or administrator, execution is described to request according to the key controller,
Control the step of NFC security module updates the key information in the white list in the corresponding vehicle end of the vehicles identifications.
Optionally, further includes:
When receiving the response message that the vehicle end is reported for key controller request, by the NFC entity
Key identification is that the key controller requests corresponding state of a control;
To one control completion notice of user terminal feedback.
Optionally, the key controller request includes reporting the loss request, described to be requested according to the key controller, described in control
The step of NFC security module updates the key information in the white list in the corresponding vehicle end of vehicles identifications include:
The corresponding loss reporting command of request is reported the loss described in generation;
The loss reporting command is sent to the vehicle end, it is corresponding in the white list, to remove the key identification
Key information.
Optionally, the key controller request includes locking request, described to be requested according to the key controller, described in control
The step of NFC security module updates the key information in the white list in the corresponding vehicle end of vehicles identifications include:
Generate the corresponding lock instruction of the locking request;
The lock instruction is sent to the vehicle end, it is in the white list, the key identification is corresponding
Key information is set as locking mark;Wherein, in the case where setting locking mark, the control vehicle of the NFC physical key
Function is limited.
Optionally, the key controller request includes unlocking request, described to be requested according to the key controller, described in control
The step of NFC security module updates the key information in the white list in the corresponding vehicle end of vehicles identifications include:
Generate the corresponding unlock instruction of the unlocking request;
The vehicle end is sent to by the unlock is specified, it is in the white list, the key identification is corresponding
Key information is set as unlock mark;Wherein, in the case where setting unlock mark, the control vehicle of the NFC physical key
Function is resumed.
Optionally, the key controller request includes validity period setting request, and the validity period setting request further includes having
Effect phase information, it is described to be requested according to the key controller, control in the corresponding vehicle end of the vehicles identifications NFC security module more
The step of key information in the new white list includes:
It generates the validity period setting and requests corresponding validity period setting instruction;
Validity period setting instruction is sent to the vehicle end, in the white list, using the validity period
Information update key information.
Optionally, the key controller request includes permission control request, and the permission control request further includes permission letter
Breath, it is described to be requested according to the key controller, it controls in the corresponding vehicle end of the vehicles identifications described in the update of NFC security module
The step of key information in white list includes:
It generates the permission control and requests corresponding permission control instruction;
The permission control instruction is sent to the vehicle end, in the white list, using the authority information
Update key information.
A kind of control device of car key is related to NFC physical key, read-write client, Service Provider Platform, Yi Jiche
End, described device includes:
Key generates request receiving module, generates request for receiving the key that the read-write client is sent;Wherein, institute
Stating key and generating request includes the corresponding key information of the NFC physical key and a vehicles identifications;
Business cipher key generation module, for generating business cipher key corresponding with the key information and the vehicles identifications;
Wherein, the key information includes the corresponding key identification of the NFC physical key;
Encrypted instruction sending module, for the key identification and the business cipher key to be packaged as encrypted instruction, concurrently
It send to the read-write client, the NFC physical key is written by the read-write client;
Key information sending module, for generating key information corresponding with the key identification and the business cipher key,
And be sent in the corresponding vehicle end of the vehicles identifications, to be synchronized to the white list of NFC security module in the vehicle end.
Optionally, the NFC physical key is numbered with a key, described device further include:
Key controller request receiving module, for receiving key controller request;Wherein, the key controller request includes institute
State key number;
Determining module is identified, for determining that the key numbers corresponding key identification and vehicles identifications;
Key information update module controls the corresponding vehicle of the vehicles identifications for requesting according to the key controller
NFC security module updates the key information in the white list in end.
Optionally, described device further relates to user terminal, and the user terminal is deployed with and the Service Provider Platform
Corresponding first application, the key controller request include the request that first application is sent.
Optionally, further includes:
Subscriber authentication module, for verifying whether active user is the corresponding car owner user of the vehicles identifications or administrator
User;When the active user is car owner user or administrator, the key information update module is called.
Optionally, further includes:
State of a control mark module, for working as the response for receiving the vehicle end and reporting for key controller request
When message, the NFC physical key is identified as the key controller and requests corresponding state of a control;
Feedback module is completed in control, for controlling completion notice to user terminal feedback one.
Optionally, the key controller request includes reporting the loss request, and the key information update module includes:
Loss reporting command generates submodule, requests corresponding loss reporting command for generating described report the loss;
Loss reporting command sending submodule, for the loss reporting command to be sent to the vehicle end, in the white list
In, remove the corresponding key information of the key identification.
Optionally, the key controller request includes locking request, and the key information update module includes:
Lock instruction generates submodule, for generating the corresponding lock instruction of the locking request;
Lock instruction sending submodule, for the lock instruction to be sent to the vehicle end, in the white list
In, locking mark is set by the corresponding key information of the key identification;Wherein, in the case where setting locking mark, institute
The control vehicle functions for stating NFC physical key are limited.
Optionally, the key controller request includes unlocking request, and the key information update module includes:
Unlocking request generates submodule, for generating the corresponding unlock instruction of the unlocking request;
Unlocking request sending submodule is sent to the vehicle end for specifying the unlock, in the white list
In, unlock mark is set by the corresponding key information of the key identification;Wherein, in the case where setting unlock mark, institute
The control vehicle functions for stating NFC physical key are resumed.
Optionally, the key controller request includes validity period setting request, and the validity period setting request further includes having
Effect phase information, the key information update module include:
Validity period setting instruction generates submodule, requests corresponding validity period setting to refer to for generating the validity period setting
It enables;
Validity period setting instruction sending submodule, for validity period setting instruction to be sent to the vehicle end, with
In the white list, using the validity period information update key information.
Optionally, the key controller request includes permission control request, and the permission control request further includes permission letter
Breath, the key information update module include:
Permission control instruction generates submodule, requests corresponding permission control instruction for generating the permission control;
Permission control instruction sending submodule, for the permission control instruction to be sent to the vehicle end, in institute
It states in white list, key information is updated using the authority information.
A kind of vehicle, including processor, memory and be stored on the memory and can transport on the processor
Capable computer program, the computer program realize the control method of car key as described above when being executed by the processor
The step of.
A kind of computer readable storage medium stores computer program, the meter on the computer readable storage medium
The step of calculation machine program realizes the control method of car key as described above when being executed by processor.
The embodiment of the present application has the advantage that
In the embodiment of the present application, request is generated by receiving the key that read-write client is sent, key generates request packet
The corresponding key information of NFC physical key and a vehicles identifications are included, it is close to generate business corresponding with key information and vehicles identifications
Key, key information include the corresponding key identification of NFC physical key, and key identification and business cipher key are packaged as encrypted instruction,
And it is sent to read-write client, NFC physical key is written by read-write client, generate and key identification and business cipher key pair
The key information answered, and be sent in the corresponding vehicle end of vehicles identifications, to be synchronized to the white name of NFC security module in vehicle end
It is single, the control to NFC physical key is realized, the case where can not carrying out cloud management to physical key is solved, improves reality
The convenience of body key controller, safety.
Detailed description of the invention
It, below will be to attached needed in the description of the present application in order to illustrate more clearly of the technical solution of the application
Figure is briefly described, it should be apparent that, the drawings in the following description are only some examples of the present application, for this field
For those of ordinary skill, without any creative labor, it can also be obtained according to these attached drawings other attached
Figure.
Fig. 1 is a kind of step flow chart of the control method for car key that one embodiment of the application provides;
Fig. 2 is a kind of structural schematic diagram of the control system for car key that one embodiment of the application provides;
Fig. 3 is the step flow chart of the control method for another car key that one embodiment of the application provides;
Fig. 4 is a kind of structural schematic diagram of the control device for car key that one embodiment of the application provides.
Specific embodiment
In order to make the above objects, features, and advantages of the present application more apparent, with reference to the accompanying drawing and it is specific real
Applying mode, the present application will be further described in detail.Obviously, described embodiment is some embodiments of the present application, without
It is whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not before making creative work
Every other embodiment obtained is put, shall fall in the protection scope of this application.
Referring to Fig.1, a kind of step flow chart of the control method of car key of one embodiment of the application offer is provided, it should
Method can be related to NFC (NearField Communication, near-field communication) physical key, read-write client, service offer
Quotient's (SP, Service Provider) platform and vehicle end.
Such as Fig. 2, NFC physical key 201 can be communicated with read-write client 202, and read-write client 202 can be with clothes
Business provider's platform 203 is communicated, and Service Provider Platform 203 can also be communicated with vehicle end 204.
Wherein, NFC physical key can be the key with NFC chip, can be card key, or other
The physical key of form is such as embedded in a NFC chip in integral remote-controlled key, can be made by third-party vendor.For
The NFC physical key of key is not written, i.e. " white card ", surface can be imprinted with unique key number, internal NFC chip
With unique chip identification, and memory block has unique key identification (NFC_Card_ID).
Read-write client may include the visitor of read-write equipment and the deployment being connected with the read-write equipment on computer terminals
Family end program, client-side program are connected by network with Service Provider Platform.
Service Provider Platform can be communicated with vehicle end, be provided with SP TSM (Trusted Service
Management, trusted service management) server.
Vehicle end is deployed in vehicle side, can have NFC security module, and NFC security module can be used as the lock core of vehicle,
Can integrate inside it safety chip (SE, Secure Element), and NFC security module can be deployed in vehicle side
NFC inductor is connected with communication module, and NFC security module can be led to by communication module and Service Provider Platform
Letter, when NFC physical key is close to NFC inductor, NFC inductor can carry out reading data, Jin Eryu for NFC physical key
The data stored in NFC security module are verified.
Specifically, may include steps of:
Step 101, it receives the key that the read-write client is sent and generates request;Wherein, the key generates request packet
Include the corresponding key information of the NFC physical key and a vehicles identifications;
When needing that key is written to NFC physical key, NFC physical key can be in contact with read-write equipment, be read and write
Equipment can scan the corresponding key information of NFC physical key, as the key marked in NFC physical key is numbered, NFC chip
Chip identification, and the key identification of storage.
After scanning key information, it can be shown by client-side program in terminal or other mobile terminals
Show, user can input or scan the vehicles identifications of vehicle to be bound, such as Vehicle Identify Number (VIN, Vehicle
IdentificationNumber), vehicles identifications can be generated in client-side program and the corresponding key of key information generates request,
And key is generated into request and is sent to Service Provider Platform, Service Provider Platform can receive key and generate request.
Step 102, business cipher key corresponding with the key information and the vehicles identifications is generated;Wherein, the key
Information includes the corresponding key identification of the NFC physical key;
After receiving key and generating request, Service Provider Platform be can be generated a business cipher key (Key_Card), and
It can store the corresponding relationship of key information, vehicles identifications and business cipher key, that is, establish NFC physical key and vehicle end
Incidence relation.
Specifically, business cipher key can be by AES (Advanced Encryption Standard, Advanced Encryption Standard)
128 algorithms, combining encryption machine generate, and can be used for carrying out response challenge with the NFC security module of vehicle end, complete key mirror
Power.
Step 103, the key identification and the business cipher key are packaged as encrypted instruction, and are sent to the read-write visitor
Family end, the NFC physical key is written by the read-write client;
It, can be by TSM server in Service Provider Platform, by key identification and business cipher key after generating business cipher key
It is packaged as the encrypted instruction based on APDU (ApplicationProtocolDataUnit, Application Protocol Data Unit), then will
The encrypted instruction is sent to read-write client.
After receiving encrypted instruction, reading and writing client-side program in client can be by read-write equipment by the encrypted instruction
NFC physical key is written, there is Applet component in NFC physical key, business cipher key can be carried out using Applet component
Burning, then NFC physical key and vehicle end binding are completed.
Step 104, key information corresponding with the key identification and the business cipher key is generated, and is sent to the vehicle
In the corresponding vehicle end of mark, to be synchronized to the white list of NFC security module in the vehicle end.
After the completion of binding, key identification and business cipher key can be organized into key information by service supplier's platform, will
Key information is sent to vehicle end, and the key information can be stored in white list by NFC security module in vehicle end, completes
The activation of NFC physical key, then key is in initiate mode.
After activating NFC physical key, when NFC physical key is close to vehicle end, the two can carry out near-field communication, then may be used
To be verified by vehicle end to NFC physical key, after being verified, it can be unlocked in vehicle end, start engine
Deng operation, specific verifying is as follows:
1, whether the corresponding key identification of verifying NFC physical key is in white list;
2, whether effective the corresponding token of key identification (Token) information in white list is verified;
3, random number challenge response is carried out by interim conversation key, verifies business cipher key.
When verifying key identification in white list, token information effectively and business cipher key be verified, then determine vehicle end
NFC physical key is verified.
In the embodiment of the present application, request is generated by receiving the key that read-write client is sent, key generates request packet
The corresponding key information of NFC physical key and a vehicles identifications are included, it is close to generate business corresponding with key information and vehicles identifications
Key, key information include the corresponding key identification of NFC physical key, and key identification and business cipher key are packaged as encrypted instruction,
And it is sent to read-write client, NFC physical key is written by read-write client, generate and key identification and business cipher key pair
The key information answered, and be sent in the corresponding vehicle end of vehicles identifications, to be synchronized to the white name of NFC security module in vehicle end
It is single, the control to NFC physical key is realized, the case where can not carrying out cloud management to physical key is solved, improves reality
The convenience of body key controller, safety.
Referring to Fig. 3, the step flow chart of the control method of another car key of one embodiment of the application offer is shown,
It can specifically include following steps:
Step 301, key controller request is received;Wherein, the key controller request includes that the key is numbered;
After activating NFC physical key, since NFC physical key is numbered with a key, it can number and give birth to according to key
It is requested at key controller, Service Provider Platform can receive key controller request.
In one embodiment of the application, this method can also relate to user terminal, and user terminal can be deployed with and service
Corresponding first application of provider's platform, then key controller request may include the request that the first application is sent, and detailed process is such as
Under:
1, it opens first to apply, and the input key number in the first application, and then can add in the first application should
NFC physical key;
2, in the key that active user's triggering controls NFC physical key, then identity is carried out to active user and tested
Card, such as issues identifying code to the corresponding car owner of NFC physical key/administrator's phone, inputs identifying code by active user and tests
Card for another example can also input car owner/administrator ID card No. (latter six) by active user, by the ID card No. of input
It is compared with the ID card No. of pre-acquired;
3, after authentication passes through, the first application can be generated key and number corresponding key controller request, and send
To service supplier's platform.
It is of course also possible to which the first application is not used to carry out key controller, active user can directly send a telegraph after-sale service,
After carrying out authentication, key controller request is sent from background end to service supplier's platform.
Step 302, determine that the key numbers corresponding key identification and vehicles identifications;
Due to storing the incidence relation with NFC physical key and vehicle end during activating NFC physical key, then
Key can be searched in Service Provider Platform and number corresponding key identification, and can search key number binding vehicle end
Vehicles identifications.
Certainly, key controller request can also directly carrying keys identify, then can be directly from key controller request really
Key identification is determined, without being searched in platform.
Step 303, it is requested according to the key controller, controls the safe mould of NFC in the corresponding vehicle end of the vehicles identifications
Block updates the key information in the white list.
After determining key identification and vehicles identifications, can in the NFC security module of vehicle end, update white list in
The corresponding key information of key identification as updated token information in key information, and then may be implemented by updating vehicle end
" lock core " controls NFC physical key.
In one example, if vehicle end is since network cause is in off-line state, if platform ping was operated in 10 seconds, vehicle
End then determines that vehicle end is in off-line state without response, active synchronization can update key information after networking vehicle end next time,
Complete key controller.
In one embodiment of the application, key controller request may include reporting the loss request, then step 303 may include as follows
Sub-step:
The corresponding loss reporting command of request is reported the loss described in generation;The loss reporting command is sent to the vehicle end, in institute
It states in white list, removes the corresponding key information of the key identification.
After receiving and reporting the loss request, which can be recorded as having reported the loss by Service Provider Platform, write-in
In car key blacklist, and it can be generated and report the loss the corresponding loss reporting command of request, loss reporting command may include key identification, then
Loss reporting command can be sent to vehicle end.
After receiving loss reporting command, vehicle end it is corresponding can to search key identification in the white list of NFC security module
Key information, then can remove the corresponding key information of key identification, then key be in reported the loss state, can not be further
It uses.
In one embodiment of the application, key controller request may include locking request, then step 303 may include as follows
Sub-step:
Generate the corresponding lock instruction of the locking request;The lock instruction is sent to the vehicle end, in institute
It states in white list, sets locking mark for the corresponding key information of the key identification.
After receiving locking request, the corresponding lock instruction of locking request is can be generated in Service Provider Platform, locking
Instruction may include key identification, then lock instruction can be sent to vehicle end.
After receiving lock instruction, vehicle end it is corresponding can to search key identification in the white list of NFC security module
Key information, then can in the Token information of key information, be set as locking mark, such as the value of relevant field is had
" 1 " is updated to " 0 ", then key is in locked state, in the case where setting locking mark, the control vehicle of NFC physical key
Function is limited.
In one example, due to a variety of vehicle control permissions, such as unlocking vehicle permission, locking vehicle permission, starting
Vehicle permission, automatic Pilot permission etc., then locking mark can be corresponding with vehicle control permission, and such as locking mark A characterization is all
Vehicle control permission is all limited, and locking mark B characterization part control vehicle control permission is limited, such as automatic Pilot permission quilt
Limitation.
In one embodiment of the application, key controller request may include unlocking request, then step 303 may include as follows
Sub-step:
Generate the corresponding unlock instruction of the unlocking request;The unlock is specified and is sent to the vehicle end, in institute
It states in white list, sets unlock mark for the corresponding key information of the key identification.
After receiving unlocking request, the corresponding unlock instruction of unlocking request is can be generated in Service Provider Platform, unlock
Instruction may include key identification, then unlock instruction can be sent to vehicle end.
After receiving unlock instruction, vehicle end it is corresponding can to search key identification in the white list of NFC security module
Key information, then can in the Token information of key information, be set as unlock mark, such as the value of relevant field is had
" 0 " is updated to " 1 ", then key reverts to initiate mode, in the case where setting unlock mark, the control of NFC physical key
Vehicle functions are resumed.
In one embodiment of the application, key controller request may include validity period setting request, validity period setting request
It can also include validity period information, it is effective in a length of 100 hours when vehicle travels that NFC physical key is such as set, alternatively, being arranged
For NFC physical key in VMT Vehicle-Miles of Travel to be effective in 1000KM, validity period information can also be a fix information, such as be arranged
Before the year two thousand twenty January 1 effectively, then step 303 may include following sub-step to NFC physical key:
It generates the validity period setting and requests corresponding validity period setting instruction;Validity period setting instruction is sent to
The vehicle end, in the white list, using the validity period information update key information.
After receiving validity period setting request, validity period setting request, which can be generated, in Service Provider Platform corresponding has
The setting instruction of effect phase, validity period setting instruction may include key identification and validity period information, then can will be arranged validity period
Instruction is sent to vehicle end.
After receiving validity period setting instruction, vehicle end can search key mark in the white list of NFC security module
Know corresponding key information, then can use validity period information, be updated, then exist in the Token information of key information
When the current time limit is more than the time limit in validity period information, key is in state out of date, can not further use.
In one embodiment of the application, key controller request may include permission control request, and permission control request may be used also
To include authority information, such as unlock vehicle permission, locking vehicle permission, starting vehicle permission, then step 303 may include as
Lower sub-step:
It generates the permission control and requests corresponding permission control instruction;The permission control instruction is sent to the vehicle
End updates key information using the authority information in the white list.
After receiving permission control request, Service Provider Platform can be generated permission control and request corresponding permission control
System instruction, permission control instruction may include key identification and authority information, then permission control instruction can be sent to vehicle
End.
After receiving permission control instruction, vehicle end can search key identification in the white list of NFC security module
Then corresponding key information can use authority information, be updated in the token information of key information.
In one embodiment of the application, before step 303, it can also include the following steps:
Verify whether active user is the corresponding car owner user of the vehicles identifications or administrator;In the current use
When family is car owner user or administrator, step 303 is executed.
Before carrying out vehicle control, service management platform can verify whether active user is the corresponding vehicle of vehicles identifications
Primary user or administrator are not car owner user or administrator in active user, then without subsequent vehicle control
Process then allows to carry out subsequent vehicle control process when active user is car owner user or administrator.
For example, identifying code can be issued to the corresponding car owner of NFC physical key/administrator's phone, is inputted and verified by user
Code is verified, and for another example car owner/administrator ID card No. (latter six) can also be inputted by user, by the identity card of input
Number is compared with ID card No. gathered in advance.
In one embodiment of the application, it can also include the following steps:
When receiving the response message that the vehicle end is reported for key controller request, by the NFC entity
Key identification is that the key controller requests corresponding state of a control;To one control completion notice of user terminal feedback.
After vehicle end updates key information success, a response message can be fed back to Service Provider Platform, service mentions
NFC physical key is identified as key controller for quotient's platform and requests corresponding state of a control, such as lock state, reports the loss state.
After updating state of a control, Service Provider Platform can feed back a control completion notice, user to user terminal
First applies the corresponding status information of update NFC physical key in display interface in terminal, alternatively, can also pass through short message etc.
Mode is to car owner's feedback control completion notice.
It should be noted that for simple description, therefore, it is stated as a series of action groups for embodiment of the method
It closes, but those skilled in the art should understand that, the embodiment of the present application is not limited by the described action sequence, because according to
According to the embodiment of the present application, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art also should
Know, the embodiments described in the specification are all preferred embodiments, and related movement not necessarily the application is implemented
Necessary to example.
Referring to Fig. 4, a kind of structural schematic diagram of the control device of car key of one embodiment of the application offer is provided, is related to
And NFC physical key, read-write client, Service Provider Platform and vehicle end, it can specifically include following module:
Key generates request receiving module 401, generates request for receiving the key that the read-write client is sent;Its
In, it includes the corresponding key information of the NFC physical key and a vehicles identifications that the key, which generates request,;
Business cipher key generation module 402, it is close for generating business corresponding with the key information and the vehicles identifications
Key;Wherein, the key information includes the corresponding key identification of the NFC physical key;
Encrypted instruction sending module 403, for the key identification and the business cipher key to be packaged as encrypted instruction, and
It is sent to the read-write client, the NFC physical key is written by the read-write client;
Key information sending module 404, for generating key letter corresponding with the key identification and the business cipher key
Breath, and be sent in the corresponding vehicle end of the vehicles identifications, to be synchronized to the white name of NFC security module in the vehicle end
It is single.
In one embodiment of the application, the NFC physical key is numbered with a key, described device further include:
Key controller request receiving module, for receiving key controller request;Wherein, the key controller request includes institute
State key number;
Determining module is identified, for determining that the key numbers corresponding key identification and vehicles identifications;
Key information update module controls the corresponding vehicle of the vehicles identifications for requesting according to the key controller
NFC security module updates the key information in the white list in end.
In one embodiment of the application, described device further relates to user terminal, and the user terminal is deployed with and the clothes
Corresponding first application of business provider's platform, the key controller request include the request of the first application transmission.
In one embodiment of the application, further includes:
Subscriber authentication module, for verifying whether active user is the corresponding car owner user of the vehicles identifications or administrator
User;When the active user is car owner user or administrator, the key information update module is called.
In one embodiment of the application, further includes:
State of a control mark module, for working as the response for receiving the vehicle end and reporting for key controller request
When message, the NFC physical key is identified as the key controller and requests corresponding state of a control;
Feedback module is completed in control, for controlling completion notice to user terminal feedback one.
In one embodiment of the application, the key controller request includes reporting the loss request, the key information update module
Include:
Loss reporting command generates submodule, requests corresponding loss reporting command for generating described report the loss;
Loss reporting command sending submodule, for the loss reporting command to be sent to the vehicle end, in the white list
In, remove the corresponding key information of the key identification.
In one embodiment of the application, the key controller request includes locking request, the key information update module
Include:
Lock instruction generates submodule, for generating the corresponding lock instruction of the locking request;
Lock instruction sending submodule, for the lock instruction to be sent to the vehicle end, in the white list
In, locking mark is set by the corresponding key information of the key identification;Wherein, in the case where setting locking mark, institute
The control vehicle functions for stating NFC physical key are limited.
In one embodiment of the application, the key controller request includes unlocking request, the key information update module
Include:
Unlocking request generates submodule, for generating the corresponding unlock instruction of the unlocking request;
Unlocking request sending submodule is sent to the vehicle end for specifying the unlock, in the white list
In, unlock mark is set by the corresponding key information of the key identification;Wherein, in the case where setting unlock mark, institute
The control vehicle functions for stating NFC physical key are resumed.
In one embodiment of the application, the key controller request includes validity period setting request, the validity period setting
Request further includes validity period information, and the key information update module includes:
Validity period setting instruction generates submodule, requests corresponding validity period setting to refer to for generating the validity period setting
It enables;
Validity period setting instruction sending submodule, for validity period setting instruction to be sent to the vehicle end, with
In the white list, using the validity period information update key information.
In one embodiment of the application, the key controller request includes permission control request, the permission control request
It further include authority information, the key information update module includes:
Permission control instruction generates submodule, requests corresponding permission control instruction for generating the permission control;
Permission control instruction sending submodule, for the permission control instruction to be sent to the vehicle end, in institute
It states in white list, key information is updated using the authority information.
For device embodiment, since it is basically similar to the method embodiment, related so being described relatively simple
Place illustrates referring to the part of embodiment of the method.
One embodiment of the application additionally provides a kind of vehicle, may include processor, memory and storage on a memory
And the computer program that can be run on a processor, the control of car key as above is realized when computer program is executed by processor
The step of method.
One embodiment of the application additionally provides a kind of computer readable storage medium, stores on computer readable storage medium
Computer program, the step of control method of car key as above is realized when computer program is executed by processor.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with
The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
It should be understood by those skilled in the art that, the embodiment of the present application can provide as method, apparatus or computer program production
Product.Therefore, in terms of the embodiment of the present application can be used complete hardware embodiment, complete software embodiment or combine software and hardware
Embodiment form.Moreover, it wherein includes computer available programs generation that the embodiment of the present application, which can be used in one or more,
The meter implemented in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of code
The form of calculation machine program product.
The embodiment of the present application is referring to according to the method for the embodiment of the present application, terminal device (system) and computer program
The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions
In each flow and/or block and flowchart and/or the block diagram in process and/or box combination.It can provide these
Computer program instructions are set to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminals
Standby processor is to generate a machine, so that being held by the processor of computer or other programmable data processing terminal devices
Capable instruction generates for realizing in one or more flows of the flowchart and/or one or more blocks of the block diagram
The device of specified function.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing terminal devices
In computer-readable memory operate in a specific manner, so that instruction stored in the computer readable memory generates packet
The manufacture of command device is included, which realizes in one side of one or more flows of the flowchart and/or block diagram
The function of being specified in frame or multiple boxes.
These computer program instructions can also be loaded into computer or other programmable data processing terminal devices, so that
Series of operation steps are executed on computer or other programmable terminal equipments to generate computer implemented processing, thus
The instruction executed on computer or other programmable terminal equipments is provided for realizing in one or more flows of the flowchart
And/or in one or more blocks of the block diagram specify function the step of.
Although preferred embodiments of the embodiments of the present application have been described, once a person skilled in the art knows bases
This creative concept, then additional changes and modifications can be made to these embodiments.So the following claims are intended to be interpreted as
Including preferred embodiment and all change and modification within the scope of the embodiments of the present application.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning
Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements not only wrap
Those elements are included, but also including other elements that are not explicitly listed, or further includes for this process, method, article
Or the element that terminal device is intrinsic.In the absence of more restrictions, being wanted by what sentence "including a ..." limited
Element, it is not excluded that there is also other identical elements in process, method, article or the terminal device for including the element.
Above to the control method and device of provided car key, it is described in detail, it is used herein specifically
The principle and implementation of this application are described for a example, the application that the above embodiments are only used to help understand
Method and its core concept;At the same time, for those skilled in the art is being embodied according to the thought of the application
There will be changes in mode and application range, in conclusion the contents of this specification should not be construed as limiting the present application.
Claims (22)
1. a kind of control method of car key, which is characterized in that it is flat to be related to NFC physical key, read-write client, service provider
Platform and vehicle end, which comprises
It receives the key that the read-write client is sent and generates request;Wherein, it includes the NFC entity that the key, which generates request,
The corresponding key information of key and a vehicles identifications;
Generate business cipher key corresponding with the key information and the vehicles identifications;Wherein, the key information includes described
The corresponding key identification of NFC physical key;
The key identification and the business cipher key are packaged as encrypted instruction, and are sent to the read-write client, to pass through
The NFC physical key is written in the read-write client;
Key information corresponding with the key identification and the business cipher key is generated, and it is corresponding to be sent to the vehicles identifications
In vehicle end, to be synchronized to the white list of NFC security module in the vehicle end.
2. the method according to claim 1, wherein the NFC physical key is with key number, the side
Method further include:
Receive key controller request;Wherein, the key controller request includes that the key is numbered;
Determine that the key numbers corresponding key identification and vehicles identifications;
It is requested according to the key controller, it is described white to control NFC security module update in the corresponding vehicle end of the vehicles identifications
Key information in list.
3. according to the method described in claim 2, it is characterized in that, the method further relates to user terminal, the user terminal
It is deployed with the first application corresponding with the Service Provider Platform, the key controller request includes that first application is sent
Request.
4. according to the method described in claim 3, it is characterized in that, being requested described according to the key controller, described in control
Before the step of NFC security module updates the key information in the white list in the corresponding vehicle end of vehicles identifications, further includes:
Verify whether active user is the corresponding car owner user of the vehicles identifications or administrator;
When the active user is car owner user or administrator, execute described according to key controller request, control
The step of NFC security module updates the key information in the white list in the corresponding vehicle end of the vehicles identifications.
5. according to the method described in claim 3, it is characterized by further comprising:
When receiving the response message that the vehicle end is reported for key controller request, by the NFC physical key
It is identified as the key controller and requests corresponding state of a control;
To one control completion notice of user terminal feedback.
6. according to method described in Claims 2 or 3 or 4 or 5, which is characterized in that the key controller request includes reporting the loss to ask
It asks, it is described to be requested according to the key controller, it controls in the corresponding vehicle end of the vehicles identifications described in the update of NFC security module
The step of key information in white list includes:
The corresponding loss reporting command of request is reported the loss described in generation;
The loss reporting command is sent to the vehicle end, it is corresponding close to remove the key identification in the white list
Key information.
7. according to method described in Claims 2 or 3 or 4 or 5, which is characterized in that the key controller request includes that locking is asked
It asks, it is described to be requested according to the key controller, it controls in the corresponding vehicle end of the vehicles identifications described in the update of NFC security module
The step of key information in white list includes:
Generate the corresponding lock instruction of the locking request;
The lock instruction is sent to the vehicle end, in the white list, by the corresponding key of the key identification
Information is set as locking mark;Wherein, in the case where setting locking mark, the control vehicle functions of the NFC physical key
It is limited.
8. the method according to the description of claim 7 is characterized in that the key controller request include unlocking request, described
It is requested according to the key controller, controls NFC security module in the corresponding vehicle end of the vehicles identifications and update in the white list
Key information the step of include:
Generate the corresponding unlock instruction of the unlocking request;
The vehicle end is sent to by the unlock is specified, in the white list, by the corresponding key of the key identification
Information is set as unlock mark;Wherein, in the case where setting unlock mark, the control vehicle functions of the NFC physical key
It is resumed.
9. according to method described in Claims 2 or 3 or 4 or 5, which is characterized in that the key controller request includes validity period
Setting request, the validity period setting request further includes validity period information, described to be requested according to the key controller, described in control
The step of NFC security module updates the key information in the white list in the corresponding vehicle end of vehicles identifications include:
It generates the validity period setting and requests corresponding validity period setting instruction;
Validity period setting instruction is sent to the vehicle end, in the white list, using the validity period information
Update key information.
10. according to method described in Claims 2 or 3 or 4 or 5, which is characterized in that the key controller request includes permission control
System request, the permission control request further includes authority information, described to be requested according to the key controller, controls the vehicle mark
Knowing the step of NFC security module updates the key information in the white list in corresponding vehicle end includes:
It generates the permission control and requests corresponding permission control instruction;
The permission control instruction is sent to the vehicle end, updated in the white list using the authority information
Key information.
11. a kind of control device of car key, which is characterized in that be related to NFC physical key, read-write client, service provider
Platform and vehicle end, described device include:
Key generates request receiving module, generates request for receiving the key that the read-write client is sent;Wherein, described close
It includes the corresponding key information of the NFC physical key and a vehicles identifications that key, which generates request,;
Business cipher key generation module, for generating business cipher key corresponding with the key information and the vehicles identifications;Wherein,
The key information includes the corresponding key identification of the NFC physical key;
Encrypted instruction sending module for the key identification and the business cipher key to be packaged as encrypted instruction, and is sent to
The read-write client, the NFC physical key is written by the read-write client;
Key information sending module, for generating key information corresponding with the key identification and the business cipher key, concurrently
It send into the corresponding vehicle end of the vehicles identifications, to be synchronized to the white list of NFC security module in the vehicle end.
12. device according to claim 11, which is characterized in that the NFC physical key is numbered with a key, described
Device further include:
Key controller request receiving module, for receiving key controller request;Wherein, the key controller request includes the key
Spoon number;
Determining module is identified, for determining that the key numbers corresponding key identification and vehicles identifications;
Key information update module controls in the corresponding vehicle end of the vehicles identifications for being requested according to the key controller
NFC security module updates the key information in the white list.
13. device according to claim 12, which is characterized in that described device further relates to user terminal, and the user is whole
End is deployed with the first application corresponding with the Service Provider Platform, and the key controller request includes the first application hair
The request sent.
14. device according to claim 13, which is characterized in that further include:
Subscriber authentication module, for verifying whether active user is that the corresponding car owner user of the vehicles identifications or administrator use
Family;When the active user is car owner user or administrator, the key information update module is called.
15. device according to claim 13, which is characterized in that further include:
State of a control mark module, for working as the response message for receiving the vehicle end and reporting for key controller request
When, the NFC physical key is identified as the key controller and requests corresponding state of a control;
Feedback module is completed in control, for controlling completion notice to user terminal feedback one.
16. device described in 2 or 13 or 14 or 15 according to claim 1, which is characterized in that the key controller request includes hanging
Request is lost, the key information update module includes:
Loss reporting command generates submodule, requests corresponding loss reporting command for generating described report the loss;
Loss reporting command sending submodule, for the loss reporting command to be sent to the vehicle end, in the white list, clearly
Except the corresponding key information of the key identification.
17. device described in 2 or 13 or 14 or 15 according to claim 1, which is characterized in that the key controller request includes lock
Fixed request, the key information update module include:
Lock instruction generates submodule, for generating the corresponding lock instruction of the locking request;
Lock instruction sending submodule, for the lock instruction to be sent to the vehicle end, to incite somebody to action in the white list
The corresponding key information of the key identification is set as locking mark;Wherein, in the case where setting locking mark, the NFC
The control vehicle functions of physical key are limited.
18. device according to claim 17, which is characterized in that the key controller request includes unlocking request, described
Key information update module includes:
Unlocking request generates submodule, for generating the corresponding unlock instruction of the unlocking request;
Unlocking request sending submodule is sent to the vehicle end for specifying the unlock, to incite somebody to action in the white list
The corresponding key information of the key identification is set as unlock mark;Wherein, in the case where setting unlock mark, the NFC
The control vehicle functions of physical key are resumed.
19. device described in 2 or 13 or 14 or 15 according to claim 1, which is characterized in that key controller request includes
The setting request of effect phase, the validity period setting request further includes validity period information, and the key information update module includes:
Validity period setting instruction generates submodule, requests corresponding validity period setting instruction for generating the validity period setting;
Validity period setting instruction sending submodule, for validity period setting instruction to be sent to the vehicle end, in institute
It states in white list, using the validity period information update key information.
20. device described in 2 or 13 or 14 or 15 according to claim 1, which is characterized in that the key controller request includes power
Limit control request, the permission control request further includes authority information, and the key information update module includes:
Permission control instruction generates submodule, requests corresponding permission control instruction for generating the permission control;
Permission control instruction sending submodule, for the permission control instruction to be sent to the vehicle end, described white
In list, key information is updated using the authority information.
21. a kind of vehicle, which is characterized in that including processor, memory and be stored on the memory and can be described
The computer program run on processor realizes such as claims 1 to 10 when the computer program is executed by the processor
Any one of described in car key control method the step of.
22. a kind of computer readable storage medium, which is characterized in that store computer journey on the computer readable storage medium
Sequence realizes the control of the car key as described in any one of claims 1 to 10 when the computer program is executed by processor
The step of method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910410316.0A CN110111472B (en) | 2019-05-16 | 2019-05-16 | Vehicle key control method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910410316.0A CN110111472B (en) | 2019-05-16 | 2019-05-16 | Vehicle key control method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110111472A true CN110111472A (en) | 2019-08-09 |
CN110111472B CN110111472B (en) | 2022-05-13 |
Family
ID=67490636
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910410316.0A Active CN110111472B (en) | 2019-05-16 | 2019-05-16 | Vehicle key control method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110111472B (en) |
Cited By (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110503758A (en) * | 2019-08-23 | 2019-11-26 | 上海元城汽车技术有限公司 | Control method, device, electronic equipment and the computer-readable medium of vehicle |
CN111127709A (en) * | 2019-12-17 | 2020-05-08 | 重庆邮电大学 | Method for preparing automobile door lock key |
CN111402464A (en) * | 2020-03-20 | 2020-07-10 | 科世达(上海)机电有限公司 | Method, device and system for updating vehicle electronic key |
CN111554008A (en) * | 2020-04-22 | 2020-08-18 | 支付宝(杭州)信息技术有限公司 | Digital key binding method, digital key verification method, mobile electronic equipment and near field communication device |
CN112967429A (en) * | 2021-03-12 | 2021-06-15 | 青岛中瑞车联电子科技有限公司 | NFC lock control system and method |
CN113129483A (en) * | 2020-01-13 | 2021-07-16 | 阿里巴巴集团控股有限公司 | System and method for managing working condition of lock box |
CN113561934A (en) * | 2020-04-29 | 2021-10-29 | 广州汽车集团股份有限公司 | Vehicle anti-theft matching method, system, diagnostic instrument and storage medium |
CN114466357A (en) * | 2022-02-28 | 2022-05-10 | 重庆长安汽车股份有限公司 | Vehicle-mounted NFC card key binding system and method |
WO2022095789A1 (en) * | 2020-11-05 | 2022-05-12 | 深圳市道通科技股份有限公司 | Automobile key matching method and apparatus, and automobile communication interface device |
CN114582049A (en) * | 2021-02-05 | 2022-06-03 | 长城汽车股份有限公司 | Calibration parameter transmission method, mobile terminal and cloud server |
CN114582048A (en) * | 2020-12-01 | 2022-06-03 | 比亚迪股份有限公司 | NFC-based vehicle door control method, mobile terminal and vehicle |
CN114598459A (en) * | 2022-01-29 | 2022-06-07 | 上海钧正网络科技有限公司 | Communication method, device and storage medium based on remote control equipment |
CN114670779A (en) * | 2022-04-07 | 2022-06-28 | 浙江极氪智能科技有限公司 | Digital key sharing method and system |
CN114684070A (en) * | 2022-03-23 | 2022-07-01 | 中汽创智科技有限公司 | Safe vehicle control method and device, vehicle system and storage medium |
CN114830619A (en) * | 2021-02-19 | 2022-07-29 | 深圳市汇顶科技股份有限公司 | Vehicle key control method and device, vehicle and vehicle key body |
CN115019423A (en) * | 2022-06-27 | 2022-09-06 | 无锡融卡科技有限公司 | Bluetooth vehicle key distribution system and implementation method thereof |
CN115273289A (en) * | 2022-09-20 | 2022-11-01 | 上海银基信息安全技术股份有限公司 | Physical key activation method, system, device, equipment and medium |
CN115396191A (en) * | 2022-08-24 | 2022-11-25 | 重庆长安汽车股份有限公司 | Vehicle-end digital key pushing method and system, electronic equipment and readable storage medium |
CN115527294A (en) * | 2022-11-28 | 2022-12-27 | 广州万协通信息技术有限公司 | NFC signal vehicle unlocking method of security chip and security chip device |
CN115565268A (en) * | 2022-08-30 | 2023-01-03 | 星汉智能科技股份有限公司 | Automobile control method and system based on wireless automobile key, electronic equipment and storage medium |
CN115631556A (en) * | 2022-10-20 | 2023-01-20 | 重庆长安汽车股份有限公司 | Management system and method for vehicle NFC digital key |
CN115675362A (en) * | 2022-10-19 | 2023-02-03 | 云度新能源汽车有限公司 | Automobile NFC key pairing system and automobile NFC key pairing method |
CN115909550A (en) * | 2022-10-20 | 2023-04-04 | 远峰科技股份有限公司 | NFC key verification method, device and system and computer readable storage medium |
CN115915131A (en) * | 2022-10-20 | 2023-04-04 | 远峰科技股份有限公司 | Vehicle key bidirectional encryption authentication method and system, vehicle binding device and NFC card |
CN115938022A (en) * | 2022-12-12 | 2023-04-07 | 远峰科技股份有限公司 | Vehicle entity key safety authentication method and system |
CN117690214A (en) * | 2023-12-07 | 2024-03-12 | 小米汽车科技有限公司 | Vehicle key processing method and device, storage medium and vehicle |
CN117711099A (en) * | 2023-12-15 | 2024-03-15 | 小米汽车科技有限公司 | NFC car key processing method and device, storage medium and car |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN2513843Y (en) * | 2001-12-20 | 2002-10-02 | 蒋楚明 | Intelligent IC identifying anti-theft lock device for automobile |
CN101343961A (en) * | 2008-07-29 | 2009-01-14 | 上海世科嘉车辆技术研发有限公司 | Non-key gate control system |
CN105959277A (en) * | 2016-04-27 | 2016-09-21 | 四川效率源信息安全技术股份有限公司 | Method of locking/unlocking computer screen based on NFC terminal |
CN107393079A (en) * | 2017-07-26 | 2017-11-24 | 北京小米移动软件有限公司 | Management method, device and the storage medium of virtual car key |
CN107685714A (en) * | 2017-08-30 | 2018-02-13 | 上海博泰悦臻电子设备制造有限公司 | Intelligent vehicle key system and its control method |
US20180061155A1 (en) * | 2016-09-01 | 2018-03-01 | Mastercard International Incorporated | Method and system for access control |
CN108108598A (en) * | 2017-12-15 | 2018-06-01 | 蔚来汽车有限公司 | Vehicle authorization management method and system |
-
2019
- 2019-05-16 CN CN201910410316.0A patent/CN110111472B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN2513843Y (en) * | 2001-12-20 | 2002-10-02 | 蒋楚明 | Intelligent IC identifying anti-theft lock device for automobile |
CN101343961A (en) * | 2008-07-29 | 2009-01-14 | 上海世科嘉车辆技术研发有限公司 | Non-key gate control system |
CN105959277A (en) * | 2016-04-27 | 2016-09-21 | 四川效率源信息安全技术股份有限公司 | Method of locking/unlocking computer screen based on NFC terminal |
US20180061155A1 (en) * | 2016-09-01 | 2018-03-01 | Mastercard International Incorporated | Method and system for access control |
CN107393079A (en) * | 2017-07-26 | 2017-11-24 | 北京小米移动软件有限公司 | Management method, device and the storage medium of virtual car key |
CN107685714A (en) * | 2017-08-30 | 2018-02-13 | 上海博泰悦臻电子设备制造有限公司 | Intelligent vehicle key system and its control method |
CN108108598A (en) * | 2017-12-15 | 2018-06-01 | 蔚来汽车有限公司 | Vehicle authorization management method and system |
Cited By (41)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110503758A (en) * | 2019-08-23 | 2019-11-26 | 上海元城汽车技术有限公司 | Control method, device, electronic equipment and the computer-readable medium of vehicle |
CN111127709B (en) * | 2019-12-17 | 2022-03-29 | 重庆邮电大学 | Method for preparing automobile door lock key |
CN111127709A (en) * | 2019-12-17 | 2020-05-08 | 重庆邮电大学 | Method for preparing automobile door lock key |
CN113129483A (en) * | 2020-01-13 | 2021-07-16 | 阿里巴巴集团控股有限公司 | System and method for managing working condition of lock box |
CN111402464A (en) * | 2020-03-20 | 2020-07-10 | 科世达(上海)机电有限公司 | Method, device and system for updating vehicle electronic key |
CN111554008A (en) * | 2020-04-22 | 2020-08-18 | 支付宝(杭州)信息技术有限公司 | Digital key binding method, digital key verification method, mobile electronic equipment and near field communication device |
CN111554008B (en) * | 2020-04-22 | 2024-01-16 | 支付宝(杭州)信息技术有限公司 | Digital key binding method, digital key verification method, mobile electronic equipment and near field communication device |
CN113561934B (en) * | 2020-04-29 | 2022-07-15 | 广州汽车集团股份有限公司 | Vehicle anti-theft matching method, system, diagnostic instrument and storage medium |
CN113561934A (en) * | 2020-04-29 | 2021-10-29 | 广州汽车集团股份有限公司 | Vehicle anti-theft matching method, system, diagnostic instrument and storage medium |
WO2022095789A1 (en) * | 2020-11-05 | 2022-05-12 | 深圳市道通科技股份有限公司 | Automobile key matching method and apparatus, and automobile communication interface device |
CN114582048B (en) * | 2020-12-01 | 2023-09-05 | 比亚迪股份有限公司 | NFC-based vehicle door control method, mobile terminal and vehicle |
CN114582048A (en) * | 2020-12-01 | 2022-06-03 | 比亚迪股份有限公司 | NFC-based vehicle door control method, mobile terminal and vehicle |
CN114582049A (en) * | 2021-02-05 | 2022-06-03 | 长城汽车股份有限公司 | Calibration parameter transmission method, mobile terminal and cloud server |
WO2022174391A1 (en) * | 2021-02-19 | 2022-08-25 | 深圳市汇顶科技股份有限公司 | Vehicle key control method and apparatus, and vehicle and vehicle key body |
CN114830619A (en) * | 2021-02-19 | 2022-07-29 | 深圳市汇顶科技股份有限公司 | Vehicle key control method and device, vehicle and vehicle key body |
CN114830619B (en) * | 2021-02-19 | 2024-04-26 | 深圳市汇顶科技股份有限公司 | Vehicle key control method and device, vehicle and vehicle key body |
CN112967429A (en) * | 2021-03-12 | 2021-06-15 | 青岛中瑞车联电子科技有限公司 | NFC lock control system and method |
CN114598459B (en) * | 2022-01-29 | 2024-04-19 | 上海钧正网络科技有限公司 | Communication method, device and storage medium based on remote control equipment |
CN114598459A (en) * | 2022-01-29 | 2022-06-07 | 上海钧正网络科技有限公司 | Communication method, device and storage medium based on remote control equipment |
CN114466357A (en) * | 2022-02-28 | 2022-05-10 | 重庆长安汽车股份有限公司 | Vehicle-mounted NFC card key binding system and method |
CN114466357B (en) * | 2022-02-28 | 2024-04-19 | 重庆长安汽车股份有限公司 | Vehicle-mounted NFC card key binding system and method |
CN114684070A (en) * | 2022-03-23 | 2022-07-01 | 中汽创智科技有限公司 | Safe vehicle control method and device, vehicle system and storage medium |
CN114670779A (en) * | 2022-04-07 | 2022-06-28 | 浙江极氪智能科技有限公司 | Digital key sharing method and system |
CN115019423B (en) * | 2022-06-27 | 2023-10-24 | 无锡融卡科技有限公司 | Bluetooth car key distribution system and implementation method thereof |
CN115019423A (en) * | 2022-06-27 | 2022-09-06 | 无锡融卡科技有限公司 | Bluetooth vehicle key distribution system and implementation method thereof |
CN115396191A (en) * | 2022-08-24 | 2022-11-25 | 重庆长安汽车股份有限公司 | Vehicle-end digital key pushing method and system, electronic equipment and readable storage medium |
CN115565268B (en) * | 2022-08-30 | 2024-04-05 | 星汉智能科技股份有限公司 | Automobile control method and system based on wireless automobile key, electronic equipment and storage medium |
CN115565268A (en) * | 2022-08-30 | 2023-01-03 | 星汉智能科技股份有限公司 | Automobile control method and system based on wireless automobile key, electronic equipment and storage medium |
WO2024060673A1 (en) * | 2022-09-20 | 2024-03-28 | 上海银基信息安全技术股份有公司 | Method, system and apparatus for activating physical key, and device and medium |
CN115273289A (en) * | 2022-09-20 | 2022-11-01 | 上海银基信息安全技术股份有限公司 | Physical key activation method, system, device, equipment and medium |
CN115675362A (en) * | 2022-10-19 | 2023-02-03 | 云度新能源汽车有限公司 | Automobile NFC key pairing system and automobile NFC key pairing method |
CN115915131A (en) * | 2022-10-20 | 2023-04-04 | 远峰科技股份有限公司 | Vehicle key bidirectional encryption authentication method and system, vehicle binding device and NFC card |
CN115915131B (en) * | 2022-10-20 | 2023-11-10 | 远峰科技股份有限公司 | Vehicle key bidirectional encryption authentication method and system, vehicle binding device and NFC card |
CN115631556A (en) * | 2022-10-20 | 2023-01-20 | 重庆长安汽车股份有限公司 | Management system and method for vehicle NFC digital key |
CN115909550A (en) * | 2022-10-20 | 2023-04-04 | 远峰科技股份有限公司 | NFC key verification method, device and system and computer readable storage medium |
CN115527294A (en) * | 2022-11-28 | 2022-12-27 | 广州万协通信息技术有限公司 | NFC signal vehicle unlocking method of security chip and security chip device |
CN115527294B (en) * | 2022-11-28 | 2023-03-24 | 广州万协通信息技术有限公司 | NFC signal vehicle unlocking method of security chip and security chip device |
CN115938022A (en) * | 2022-12-12 | 2023-04-07 | 远峰科技股份有限公司 | Vehicle entity key safety authentication method and system |
CN115938022B (en) * | 2022-12-12 | 2023-11-24 | 远峰科技股份有限公司 | Vehicle entity key safety authentication method and system |
CN117690214A (en) * | 2023-12-07 | 2024-03-12 | 小米汽车科技有限公司 | Vehicle key processing method and device, storage medium and vehicle |
CN117711099A (en) * | 2023-12-15 | 2024-03-15 | 小米汽车科技有限公司 | NFC car key processing method and device, storage medium and car |
Also Published As
Publication number | Publication date |
---|---|
CN110111472B (en) | 2022-05-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110111472A (en) | Vehicle key control method and device | |
CN110091828A (en) | A kind of control method and device of car key | |
CN110136306A (en) | Vehicle key control method and system | |
CN110103883A (en) | A kind of control method and device of car key | |
KR102219756B1 (en) | Method for managing the state of connected devices | |
EP3089494B1 (en) | Trusted execution environment initialization method and mobile terminal | |
CN108173662A (en) | The authentication method and device of a kind of equipment | |
CN108462710B (en) | Authentication and authorization method, device, authentication server and machine-readable storage medium | |
CN110111459B (en) | Virtual key management method and system | |
CN105704131A (en) | Vehicle lock control method and cloud management server | |
CN109379336A (en) | A kind of uniform authentication method, distributed system and computer readable storage medium | |
CN113781678A (en) | Vehicle Bluetooth key generation and authentication method and system under network-free environment | |
CN105933374B (en) | A kind of mobile terminal data backup method, system and mobile terminal | |
CN109831435A (en) | A kind of database operation method, system and proxy server and storage medium | |
CN109587164A (en) | A kind of information encrypting transmission method, device, equipment and storage medium | |
CN112291071B (en) | Password management method and system suitable for zero trust network | |
CN113016201A (en) | Key provisioning method and related product | |
CN110091829A (en) | A kind of control method and device of car key | |
CN109698834A (en) | A kind of encrypted transmission method and system | |
CN106302428B (en) | A kind of automatic deployment method and device of encryption level | |
CN108121904B (en) | Unlocking method, device, electronic equipment and server | |
CN104735064B (en) | The method that safety is cancelled and updated is identified in a kind of id password system | |
CN114764956A (en) | Vehicle control method and device and readable storage medium | |
US11829481B2 (en) | Method of verifying the integrity of an electronic device, and a corresponding electronic device | |
CN106685931B (en) | Smart card application management method and system, terminal and smart card |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |