CN110136306A - Vehicle key control method and system - Google Patents

Vehicle key control method and system Download PDF

Info

Publication number
CN110136306A
CN110136306A CN201910406843.4A CN201910406843A CN110136306A CN 110136306 A CN110136306 A CN 110136306A CN 201910406843 A CN201910406843 A CN 201910406843A CN 110136306 A CN110136306 A CN 110136306A
Authority
CN
China
Prior art keywords
key
nfc
user terminal
vehicle end
virtual
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910406843.4A
Other languages
Chinese (zh)
Other versions
CN110136306B (en
Inventor
李向荣
周波
刘毅林
陆宇哲
何光波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Xiaopeng Motors Technology Co Ltd
Original Assignee
Guangzhou Xiaopeng Motors Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Xiaopeng Motors Technology Co Ltd filed Critical Guangzhou Xiaopeng Motors Technology Co Ltd
Priority to CN201910406843.4A priority Critical patent/CN110136306B/en
Publication of CN110136306A publication Critical patent/CN110136306A/en
Application granted granted Critical
Publication of CN110136306B publication Critical patent/CN110136306B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00412Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted

Abstract

The embodiment of the application provides a vehicle key control method and a vehicle key control system, wherein the system comprises a first user terminal, a service provider platform and a vehicle end; the first user terminal is used for responding to user operation, generating a virtual key creating request aiming at the vehicle end and sending the virtual key creating request to the service provider platform; the service provider platform is used for creating an NFC virtual key corresponding to the virtual key creation request, and establishing a binding relationship among the vehicle terminal, the first user terminal and the NFC virtual key so as to issue the NFC virtual key to the first user terminal; and the vehicle end is used for verifying the NFC virtual key bound by the first user terminal when the first user terminal is detected, and controlling the vehicle when the verification is passed. Through this application embodiment, realized the control to NFC car key, promoted convenience, the security of car key control.

Description

A kind of control method and system of car key
Technical field
This application involves automotive fields, more particularly to the control method and system of a kind of car key.
Background technique
With the development of science and technology, automobile has become the vehicles that cannot lack in life, in the use of automobile In the process, key must be used to carry out out/lock door, start/and close the operation such as engine, the key of automobile usually has machinery Key, integral remote-controlled key etc..
Mechanical key, also referred to as blade key are only used for basic enabling and lock a door, have a single function, is inconvenient to carry, and its For inactive component, anti-theft is bad.
Integral remote-controlled key is to be made of blade key and chip key, due to increasing chip key, compensates for knife Piece key anti-theft, and whistle can also be carried out using chip key and look for the functions such as vehicle, but its there is also have a single function, volume it is big The problems such as inconvenient to carry.
Summary of the invention
In view of the above problems, it proposes in order to provide overcoming the above problem or at least being partially solved the one of the above problem The control method and system of kind car key, comprising:
A kind of control system of car key, the system comprises the first user terminal, Service Provider Platform and vehicles End;
First user terminal, the virtual key for generating for the vehicle end in response to user's operation create Request, and it is sent to the Service Provider Platform;
The Service Provider Platform, for creating the virtual key of NFC corresponding with the virtual key request to create, and The binding relationship of the vehicle end, first user terminal and the virtual key of the NFC is established, the NFC is virtual Key is issued to first user terminal;
The vehicle end, the NFC for being bound to first user terminal when detecting first user terminal Virtual key is verified, and vehicle control is carried out when being verified.
Optionally, first user terminal is deployed with the first application corresponding with the Service Provider Platform, described The exit passageway permission that first application has first user terminal open;
The virtual key request to create includes a vehicles identifications;The Service Provider Platform creation with it is described virtual The virtual key of the corresponding NFC of key request to create, and it is empty to establish the vehicle end, first user terminal and the NFC When the binding relationship of quasi- key, it is specifically used for:
Determine the first key information corresponding with first user terminal;
Create the first business cipher key corresponding with first key information, the vehicles identifications;
Generate first key information corresponding with first business cipher key;
The first key information is pushed into the corresponding vehicle end of the vehicles identifications, to be synchronized in the vehicle end The white list of NFC security module, and applied by described first, first business cipher key is written according to exit passageway permission NFC encryption chip in first user terminal.
Optionally, the system also includes safety element provider platform, first user terminal be deployed with it is described Corresponding first application of Service Provider Platform and the second application corresponding with safety element provider platform;
The virtual key request to create includes a vehicles identifications;The Service Provider Platform creation with it is described virtual The virtual key of the corresponding NFC of key request to create, and it is empty to establish the vehicle end, first user terminal and the NFC When the binding relationship of quasi- key, it is specifically used for:
Determine the first key information corresponding with first user terminal;
Create the first business cipher key corresponding with first key information, the vehicles identifications;
Generate first key information corresponding with first business cipher key;
The first key information is pushed into the corresponding vehicle end of the vehicles identifications, to be synchronized in the vehicle end The white list of NFC security module, and by safety element provider platform and second application, by first business NFC encryption chip in first user terminal is written in key.
Optionally, the vehicle end is when detecting first user terminal, to first user terminal binding When the virtual key of NFC is verified, it is specifically used for:
Whether the virtual key of NFC for verifying the first user terminal binding meets preset condition;
If meeting first preset condition, determine that the virtual key authentication of NFC of the first user terminal binding is logical It crosses;
Wherein, first preset condition includes following multinomial:
The first key identification in first user terminal is stored in the white list of NFC security module in the vehicle end In, the white list storage first key information corresponding with first key identification in token information effectively, using with Machine number challenge response mode is verified corresponding first business cipher key of the virtual key of the NFC.
Optionally, the Service Provider Platform, is also used to:
Receive the first key controller request that first user terminal is sent;
It is requested according to first key controller, key controller is carried out to the virtual key of the NFC.
Optionally, the system further relates to second user terminal, and the Service Provider Platform is to the virtual key of the NFC When spoon carries out key controller, it is specifically used for:
The virtual key of the NFC is shared to the second user terminal;
And/or permission update is carried out to the virtual key of the NFC.
A kind of control system of car key, the system comprises NFC physical key, read-write terminal, Service Provider Platform, And vehicle end;
The read-write terminal for generating the key generation request for being directed to the NFC physical key, and is sent to the clothes Business provider's platform;
The Service Provider Platform is requested for being generated according to the key, is generated corresponding with the NFC physical key Third business cipher key, and establish the binding relationship of the NFC physical key and the vehicle end, the third business is close Key is written to the NFC physical key;
The vehicle end, for being verified to the virtual key of the NFC when detecting the NFC physical key, and Vehicle control is carried out when being verified.
Optionally, it includes the corresponding third key information of the NFC physical key and the vehicle that the key, which generates request, Corresponding vehicles identifications in end;
The Service Provider Platform is generating request according to the key, generates corresponding with the NFC physical key Third business cipher key, and when establishing the binding relationship of the NFC physical key and the vehicle end, it is specifically used for:
Generate third business cipher key corresponding with the third key information and the vehicles identifications;Wherein, the third Key information includes the corresponding third key identification of the NFC physical key;
The third key identification and the third business cipher key are packaged as encrypted instruction, and are sent to the read-write visitor Family end, the NFC physical key is written by the read-write client;
Third key information corresponding with the third key identification and the third business cipher key is generated, and is sent to institute It states in vehicle end, to be synchronized to the white list of NFC security module in the vehicle end.
Optionally, the vehicle end verifies the virtual key of the NFC when detecting the NFC physical key When, it is specifically used for:
Verify whether the NFC physical key meets the second preset condition;
If meeting second preset condition, determine that the NFC physical key is verified;
Wherein, second preset condition includes following multinomial:
Third key identification in the NFC physical key is stored in the white list of NFC security module in the vehicle end In, the white list storage third key information corresponding with the third key identification in token information effectively, using with Machine number challenge response mode is verified the corresponding third business cipher key of the NFC physical key.
Optionally, the Service Provider Platform, is also used to:
Receive the request of the second key controller;
It is requested according to second key controller, permission update is carried out to the NFC physical key.
A kind of control method of car key, is related to user terminal, Service Provider Platform and vehicle end, the method Include:
Receive the virtual key request to create for the vehicle end that first user terminal is sent;
The creation virtual key of NFC corresponding with the virtual key request to create;
Establish the binding relationship of the vehicle end, first user terminal and the virtual key of the NFC, and by institute It states the virtual key of NFC and is issued to first user terminal, so that the vehicle end is when detecting first user terminal, The virtual key of NFC of first user terminal binding is verified, and carries out vehicle control when being verified.
Optionally, first user terminal is deployed with the first application corresponding with the Service Provider Platform, described The exit passageway permission that first application has first user terminal open, the virtual key request to create include a vehicle Mark;The step of creation NFC corresponding with the virtual key request to create virtual key includes:
Determine the first key information corresponding with first user terminal;
Create the first business cipher key corresponding with first key information, the vehicles identifications;
Generate first key information corresponding with first business cipher key;
The binding relationship for establishing the vehicle end, first user terminal and the virtual key of the NFC, and The step of virtual key of the NFC is issued to first user terminal include:
The first key information is pushed into the corresponding vehicle end of the vehicles identifications, to be synchronized in the vehicle end The white list of NFC security module;
It is applied by described first, first business cipher key is written by the first user end according to exit passageway permission NFC encryption chip in end.
Optionally, the method further relates to safety element provider platform, first user terminal be deployed with it is described Corresponding first application of Service Provider Platform and the second application corresponding with safety element provider platform, it is described virtual Key request to create includes a vehicles identifications;The creation virtual key of NFC corresponding with the virtual key request to create Step includes:
Determine the first key information corresponding with first user terminal;
Create the first business cipher key corresponding with first key information, the vehicles identifications;
Generate first key information corresponding with first business cipher key;
The binding relationship for establishing the vehicle end, first user terminal and the virtual key of the NFC, and The step of virtual key of the NFC is issued to first user terminal include:
The first key information is pushed into the corresponding vehicle end of the vehicles identifications, to be synchronized in the vehicle end The white list of NFC security module;
By safety element provider platform and second application, first business cipher key is written described the NFC encryption chip in one user terminal.
A kind of control method of car key, is related to NFC physical key, read-write terminal, Service Provider Platform and vehicle End, which comprises
It receives the third key for the NFC physical key that the read-write terminal is sent and generates request;
It is generated and is requested according to the third key, generate third business cipher key corresponding with the NFC physical key;
Establish the binding relationship of the NFC physical key and the vehicle end, and by the third business cipher key be written to The NFC physical key, to test the virtual key of the NFC when the vehicle end detects the NFC physical key Card, and vehicle control is carried out when being verified.
A kind of vehicle, including processor, memory and be stored on the memory and can transport on the processor Capable computer program, the computer program realize the control method of car key as described above when being executed by the processor The step of.
A kind of computer readable storage medium stores computer program, the meter on the computer readable storage medium The step of calculation machine program realizes the control method of car key as described above when being executed by processor.
The embodiment of the present application has the advantage that
In the embodiment of the present application, it is used to generate in response to user's operation and be directed to vehicle by the first user terminal of setting The virtual key request to create at end, and it is sent to Service Provider Platform, Service Provider Platform is for creating and virtual key The virtual key of the corresponding NFC of request to create, and the binding for establishing vehicle end, the first user terminal and the virtual key of NFC is closed The virtual key of NFC is issued to the first user terminal by system, and vehicle end is used for when detecting the first user terminal, to first The virtual key of NFC of user terminal binding is verified, and vehicle control is carried out when being verified, and is realized to NFC vehicle key The control of spoon improves convenience, the safety of car key control.
Detailed description of the invention
It, below will be to attached needed in the description of the present application in order to illustrate more clearly of the technical solution of the application Figure is briefly described, it should be apparent that, the drawings in the following description are only some examples of the present application, for this field For those of ordinary skill, without any creative labor, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is a kind of structural schematic diagram of the control system for car key that one embodiment of the application provides;
Fig. 2 is the structural schematic diagram of the control system for another car key that one embodiment of the application provides;
Fig. 3 is a kind of step flow chart of the control method for car key that one embodiment of the application provides;
Fig. 4 is the step flow chart of the control method for another car key that one embodiment of the application provides.
Specific embodiment
In order to make the above objects, features, and advantages of the present application more apparent, with reference to the accompanying drawing and it is specific real Applying mode, the present application will be further described in detail.Obviously, described embodiment is some embodiments of the present application, without It is whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not before making creative work Every other embodiment obtained is put, shall fall in the protection scope of this application.
Referring to Fig.1, a kind of structural schematic diagram of the control system of car key of one embodiment of the application offer is provided, it should System may include the first user terminal 101, service provider's (SP, Service Provider) platform 102 and vehicle end 103。
Wherein, the first user terminal can be support NFC (Near Field Communication, near-field communication) function Terminal, such as mobile phone, smartwatch can have NFC encryption chip, NFC encryption chip can be a kind of embedded peace Full element (eSE, Embedded Secure Element).
Service Provider Platform can be communicated with the first application and vehicle end in the first user terminal, can be set There is SP TSM (Trusted Service Management, trusted service management) server, is also provided with the virtual key of NFC Spoon service server (Virtual Key Management, VKM), hierarchical storage management (Hierarchical Storage Management, HSM) encryption equipment etc..
Vehicle end is disposed in the car, can have NFC security module, NFC security module can be used as the lock of vehicle Core, inside can integrate safety chip, and NFC security module can with the NFC inductor for being deployed in vehicle side and communicate mould Block is connected, and NFC security module can be communicated by communication module with Service Provider Platform, when the first user terminal leans on Nearly NFC inductor, NFC inductor can carry out reading data, Jin Eryu for the virtual key of NFC in the first user terminal The data stored in NFC security module are verified.
Various pieces are described in detail below:
First user terminal 101
First user terminal, the virtual key for generating for the vehicle end in response to user's operation create Request, and it is sent to the Service Provider Platform.
In the concrete realization, user can be by operating in the first user terminal, and determination will create virtual key Vehicle, in response to user's operation, the virtual key request to create for vehicle end is can be generated in the first user terminal, then may be used To be sent to Service Provider Platform.
Service Provider Platform 102
The Service Provider Platform, for creating the virtual key of NFC corresponding with the virtual key request to create, and The binding relationship of the vehicle end, first user terminal and the virtual key of the NFC is established, the NFC is virtual Key is issued to first user terminal.
After receiving virtual key request to create, Service Provider Platform can be created and virtual key request to create pair Then the virtual key of the NFC answered can establish the binding relationship of vehicle end, the first user terminal and the virtual key of NFC, and The virtual key of the NFC created can be issued to the first user terminal, allow a user to carry out vehicle using the first user terminal Control.
" binding " scheme one
In one embodiment of the application, the first user terminal can be deployed with corresponding with Service Provider Platform first and answer With such as the first application can be vehicle management application, the exit passageway permission that the first application has the first user terminal open.
Specifically, having security domain due to creating in NFC encryption chip, pass through OMAPI (Open MobileAPI), user Terminal applies security domain in accessible NFC encryption chip at the middle and upper levels, and then can establish the peace that the first application is directed to security domain Full tunnel permission.
Wherein, virtual key request to create may include the corresponding vehicles identifications of vehicle end, as Vehicle Identify Number (VIN, Vehicle IdentificationNumber)。
In one embodiment, Service Provider Platform is in creation NFC void corresponding with the virtual key request to create When intending key, and establishing the binding relationship of the vehicle end, first user terminal and the virtual key of the NFC, specifically For:
Determine the first key information corresponding with first user terminal;Creation and first key information, described Corresponding first business cipher key of vehicles identifications;Generate first key information corresponding with first business cipher key;By described One key information pushes to the corresponding vehicle end of the vehicles identifications, to be synchronized to the white of NFC security module in the vehicle end List, and applied by described first, first business cipher key is written by the first user end according to exit passageway permission NFC encryption chip in end.
In practical applications, the key information stored in each user terminal is uniquely, then to receive the first use After the virtual key request to create that family terminal is sent, Service Provider Platform can determine corresponding first key of the first user terminal Spoon information.
Specifically, the first key information may include the first key identification, Service Provider Platform can be the first user Terminal creates unique first key identification, and then the first key identification can be sent to in the first user terminal first answered With the first key identification can be stored in the first user terminal in NFC encryption chip by the first application.
Since key information is unique in same user terminal, and multiple virtual keys can be created in a user terminal Spoon, each virtual key can correspond to a vehicle, then Service Provider Platform can create the first business cipher key, and can store The corresponding relationship of vehicles identifications, the first key information and the first business cipher key completes vehicle, user terminal, virtual key The binding of spoon.
Specifically, the first business cipher key can be by AES (Advanced Encryption Standard, superencipherment mark It is quasi-) 128 algorithms, combining encryption machine generates, can be used for carrying out response challenge with the NFC security module of vehicle end, complete key Spoon authentication.
After generating the first business cipher key, Service Provider Platform can be believed in conjunction with the first business cipher key and the first key Breath generates first key information.
Specifically, corresponding first token (Token) information of the first business cipher key can be determined, such as authority information, effectively Phase information etc., can by user setting or use default setting, then can by the first business cipher key, the first key identification, And first token information be organized into first key information.
After generating the first business cipher key, since the first application has exit passageway permission, Service Provider Platform can be with NFC encryption chip in the first user terminal is written into the first business cipher key by the first application, without the first user terminal Safety element provider (SEI, Secure Element Issuer) corresponding application program of platform, efficiency and process are reliable Property is more preferably.
Correspondingly, first key information can be pushed to vehicle end by Service Provider Platform, the NFC safety in vehicle end First key information can be stored in white list by module, complete the activation of the virtual key of NFC, then key is in and has enabled shape State.
" binding " scheme two
In one embodiment of the application, which can also include safety element provider platform, safety element provider Platform can be communicated with the second application in the first user terminal, and SEI TSM server can be set.
First user terminal can be deployed with the first application corresponding with Service Provider Platform, and such as the first application can be Vehicle management application can also be deployed with the second application corresponding with safety element provider platform, and such as the second application can be Wallet System application.
Wherein, virtual key request to create includes a vehicles identifications.
In another embodiment, Service Provider Platform is in creation NFC corresponding with the virtual key request to create Virtual key, and when establishing the binding relationship of the vehicle end, first user terminal and the virtual key of the NFC, tool Body is used for:
Determine the first key information corresponding with first user terminal;Creation and first key information, described Corresponding first business cipher key of vehicles identifications;Generate first key information corresponding with first business cipher key;By described One key information pushes to the corresponding vehicle end of the vehicles identifications, to be synchronized to the white of NFC security module in the vehicle end List, and by safety element provider platform and second application, first business cipher key is written described the NFC encryption chip in one user terminal.
In practical implementations, the key information stored in each user terminal is uniquely, then to receive the first use After the virtual key request to create that family terminal is sent, Service Provider Platform can determine corresponding first key of the first user terminal Spoon information.
Specifically, Service Provider Platform can create unique first key identification for the first user terminal, then may be used The first key identification is sent to the first application in the first user terminal, the first key identification can be stored in by the first application In first user terminal in NFC encryption chip.
Since key information is unique in same user terminal, and multiple virtual keys can be created in a user terminal Spoon, each virtual key can correspond to a vehicle, then Service Provider Platform can create the first business cipher key, and can store The corresponding relationship of vehicles identifications, the first key information and the first business cipher key completes vehicle, user terminal, virtual key The binding of spoon.
Specifically, the first business cipher key can be by AES (Advanced Encryption Standard, superencipherment mark It is quasi-) 128 algorithms, combining encryption machine generates, can be used for carrying out response challenge with the NFC security module of vehicle end, complete key Spoon authentication.
After generating the first business cipher key, Service Provider Platform can be believed in conjunction with the first business cipher key and the first key Breath generates first key information.
Specifically, corresponding first token information of the first business cipher key can be determined, such as authority information, validity period information Deng, by user setting or default setting can be used, then can be by the first business cipher key, the first key identification, Yi Ji One token information is organized into first key information.
After generating the first business cipher key, Service Provider Platform can call TSM in safety element provider platform to take By the second application NFC encryption chip in the first user terminal is written in first cryptographic key by the write-in rights interface of business device.
Correspondingly, first key information can be pushed to vehicle end by Service Provider Platform, the NFC safety in vehicle end First key information can be stored in white list by module, complete the activation of the virtual key of NFC, then key is in and has enabled shape State.
Vehicle end 103
The vehicle end, the NFC for being bound to first user terminal when detecting first user terminal Virtual key is verified, and vehicle control is carried out when being verified.
In one embodiment of the application, vehicle end is whole to first user when detecting first user terminal When the virtual key of NFC of end binding is verified, it is specifically used for:
Whether the virtual key of NFC for verifying the first user terminal binding meets preset condition;If meeting described first Preset condition then determines that the virtual key authentication of NFC of the first user terminal binding passes through.
Wherein, the first preset condition may include following multinomial:
The first key identification in first user terminal is stored in the white list of NFC security module in the vehicle end In, the white list storage first key information corresponding with first key identification in token information effectively, using with Machine number challenge response mode is verified corresponding first business cipher key of the virtual key of the NFC.
After activating the virtual key of NFC, when the first user terminal is close to vehicle end, the two can carry out near-field communication, then The NFC encryption chip storage virtual key of NFC in the first user terminal can be verified by vehicle end, after being verified, It the operation such as can be unlocked, start engine in vehicle end.
When the first key identification stored in the first user terminal of verifying is in white list, the corresponding order of the first key identification The first business cipher key that board information effectively, in the first user terminal stores is verified, then determines vehicle end to the first user end The virtual key of NFC is verified in end.
" key controller " scheme
In one embodiment of the application, Service Provider Platform be can be also used for:
Receive the first key controller request that first user terminal is sent;It is requested according to first key controller, Key controller is carried out to the virtual key of the NFC.
In practical applications, user can select in the selected virtual key of NFC created of the first user terminal and carry out key The type of spoon control, such as key is shared, permission updates, and the request of the first key controller then can be generated, service provider is flat Platform can be requested according to the first key controller received, carry out key controller to the virtual key of the NFC.
In one embodiment of the application, which further relates to second user terminal, and Service Provider Platform is to the NFC When virtual key carries out key controller, it is specifically used for:
The virtual key of the NFC is shared to the second user terminal;
And/or permission update is carried out to the virtual key of the NFC.
" virtual key sharing " scheme one
In one embodiment of the application, second user terminal can be deployed with third corresponding with Service Provider Platform and answer With third applies the exit passageway permission with second user open-destination.
It is as follows that specific key shares process:
Receive the virtual key sharing request for the vehicle end that first application is sent;Wherein, described virtual Key sharing request includes the corresponding terminal iidentification of the second user terminal;Determine corresponding with the second user terminal the Two key informations;Create the second business cipher key corresponding with second key information, the vehicles identifications;It generates and described the Corresponding second key information of two business cipher keys;Second key information is pushed into the vehicle end, it is described to be synchronized to The white list of NFC security module in vehicle end, and by the third application, according to the exit passageway permission by described second NFC encryption chip in the second user terminal is written in business cipher key.
Wherein, the second key information may include the second key identification.
In practical applications, due to first application in login user be car owner or administrator, as car owner or administrator When user needs to share virtual key to second user terminal, then it can carry out virtual key and share interface, input second user Such as the user information of login user in third application and then the void for vehicle end can be generated in the corresponding terminal iidentification of terminal Quasi- key sharing request.
If formerly stored second key identification, Service Provider Platform can directly determine to second user terminal Corresponding second key identification of two user terminals.
If formerly second user can be generated in not stored second key identification, Service Provider Platform to second user terminal Corresponding second key identification of terminal, is then sent to the second user terminal for the second key identification, by described second Key identification is stored in NFC encryption chip in second user terminal.
After determining the second key information, vehicles identifications, Service Provider Platform can create the first business cipher key, and can To store the corresponding relationship of vehicles identifications, the second key information and the second business cipher key.
Specifically, the second business cipher key can be by AES (Advanced Encryption Standard, superencipherment mark It is quasi-) 128 algorithms, combining encryption machine generates, can be used for carrying out response challenge with the NFC security module of vehicle end, complete key Spoon authentication.
In the concrete realization, corresponding second token information of the second business cipher key can be determined, such as authority information, validity period Information etc. by user setting or can use default setting, then can by the second business cipher key, the second key identification, with And second token information be organized into the second key information.
After generating the second key information, being applied due to third has exit passageway permission, and Service Provider Platform can be with By third application, the second business cipher key is written by NFC encryption chip in second user terminal according to exit passageway permission, and can The second key information is pushed to vehicle end, the second key information can be stored in white by the NFC security module in vehicle end In list, the activation of the virtual key of NFC is completed, then key is in initiate mode.
" virtual key sharing " scheme two
In one embodiment of the application, second user terminal can be deployed with corresponding with the Service Provider Platform Three applications if third application can be vehicle management application, and can be deployed with corresponding with safety element provider platform the Four applications, such as the 4th application can be Wallet System application.
It is as follows that specific key shares process:
Receive the virtual key sharing request for the vehicle end that first application is sent;Wherein, described virtual Key sharing request includes the corresponding terminal iidentification of the second user terminal;Determine corresponding with the second user terminal the Two key informations;Create the second business cipher key corresponding with second key information, the vehicles identifications;It generates and described the Corresponding second key information of two business cipher keys;Second key information is pushed into the vehicle end, it is described to be synchronized to The white list of NFC security module in vehicle end, and by safety element provider platform and the 4th application, it will be described NFC encryption chip in the second user terminal is written in second business cipher key.
In practical applications, due to first application in login user be car owner or administrator, as car owner or administrator When user needs to share virtual key to second user terminal, then it can carry out virtual key and share interface, input second user Such as the user information of login user in third application and then the void for vehicle end can be generated in the corresponding terminal iidentification of terminal Quasi- key sharing request.
In the concrete realization, if first stored second key identification of second user terminal, Service Provider Platform Corresponding second key identification of second user terminal can be directly determined.
If formerly second user can be generated in not stored second key identification, Service Provider Platform to second user terminal Corresponding second key identification of terminal, is then sent to second user terminal for the second key identification, by the second key identification It is stored in NFC encryption chip in second user terminal.
After determining the second key information, vehicles identifications, Service Provider Platform can create the first business cipher key, and can To store the corresponding relationship of vehicles identifications, the second key information and the second business cipher key.
Specifically, the second business cipher key can be by AES (Advanced Encryption Standard, superencipherment mark It is quasi-) 128 algorithms, combining encryption machine generates, can be used for carrying out response challenge with the NFC security module of vehicle end, complete key Spoon authentication.
In the concrete realization, corresponding second token information of the second business cipher key can be determined, such as authority information, validity period Information etc. by user setting or can use default setting, then can by the second business cipher key, the second key identification, with And second token information be organized into the second key information.
After generating the second key information, Service Provider Platform can call TSM in safety element provider platform to take By the 4th application NFC encryption chip in second user terminal is written in second cryptographic key by the write-in rights interface of business device.
Correspondingly, the second key information can be pushed to vehicle end by Service Provider Platform, the NFC safety in vehicle end Second key information can be stored in white list by module, complete the activation of the virtual key of NFC, then key is in and has enabled shape State.
" permission update " scheme
In one embodiment of the application, concrete power limit renewal process is as follows:
Receive the first key controller request that first application is sent;Control in the vehicle end NFC security module more Key information corresponding with the first key controller request in the new white list.
In the concrete realization, user can select the virtual key of a certain NFC in the first application, and then selection carries out key The type of control, such as delete, locking, the request of the first key controller is generated, and be sent to Service Provider Platform, service provides Quotient's platform can receive the request of the first key controller.
After receiving the request of the first key controller, Service Provider Platform can determine that the request of the first key controller corresponds to Key information, such as the first key controller request may include key number, due to being stored in advance in Service Provider Platform Key information can then search key and number corresponding key information.
Certainly, the request of the first key controller can also direct carrying keys information, then can directly be requested from key controller Middle determining key information, without being searched in platform.
After determining key information corresponding with the request of the first key controller, it can request to correspond to according to the first key controller Control Cooling, such as delete, locking, unlock, control vehicle end in NFC security module update white list in the key information Corresponding key information.
In fact, it can be first key information, i.e. car owner or management that the first key controller, which requests corresponding key information, The owned key of member's user's control, it may be the second key information that the first key controller, which requests corresponding key information, I.e. car owner or administrator control the key for being shared with other people.
In one example, the first key controller request may include removal request, can be generated what vehicle end can identify Instruction is deleted, instruction then will be deleted and be sent to vehicle end, after receiving deletion instruction, vehicle end can be in NFC chip In white list, the corresponding key information of pre-stored removal request is deleted.
For being shared with the virtual key of second user terminal, i.e. the corresponding key information of removal request is the second key letter Breath can will then delete instruction and be sent to second user terminal, and after receiving and deleting instruction, second user terminal can be from In NFC encryption chip, corresponding second key information of pre-stored second key information is deleted.
In one example, the first key controller request may include locking request, can be generated what vehicle end can identify Then lock instruction is sent to vehicle end by lock instruction, after receiving lock instruction, vehicle end can be in NFC chip The corresponding key information of locking request that storage is searched in white list, then can be in the order of the corresponding key information of locking request In board information, being set as locking mark, such as there is " 1 " to be updated to " 0 " value of relevant field, then key is in locked state, In the case where setting locking mark, the control vehicle functions of the virtual key of the corresponding NFC of the locking request are limited.
Due to a variety of vehicle control permissions, such as unlock vehicle permission, locking vehicle permission, starting vehicle permission, from Dynamic to drive permission etc., then locking mark can be corresponding with vehicle control permission, and such as locking mark A characterizes all vehicle control permissions It is all limited, locking mark B characterization part control vehicle control permission is limited, as automatic Pilot permission is limited.
In one example, the first key controller request may include unlocking request, can be generated what vehicle end can identify Then unlock instruction is sent to vehicle end by unlock instruction, after receiving unlock instruction, vehicle end can be in NFC chip The corresponding key information of unlocking request that storage is searched in white list, then can be in the order of the corresponding key information of unlocking request In board information, it is set as unlock mark, such as has " 0 " to be updated to " 1 " value of relevant field, then key, which reverts to, has enabled shape State, in the case where setting unlock mark, the control vehicle functions of the virtual key of the corresponding NFC of the unlocking request are resumed.
In one example, the request of the first key controller may include validity period setting request, and validity period setting request may be used also To include validity period information, receive validity period setting instruction after, vehicle end can in the white list of NFC security module, It searches validity period setting and requests corresponding key information, then can use validity period information, request is set in validity period and is corresponded to Key information token information in be updated, then the current time limit be more than validity period information in time limit when, key is in State out of date can not further use.
In one example, the request of the first key controller may include priority assignation request, and validity period setting request can be with Including authority information, after receiving validity period setting instruction, vehicle end can be searched in the white list of NFC security module Priority assignation requests corresponding key information, then can use authority information, requests corresponding key information in priority assignation Token information in be updated, then when current operation is not in the corresponding opereating specification of authority information, can not further make With.
Referring to Fig. 2, a kind of structural schematic diagram of the control system of car key of one embodiment of the application offer is shown, it should System may include NFC physical key 201, read-write terminal 202, Service Provider Platform 203 and vehicle end 204.
Various pieces are described in detail below:
Read-write terminal 202
The read-write terminal for generating the key generation request for being directed to the NFC physical key, and is sent to the clothes Business provider's platform.
When needing that key is written to NFC physical key, NFC physical key can be in contact with read-write equipment, be read and write Equipment can scan the corresponding key information of NFC physical key, as the key marked in NFC physical key is numbered, NFC chip Chip identification, and the key identification of storage.
After scanning key information, it can be shown by client-side program in terminal or other mobile terminals Show, user can input or scan the vehicles identifications of vehicle to be bound, such as Vehicle Identify Number, and vehicles identifications can be generated in client-side program Key corresponding with key information generates request, and key is generated request and is sent to Service Provider Platform.
Service Provider Platform 203
The Service Provider Platform is requested for being generated according to the key, is generated corresponding with the NFC physical key Third business cipher key, and establish the binding relationship of the NFC physical key and the vehicle end, the third business is close Key is written to the NFC physical key.
After receiving key and generating request, Service Provider Platform can create third corresponding with NFC physical key Then business cipher key can establish the binding relationship of vehicle end and NFC physical key, and can be by reading and writing client for third NFC physical key is written in business cipher key.
In one embodiment of the application, it may include the corresponding third key information of NFC physical key that key, which generates request, Vehicles identifications corresponding with vehicle end.
Service Provider Platform is generating request according to the key, generates third corresponding with the NFC physical key Business cipher key, and when establishing the binding relationship of the NFC physical key and the vehicle end, it is specifically used for:
Generate third business cipher key corresponding with the third key information and the vehicles identifications;Wherein, the third Key information includes the corresponding third key identification of the NFC physical key;By the third key identification and the third industry Business key is packaged as encrypted instruction, and is sent to the read-write client, real the NFC is written by the read-write client Body key;Third key information corresponding with the third key identification and the third business cipher key is generated, and is sent to institute It states in vehicle end, to be synchronized to the white list of NFC security module in the vehicle end.
After receiving key and generating request, Service Provider Platform be can be generated a business cipher key (Key_Card), and It can store the corresponding relationship of third key information, vehicles identifications and third business cipher key, that is, establish NFC physical key With the binding relationship of vehicle end.
Specifically, third business cipher key can be by AES (Advanced Encryption Standard, superencipherment mark It is quasi-) 128 algorithms, combining encryption machine generates, can be used for carrying out response challenge with the NFC security module of vehicle end, complete key Spoon authentication.
After generating third business cipher key, can by TSM server in Service Provider Platform, by third key identification and Third business cipher key is packaged as adding based on APDU (ApplicationProtocolDataUnit, Application Protocol Data Unit) Then the encrypted instruction is sent to read-write client by close instruction.
After receiving encrypted instruction, reading and writing client-side program in client can be by read-write equipment by the encrypted instruction NFC physical key is written, there is Applet component in NFC physical key, business cipher key can be carried out using Applet component Burning, then NFC physical key and vehicle end binding are completed.
After the completion of binding, third key identification and third business cipher key can be organized into third by service supplier's platform Third key information is sent to vehicle end by key information, and NFC security module can deposit the third key information in vehicle end Storage completes the activation of NFC physical key in white list, then key is in initiate mode.
Vehicle end 204
The vehicle end, for being verified to the virtual key of the NFC when detecting the NFC physical key, and Vehicle control is carried out when being verified.
In one embodiment of the application, the vehicle end is virtual to the NFC when detecting the NFC physical key When key is verified, it is specifically used for:
Verify whether the NFC physical key meets preset condition;If meeting second preset condition, described in judgement NFC physical key is verified.
Wherein, second preset condition includes following multinomial:
Third key identification in the NFC physical key is stored in the white list of NFC security module in the vehicle end In, the white list storage third key information corresponding with the third key identification in token information effectively, using with Machine number challenge response mode is verified the corresponding third business cipher key of the NFC physical key.
After activating NFC physical key, when NFC physical key is close to vehicle end, the two can carry out near-field communication, then may be used To be verified by vehicle end to NFC physical key, after being verified, it can be unlocked in vehicle end, start engine Deng operation.
When the third key identification stored in verifying NFC physical key is in white list, the corresponding order of third key identification The third business cipher key that board information effectively, in NFC physical key stores is verified, then determines vehicle end to the first user terminal The middle virtual key of NFC is verified.
In one embodiment of the application, the NFC physical key is numbered with a key, the Service Provider Platform, It is also used to:
Receive the request of the second key controller;It is requested according to second key controller, the NFC physical key is weighed Limit updates.
It is requested according to the second key controller, carry out the process of permission update and is above requested according to the first key controller, The process for carrying out permission update is similar, can specifically be not repeated herein with reference to above.
In the embodiment of the present application, it is used to generate in response to user's operation and be directed to vehicle by the first user terminal of setting The virtual key request to create at end, and it is sent to Service Provider Platform, Service Provider Platform is for creating and virtual key The virtual key of the corresponding NFC of request to create, and the binding for establishing vehicle end, the first user terminal and the virtual key of NFC is closed The virtual key of NFC is issued to the first user terminal by system, and vehicle end is used for when detecting the first user terminal, to first The virtual key of NFC of user terminal binding is verified, and vehicle control is carried out when being verified, and is realized to NFC vehicle key The control of spoon improves convenience, the safety of car key control
Referring to Fig. 3, a kind of step flow chart of the control method of car key of one embodiment of the application offer is provided, is related to And user terminal, Service Provider Platform and vehicle end.
Specifically, may include steps of:
Step 301, the virtual key request to create for the vehicle end that first user terminal is sent is received;
Step 302, the creation virtual key of NFC corresponding with the virtual key request to create;
Step 303, the binding for establishing the vehicle end, first user terminal and the virtual key of the NFC is closed System, and the virtual key of the NFC is issued to first user terminal, so that the vehicle end is detecting that described first uses When the terminal of family, the virtual key of NFC of first user terminal binding is verified, and vehicle control is carried out when being verified System.
In one embodiment of the application, first user terminal is deployed with corresponding with the Service Provider Platform One application, the exit passageway permission that first application has first user terminal open, step 302 may include as follows Sub-step:
Determine the first key information corresponding with first user terminal;Creation and first key information, described Corresponding first business cipher key of vehicles identifications;Generate first key information corresponding with first business cipher key.
Correspondingly, step 303 may include following sub-step:
The first key information is pushed into the corresponding vehicle end of the vehicles identifications, to be synchronized in the vehicle end The white list of NFC security module;It is applied by described first, first business cipher key is written by institute according to exit passageway permission State NFC encryption chip in the first user terminal.
In one embodiment of the application, the method further relates to safety element provider platform, first user terminal Be deployed with and the Service Provider Platform it is corresponding first application and corresponding with safety element provider platform second Using the virtual key request to create includes a vehicles identifications, and step 302 may include following sub-step:
Determine the first key information corresponding with first user terminal;Creation and first key information, described Corresponding first business cipher key of vehicles identifications;Generate first key information corresponding with first business cipher key.
Correspondingly, step 303 may include following sub-step:
The first key information is pushed into the corresponding vehicle end of the vehicles identifications, to be synchronized in the vehicle end The white list of NFC security module;It is by safety element provider platform and second application, first business is close NFC encryption chip in first user terminal is written in key.
Referring to Fig. 4, a kind of step flow chart of the control method of car key of one embodiment of the application offer is provided, is related to And NFC physical key, read-write terminal, Service Provider Platform and vehicle end.
Specifically, may include steps of:
Step 401, it receives the third key for the NFC physical key that the read-write terminal is sent and generates request;
Step 402, it is generated and is requested according to the third key, generate third business corresponding with the NFC physical key Key;
Step 403, the binding relationship of the NFC physical key and the vehicle end is established, and the third business is close Key is written to the NFC physical key, with when the vehicle end detects the NFC physical key, to the virtual key of the NFC Spoon is verified, and vehicle control is carried out when being verified.
It should be noted that for simple description, therefore, it is stated as a series of action groups for embodiment of the method It closes, but those skilled in the art should understand that, the embodiment of the present application is not limited by the described action sequence, because according to According to the embodiment of the present application, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art also should Know, the embodiments described in the specification are all preferred embodiments, and related movement not necessarily the application is implemented Necessary to example.
One embodiment of the application additionally provides a kind of vehicle, may include processor, memory and storage on a memory And the computer program that can be run on a processor, the control of car key as above is realized when computer program is executed by processor The step of method.
One embodiment of the application additionally provides a kind of computer readable storage medium, stores on computer readable storage medium Computer program, the step of control method of car key as above is realized when computer program is executed by processor.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
It should be understood by those skilled in the art that, the embodiment of the present application can provide as method, apparatus or computer program production Product.Therefore, in terms of the embodiment of the present application can be used complete hardware embodiment, complete software embodiment or combine software and hardware Embodiment form.Moreover, it wherein includes computer available programs generation that the embodiment of the present application, which can be used in one or more, The meter implemented in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of code The form of calculation machine program product.
The embodiment of the present application is referring to according to the method for the embodiment of the present application, terminal device (system) and computer program The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions In each flow and/or block and flowchart and/or the block diagram in process and/or box combination.It can provide these Computer program instructions are set to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminals Standby processor is to generate a machine, so that being held by the processor of computer or other programmable data processing terminal devices Capable instruction generates for realizing in one or more flows of the flowchart and/or one or more blocks of the block diagram The device of specified function.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing terminal devices In computer-readable memory operate in a specific manner, so that instruction stored in the computer readable memory generates packet The manufacture of command device is included, which realizes in one side of one or more flows of the flowchart and/or block diagram The function of being specified in frame or multiple boxes.
These computer program instructions can also be loaded into computer or other programmable data processing terminal devices, so that Series of operation steps are executed on computer or other programmable terminal equipments to generate computer implemented processing, thus The instruction executed on computer or other programmable terminal equipments is provided for realizing in one or more flows of the flowchart And/or in one or more blocks of the block diagram specify function the step of.
Although preferred embodiments of the embodiments of the present application have been described, once a person skilled in the art knows bases This creative concept, then additional changes and modifications can be made to these embodiments.So the following claims are intended to be interpreted as Including preferred embodiment and all change and modification within the scope of the embodiments of the present application.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements not only wrap Those elements are included, but also including other elements that are not explicitly listed, or further includes for this process, method, article Or the element that terminal device is intrinsic.In the absence of more restrictions, being wanted by what sentence "including a ..." limited Element, it is not excluded that there is also other identical elements in process, method, article or the terminal device for including the element.
Above to the provided a kind of control method and system of car key, it is described in detail, it is used herein The principle and implementation of this application are described for specific case, and the above embodiments are only used to help understand originally The method and its core concept of application;At the same time, for those skilled in the art, according to the thought of the application, specific There will be changes in embodiment and application range, in conclusion the content of the present specification should not be construed as to the application's Limitation.

Claims (16)

1. a kind of control system of car key, which is characterized in that the system comprises the first user terminal, service provider are flat Platform and vehicle end;
First user terminal, for generating the virtual key request to create for being directed to the vehicle end in response to user's operation, And it is sent to the Service Provider Platform;
The Service Provider Platform for creating the virtual key of NFC corresponding with the virtual key request to create, and is established The binding relationship of the vehicle end, first user terminal and the virtual key of the NFC, by the virtual key of the NFC It is issued to first user terminal;
The vehicle end, for when detecting first user terminal, the NFC bound to first user terminal to be virtual Key is verified, and vehicle control is carried out when being verified.
2. system according to claim 1, which is characterized in that first user terminal is deployed with to be provided with the service Corresponding first application of quotient's platform, the exit passageway permission that first application has first user terminal open;
The virtual key request to create includes a vehicles identifications;The Service Provider Platform is in creation and the virtual key The virtual key of the corresponding NFC of request to create, and establish the vehicle end, first user terminal and the virtual key of the NFC When the binding relationship of spoon, it is specifically used for:
Determine the first key information corresponding with first user terminal;
Create the first business cipher key corresponding with first key information, the vehicles identifications;
Generate first key information corresponding with first business cipher key;
The first key information is pushed into the corresponding vehicle end of the vehicles identifications, to be synchronized to NFC in the vehicle end The white list of security module, and applied by described first, first business cipher key is written by institute according to exit passageway permission State NFC encryption chip in the first user terminal.
3. system according to claim 1, which is characterized in that the system also includes safety element provider platform, institutes State the first user terminal be deployed with it is corresponding with the Service Provider Platform first application and with the safety element provider Corresponding second application of platform;
The virtual key request to create includes a vehicles identifications;The Service Provider Platform is in creation and the virtual key The virtual key of the corresponding NFC of request to create, and establish the vehicle end, first user terminal and the virtual key of the NFC When the binding relationship of spoon, it is specifically used for:
Determine the first key information corresponding with first user terminal;
Create the first business cipher key corresponding with first key information, the vehicles identifications;
Generate first key information corresponding with first business cipher key;
The first key information is pushed into the corresponding vehicle end of the vehicles identifications, to be synchronized to NFC in the vehicle end The white list of security module, and by safety element provider platform and second application, first business is close NFC encryption chip in first user terminal is written in key.
4. system according to claim 1 or 2 or 3, which is characterized in that the vehicle end is detecting first user When terminal, when being verified to the virtual key of NFC of first user terminal binding, it is specifically used for:
Whether the virtual key of NFC for verifying the first user terminal binding meets preset condition;
If meeting first preset condition, determine that the virtual key authentication of NFC of the first user terminal binding passes through;
Wherein, first preset condition includes following multinomial:
The first key identification in first user terminal is stored in the vehicle end in the white list of NFC security module, In the first key information corresponding with first key identification of the white list storage token information effectively, using random number Challenge response mode is verified corresponding first business cipher key of the virtual key of the NFC.
5. system according to claim 4, which is characterized in that the Service Provider Platform is also used to:
Receive the first key controller request that first user terminal is sent;
It is requested according to first key controller, key controller is carried out to the virtual key of the NFC.
6. system according to claim 5, which is characterized in that the system further relates to second user terminal, the service Provider's platform is specifically used for when carrying out key controller to the virtual key of the NFC:
The virtual key of the NFC is shared to the second user terminal;
And/or permission update is carried out to the virtual key of the NFC.
7. a kind of control system of car key, which is characterized in that the system comprises NFC physical key, read-write terminal, services to mention For quotient's platform and vehicle end;
The read-write terminal for generating the key generation request for being directed to the NFC physical key, and is sent to the service and mentions For quotient's platform;
The Service Provider Platform is requested for being generated according to the key, generates corresponding with the NFC physical key the Three business cipher keys, and the binding relationship of the NFC physical key and the vehicle end is established, the third business cipher key is write Enter to the NFC physical key;
The vehicle end, for being verified to the NFC physical key, and testing when detecting the NFC physical key Card carries out vehicle control when passing through.
8. system according to claim 7, which is characterized in that it includes the NFC physical key that the key, which generates request, Corresponding third key information and the corresponding vehicles identifications of the vehicle end;
The Service Provider Platform is generating request according to the key, generates third corresponding with the NFC physical key Business cipher key, and when establishing the binding relationship of the NFC physical key and the vehicle end, it is specifically used for:
Generate third business cipher key corresponding with the third key information and the vehicles identifications;Wherein, the third key Information includes the corresponding third key identification of the NFC physical key;
The third key identification and the third business cipher key are packaged as encrypted instruction, and are sent to the read-write client End, the NFC physical key is written by the read-write client;
Third key information corresponding with the third key identification and the third business cipher key is generated, and is sent to the vehicle End in, to be synchronized to the white list of NFC security module in the vehicle end.
9. system according to claim 7, which is characterized in that the vehicle end when detecting the NFC physical key, When being verified to the NFC physical key, it is specifically used for:
Verify whether the NFC physical key meets the second preset condition;
If meeting second preset condition, determine that the NFC physical key is verified;
Wherein, second preset condition includes following multinomial:
Third key identification in the NFC physical key is stored in the vehicle end in the white list of NFC security module, institute Token information in the third key information corresponding with the third key identification of white list storage is stated effectively, using random number to choose War response mode is verified the corresponding third business cipher key of the NFC physical key.
10. according to system described in claim 7 or 8 or 9, which is characterized in that the Service Provider Platform is also used to:
Receive the request of the second key controller;
It is requested according to second key controller, permission update is carried out to the NFC physical key.
11. a kind of control method of car key, which is characterized in that be related to user terminal, Service Provider Platform and vehicle End, which comprises
Receive the virtual key request to create for the vehicle end that first user terminal is sent;
The creation virtual key of NFC corresponding with the virtual key request to create;
Establish the binding relationship of the vehicle end, first user terminal and the virtual key of the NFC, and by the NFC Virtual key is issued to first user terminal, so that the vehicle end is when detecting first user terminal, to institute The virtual key of NFC for stating the binding of the first user terminal is verified, and vehicle control is carried out when being verified.
12. according to the method for claim 11, which is characterized in that first user terminal is deployed with to be mentioned with the service For corresponding first application of quotient's platform, the exit passageway permission that first application has first user terminal open, institute Stating virtual key request to create includes a vehicles identifications;Creation NFC corresponding with the virtual key request to create is virtual The step of key includes:
Determine the first key information corresponding with first user terminal;
Create the first business cipher key corresponding with first key information, the vehicles identifications;
Generate first key information corresponding with first business cipher key;
The binding relationship for establishing the vehicle end, first user terminal and the virtual key of the NFC, and by institute Stating the step of virtual key of NFC is issued to first user terminal includes:
The first key information is pushed into the corresponding vehicle end of the vehicles identifications, to be synchronized to NFC in the vehicle end The white list of security module;
It applies by described first, first business cipher key is written in first user terminal according to exit passageway permission NFC encryption chip.
13. according to the method for claim 11, which is characterized in that the method further relates to safety element provider platform, First user terminal is deployed with the first application corresponding with the Service Provider Platform and provides with the safety element Corresponding second application of quotient's platform, the virtual key request to create includes a vehicles identifications;The creation and the virtual key The step of corresponding NFC of spoon request to create virtual key includes:
Determine the first key information corresponding with first user terminal;
Create the first business cipher key corresponding with first key information, the vehicles identifications;
Generate first key information corresponding with first business cipher key;
The binding relationship for establishing the vehicle end, first user terminal and the virtual key of the NFC, and by institute Stating the step of virtual key of NFC is issued to first user terminal includes:
The first key information is pushed into the corresponding vehicle end of the vehicles identifications, to be synchronized to NFC in the vehicle end The white list of security module;
By safety element provider platform and second application, first business cipher key write-in described first is used NFC encryption chip in the terminal of family.
14. a kind of control method of car key, which is characterized in that it is flat to be related to NFC physical key, read-write terminal, service provider Platform and vehicle end, which comprises
It receives the third key for the NFC physical key that the read-write terminal is sent and generates request;
It is generated and is requested according to the third key, generate third business cipher key corresponding with the NFC physical key;
The binding relationship of the NFC physical key and the vehicle end is established, and the third business cipher key is written to described NFC physical key, verified to the virtual key of the NFC when the vehicle end detects the NFC physical key, And vehicle control is carried out when being verified.
15. a kind of vehicle, which is characterized in that including processor, memory and be stored on the memory and can be described The computer program run on processor realizes such as claim 11 to 14 when the computer program is executed by the processor Any one of described in car key control method the step of.
16. a kind of computer readable storage medium, which is characterized in that store computer journey on the computer readable storage medium Sequence realizes the control of the car key as described in any one of claim 11 to 14 when the computer program is executed by processor The step of method.
CN201910406843.4A 2019-05-16 2019-05-16 Vehicle key control method and system Active CN110136306B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910406843.4A CN110136306B (en) 2019-05-16 2019-05-16 Vehicle key control method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910406843.4A CN110136306B (en) 2019-05-16 2019-05-16 Vehicle key control method and system

Publications (2)

Publication Number Publication Date
CN110136306A true CN110136306A (en) 2019-08-16
CN110136306B CN110136306B (en) 2022-05-13

Family

ID=67574578

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910406843.4A Active CN110136306B (en) 2019-05-16 2019-05-16 Vehicle key control method and system

Country Status (1)

Country Link
CN (1) CN110136306B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110992540A (en) * 2019-12-19 2020-04-10 广州中胜物联网络科技有限公司 Lock opening and closing method and device based on keyless entry system
CN111491272A (en) * 2020-04-01 2020-08-04 支付宝(杭州)信息技术有限公司 Vehicle unlocking method and system
CN112562135A (en) * 2020-12-07 2021-03-26 中国第一汽车股份有限公司 Vehicle control method and device, vehicle and storage medium
CN112896093A (en) * 2021-01-29 2021-06-04 成都锐美动力科技有限公司 Vehicle driving system based on identity recognition
CN112954654A (en) * 2019-11-26 2021-06-11 比亚迪股份有限公司 Vehicle NFC key registration method, computer device and storage medium
CN113436372A (en) * 2021-07-29 2021-09-24 上海瓶钵信息科技有限公司 Method and system for passing account of digital key
CN114025329A (en) * 2021-11-05 2022-02-08 上海酉擎物联技术有限公司 Method for realizing standby NFC key in CCC application mobile terminal
CN114466357A (en) * 2022-02-28 2022-05-10 重庆长安汽车股份有限公司 Vehicle-mounted NFC card key binding system and method
CN114670779A (en) * 2022-04-07 2022-06-28 浙江极氪智能科技有限公司 Digital key sharing method and system
WO2022143469A1 (en) * 2020-12-30 2022-07-07 比亚迪股份有限公司 Sharing system and method for virtual key

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2513843Y (en) * 2001-12-20 2002-10-02 蒋楚明 Intelligent IC identifying anti-theft lock device for automobile
CN101281628A (en) * 2007-04-04 2008-10-08 晨星半导体股份有限公司 Automobile lease system and method using vehicle electron and mobile device
CN101343961A (en) * 2008-07-29 2009-01-14 上海世科嘉车辆技术研发有限公司 Non-key gate control system
CN106408700A (en) * 2016-08-31 2017-02-15 长城汽车股份有限公司 Mobile terminal, server, vehicle and control system
CN107393079A (en) * 2017-07-26 2017-11-24 北京小米移动软件有限公司 Management method, device and the storage medium of virtual car key
CN108108598A (en) * 2017-12-15 2018-06-01 蔚来汽车有限公司 Vehicle authorization management method and system
CN108876986A (en) * 2018-05-28 2018-11-23 优信数享(北京)信息技术有限公司 A kind of key matching process and system
CN109067549A (en) * 2018-09-21 2018-12-21 北京仁信证科技有限公司 Virtual key two-way authentication system and method
CN109727358A (en) * 2019-02-21 2019-05-07 深圳四海万联科技有限公司 Vehicle share system based on bluetooth key

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2513843Y (en) * 2001-12-20 2002-10-02 蒋楚明 Intelligent IC identifying anti-theft lock device for automobile
CN101281628A (en) * 2007-04-04 2008-10-08 晨星半导体股份有限公司 Automobile lease system and method using vehicle electron and mobile device
CN101343961A (en) * 2008-07-29 2009-01-14 上海世科嘉车辆技术研发有限公司 Non-key gate control system
CN106408700A (en) * 2016-08-31 2017-02-15 长城汽车股份有限公司 Mobile terminal, server, vehicle and control system
CN107393079A (en) * 2017-07-26 2017-11-24 北京小米移动软件有限公司 Management method, device and the storage medium of virtual car key
CN108108598A (en) * 2017-12-15 2018-06-01 蔚来汽车有限公司 Vehicle authorization management method and system
CN108876986A (en) * 2018-05-28 2018-11-23 优信数享(北京)信息技术有限公司 A kind of key matching process and system
CN109067549A (en) * 2018-09-21 2018-12-21 北京仁信证科技有限公司 Virtual key two-way authentication system and method
CN109727358A (en) * 2019-02-21 2019-05-07 深圳四海万联科技有限公司 Vehicle share system based on bluetooth key

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112954654A (en) * 2019-11-26 2021-06-11 比亚迪股份有限公司 Vehicle NFC key registration method, computer device and storage medium
CN112954654B (en) * 2019-11-26 2022-10-18 比亚迪股份有限公司 Vehicle NFC key registration method, computer device and storage medium
CN110992540A (en) * 2019-12-19 2020-04-10 广州中胜物联网络科技有限公司 Lock opening and closing method and device based on keyless entry system
CN111491272A (en) * 2020-04-01 2020-08-04 支付宝(杭州)信息技术有限公司 Vehicle unlocking method and system
CN111491272B (en) * 2020-04-01 2022-04-19 支付宝(杭州)信息技术有限公司 Vehicle unlocking method and system
CN112562135A (en) * 2020-12-07 2021-03-26 中国第一汽车股份有限公司 Vehicle control method and device, vehicle and storage medium
WO2022143469A1 (en) * 2020-12-30 2022-07-07 比亚迪股份有限公司 Sharing system and method for virtual key
CN112896093A (en) * 2021-01-29 2021-06-04 成都锐美动力科技有限公司 Vehicle driving system based on identity recognition
CN113436372A (en) * 2021-07-29 2021-09-24 上海瓶钵信息科技有限公司 Method and system for passing account of digital key
CN114025329A (en) * 2021-11-05 2022-02-08 上海酉擎物联技术有限公司 Method for realizing standby NFC key in CCC application mobile terminal
CN114466357A (en) * 2022-02-28 2022-05-10 重庆长安汽车股份有限公司 Vehicle-mounted NFC card key binding system and method
CN114466357B (en) * 2022-02-28 2024-04-19 重庆长安汽车股份有限公司 Vehicle-mounted NFC card key binding system and method
CN114670779A (en) * 2022-04-07 2022-06-28 浙江极氪智能科技有限公司 Digital key sharing method and system

Also Published As

Publication number Publication date
CN110136306B (en) 2022-05-13

Similar Documents

Publication Publication Date Title
CN110136306A (en) Vehicle key control method and system
CN110111472A (en) Vehicle key control method and device
CN110091828A (en) A kind of control method and device of car key
CN110103883A (en) A kind of control method and device of car key
CN110065470A (en) Automobile control method, device, automobile and storage medium based on NFC car key
EP3089494B1 (en) Trusted execution environment initialization method and mobile terminal
US8364952B2 (en) Methods and system for a key recovery plan
CN111787530B (en) Block chain digital identity management method based on SIM card
JPWO2005117336A1 (en) Parent-child card authentication system
CN103475471A (en) Electronic key registration system
CN109314703A (en) Method for managing the state of connection equipment
CN110311787A (en) Authorization management method, system, equipment and computer readable storage medium
KR20120053929A (en) The agent system for digital signature using sign private key with double encryption and method thereof features to store in web storage
CN113282944B (en) Intelligent lock unlocking method and device, electronic equipment and storage medium
CN106664294A (en) Method and system for authentication by means of tokens
CN108121904B (en) Unlocking method, device, electronic equipment and server
CN109831435A (en) A kind of database operation method, system and proxy server and storage medium
CN107358118B (en) SFS access control method and system, SFS and terminal equipment
CN109543365A (en) A kind of authorization method and device
CN102368773B (en) Access control method of mobile memory, mobile memory and system
CN110091829A (en) A kind of control method and device of car key
US20020053028A1 (en) Process and apparatus for improving the security of digital signatures and public key infrastructures for real-world applications
CN113763602A (en) Information processing apparatus, information processing method, and non-transitory storage medium
CN110610569A (en) Intelligent lock system and control method thereof
JP2020095393A (en) Service reservation provision system and reservation provision method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant