CN110111472B - Vehicle key control method and device - Google Patents

Vehicle key control method and device Download PDF

Info

Publication number
CN110111472B
CN110111472B CN201910410316.0A CN201910410316A CN110111472B CN 110111472 B CN110111472 B CN 110111472B CN 201910410316 A CN201910410316 A CN 201910410316A CN 110111472 B CN110111472 B CN 110111472B
Authority
CN
China
Prior art keywords
key
vehicle
request
instruction
nfc
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910410316.0A
Other languages
Chinese (zh)
Other versions
CN110111472A (en
Inventor
刘毅林
李向荣
陆宇哲
周波
何光波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Xiaopeng Motors Technology Co Ltd
Original Assignee
Guangzhou Xiaopeng Motors Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Xiaopeng Motors Technology Co Ltd filed Critical Guangzhou Xiaopeng Motors Technology Co Ltd
Priority to CN201910410316.0A priority Critical patent/CN110111472B/en
Publication of CN110111472A publication Critical patent/CN110111472A/en
Application granted granted Critical
Publication of CN110111472B publication Critical patent/CN110111472B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00412Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00825Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The embodiment of the application provides a vehicle key control method and device, and the method comprises the following steps: receiving a key generation request sent by a read-write client; the key generation request comprises key information corresponding to the NFC entity key and a vehicle identifier; generating a service key corresponding to the key information and the vehicle identifier; the key information comprises a key identification corresponding to the NFC entity key; packaging the key identification and the service key into an encryption instruction, and sending the encryption instruction to the read-write client so as to write the NFC entity key in the read-write client; and generating key information corresponding to the key identification and the service key, and sending the key information to the vehicle end corresponding to the vehicle identification so as to synchronize to a white list of the NFC security module in the vehicle end. Through this application embodiment, realized the control to NFC entity key, solved the condition that can't carry out high in the clouds management to entity key, promoted convenience, the security of entity key control.

Description

Vehicle key control method and device
Technical Field
The application relates to the field of automobiles, in particular to a method and a device for controlling an automobile key.
Background
With the development of scientific technology, automobiles become traffic tools which cannot be lacked in life, and during the use process of automobiles, the operation of opening/locking doors, starting/closing engines and the like is carried out by using keys, and the conventional automobile keys usually comprise mechanical keys, integrated remote control keys and the like.
Mechanical key also called the blade key can only be used for basic lock door function of opening the door, and integration remote control key comprises blade key and chip key, owing to increased the chip key, has promoted blade key theftproof nature, and can also adopt the chip key to whistle and look for functions such as car, but both all can't manage through the high in the clouds, and all have the big inconvenient problem of carrying.
Disclosure of Invention
In view of the above problems, it is proposed to provide a control method and apparatus for a vehicle key that overcomes or at least partially solves the above problems, comprising:
a control method of a car key relates to an NFC entity key, a read-write client, a service provider platform and a car end, and comprises the following steps:
receiving a key generation request sent by the read-write client; the key generation request comprises key information corresponding to the NFC entity key and a vehicle identifier;
generating a service key corresponding to the key information and the vehicle identifier; the key information comprises a key identification corresponding to the NFC entity key;
packaging the key identification and the service key into an encryption instruction, and sending the encryption instruction to the read-write client so as to write the NFC entity key in the read-write client;
and generating key information corresponding to the key identification and the service key, and sending the key information to a vehicle end corresponding to the vehicle identification so as to synchronize to a white list of an NFC (near field communication) security module in the vehicle end.
Optionally, the NFC entity key has a key number, and the method further includes:
receiving a key control request; wherein the key control request includes the key number;
determining a key identification and a vehicle identification corresponding to the key number;
and controlling an NFC security module in the vehicle end corresponding to the vehicle identification to update the key information in the white list according to the key control request.
Optionally, the method further involves a user terminal deployed with a first application corresponding to the service provider platform, and the key control request includes a request sent by the first application.
Optionally, before the step of controlling, according to the key control request, an NFC security module in a vehicle end corresponding to the vehicle identifier to update key information in the white list, the method further includes:
verifying whether the current user is a vehicle owner user or an administrator user corresponding to the vehicle identifier;
and when the current user is a vehicle owner user or an administrator user, executing the step of controlling an NFC security module in a vehicle end corresponding to the vehicle identifier to update the key information in the white list according to the key control request.
Optionally, the method further comprises:
when a response message reported by the vehicle end aiming at the key control request is received, identifying the NFC entity key as a control state corresponding to the key control request;
and feeding back a control completion notice to the user terminal.
Optionally, the key control request includes a loss report request, and the step of controlling, according to the key control request, an NFC security module in a vehicle end corresponding to the vehicle identifier to update key information in the white list includes:
generating a loss reporting instruction corresponding to the loss reporting request;
and sending the loss report instruction to the vehicle end so as to clear the key information corresponding to the key identification in the white list.
Optionally, the key control request includes a locking request, and the step of controlling, according to the key control request, an NFC security module in a vehicle end corresponding to the vehicle identifier to update key information in the white list includes:
generating a locking instruction corresponding to the locking request;
sending the locking instruction to the vehicle end so as to set key information corresponding to the key identification as a locking identification in the white list; wherein, in case of setting a locking flag, the controlling vehicle function of the NFC entity key is restricted.
Optionally, the key control request includes an unlocking request, and the step of controlling, according to the key control request, an NFC security module in a vehicle end corresponding to the vehicle identifier to update key information in the white list includes:
generating an unlocking instruction corresponding to the unlocking request;
sending the unlocking instruction to the vehicle end so as to set key information corresponding to the key identification as an unlocking identification in the white list; wherein the control vehicle function of the NFC entity key is restored in case of setting an unlock flag.
Optionally, the key control request includes a validity period setting request, the validity period setting request further includes validity period information, and the step of controlling, according to the key control request, the NFC security module in the vehicle end corresponding to the vehicle identifier to update the key information in the white list includes:
generating a validity period setting instruction corresponding to the validity period setting request;
and sending the validity period setting instruction to the vehicle end so as to update key information by adopting the validity period information in the white list.
Optionally, the key control request includes an authority control request, the authority control request further includes authority information, and the step of controlling, according to the key control request, an NFC security module in a vehicle end corresponding to the vehicle identifier to update key information in the white list includes:
generating an authority control instruction corresponding to the authority control request;
and sending the authority control instruction to the vehicle end so as to update key information by adopting the authority information in the white list.
A control device of a car key relates to an NFC entity key, a read-write client, a service provider platform and a car end, and comprises:
a key generation request receiving module, configured to receive a key generation request sent by the read-write client; the key generation request comprises key information corresponding to the NFC entity key and a vehicle identifier;
the service key generation module is used for generating a service key corresponding to the key information and the vehicle identifier; the key information comprises a key identification corresponding to the NFC entity key;
an encryption instruction sending module, configured to package the key identifier and the service key into an encryption instruction, and send the encryption instruction to the read-write client, so as to write the NFC entity key in the read-write client;
and the key information sending module is used for generating key information corresponding to the key identification and the service key and sending the key information to a vehicle end corresponding to the vehicle identification so as to synchronize to a white list of an NFC (near field communication) security module in the vehicle end.
Optionally, the NFC entity key has a key number, and the apparatus further includes:
the key control request receiving module is used for receiving a key control request; wherein the key control request includes the key number;
the identification determining module is used for determining a key identification and a vehicle identification corresponding to the key number;
and the key information updating module is used for controlling an NFC safety module in the vehicle end corresponding to the vehicle identifier to update the key information in the white list according to the key control request.
Optionally, the apparatus further relates to a user terminal, the user terminal being deployed with a first application corresponding to the service provider platform, and the key control request includes a request sent by the first application.
Optionally, the method further comprises:
the user verification module is used for verifying whether the current user is a vehicle owner user or an administrator user corresponding to the vehicle identification; and when the current user is a vehicle owner user or an administrator user, calling the key information updating module.
Optionally, the method further comprises:
the control state identification module is used for identifying the NFC entity key as a control state corresponding to the key control request when receiving a response message reported by the vehicle end aiming at the key control request;
and the control completion feedback module is used for feeding back a control completion notice to the user terminal.
Optionally, the key control request includes a loss report request, and the key information update module includes:
the loss reporting instruction generating submodule is used for generating a loss reporting instruction corresponding to the loss reporting request;
and the loss reporting instruction sending submodule is used for sending the loss reporting instruction to the vehicle end so as to clear the key information corresponding to the key identification in the white list.
Optionally, the key control request includes a lock request, and the key information updating module includes:
the locking instruction generation submodule is used for generating a locking instruction corresponding to the locking request;
the locking instruction sending submodule is used for sending the locking instruction to the vehicle end so as to set key information corresponding to the key identification as a locking identification in the white list; wherein, in case of setting a locking flag, the controlling vehicle function of the NFC entity key is restricted.
Optionally, the key control request includes an unlocking request, and the key information updating module includes:
the unlocking request generation sub-module is used for generating an unlocking instruction corresponding to the unlocking request;
the unlocking request sending submodule is used for sending the unlocking instruction to the vehicle end so as to set key information corresponding to the key identification as an unlocking identification in the white list; wherein the control vehicle function of the NFC entity key is restored in case of setting an unlock flag.
Optionally, the key control request includes a validity period setting request, the validity period setting request further includes validity period information, and the key information updating module includes:
the validity period setting instruction generating submodule is used for generating a validity period setting instruction corresponding to the validity period setting request;
and the validity period setting instruction sending submodule is used for sending the validity period setting instruction to the vehicle end so as to update the key information by adopting the validity period information in the white list.
Optionally, the key control request includes an authority control request, the authority control request further includes authority information, and the key information updating module includes:
the authority control instruction generating submodule is used for generating an authority control instruction corresponding to the authority control request;
and the authority control instruction sending submodule is used for sending the authority control instruction to the vehicle end so as to update key information by adopting the authority information in the white list.
A vehicle comprising a processor, a memory and a computer program stored on the memory and capable of running on the processor, the computer program, when executed by the processor, implementing the steps of the method of controlling a vehicle key as described above.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method of controlling a vehicle key as set forth above.
The embodiment of the application has the following advantages:
in the embodiment of the application, a key generation request sent by a read-write client is received, the key generation request comprises key information corresponding to an NFC entity key and a vehicle identifier, a service key corresponding to the key information and the vehicle identifier is generated, the key information comprises a key identifier corresponding to the NFC entity key, the key identifier and the service key are packaged into an encryption instruction and sent to the read-write client, the NFC entity key is written in through the read-write client, key information corresponding to the key identifier and the service key is generated and sent to a vehicle end corresponding to the vehicle identifier, and a white list of an NFC security module in the vehicle end is synchronized, so that the NFC entity key is controlled, the problem that cloud management cannot be performed on the entity key is solved, and convenience and safety of entity key control are improved.
Drawings
In order to more clearly illustrate the technical solutions of the present application, the drawings needed to be used in the description of the present application will be briefly introduced below, and it is apparent that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive labor.
FIG. 1 is a flow chart illustrating steps of a method for controlling a vehicle key according to an embodiment of the present application;
FIG. 2 is a schematic structural diagram of a control system of a vehicle key according to an embodiment of the present application;
FIG. 3 is a flowchart illustrating steps of another method for controlling a vehicle key according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a control device of a vehicle key according to an embodiment of the present application.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, the present application is described in further detail with reference to the accompanying drawings and the detailed description. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, a flowchart illustrating steps of a method for controlling a car key according to an embodiment of the present application is shown, where the method may relate to an NFC (near field Communication) entity key, a read-write client, a Service Provider (SP) platform, and a vehicle.
As shown in fig. 2, the NFC entity key 201 may communicate with the read-write client 202, the read-write client 202 may communicate with the service provider platform 203, and the service provider platform 203 may further communicate with the vehicle end 204.
The NFC entity key can be a key with an NFC chip, can be a card key, and can also be an entity key in other forms, for example, an NFC chip is embedded in an integrated remote control key, and the NFC entity key can be manufactured by a third-party supplier. For an NFC entity key without a key written, i.e. a "white Card", its surface may be imprinted with a unique key number, the internal NFC chip has a unique chip identification, and the storage area has a unique key identification (NFC _ Card _ ID).
The read-write client can comprise read-write equipment and a client program which is connected with the read-write equipment and is deployed on a computer terminal, and the client program is connected with the service provider platform through a network.
The Service provider platform may communicate with the vehicle side, which is provided with a SP TSM (Trusted Service Management) server.
The vehicle end deploys in the vehicle side, can have NFC security module, NFC security module can regard as the lock core of vehicle, its inside can integrated security chip (SE, Secure Element), and NFC security module can be connected with the NFC inductor and the communication module who deploy in the vehicle side, NFC security module can communicate with service provider platform through communication module, be close to the NFC inductor when NFC entity key, the NFC inductor can carry out data reading to NFC entity key, and then verify with the data of storage in the NFC security module.
Specifically, the method can comprise the following steps:
step 101, receiving a key generation request sent by the read-write client; the key generation request comprises key information corresponding to the NFC entity key and a vehicle identifier;
when a key needs to be written into the NFC entity key, the NFC entity key may be contacted with the read-write device, and the read-write device may scan key information corresponding to the NFC entity key, such as a key number engraved on the NFC entity key, a chip identifier of an NFC chip, and a stored key identifier.
After the key information is scanned, the key information can be displayed through a client program in a computer terminal or other mobile terminals, a user can input or scan a Vehicle identifier of a Vehicle to be bound, such as a Vehicle Identification Number (VIN), the client program can generate a key generation request corresponding to the Vehicle identifier and the key information, and send the key generation request to a service provider platform, and the service provider platform can receive the key generation request.
102, generating a service key corresponding to the key information and the vehicle identifier; the key information comprises a key identification corresponding to the NFC entity key;
after receiving the Key generation request, the service provider platform may generate a service Key (Key _ Card), and may store the Key information, the vehicle identifier, and the corresponding relationship of the service Key, that is, establish the association relationship between the NFC entity Key and the vehicle end.
Specifically, the service key may be generated by an AES (Advanced Encryption Standard) 128 algorithm in combination with the Encryption engine, and may be used to perform a challenge response with the NFC security module at the vehicle end to complete key authentication.
103, packaging the key identifier and the service key into an encryption command, and sending the encryption command to the read-write client so as to write the NFC entity key into the read-write client;
after the service key is generated, the TSM server in the service provider platform may package the key identifier and the service key into an encryption instruction based on an APDU (application protocol data unit), and then send the encryption instruction to the read-write client.
After the encryption instruction is received, a client program in the read-write client can write the encryption instruction into an NFC entity key through read-write equipment, an Applet component is arranged in the NFC entity key, the Applet component can be used for burning a service key, and then the NFC entity key is bound with a vehicle end.
And 104, generating key information corresponding to the key identification and the service key, and sending the key information to a vehicle end corresponding to the vehicle identification so as to synchronize to a white list of an NFC security module in the vehicle end.
After the binding is completed, the service provider platform may organize the key identifier and the service key into key information, send the key information to the vehicle end, the NFC security module in the vehicle end may store the key information in a white list, and complete the activation of the NFC entity key, so that the key is in an enabled state.
After the NFC entity key is activated, when the NFC entity key is close to the vehicle end, the NFC entity key and the vehicle end can be in near field communication, the NFC entity key can be verified by the vehicle end, after the NFC entity key passes the verification, the operations of unlocking, starting an engine and the like can be carried out at the vehicle end, and the specific verification is as follows:
1. verifying whether a key identifier corresponding to the NFC entity key is in a white list;
2. verifying whether Token (Token) information corresponding to the key identification in the white list is valid;
3. and carrying out random number challenge response through the temporary session key, and verifying the service key.
And when the verification key identification is in the white list, the token information is valid and the service key passes the verification, judging that the vehicle end passes the verification of the NFC entity key.
In the embodiment of the application, a key generation request sent by a read-write client is received, the key generation request comprises key information corresponding to an NFC entity key and a vehicle identifier, a service key corresponding to the key information and the vehicle identifier is generated, the key information comprises a key identifier corresponding to the NFC entity key, the key identifier and the service key are packaged into an encryption instruction and sent to the read-write client, the NFC entity key is written in through the read-write client, key information corresponding to the key identifier and the service key is generated and sent to a vehicle end corresponding to the vehicle identifier, and a white list of an NFC security module in the vehicle end is synchronized, so that the NFC entity key is controlled, the problem that cloud management cannot be performed on the entity key is solved, and convenience and safety of entity key control are improved.
Referring to fig. 3, a flowchart illustrating steps of another vehicle key control method according to an embodiment of the present application is shown, which may specifically include the following steps:
step 301, receiving a key control request; wherein the key control request includes the key number;
after the NFC entity key is activated, since the NFC entity key has a key number, the key control request may be generated according to the key number, and the service provider platform may receive the key control request.
In an embodiment of the present application, the method may further involve a user terminal, where the user terminal may be deployed with a first application corresponding to the service provider platform, and the key control request may include a request sent by the first application, where the specific process is as follows:
1. starting the first application, inputting a key number in the first application, and further adding the NFC entity key in the first application;
2. when a current user triggers a key for controlling the NFC entity key, identity verification is carried out on the current user, if a verification code is issued to a vehicle owner/administrator telephone corresponding to the NFC entity key, the verification code is input by the current user for verification, and if the current user can also input an identity card number (last six digits) of the vehicle owner/administrator, the input identity card number is compared with a pre-acquired identity card number;
3. after the identity authentication is passed, the first application may generate a key control request corresponding to the key number and send the key control request to the service provider platform.
Of course, the first application may not be used for key control, the current user may directly send the electricity for the after-sale service, and after the identity authentication, the background end sends a key control request to the service provider platform.
Step 302, determining a key identification and a vehicle identification corresponding to the key number;
since the association relationship between the NFC entity key and the vehicle end is stored in the process of activating the NFC entity key, the key identification corresponding to the key number can be searched on the service provider platform, and the vehicle identification of the vehicle end bound to the key number can be searched.
Of course, the key control request may also directly carry the key identifier, and the key identifier may be directly determined from the key control request without being searched on the platform.
And 303, controlling an NFC security module in the vehicle end corresponding to the vehicle identifier to update the key information in the white list according to the key control request.
After the key identification and the vehicle identification are determined, the key information corresponding to the key identification in the white list, such as the token information in the key information, can be updated in the NFC security module of the vehicle end, and further the NFC entity key can be controlled by updating the 'lock cylinder' of the vehicle end.
In an example, if the vehicle end is in an offline state due to a network reason, for example, the vehicle end does not respond within 10 seconds of the platform ping operation, it is determined that the vehicle end is in the offline state, and the key information can be actively and synchronously updated after the vehicle end is networked next time, so that the key control is completed.
In an embodiment of the present application, the key control request may include a loss report request, and step 303 may include the following sub-steps:
generating a loss reporting instruction corresponding to the loss reporting request; and sending the loss report instruction to the vehicle end so as to clear the key information corresponding to the key identification in the white list.
After receiving the loss report request, the service provider platform may record the NFC entity key as lost, write the recorded NFC entity key into the vehicle key blacklist, generate a loss report instruction corresponding to the loss report request, where the loss report instruction may include a key identifier, and then may send the loss report instruction to the vehicle end.
After receiving the loss report instruction, the vehicle end can search the key information corresponding to the key identifier in the white list of the NFC security module, and then can clear the key information corresponding to the key identifier, so that the key is in a loss report state and cannot be used further.
In an embodiment of the present application, the key control request may include a lock request, and step 303 may include the following sub-steps:
generating a locking instruction corresponding to the locking request; and sending the locking instruction to the vehicle end so as to set key information corresponding to the key identification as a locking identification in the white list.
After receiving the locking request, the service provider platform may generate a locking instruction corresponding to the locking request, where the locking instruction may include a key identifier, and then may send the locking instruction to the vehicle.
After receiving the locking instruction, the vehicle end may search key information corresponding to the key identifier in a white list of the NFC security module, and then may set a locking identifier in Token information of the key information, where if a value of "1" in a related field is updated to "0", the key is in a locked state, and under the condition that the locking identifier is set, the vehicle control function of the NFC entity key is limited.
In one example, since there are multiple vehicle control authorities, such as unlock vehicle authority, lock vehicle authority, start vehicle authority, auto-drive authority, etc., the lock identification may correspond to the vehicle control authority, such as lock identification a indicating that all vehicle control authorities are restricted and lock identification B indicating that part of the control vehicle authority is restricted, such as auto-drive authority is restricted.
In an embodiment of the present application, the key control request may include an unlocking request, and step 303 may include the following sub-steps:
generating an unlocking instruction corresponding to the unlocking request; and sending the unlocking instruction to the vehicle end so as to set the key information corresponding to the key identification as an unlocking identification in the white list.
After receiving the unlocking request, the service provider platform may generate an unlocking instruction corresponding to the unlocking request, where the unlocking instruction may include a key identifier, and then may send the unlocking instruction to the vehicle end.
After receiving the unlocking instruction, the vehicle end may search key information corresponding to the key identifier in a white list of the NFC security module, and then may set an unlocking identifier in Token information of the key information, where if a value of a relevant field is "0" and is updated to "1", the key is restored to the enabled state, and in the case of setting the unlocking identifier, the vehicle control function of the NFC entity key is restored.
In an embodiment of the present application, the key control request may include a validity period setting request, and the validity period setting request may further include validity period information, where if the NFC entity key is set to be valid for 100 hours of the vehicle driving time, or if the NFC entity key is set to be valid for 1000KM of the vehicle driving mileage, the validity period information may also be a fixed information, and if the NFC entity key is set to be valid 1 month 1 day before 2020, step 303 may include the following sub-steps:
generating a validity period setting instruction corresponding to the validity period setting request; and sending the validity period setting instruction to the vehicle end so as to update key information by adopting the validity period information in the white list.
After receiving the validity period setting request, the service provider platform may generate a validity period setting instruction corresponding to the validity period setting request, where the validity period setting instruction may include a key identifier and validity period information, and then may send the validity period setting instruction to the vehicle end.
After receiving the validity period setting instruction, the vehicle end may search the key information corresponding to the key identifier in the white list of the NFC security module, and then may update in the Token information of the key information by using the validity period information, so that when the current time period exceeds the time period in the validity period information, the key is in an expired state and cannot be used further.
In an embodiment of the present application, the key control request may include a permission control request, and the permission control request may further include permission information, such as an unlocking permission of the vehicle, a locking permission of the vehicle, a starting permission of the vehicle, and the like, then step 303 may include the following sub-steps:
generating an authority control instruction corresponding to the authority control request; and sending the authority control instruction to the vehicle end so as to update key information by adopting the authority information in the white list.
After receiving the authority control request, the service provider platform may generate an authority control instruction corresponding to the authority control request, where the authority control instruction may include a key identifier and authority information, and then may send the authority control instruction to the vehicle end.
After receiving the authority control instruction, the vehicle end can search the key information corresponding to the key identifier in the white list of the NFC security module, and then can update the token information of the key information by using the authority information.
In an embodiment of the present application, before step 303, the following steps may be further included:
verifying whether the current user is a vehicle owner user or an administrator user corresponding to the vehicle identifier; and executing step 303 when the current user is the owner user or the administrator user.
Before vehicle control is carried out, the service management platform can verify whether the current user is an owner user or an administrator user corresponding to the vehicle identifier, if the current user is not the owner user or the administrator user, subsequent vehicle control processes are not carried out, and if the current user is the owner user or the administrator user, the subsequent vehicle control processes are allowed to be carried out.
For example, the verification code may be issued to the phone of the owner/administrator corresponding to the NFC entity key, and the user inputs the verification code to perform verification, or the user may also input the id number (last six digits) of the owner/administrator, and compare the input id number with the pre-acquired id number.
In an embodiment of the present application, the method may further include the following steps:
when a response message reported by the vehicle end aiming at the key control request is received, identifying the NFC entity key as a control state corresponding to the key control request; and feeding back a control completion notice to the user terminal.
After the key information is successfully updated at the vehicle end, a response message can be fed back to the service provider platform, and the service provider platform identifies the NFC entity key as a control state corresponding to the key control request, such as a locking state, a loss report state, and the like.
After the control state is updated, the service provider platform may feed back a control completion notification to the user terminal, and the first application in the user terminal updates the state information corresponding to the NFC entity key in the display interface, or may feed back the control completion notification to the vehicle owner in a manner of a short message or the like.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the embodiments are not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the embodiments. Further, those skilled in the art will also appreciate that the embodiments described in the specification are presently preferred and that no particular act is required of the embodiments of the application.
Referring to fig. 4, a schematic structural diagram of a control device of a car key provided in an embodiment of the present application is shown, which relates to an NFC entity key, a read-write client, a service provider platform, and a vehicle end, and specifically may include the following modules:
a key generation request receiving module 401, configured to receive a key generation request sent by the read-write client; the key generation request comprises key information corresponding to the NFC entity key and a vehicle identifier;
a service key generation module 402, configured to generate a service key corresponding to the key information and the vehicle identifier; the key information comprises a key identification corresponding to the NFC entity key;
an encryption instruction sending module 403, configured to package the key identifier and the service key into an encryption instruction, and send the encryption instruction to the read-write client, so as to write the NFC entity key in the read-write client;
a key information sending module 404, configured to generate key information corresponding to the key identifier and the service key, and send the key information to a vehicle end corresponding to the vehicle identifier, so as to synchronize to a white list of an NFC security module in the vehicle end.
In an embodiment of the present application, the NFC physical key has a key number, and the apparatus further includes:
the key control request receiving module is used for receiving a key control request; wherein the key control request includes the key number;
the identification determining module is used for determining a key identification and a vehicle identification corresponding to the key number;
and the key information updating module is used for controlling an NFC safety module in the vehicle end corresponding to the vehicle identifier to update the key information in the white list according to the key control request.
In an embodiment of the present application, the apparatus further relates to a user terminal, where the user terminal is deployed with a first application corresponding to the service provider platform, and the key control request includes a request sent by the first application.
In an embodiment of the present application, the method further includes:
the user verification module is used for verifying whether the current user is a vehicle owner user or an administrator user corresponding to the vehicle identifier; and when the current user is a vehicle owner user or an administrator user, calling the key information updating module.
In an embodiment of the present application, the method further includes:
the control state identification module is used for identifying the NFC entity key as a control state corresponding to the key control request when receiving a response message reported by the vehicle end aiming at the key control request;
and the control completion feedback module is used for feeding back a control completion notice to the user terminal.
In an embodiment of the present application, the key control request includes a loss report request, and the key information updating module includes:
the loss reporting instruction generating submodule is used for generating a loss reporting instruction corresponding to the loss reporting request;
and the loss reporting instruction sending submodule is used for sending the loss reporting instruction to the vehicle end so as to clear the key information corresponding to the key identification in the white list.
In an embodiment of the present application, the key control request includes a lock request, and the key information update module includes:
the locking instruction generation submodule is used for generating a locking instruction corresponding to the locking request;
the locking instruction sending submodule is used for sending the locking instruction to the vehicle end so as to set key information corresponding to the key identification as a locking identification in the white list; wherein, in case of setting a locking flag, the controlling vehicle function of the NFC entity key is restricted.
In an embodiment of the present application, the key control request includes an unlocking request, and the key information updating module includes:
the unlocking request generation sub-module is used for generating an unlocking instruction corresponding to the unlocking request;
the unlocking request sending submodule is used for sending the unlocking instruction to the vehicle end so as to set key information corresponding to the key identification as an unlocking identification in the white list; wherein the control vehicle function of the NFC entity key is restored in case of setting an unlock flag.
In an embodiment of the present application, the key control request includes a validity period setting request, the validity period setting request further includes validity period information, and the key information update module includes:
the validity period setting instruction generating submodule is used for generating a validity period setting instruction corresponding to the validity period setting request;
and the validity period setting instruction sending submodule is used for sending the validity period setting instruction to the vehicle end so as to update the key information by adopting the validity period information in the white list.
In an embodiment of the present application, the key control request includes an authority control request, the authority control request further includes authority information, and the key information updating module includes:
the authority control instruction generating submodule is used for generating an authority control instruction corresponding to the authority control request;
and the authority control instruction sending submodule is used for sending the authority control instruction to the vehicle end so as to update key information by adopting the authority information in the white list.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
An embodiment of the present application also provides a vehicle, which may include a processor, a memory, and a computer program stored on the memory and capable of running on the processor, wherein the computer program, when executed by the processor, implements the steps of the above control method for the vehicle key.
An embodiment of the present application further provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the steps of the control method for the boarding key.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present application have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including the preferred embodiment and all such alterations and modifications as fall within the true scope of the embodiments of the application.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The method and the device for controlling the vehicle key are introduced in detail, and a specific example is applied in the description to explain the principle and the implementation of the present application, and the description of the above embodiment is only used to help understand the method and the core idea of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (20)

1. A control method of a car key relates to an NFC entity key, a read-write client, a service provider platform and a car end, and comprises the following steps:
receiving a key generation request sent by the read-write client; the key generation request comprises key information corresponding to the NFC entity key and a vehicle identifier;
generating a service key corresponding to the key information and the vehicle identifier; the key information comprises a key identification corresponding to the NFC entity key;
packaging the key identification and the service key into an encryption instruction, and sending the encryption instruction to the read-write client so as to write the NFC entity key in the read-write client;
generating key information corresponding to the key identification and the service key, and sending the key information to a vehicle end corresponding to the vehicle identification so as to synchronize to a white list of an NFC (near field communication) security module in the vehicle end;
wherein the NFC entity key has a key number, the method further comprising:
receiving a key control request; wherein the key control request includes the key number;
determining a key identification and a vehicle identification corresponding to the key number;
and controlling an NFC security module in the vehicle end corresponding to the vehicle identification to update the key information in the white list according to the key control request.
2. The method of claim 1, further comprising a user terminal deployed with a first application corresponding to the service provider platform, wherein the key control request comprises a request sent by the first application.
3. The method according to claim 2, further comprising, before the step of controlling, according to the key control request, an NFC security module in a vehicle end corresponding to the vehicle identifier to update key information in the white list:
verifying whether the current user is a vehicle owner user or an administrator user corresponding to the vehicle identifier;
and when the current user is a vehicle owner user or an administrator user, executing the step of controlling an NFC security module in a vehicle end corresponding to the vehicle identifier to update the key information in the white list according to the key control request.
4. The method of claim 2, further comprising:
when a response message reported by the vehicle end aiming at the key control request is received, identifying the NFC entity key as a control state corresponding to the key control request;
and feeding back a control completion notice to the user terminal.
5. The method according to claim 1, 2, 3 or 4, wherein the key control request includes a loss report request, and the step of controlling the NFC security module in the vehicle end corresponding to the vehicle identifier to update the key information in the white list according to the key control request includes:
generating a loss reporting instruction corresponding to the loss reporting request;
and sending the loss report instruction to the vehicle end so as to clear the key information corresponding to the key identification in the white list.
6. The method according to claim 1, 2, 3 or 4, wherein the key control request comprises a lock request, and the step of controlling the NFC security module in the vehicle end corresponding to the vehicle identifier to update the key information in the white list according to the key control request comprises:
generating a locking instruction corresponding to the locking request;
sending the locking instruction to the vehicle end so as to set key information corresponding to the key identification as a locking identification in the white list; wherein, in case of setting a locking flag, the controlling vehicle function of the NFC entity key is restricted.
7. The method according to claim 6, wherein the key control request includes an unlocking request, and the step of controlling, according to the key control request, the NFC security module in the vehicle side corresponding to the vehicle identifier to update the key information in the white list includes:
generating an unlocking instruction corresponding to the unlocking request;
sending the unlocking instruction to the vehicle end so as to set key information corresponding to the key identification as an unlocking identification in the white list; wherein the control vehicle function of the NFC entity key is restored in case of setting an unlock flag.
8. The method according to claim 1, 2, 3 or 4, wherein the key control request comprises a validity period setting request, the validity period setting request comprises validity period information, and the step of controlling the NFC security module in the vehicle end corresponding to the vehicle identifier to update the key information in the white list according to the key control request comprises the following steps:
generating a validity period setting instruction corresponding to the validity period setting request;
and sending the validity period setting instruction to the vehicle end so as to update key information by adopting the validity period information in the white list.
9. The method according to claim 1, 2, 3 or 4, wherein the key control request comprises an authority control request, the authority control request comprises authority information, and the step of controlling the NFC security module in the vehicle side corresponding to the vehicle identifier to update the key information in the white list according to the key control request comprises:
generating an authority control instruction corresponding to the authority control request;
and sending the authority control instruction to the vehicle end so as to update key information by adopting the authority information in the white list.
10. The utility model provides a controlling means of car key which characterized in that relates to NFC entity key, reading and writing customer end, service provider platform to and the vehicle end, the device includes:
a key generation request receiving module, configured to receive a key generation request sent by the read-write client; the key generation request comprises key information corresponding to the NFC entity key and a vehicle identifier;
the service key generation module is used for generating a service key corresponding to the key information and the vehicle identifier; the key information comprises a key identification corresponding to the NFC entity key;
an encryption instruction sending module, configured to package the key identifier and the service key into an encryption instruction, and send the encryption instruction to the read-write client, so as to write the NFC entity key in the read-write client;
the key information sending module is used for generating key information corresponding to the key identification and the service key and sending the key information to a vehicle end corresponding to the vehicle identification so as to synchronize to a white list of an NFC (near field communication) security module in the vehicle end;
wherein the NFC entity key has a key number, the apparatus further comprising:
the key control request receiving module is used for receiving a key control request; wherein the key control request includes the key number;
the identification determining module is used for determining a key identification and a vehicle identification corresponding to the key number;
and the key information updating module is used for controlling an NFC safety module in the vehicle end corresponding to the vehicle identifier to update the key information in the white list according to the key control request.
11. The apparatus of claim 10, wherein the apparatus further relates to a user terminal deployed with a first application corresponding to the service provider platform, and wherein the key control request comprises a request sent by the first application.
12. The apparatus of claim 11, further comprising:
the user verification module is used for verifying whether the current user is a vehicle owner user or an administrator user corresponding to the vehicle identifier; and when the current user is a vehicle owner user or an administrator user, calling the key information updating module.
13. The apparatus of claim 11, further comprising:
the control state identification module is used for identifying the NFC entity key as a control state corresponding to the key control request when receiving a response message reported by the vehicle end aiming at the key control request;
and the control completion feedback module is used for feeding back a control completion notice to the user terminal.
14. The apparatus of claim 10, 11, 12 or 13, wherein the key control request comprises a loss report request, and wherein the key information update module comprises:
the loss reporting instruction generating submodule is used for generating a loss reporting instruction corresponding to the loss reporting request;
and the loss reporting instruction sending submodule is used for sending the loss reporting instruction to the vehicle end so as to clear the key information corresponding to the key identification in the white list.
15. The apparatus of claim 10, 11, 12 or 13, wherein the key control request comprises a lock request, and wherein the key information update module comprises:
the locking instruction generation submodule is used for generating a locking instruction corresponding to the locking request;
the locking instruction sending submodule is used for sending the locking instruction to the vehicle end so as to set key information corresponding to the key identification as a locking identification in the white list; wherein, in case of setting a locking flag, the controlling vehicle function of the NFC entity key is restricted.
16. The apparatus of claim 15, wherein the key control request comprises an unlock request, and wherein the key information update module comprises:
the unlocking request generation sub-module is used for generating an unlocking instruction corresponding to the unlocking request;
the unlocking request sending submodule is used for sending the unlocking instruction to the vehicle end so as to set key information corresponding to the key identification as an unlocking identification in the white list; wherein the control vehicle function of the NFC entity key is restored in case of setting an unlock flag.
17. The apparatus according to claim 10, 11, 12 or 13, wherein the key control request includes a validity period setting request including validity period information, and the key information update module includes:
the validity period setting instruction generating submodule is used for generating a validity period setting instruction corresponding to the validity period setting request;
and the validity period setting instruction sending submodule is used for sending the validity period setting instruction to the vehicle end so as to update the key information by adopting the validity period information in the white list.
18. The apparatus of claim 10, 11, 12 or 13, wherein the key control request comprises a rights control request, wherein the rights control request comprises rights information, and wherein the key information update module comprises:
the authority control instruction generating submodule is used for generating an authority control instruction corresponding to the authority control request;
and the authority control instruction sending submodule is used for sending the authority control instruction to the vehicle end so as to update key information by adopting the authority information in the white list.
19. A vehicle, characterized by comprising a processor, a memory, and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the control method of vehicle keys according to any one of claims 1 to 9.
20. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method of controlling a vehicle key according to any one of claims 1 to 9.
CN201910410316.0A 2019-05-16 2019-05-16 Vehicle key control method and device Active CN110111472B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910410316.0A CN110111472B (en) 2019-05-16 2019-05-16 Vehicle key control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910410316.0A CN110111472B (en) 2019-05-16 2019-05-16 Vehicle key control method and device

Publications (2)

Publication Number Publication Date
CN110111472A CN110111472A (en) 2019-08-09
CN110111472B true CN110111472B (en) 2022-05-13

Family

ID=67490636

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910410316.0A Active CN110111472B (en) 2019-05-16 2019-05-16 Vehicle key control method and device

Country Status (1)

Country Link
CN (1) CN110111472B (en)

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110503758A (en) * 2019-08-23 2019-11-26 上海元城汽车技术有限公司 Control method, device, electronic equipment and the computer-readable medium of vehicle
CN111127709B (en) * 2019-12-17 2022-03-29 重庆邮电大学 Method for preparing automobile door lock key
CN113129483A (en) * 2020-01-13 2021-07-16 阿里巴巴集团控股有限公司 System and method for managing working condition of lock box
CN111402464A (en) * 2020-03-20 2020-07-10 科世达(上海)机电有限公司 Method, device and system for updating vehicle electronic key
CN111554008B (en) * 2020-04-22 2024-01-16 支付宝(杭州)信息技术有限公司 Digital key binding method, digital key verification method, mobile electronic equipment and near field communication device
CN113561934B (en) * 2020-04-29 2022-07-15 广州汽车集团股份有限公司 Vehicle anti-theft matching method, system, diagnostic instrument and storage medium
CN112311892A (en) * 2020-11-05 2021-02-02 深圳市道通科技股份有限公司 Automobile key matching method and device and automobile communication interface equipment
CN114582048B (en) * 2020-12-01 2023-09-05 比亚迪股份有限公司 NFC-based vehicle door control method, mobile terminal and vehicle
CN114582049A (en) * 2021-02-05 2022-06-03 长城汽车股份有限公司 Calibration parameter transmission method, mobile terminal and cloud server
WO2022174391A1 (en) * 2021-02-19 2022-08-25 深圳市汇顶科技股份有限公司 Vehicle key control method and apparatus, and vehicle and vehicle key body
CN112967429B (en) * 2021-03-12 2022-08-12 青岛中瑞车联电子科技有限公司 NFC lock control system and method
CN114598459B (en) * 2022-01-29 2024-04-19 上海钧正网络科技有限公司 Communication method, device and storage medium based on remote control equipment
CN114466357B (en) * 2022-02-28 2024-04-19 重庆长安汽车股份有限公司 Vehicle-mounted NFC card key binding system and method
CN114684070B (en) * 2022-03-23 2023-07-25 中汽创智科技有限公司 Safety vehicle control method and device, vehicle system and storage medium
CN114670779A (en) * 2022-04-07 2022-06-28 浙江极氪智能科技有限公司 Digital key sharing method and system
CN115019423B (en) * 2022-06-27 2023-10-24 无锡融卡科技有限公司 Bluetooth car key distribution system and implementation method thereof
CN115565268B (en) * 2022-08-30 2024-04-05 星汉智能科技股份有限公司 Automobile control method and system based on wireless automobile key, electronic equipment and storage medium
CN115273289B (en) * 2022-09-20 2023-01-17 上海银基信息安全技术股份有限公司 Physical key activation method, system, device, equipment and medium
CN115915131B (en) * 2022-10-20 2023-11-10 远峰科技股份有限公司 Vehicle key bidirectional encryption authentication method and system, vehicle binding device and NFC card
CN115909550A (en) * 2022-10-20 2023-04-04 远峰科技股份有限公司 NFC key verification method, device and system and computer readable storage medium
CN115527294B (en) * 2022-11-28 2023-03-24 广州万协通信息技术有限公司 NFC signal vehicle unlocking method of security chip and security chip device
CN115938022B (en) * 2022-12-12 2023-11-24 远峰科技股份有限公司 Vehicle entity key safety authentication method and system
CN117690214A (en) * 2023-12-07 2024-03-12 小米汽车科技有限公司 Vehicle key processing method and device, storage medium and vehicle
CN117711099A (en) * 2023-12-15 2024-03-15 小米汽车科技有限公司 NFC car key processing method and device, storage medium and car

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2513843Y (en) * 2001-12-20 2002-10-02 蒋楚明 Intelligent IC identifying anti-theft lock device for automobile
CN101343961A (en) * 2008-07-29 2009-01-14 上海世科嘉车辆技术研发有限公司 Non-key gate control system
CN105959277A (en) * 2016-04-27 2016-09-21 四川效率源信息安全技术股份有限公司 Method of locking/unlocking computer screen based on NFC terminal
SG10201607277VA (en) * 2016-09-01 2018-04-27 Mastercard International Inc Method and system for access control
CN107393079B (en) * 2017-07-26 2020-09-11 北京小米移动软件有限公司 Virtual vehicle key management method and device and storage medium
CN107685714B (en) * 2017-08-30 2022-05-31 博泰车联网科技(上海)股份有限公司 Intelligent vehicle key system and control method thereof
CN108108598A (en) * 2017-12-15 2018-06-01 蔚来汽车有限公司 Vehicle authorization management method and system

Also Published As

Publication number Publication date
CN110111472A (en) 2019-08-09

Similar Documents

Publication Publication Date Title
CN110111472B (en) Vehicle key control method and device
CN110091828B (en) Vehicle key control method and device
CN110136306B (en) Vehicle key control method and system
CN110103883B (en) Vehicle key control method and device
CN110126782B (en) Vehicle intelligent key application method and device
JP5189073B2 (en) Personal property, in particular a method, computer program and personal property for protecting automobiles from unauthorized use
CN110065470B (en) Automobile control method and device based on NFC automobile key, automobile and storage medium
US11330432B2 (en) Maintenance system and maintenance method
CN107650863A (en) Vehicle sharing method and system
CN105704131A (en) Vehicle lock control method and cloud management server
CN110381199B (en) Unlocking method and unlocking system with mobile phone as automobile key
WO2022127146A1 (en) In-vehicle service authorization activation method, device, and vehicle
CN109587164A (en) A kind of information encrypting transmission method, device, equipment and storage medium
CN108791188B (en) Vehicle control method, device and system
CN117692185A (en) Electronic seal using method and device, electronic equipment and storage medium
US20160078235A1 (en) Device and management module
CN109743283B (en) Information transmission method and equipment
CN110091829A (en) A kind of control method and device of car key
CN114255533B (en) Intelligent lock system and implementation method thereof
CN116541054A (en) Off-line upgrading method for automobile software
CN113343203A (en) Digital car key processing method, equipment and platform system
CN113362505B (en) Automobile intelligent key learning method, storage medium, equipment and device
EP3614347B1 (en) Mobile phone as a car key
CN115883165A (en) ECU identity authentication method, key management method, device, T-Box and server
CN115601861A (en) Intelligent automobile door lock opening and closing method based on quantum random number and control system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant