CN110136306A - Vehicle key control method and system - Google Patents
Vehicle key control method and system Download PDFInfo
- Publication number
- CN110136306A CN110136306A CN201910406843.4A CN201910406843A CN110136306A CN 110136306 A CN110136306 A CN 110136306A CN 201910406843 A CN201910406843 A CN 201910406843A CN 110136306 A CN110136306 A CN 110136306A
- Authority
- CN
- China
- Prior art keywords
- key
- nfc
- user terminal
- vehicle end
- virtual
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00412—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
Abstract
The embodiment of the application provides a vehicle key control method and a vehicle key control system, wherein the system comprises a first user terminal, a service provider platform and a vehicle end; the first user terminal is used for responding to user operation, generating a virtual key creating request aiming at the vehicle end and sending the virtual key creating request to the service provider platform; the service provider platform is used for creating an NFC virtual key corresponding to the virtual key creation request, and establishing a binding relationship among the vehicle terminal, the first user terminal and the NFC virtual key so as to issue the NFC virtual key to the first user terminal; and the vehicle end is used for verifying the NFC virtual key bound by the first user terminal when the first user terminal is detected, and controlling the vehicle when the verification is passed. Through this application embodiment, realized the control to NFC car key, promoted convenience, the security of car key control.
Description
Technical field
This application involves automotive fields, more particularly to the control method and system of a kind of car key.
Background technique
With the development of science and technology, automobile has become the vehicles that cannot lack in life, in the use of automobile
In the process, key must be used to carry out out/lock door, start/and close the operation such as engine, the key of automobile usually has machinery
Key, integral remote-controlled key etc..
Mechanical key, also referred to as blade key are only used for basic enabling and lock a door, have a single function, is inconvenient to carry, and its
For inactive component, anti-theft is bad.
Integral remote-controlled key is to be made of blade key and chip key, due to increasing chip key, compensates for knife
Piece key anti-theft, and whistle can also be carried out using chip key and look for the functions such as vehicle, but its there is also have a single function, volume it is big
The problems such as inconvenient to carry.
Summary of the invention
In view of the above problems, it proposes in order to provide overcoming the above problem or at least being partially solved the one of the above problem
The control method and system of kind car key, comprising:
A kind of control system of car key, the system comprises the first user terminal, Service Provider Platform and vehicles
End;
First user terminal, the virtual key for generating for the vehicle end in response to user's operation create
Request, and it is sent to the Service Provider Platform;
The Service Provider Platform, for creating the virtual key of NFC corresponding with the virtual key request to create, and
The binding relationship of the vehicle end, first user terminal and the virtual key of the NFC is established, the NFC is virtual
Key is issued to first user terminal;
The vehicle end, the NFC for being bound to first user terminal when detecting first user terminal
Virtual key is verified, and vehicle control is carried out when being verified.
Optionally, first user terminal is deployed with the first application corresponding with the Service Provider Platform, described
The exit passageway permission that first application has first user terminal open;
The virtual key request to create includes a vehicles identifications;The Service Provider Platform creation with it is described virtual
The virtual key of the corresponding NFC of key request to create, and it is empty to establish the vehicle end, first user terminal and the NFC
When the binding relationship of quasi- key, it is specifically used for:
Determine the first key information corresponding with first user terminal;
Create the first business cipher key corresponding with first key information, the vehicles identifications;
Generate first key information corresponding with first business cipher key;
The first key information is pushed into the corresponding vehicle end of the vehicles identifications, to be synchronized in the vehicle end
The white list of NFC security module, and applied by described first, first business cipher key is written according to exit passageway permission
NFC encryption chip in first user terminal.
Optionally, the system also includes safety element provider platform, first user terminal be deployed with it is described
Corresponding first application of Service Provider Platform and the second application corresponding with safety element provider platform;
The virtual key request to create includes a vehicles identifications;The Service Provider Platform creation with it is described virtual
The virtual key of the corresponding NFC of key request to create, and it is empty to establish the vehicle end, first user terminal and the NFC
When the binding relationship of quasi- key, it is specifically used for:
Determine the first key information corresponding with first user terminal;
Create the first business cipher key corresponding with first key information, the vehicles identifications;
Generate first key information corresponding with first business cipher key;
The first key information is pushed into the corresponding vehicle end of the vehicles identifications, to be synchronized in the vehicle end
The white list of NFC security module, and by safety element provider platform and second application, by first business
NFC encryption chip in first user terminal is written in key.
Optionally, the vehicle end is when detecting first user terminal, to first user terminal binding
When the virtual key of NFC is verified, it is specifically used for:
Whether the virtual key of NFC for verifying the first user terminal binding meets preset condition;
If meeting first preset condition, determine that the virtual key authentication of NFC of the first user terminal binding is logical
It crosses;
Wherein, first preset condition includes following multinomial:
The first key identification in first user terminal is stored in the white list of NFC security module in the vehicle end
In, the white list storage first key information corresponding with first key identification in token information effectively, using with
Machine number challenge response mode is verified corresponding first business cipher key of the virtual key of the NFC.
Optionally, the Service Provider Platform, is also used to:
Receive the first key controller request that first user terminal is sent;
It is requested according to first key controller, key controller is carried out to the virtual key of the NFC.
Optionally, the system further relates to second user terminal, and the Service Provider Platform is to the virtual key of the NFC
When spoon carries out key controller, it is specifically used for:
The virtual key of the NFC is shared to the second user terminal;
And/or permission update is carried out to the virtual key of the NFC.
A kind of control system of car key, the system comprises NFC physical key, read-write terminal, Service Provider Platform,
And vehicle end;
The read-write terminal for generating the key generation request for being directed to the NFC physical key, and is sent to the clothes
Business provider's platform;
The Service Provider Platform is requested for being generated according to the key, is generated corresponding with the NFC physical key
Third business cipher key, and establish the binding relationship of the NFC physical key and the vehicle end, the third business is close
Key is written to the NFC physical key;
The vehicle end, for being verified to the virtual key of the NFC when detecting the NFC physical key, and
Vehicle control is carried out when being verified.
Optionally, it includes the corresponding third key information of the NFC physical key and the vehicle that the key, which generates request,
Corresponding vehicles identifications in end;
The Service Provider Platform is generating request according to the key, generates corresponding with the NFC physical key
Third business cipher key, and when establishing the binding relationship of the NFC physical key and the vehicle end, it is specifically used for:
Generate third business cipher key corresponding with the third key information and the vehicles identifications;Wherein, the third
Key information includes the corresponding third key identification of the NFC physical key;
The third key identification and the third business cipher key are packaged as encrypted instruction, and are sent to the read-write visitor
Family end, the NFC physical key is written by the read-write client;
Third key information corresponding with the third key identification and the third business cipher key is generated, and is sent to institute
It states in vehicle end, to be synchronized to the white list of NFC security module in the vehicle end.
Optionally, the vehicle end verifies the virtual key of the NFC when detecting the NFC physical key
When, it is specifically used for:
Verify whether the NFC physical key meets the second preset condition;
If meeting second preset condition, determine that the NFC physical key is verified;
Wherein, second preset condition includes following multinomial:
Third key identification in the NFC physical key is stored in the white list of NFC security module in the vehicle end
In, the white list storage third key information corresponding with the third key identification in token information effectively, using with
Machine number challenge response mode is verified the corresponding third business cipher key of the NFC physical key.
Optionally, the Service Provider Platform, is also used to:
Receive the request of the second key controller;
It is requested according to second key controller, permission update is carried out to the NFC physical key.
A kind of control method of car key, is related to user terminal, Service Provider Platform and vehicle end, the method
Include:
Receive the virtual key request to create for the vehicle end that first user terminal is sent;
The creation virtual key of NFC corresponding with the virtual key request to create;
Establish the binding relationship of the vehicle end, first user terminal and the virtual key of the NFC, and by institute
It states the virtual key of NFC and is issued to first user terminal, so that the vehicle end is when detecting first user terminal,
The virtual key of NFC of first user terminal binding is verified, and carries out vehicle control when being verified.
Optionally, first user terminal is deployed with the first application corresponding with the Service Provider Platform, described
The exit passageway permission that first application has first user terminal open, the virtual key request to create include a vehicle
Mark;The step of creation NFC corresponding with the virtual key request to create virtual key includes:
Determine the first key information corresponding with first user terminal;
Create the first business cipher key corresponding with first key information, the vehicles identifications;
Generate first key information corresponding with first business cipher key;
The binding relationship for establishing the vehicle end, first user terminal and the virtual key of the NFC, and
The step of virtual key of the NFC is issued to first user terminal include:
The first key information is pushed into the corresponding vehicle end of the vehicles identifications, to be synchronized in the vehicle end
The white list of NFC security module;
It is applied by described first, first business cipher key is written by the first user end according to exit passageway permission
NFC encryption chip in end.
Optionally, the method further relates to safety element provider platform, first user terminal be deployed with it is described
Corresponding first application of Service Provider Platform and the second application corresponding with safety element provider platform, it is described virtual
Key request to create includes a vehicles identifications;The creation virtual key of NFC corresponding with the virtual key request to create
Step includes:
Determine the first key information corresponding with first user terminal;
Create the first business cipher key corresponding with first key information, the vehicles identifications;
Generate first key information corresponding with first business cipher key;
The binding relationship for establishing the vehicle end, first user terminal and the virtual key of the NFC, and
The step of virtual key of the NFC is issued to first user terminal include:
The first key information is pushed into the corresponding vehicle end of the vehicles identifications, to be synchronized in the vehicle end
The white list of NFC security module;
By safety element provider platform and second application, first business cipher key is written described the
NFC encryption chip in one user terminal.
A kind of control method of car key, is related to NFC physical key, read-write terminal, Service Provider Platform and vehicle
End, which comprises
It receives the third key for the NFC physical key that the read-write terminal is sent and generates request;
It is generated and is requested according to the third key, generate third business cipher key corresponding with the NFC physical key;
Establish the binding relationship of the NFC physical key and the vehicle end, and by the third business cipher key be written to
The NFC physical key, to test the virtual key of the NFC when the vehicle end detects the NFC physical key
Card, and vehicle control is carried out when being verified.
A kind of vehicle, including processor, memory and be stored on the memory and can transport on the processor
Capable computer program, the computer program realize the control method of car key as described above when being executed by the processor
The step of.
A kind of computer readable storage medium stores computer program, the meter on the computer readable storage medium
The step of calculation machine program realizes the control method of car key as described above when being executed by processor.
The embodiment of the present application has the advantage that
In the embodiment of the present application, it is used to generate in response to user's operation and be directed to vehicle by the first user terminal of setting
The virtual key request to create at end, and it is sent to Service Provider Platform, Service Provider Platform is for creating and virtual key
The virtual key of the corresponding NFC of request to create, and the binding for establishing vehicle end, the first user terminal and the virtual key of NFC is closed
The virtual key of NFC is issued to the first user terminal by system, and vehicle end is used for when detecting the first user terminal, to first
The virtual key of NFC of user terminal binding is verified, and vehicle control is carried out when being verified, and is realized to NFC vehicle key
The control of spoon improves convenience, the safety of car key control.
Detailed description of the invention
It, below will be to attached needed in the description of the present application in order to illustrate more clearly of the technical solution of the application
Figure is briefly described, it should be apparent that, the drawings in the following description are only some examples of the present application, for this field
For those of ordinary skill, without any creative labor, it can also be obtained according to these attached drawings other attached
Figure.
Fig. 1 is a kind of structural schematic diagram of the control system for car key that one embodiment of the application provides;
Fig. 2 is the structural schematic diagram of the control system for another car key that one embodiment of the application provides;
Fig. 3 is a kind of step flow chart of the control method for car key that one embodiment of the application provides;
Fig. 4 is the step flow chart of the control method for another car key that one embodiment of the application provides.
Specific embodiment
In order to make the above objects, features, and advantages of the present application more apparent, with reference to the accompanying drawing and it is specific real
Applying mode, the present application will be further described in detail.Obviously, described embodiment is some embodiments of the present application, without
It is whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not before making creative work
Every other embodiment obtained is put, shall fall in the protection scope of this application.
Referring to Fig.1, a kind of structural schematic diagram of the control system of car key of one embodiment of the application offer is provided, it should
System may include the first user terminal 101, service provider's (SP, Service Provider) platform 102 and vehicle end
103。
Wherein, the first user terminal can be support NFC (Near Field Communication, near-field communication) function
Terminal, such as mobile phone, smartwatch can have NFC encryption chip, NFC encryption chip can be a kind of embedded peace
Full element (eSE, Embedded Secure Element).
Service Provider Platform can be communicated with the first application and vehicle end in the first user terminal, can be set
There is SP TSM (Trusted Service Management, trusted service management) server, is also provided with the virtual key of NFC
Spoon service server (Virtual Key Management, VKM), hierarchical storage management (Hierarchical Storage
Management, HSM) encryption equipment etc..
Vehicle end is disposed in the car, can have NFC security module, NFC security module can be used as the lock of vehicle
Core, inside can integrate safety chip, and NFC security module can with the NFC inductor for being deployed in vehicle side and communicate mould
Block is connected, and NFC security module can be communicated by communication module with Service Provider Platform, when the first user terminal leans on
Nearly NFC inductor, NFC inductor can carry out reading data, Jin Eryu for the virtual key of NFC in the first user terminal
The data stored in NFC security module are verified.
Various pieces are described in detail below:
First user terminal 101
First user terminal, the virtual key for generating for the vehicle end in response to user's operation create
Request, and it is sent to the Service Provider Platform.
In the concrete realization, user can be by operating in the first user terminal, and determination will create virtual key
Vehicle, in response to user's operation, the virtual key request to create for vehicle end is can be generated in the first user terminal, then may be used
To be sent to Service Provider Platform.
Service Provider Platform 102
The Service Provider Platform, for creating the virtual key of NFC corresponding with the virtual key request to create, and
The binding relationship of the vehicle end, first user terminal and the virtual key of the NFC is established, the NFC is virtual
Key is issued to first user terminal.
After receiving virtual key request to create, Service Provider Platform can be created and virtual key request to create pair
Then the virtual key of the NFC answered can establish the binding relationship of vehicle end, the first user terminal and the virtual key of NFC, and
The virtual key of the NFC created can be issued to the first user terminal, allow a user to carry out vehicle using the first user terminal
Control.
" binding " scheme one
In one embodiment of the application, the first user terminal can be deployed with corresponding with Service Provider Platform first and answer
With such as the first application can be vehicle management application, the exit passageway permission that the first application has the first user terminal open.
Specifically, having security domain due to creating in NFC encryption chip, pass through OMAPI (Open MobileAPI), user
Terminal applies security domain in accessible NFC encryption chip at the middle and upper levels, and then can establish the peace that the first application is directed to security domain
Full tunnel permission.
Wherein, virtual key request to create may include the corresponding vehicles identifications of vehicle end, as Vehicle Identify Number (VIN,
Vehicle IdentificationNumber)。
In one embodiment, Service Provider Platform is in creation NFC void corresponding with the virtual key request to create
When intending key, and establishing the binding relationship of the vehicle end, first user terminal and the virtual key of the NFC, specifically
For:
Determine the first key information corresponding with first user terminal;Creation and first key information, described
Corresponding first business cipher key of vehicles identifications;Generate first key information corresponding with first business cipher key;By described
One key information pushes to the corresponding vehicle end of the vehicles identifications, to be synchronized to the white of NFC security module in the vehicle end
List, and applied by described first, first business cipher key is written by the first user end according to exit passageway permission
NFC encryption chip in end.
In practical applications, the key information stored in each user terminal is uniquely, then to receive the first use
After the virtual key request to create that family terminal is sent, Service Provider Platform can determine corresponding first key of the first user terminal
Spoon information.
Specifically, the first key information may include the first key identification, Service Provider Platform can be the first user
Terminal creates unique first key identification, and then the first key identification can be sent to in the first user terminal first answered
With the first key identification can be stored in the first user terminal in NFC encryption chip by the first application.
Since key information is unique in same user terminal, and multiple virtual keys can be created in a user terminal
Spoon, each virtual key can correspond to a vehicle, then Service Provider Platform can create the first business cipher key, and can store
The corresponding relationship of vehicles identifications, the first key information and the first business cipher key completes vehicle, user terminal, virtual key
The binding of spoon.
Specifically, the first business cipher key can be by AES (Advanced Encryption Standard, superencipherment mark
It is quasi-) 128 algorithms, combining encryption machine generates, can be used for carrying out response challenge with the NFC security module of vehicle end, complete key
Spoon authentication.
After generating the first business cipher key, Service Provider Platform can be believed in conjunction with the first business cipher key and the first key
Breath generates first key information.
Specifically, corresponding first token (Token) information of the first business cipher key can be determined, such as authority information, effectively
Phase information etc., can by user setting or use default setting, then can by the first business cipher key, the first key identification,
And first token information be organized into first key information.
After generating the first business cipher key, since the first application has exit passageway permission, Service Provider Platform can be with
NFC encryption chip in the first user terminal is written into the first business cipher key by the first application, without the first user terminal
Safety element provider (SEI, Secure Element Issuer) corresponding application program of platform, efficiency and process are reliable
Property is more preferably.
Correspondingly, first key information can be pushed to vehicle end by Service Provider Platform, the NFC safety in vehicle end
First key information can be stored in white list by module, complete the activation of the virtual key of NFC, then key is in and has enabled shape
State.
" binding " scheme two
In one embodiment of the application, which can also include safety element provider platform, safety element provider
Platform can be communicated with the second application in the first user terminal, and SEI TSM server can be set.
First user terminal can be deployed with the first application corresponding with Service Provider Platform, and such as the first application can be
Vehicle management application can also be deployed with the second application corresponding with safety element provider platform, and such as the second application can be
Wallet System application.
Wherein, virtual key request to create includes a vehicles identifications.
In another embodiment, Service Provider Platform is in creation NFC corresponding with the virtual key request to create
Virtual key, and when establishing the binding relationship of the vehicle end, first user terminal and the virtual key of the NFC, tool
Body is used for:
Determine the first key information corresponding with first user terminal;Creation and first key information, described
Corresponding first business cipher key of vehicles identifications;Generate first key information corresponding with first business cipher key;By described
One key information pushes to the corresponding vehicle end of the vehicles identifications, to be synchronized to the white of NFC security module in the vehicle end
List, and by safety element provider platform and second application, first business cipher key is written described the
NFC encryption chip in one user terminal.
In practical implementations, the key information stored in each user terminal is uniquely, then to receive the first use
After the virtual key request to create that family terminal is sent, Service Provider Platform can determine corresponding first key of the first user terminal
Spoon information.
Specifically, Service Provider Platform can create unique first key identification for the first user terminal, then may be used
The first key identification is sent to the first application in the first user terminal, the first key identification can be stored in by the first application
In first user terminal in NFC encryption chip.
Since key information is unique in same user terminal, and multiple virtual keys can be created in a user terminal
Spoon, each virtual key can correspond to a vehicle, then Service Provider Platform can create the first business cipher key, and can store
The corresponding relationship of vehicles identifications, the first key information and the first business cipher key completes vehicle, user terminal, virtual key
The binding of spoon.
Specifically, the first business cipher key can be by AES (Advanced Encryption Standard, superencipherment mark
It is quasi-) 128 algorithms, combining encryption machine generates, can be used for carrying out response challenge with the NFC security module of vehicle end, complete key
Spoon authentication.
After generating the first business cipher key, Service Provider Platform can be believed in conjunction with the first business cipher key and the first key
Breath generates first key information.
Specifically, corresponding first token information of the first business cipher key can be determined, such as authority information, validity period information
Deng, by user setting or default setting can be used, then can be by the first business cipher key, the first key identification, Yi Ji
One token information is organized into first key information.
After generating the first business cipher key, Service Provider Platform can call TSM in safety element provider platform to take
By the second application NFC encryption chip in the first user terminal is written in first cryptographic key by the write-in rights interface of business device.
Correspondingly, first key information can be pushed to vehicle end by Service Provider Platform, the NFC safety in vehicle end
First key information can be stored in white list by module, complete the activation of the virtual key of NFC, then key is in and has enabled shape
State.
Vehicle end 103
The vehicle end, the NFC for being bound to first user terminal when detecting first user terminal
Virtual key is verified, and vehicle control is carried out when being verified.
In one embodiment of the application, vehicle end is whole to first user when detecting first user terminal
When the virtual key of NFC of end binding is verified, it is specifically used for:
Whether the virtual key of NFC for verifying the first user terminal binding meets preset condition;If meeting described first
Preset condition then determines that the virtual key authentication of NFC of the first user terminal binding passes through.
Wherein, the first preset condition may include following multinomial:
The first key identification in first user terminal is stored in the white list of NFC security module in the vehicle end
In, the white list storage first key information corresponding with first key identification in token information effectively, using with
Machine number challenge response mode is verified corresponding first business cipher key of the virtual key of the NFC.
After activating the virtual key of NFC, when the first user terminal is close to vehicle end, the two can carry out near-field communication, then
The NFC encryption chip storage virtual key of NFC in the first user terminal can be verified by vehicle end, after being verified,
It the operation such as can be unlocked, start engine in vehicle end.
When the first key identification stored in the first user terminal of verifying is in white list, the corresponding order of the first key identification
The first business cipher key that board information effectively, in the first user terminal stores is verified, then determines vehicle end to the first user end
The virtual key of NFC is verified in end.
" key controller " scheme
In one embodiment of the application, Service Provider Platform be can be also used for:
Receive the first key controller request that first user terminal is sent;It is requested according to first key controller,
Key controller is carried out to the virtual key of the NFC.
In practical applications, user can select in the selected virtual key of NFC created of the first user terminal and carry out key
The type of spoon control, such as key is shared, permission updates, and the request of the first key controller then can be generated, service provider is flat
Platform can be requested according to the first key controller received, carry out key controller to the virtual key of the NFC.
In one embodiment of the application, which further relates to second user terminal, and Service Provider Platform is to the NFC
When virtual key carries out key controller, it is specifically used for:
The virtual key of the NFC is shared to the second user terminal;
And/or permission update is carried out to the virtual key of the NFC.
" virtual key sharing " scheme one
In one embodiment of the application, second user terminal can be deployed with third corresponding with Service Provider Platform and answer
With third applies the exit passageway permission with second user open-destination.
It is as follows that specific key shares process:
Receive the virtual key sharing request for the vehicle end that first application is sent;Wherein, described virtual
Key sharing request includes the corresponding terminal iidentification of the second user terminal;Determine corresponding with the second user terminal the
Two key informations;Create the second business cipher key corresponding with second key information, the vehicles identifications;It generates and described the
Corresponding second key information of two business cipher keys;Second key information is pushed into the vehicle end, it is described to be synchronized to
The white list of NFC security module in vehicle end, and by the third application, according to the exit passageway permission by described second
NFC encryption chip in the second user terminal is written in business cipher key.
Wherein, the second key information may include the second key identification.
In practical applications, due to first application in login user be car owner or administrator, as car owner or administrator
When user needs to share virtual key to second user terminal, then it can carry out virtual key and share interface, input second user
Such as the user information of login user in third application and then the void for vehicle end can be generated in the corresponding terminal iidentification of terminal
Quasi- key sharing request.
If formerly stored second key identification, Service Provider Platform can directly determine to second user terminal
Corresponding second key identification of two user terminals.
If formerly second user can be generated in not stored second key identification, Service Provider Platform to second user terminal
Corresponding second key identification of terminal, is then sent to the second user terminal for the second key identification, by described second
Key identification is stored in NFC encryption chip in second user terminal.
After determining the second key information, vehicles identifications, Service Provider Platform can create the first business cipher key, and can
To store the corresponding relationship of vehicles identifications, the second key information and the second business cipher key.
Specifically, the second business cipher key can be by AES (Advanced Encryption Standard, superencipherment mark
It is quasi-) 128 algorithms, combining encryption machine generates, can be used for carrying out response challenge with the NFC security module of vehicle end, complete key
Spoon authentication.
In the concrete realization, corresponding second token information of the second business cipher key can be determined, such as authority information, validity period
Information etc. by user setting or can use default setting, then can by the second business cipher key, the second key identification, with
And second token information be organized into the second key information.
After generating the second key information, being applied due to third has exit passageway permission, and Service Provider Platform can be with
By third application, the second business cipher key is written by NFC encryption chip in second user terminal according to exit passageway permission, and can
The second key information is pushed to vehicle end, the second key information can be stored in white by the NFC security module in vehicle end
In list, the activation of the virtual key of NFC is completed, then key is in initiate mode.
" virtual key sharing " scheme two
In one embodiment of the application, second user terminal can be deployed with corresponding with the Service Provider Platform
Three applications if third application can be vehicle management application, and can be deployed with corresponding with safety element provider platform the
Four applications, such as the 4th application can be Wallet System application.
It is as follows that specific key shares process:
Receive the virtual key sharing request for the vehicle end that first application is sent;Wherein, described virtual
Key sharing request includes the corresponding terminal iidentification of the second user terminal;Determine corresponding with the second user terminal the
Two key informations;Create the second business cipher key corresponding with second key information, the vehicles identifications;It generates and described the
Corresponding second key information of two business cipher keys;Second key information is pushed into the vehicle end, it is described to be synchronized to
The white list of NFC security module in vehicle end, and by safety element provider platform and the 4th application, it will be described
NFC encryption chip in the second user terminal is written in second business cipher key.
In practical applications, due to first application in login user be car owner or administrator, as car owner or administrator
When user needs to share virtual key to second user terminal, then it can carry out virtual key and share interface, input second user
Such as the user information of login user in third application and then the void for vehicle end can be generated in the corresponding terminal iidentification of terminal
Quasi- key sharing request.
In the concrete realization, if first stored second key identification of second user terminal, Service Provider Platform
Corresponding second key identification of second user terminal can be directly determined.
If formerly second user can be generated in not stored second key identification, Service Provider Platform to second user terminal
Corresponding second key identification of terminal, is then sent to second user terminal for the second key identification, by the second key identification
It is stored in NFC encryption chip in second user terminal.
After determining the second key information, vehicles identifications, Service Provider Platform can create the first business cipher key, and can
To store the corresponding relationship of vehicles identifications, the second key information and the second business cipher key.
Specifically, the second business cipher key can be by AES (Advanced Encryption Standard, superencipherment mark
It is quasi-) 128 algorithms, combining encryption machine generates, can be used for carrying out response challenge with the NFC security module of vehicle end, complete key
Spoon authentication.
In the concrete realization, corresponding second token information of the second business cipher key can be determined, such as authority information, validity period
Information etc. by user setting or can use default setting, then can by the second business cipher key, the second key identification, with
And second token information be organized into the second key information.
After generating the second key information, Service Provider Platform can call TSM in safety element provider platform to take
By the 4th application NFC encryption chip in second user terminal is written in second cryptographic key by the write-in rights interface of business device.
Correspondingly, the second key information can be pushed to vehicle end by Service Provider Platform, the NFC safety in vehicle end
Second key information can be stored in white list by module, complete the activation of the virtual key of NFC, then key is in and has enabled shape
State.
" permission update " scheme
In one embodiment of the application, concrete power limit renewal process is as follows:
Receive the first key controller request that first application is sent;Control in the vehicle end NFC security module more
Key information corresponding with the first key controller request in the new white list.
In the concrete realization, user can select the virtual key of a certain NFC in the first application, and then selection carries out key
The type of control, such as delete, locking, the request of the first key controller is generated, and be sent to Service Provider Platform, service provides
Quotient's platform can receive the request of the first key controller.
After receiving the request of the first key controller, Service Provider Platform can determine that the request of the first key controller corresponds to
Key information, such as the first key controller request may include key number, due to being stored in advance in Service Provider Platform
Key information can then search key and number corresponding key information.
Certainly, the request of the first key controller can also direct carrying keys information, then can directly be requested from key controller
Middle determining key information, without being searched in platform.
After determining key information corresponding with the request of the first key controller, it can request to correspond to according to the first key controller
Control Cooling, such as delete, locking, unlock, control vehicle end in NFC security module update white list in the key information
Corresponding key information.
In fact, it can be first key information, i.e. car owner or management that the first key controller, which requests corresponding key information,
The owned key of member's user's control, it may be the second key information that the first key controller, which requests corresponding key information,
I.e. car owner or administrator control the key for being shared with other people.
In one example, the first key controller request may include removal request, can be generated what vehicle end can identify
Instruction is deleted, instruction then will be deleted and be sent to vehicle end, after receiving deletion instruction, vehicle end can be in NFC chip
In white list, the corresponding key information of pre-stored removal request is deleted.
For being shared with the virtual key of second user terminal, i.e. the corresponding key information of removal request is the second key letter
Breath can will then delete instruction and be sent to second user terminal, and after receiving and deleting instruction, second user terminal can be from
In NFC encryption chip, corresponding second key information of pre-stored second key information is deleted.
In one example, the first key controller request may include locking request, can be generated what vehicle end can identify
Then lock instruction is sent to vehicle end by lock instruction, after receiving lock instruction, vehicle end can be in NFC chip
The corresponding key information of locking request that storage is searched in white list, then can be in the order of the corresponding key information of locking request
In board information, being set as locking mark, such as there is " 1 " to be updated to " 0 " value of relevant field, then key is in locked state,
In the case where setting locking mark, the control vehicle functions of the virtual key of the corresponding NFC of the locking request are limited.
Due to a variety of vehicle control permissions, such as unlock vehicle permission, locking vehicle permission, starting vehicle permission, from
Dynamic to drive permission etc., then locking mark can be corresponding with vehicle control permission, and such as locking mark A characterizes all vehicle control permissions
It is all limited, locking mark B characterization part control vehicle control permission is limited, as automatic Pilot permission is limited.
In one example, the first key controller request may include unlocking request, can be generated what vehicle end can identify
Then unlock instruction is sent to vehicle end by unlock instruction, after receiving unlock instruction, vehicle end can be in NFC chip
The corresponding key information of unlocking request that storage is searched in white list, then can be in the order of the corresponding key information of unlocking request
In board information, it is set as unlock mark, such as has " 0 " to be updated to " 1 " value of relevant field, then key, which reverts to, has enabled shape
State, in the case where setting unlock mark, the control vehicle functions of the virtual key of the corresponding NFC of the unlocking request are resumed.
In one example, the request of the first key controller may include validity period setting request, and validity period setting request may be used also
To include validity period information, receive validity period setting instruction after, vehicle end can in the white list of NFC security module,
It searches validity period setting and requests corresponding key information, then can use validity period information, request is set in validity period and is corresponded to
Key information token information in be updated, then the current time limit be more than validity period information in time limit when, key is in
State out of date can not further use.
In one example, the request of the first key controller may include priority assignation request, and validity period setting request can be with
Including authority information, after receiving validity period setting instruction, vehicle end can be searched in the white list of NFC security module
Priority assignation requests corresponding key information, then can use authority information, requests corresponding key information in priority assignation
Token information in be updated, then when current operation is not in the corresponding opereating specification of authority information, can not further make
With.
Referring to Fig. 2, a kind of structural schematic diagram of the control system of car key of one embodiment of the application offer is shown, it should
System may include NFC physical key 201, read-write terminal 202, Service Provider Platform 203 and vehicle end 204.
Various pieces are described in detail below:
Read-write terminal 202
The read-write terminal for generating the key generation request for being directed to the NFC physical key, and is sent to the clothes
Business provider's platform.
When needing that key is written to NFC physical key, NFC physical key can be in contact with read-write equipment, be read and write
Equipment can scan the corresponding key information of NFC physical key, as the key marked in NFC physical key is numbered, NFC chip
Chip identification, and the key identification of storage.
After scanning key information, it can be shown by client-side program in terminal or other mobile terminals
Show, user can input or scan the vehicles identifications of vehicle to be bound, such as Vehicle Identify Number, and vehicles identifications can be generated in client-side program
Key corresponding with key information generates request, and key is generated request and is sent to Service Provider Platform.
Service Provider Platform 203
The Service Provider Platform is requested for being generated according to the key, is generated corresponding with the NFC physical key
Third business cipher key, and establish the binding relationship of the NFC physical key and the vehicle end, the third business is close
Key is written to the NFC physical key.
After receiving key and generating request, Service Provider Platform can create third corresponding with NFC physical key
Then business cipher key can establish the binding relationship of vehicle end and NFC physical key, and can be by reading and writing client for third
NFC physical key is written in business cipher key.
In one embodiment of the application, it may include the corresponding third key information of NFC physical key that key, which generates request,
Vehicles identifications corresponding with vehicle end.
Service Provider Platform is generating request according to the key, generates third corresponding with the NFC physical key
Business cipher key, and when establishing the binding relationship of the NFC physical key and the vehicle end, it is specifically used for:
Generate third business cipher key corresponding with the third key information and the vehicles identifications;Wherein, the third
Key information includes the corresponding third key identification of the NFC physical key;By the third key identification and the third industry
Business key is packaged as encrypted instruction, and is sent to the read-write client, real the NFC is written by the read-write client
Body key;Third key information corresponding with the third key identification and the third business cipher key is generated, and is sent to institute
It states in vehicle end, to be synchronized to the white list of NFC security module in the vehicle end.
After receiving key and generating request, Service Provider Platform be can be generated a business cipher key (Key_Card), and
It can store the corresponding relationship of third key information, vehicles identifications and third business cipher key, that is, establish NFC physical key
With the binding relationship of vehicle end.
Specifically, third business cipher key can be by AES (Advanced Encryption Standard, superencipherment mark
It is quasi-) 128 algorithms, combining encryption machine generates, can be used for carrying out response challenge with the NFC security module of vehicle end, complete key
Spoon authentication.
After generating third business cipher key, can by TSM server in Service Provider Platform, by third key identification and
Third business cipher key is packaged as adding based on APDU (ApplicationProtocolDataUnit, Application Protocol Data Unit)
Then the encrypted instruction is sent to read-write client by close instruction.
After receiving encrypted instruction, reading and writing client-side program in client can be by read-write equipment by the encrypted instruction
NFC physical key is written, there is Applet component in NFC physical key, business cipher key can be carried out using Applet component
Burning, then NFC physical key and vehicle end binding are completed.
After the completion of binding, third key identification and third business cipher key can be organized into third by service supplier's platform
Third key information is sent to vehicle end by key information, and NFC security module can deposit the third key information in vehicle end
Storage completes the activation of NFC physical key in white list, then key is in initiate mode.
Vehicle end 204
The vehicle end, for being verified to the virtual key of the NFC when detecting the NFC physical key, and
Vehicle control is carried out when being verified.
In one embodiment of the application, the vehicle end is virtual to the NFC when detecting the NFC physical key
When key is verified, it is specifically used for:
Verify whether the NFC physical key meets preset condition;If meeting second preset condition, described in judgement
NFC physical key is verified.
Wherein, second preset condition includes following multinomial:
Third key identification in the NFC physical key is stored in the white list of NFC security module in the vehicle end
In, the white list storage third key information corresponding with the third key identification in token information effectively, using with
Machine number challenge response mode is verified the corresponding third business cipher key of the NFC physical key.
After activating NFC physical key, when NFC physical key is close to vehicle end, the two can carry out near-field communication, then may be used
To be verified by vehicle end to NFC physical key, after being verified, it can be unlocked in vehicle end, start engine
Deng operation.
When the third key identification stored in verifying NFC physical key is in white list, the corresponding order of third key identification
The third business cipher key that board information effectively, in NFC physical key stores is verified, then determines vehicle end to the first user terminal
The middle virtual key of NFC is verified.
In one embodiment of the application, the NFC physical key is numbered with a key, the Service Provider Platform,
It is also used to:
Receive the request of the second key controller;It is requested according to second key controller, the NFC physical key is weighed
Limit updates.
It is requested according to the second key controller, carry out the process of permission update and is above requested according to the first key controller,
The process for carrying out permission update is similar, can specifically be not repeated herein with reference to above.
In the embodiment of the present application, it is used to generate in response to user's operation and be directed to vehicle by the first user terminal of setting
The virtual key request to create at end, and it is sent to Service Provider Platform, Service Provider Platform is for creating and virtual key
The virtual key of the corresponding NFC of request to create, and the binding for establishing vehicle end, the first user terminal and the virtual key of NFC is closed
The virtual key of NFC is issued to the first user terminal by system, and vehicle end is used for when detecting the first user terminal, to first
The virtual key of NFC of user terminal binding is verified, and vehicle control is carried out when being verified, and is realized to NFC vehicle key
The control of spoon improves convenience, the safety of car key control
Referring to Fig. 3, a kind of step flow chart of the control method of car key of one embodiment of the application offer is provided, is related to
And user terminal, Service Provider Platform and vehicle end.
Specifically, may include steps of:
Step 301, the virtual key request to create for the vehicle end that first user terminal is sent is received;
Step 302, the creation virtual key of NFC corresponding with the virtual key request to create;
Step 303, the binding for establishing the vehicle end, first user terminal and the virtual key of the NFC is closed
System, and the virtual key of the NFC is issued to first user terminal, so that the vehicle end is detecting that described first uses
When the terminal of family, the virtual key of NFC of first user terminal binding is verified, and vehicle control is carried out when being verified
System.
In one embodiment of the application, first user terminal is deployed with corresponding with the Service Provider Platform
One application, the exit passageway permission that first application has first user terminal open, step 302 may include as follows
Sub-step:
Determine the first key information corresponding with first user terminal;Creation and first key information, described
Corresponding first business cipher key of vehicles identifications;Generate first key information corresponding with first business cipher key.
Correspondingly, step 303 may include following sub-step:
The first key information is pushed into the corresponding vehicle end of the vehicles identifications, to be synchronized in the vehicle end
The white list of NFC security module;It is applied by described first, first business cipher key is written by institute according to exit passageway permission
State NFC encryption chip in the first user terminal.
In one embodiment of the application, the method further relates to safety element provider platform, first user terminal
Be deployed with and the Service Provider Platform it is corresponding first application and corresponding with safety element provider platform second
Using the virtual key request to create includes a vehicles identifications, and step 302 may include following sub-step:
Determine the first key information corresponding with first user terminal;Creation and first key information, described
Corresponding first business cipher key of vehicles identifications;Generate first key information corresponding with first business cipher key.
Correspondingly, step 303 may include following sub-step:
The first key information is pushed into the corresponding vehicle end of the vehicles identifications, to be synchronized in the vehicle end
The white list of NFC security module;It is by safety element provider platform and second application, first business is close
NFC encryption chip in first user terminal is written in key.
Referring to Fig. 4, a kind of step flow chart of the control method of car key of one embodiment of the application offer is provided, is related to
And NFC physical key, read-write terminal, Service Provider Platform and vehicle end.
Specifically, may include steps of:
Step 401, it receives the third key for the NFC physical key that the read-write terminal is sent and generates request;
Step 402, it is generated and is requested according to the third key, generate third business corresponding with the NFC physical key
Key;
Step 403, the binding relationship of the NFC physical key and the vehicle end is established, and the third business is close
Key is written to the NFC physical key, with when the vehicle end detects the NFC physical key, to the virtual key of the NFC
Spoon is verified, and vehicle control is carried out when being verified.
It should be noted that for simple description, therefore, it is stated as a series of action groups for embodiment of the method
It closes, but those skilled in the art should understand that, the embodiment of the present application is not limited by the described action sequence, because according to
According to the embodiment of the present application, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art also should
Know, the embodiments described in the specification are all preferred embodiments, and related movement not necessarily the application is implemented
Necessary to example.
One embodiment of the application additionally provides a kind of vehicle, may include processor, memory and storage on a memory
And the computer program that can be run on a processor, the control of car key as above is realized when computer program is executed by processor
The step of method.
One embodiment of the application additionally provides a kind of computer readable storage medium, stores on computer readable storage medium
Computer program, the step of control method of car key as above is realized when computer program is executed by processor.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with
The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
It should be understood by those skilled in the art that, the embodiment of the present application can provide as method, apparatus or computer program production
Product.Therefore, in terms of the embodiment of the present application can be used complete hardware embodiment, complete software embodiment or combine software and hardware
Embodiment form.Moreover, it wherein includes computer available programs generation that the embodiment of the present application, which can be used in one or more,
The meter implemented in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of code
The form of calculation machine program product.
The embodiment of the present application is referring to according to the method for the embodiment of the present application, terminal device (system) and computer program
The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions
In each flow and/or block and flowchart and/or the block diagram in process and/or box combination.It can provide these
Computer program instructions are set to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminals
Standby processor is to generate a machine, so that being held by the processor of computer or other programmable data processing terminal devices
Capable instruction generates for realizing in one or more flows of the flowchart and/or one or more blocks of the block diagram
The device of specified function.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing terminal devices
In computer-readable memory operate in a specific manner, so that instruction stored in the computer readable memory generates packet
The manufacture of command device is included, which realizes in one side of one or more flows of the flowchart and/or block diagram
The function of being specified in frame or multiple boxes.
These computer program instructions can also be loaded into computer or other programmable data processing terminal devices, so that
Series of operation steps are executed on computer or other programmable terminal equipments to generate computer implemented processing, thus
The instruction executed on computer or other programmable terminal equipments is provided for realizing in one or more flows of the flowchart
And/or in one or more blocks of the block diagram specify function the step of.
Although preferred embodiments of the embodiments of the present application have been described, once a person skilled in the art knows bases
This creative concept, then additional changes and modifications can be made to these embodiments.So the following claims are intended to be interpreted as
Including preferred embodiment and all change and modification within the scope of the embodiments of the present application.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning
Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements not only wrap
Those elements are included, but also including other elements that are not explicitly listed, or further includes for this process, method, article
Or the element that terminal device is intrinsic.In the absence of more restrictions, being wanted by what sentence "including a ..." limited
Element, it is not excluded that there is also other identical elements in process, method, article or the terminal device for including the element.
Above to the provided a kind of control method and system of car key, it is described in detail, it is used herein
The principle and implementation of this application are described for specific case, and the above embodiments are only used to help understand originally
The method and its core concept of application;At the same time, for those skilled in the art, according to the thought of the application, specific
There will be changes in embodiment and application range, in conclusion the content of the present specification should not be construed as to the application's
Limitation.
Claims (16)
1. a kind of control system of car key, which is characterized in that the system comprises the first user terminal, service provider are flat
Platform and vehicle end;
First user terminal, for generating the virtual key request to create for being directed to the vehicle end in response to user's operation,
And it is sent to the Service Provider Platform;
The Service Provider Platform for creating the virtual key of NFC corresponding with the virtual key request to create, and is established
The binding relationship of the vehicle end, first user terminal and the virtual key of the NFC, by the virtual key of the NFC
It is issued to first user terminal;
The vehicle end, for when detecting first user terminal, the NFC bound to first user terminal to be virtual
Key is verified, and vehicle control is carried out when being verified.
2. system according to claim 1, which is characterized in that first user terminal is deployed with to be provided with the service
Corresponding first application of quotient's platform, the exit passageway permission that first application has first user terminal open;
The virtual key request to create includes a vehicles identifications;The Service Provider Platform is in creation and the virtual key
The virtual key of the corresponding NFC of request to create, and establish the vehicle end, first user terminal and the virtual key of the NFC
When the binding relationship of spoon, it is specifically used for:
Determine the first key information corresponding with first user terminal;
Create the first business cipher key corresponding with first key information, the vehicles identifications;
Generate first key information corresponding with first business cipher key;
The first key information is pushed into the corresponding vehicle end of the vehicles identifications, to be synchronized to NFC in the vehicle end
The white list of security module, and applied by described first, first business cipher key is written by institute according to exit passageway permission
State NFC encryption chip in the first user terminal.
3. system according to claim 1, which is characterized in that the system also includes safety element provider platform, institutes
State the first user terminal be deployed with it is corresponding with the Service Provider Platform first application and with the safety element provider
Corresponding second application of platform;
The virtual key request to create includes a vehicles identifications;The Service Provider Platform is in creation and the virtual key
The virtual key of the corresponding NFC of request to create, and establish the vehicle end, first user terminal and the virtual key of the NFC
When the binding relationship of spoon, it is specifically used for:
Determine the first key information corresponding with first user terminal;
Create the first business cipher key corresponding with first key information, the vehicles identifications;
Generate first key information corresponding with first business cipher key;
The first key information is pushed into the corresponding vehicle end of the vehicles identifications, to be synchronized to NFC in the vehicle end
The white list of security module, and by safety element provider platform and second application, first business is close
NFC encryption chip in first user terminal is written in key.
4. system according to claim 1 or 2 or 3, which is characterized in that the vehicle end is detecting first user
When terminal, when being verified to the virtual key of NFC of first user terminal binding, it is specifically used for:
Whether the virtual key of NFC for verifying the first user terminal binding meets preset condition;
If meeting first preset condition, determine that the virtual key authentication of NFC of the first user terminal binding passes through;
Wherein, first preset condition includes following multinomial:
The first key identification in first user terminal is stored in the vehicle end in the white list of NFC security module,
In the first key information corresponding with first key identification of the white list storage token information effectively, using random number
Challenge response mode is verified corresponding first business cipher key of the virtual key of the NFC.
5. system according to claim 4, which is characterized in that the Service Provider Platform is also used to:
Receive the first key controller request that first user terminal is sent;
It is requested according to first key controller, key controller is carried out to the virtual key of the NFC.
6. system according to claim 5, which is characterized in that the system further relates to second user terminal, the service
Provider's platform is specifically used for when carrying out key controller to the virtual key of the NFC:
The virtual key of the NFC is shared to the second user terminal;
And/or permission update is carried out to the virtual key of the NFC.
7. a kind of control system of car key, which is characterized in that the system comprises NFC physical key, read-write terminal, services to mention
For quotient's platform and vehicle end;
The read-write terminal for generating the key generation request for being directed to the NFC physical key, and is sent to the service and mentions
For quotient's platform;
The Service Provider Platform is requested for being generated according to the key, generates corresponding with the NFC physical key the
Three business cipher keys, and the binding relationship of the NFC physical key and the vehicle end is established, the third business cipher key is write
Enter to the NFC physical key;
The vehicle end, for being verified to the NFC physical key, and testing when detecting the NFC physical key
Card carries out vehicle control when passing through.
8. system according to claim 7, which is characterized in that it includes the NFC physical key that the key, which generates request,
Corresponding third key information and the corresponding vehicles identifications of the vehicle end;
The Service Provider Platform is generating request according to the key, generates third corresponding with the NFC physical key
Business cipher key, and when establishing the binding relationship of the NFC physical key and the vehicle end, it is specifically used for:
Generate third business cipher key corresponding with the third key information and the vehicles identifications;Wherein, the third key
Information includes the corresponding third key identification of the NFC physical key;
The third key identification and the third business cipher key are packaged as encrypted instruction, and are sent to the read-write client
End, the NFC physical key is written by the read-write client;
Third key information corresponding with the third key identification and the third business cipher key is generated, and is sent to the vehicle
End in, to be synchronized to the white list of NFC security module in the vehicle end.
9. system according to claim 7, which is characterized in that the vehicle end when detecting the NFC physical key,
When being verified to the NFC physical key, it is specifically used for:
Verify whether the NFC physical key meets the second preset condition;
If meeting second preset condition, determine that the NFC physical key is verified;
Wherein, second preset condition includes following multinomial:
Third key identification in the NFC physical key is stored in the vehicle end in the white list of NFC security module, institute
Token information in the third key information corresponding with the third key identification of white list storage is stated effectively, using random number to choose
War response mode is verified the corresponding third business cipher key of the NFC physical key.
10. according to system described in claim 7 or 8 or 9, which is characterized in that the Service Provider Platform is also used to:
Receive the request of the second key controller;
It is requested according to second key controller, permission update is carried out to the NFC physical key.
11. a kind of control method of car key, which is characterized in that be related to user terminal, Service Provider Platform and vehicle
End, which comprises
Receive the virtual key request to create for the vehicle end that first user terminal is sent;
The creation virtual key of NFC corresponding with the virtual key request to create;
Establish the binding relationship of the vehicle end, first user terminal and the virtual key of the NFC, and by the NFC
Virtual key is issued to first user terminal, so that the vehicle end is when detecting first user terminal, to institute
The virtual key of NFC for stating the binding of the first user terminal is verified, and vehicle control is carried out when being verified.
12. according to the method for claim 11, which is characterized in that first user terminal is deployed with to be mentioned with the service
For corresponding first application of quotient's platform, the exit passageway permission that first application has first user terminal open, institute
Stating virtual key request to create includes a vehicles identifications;Creation NFC corresponding with the virtual key request to create is virtual
The step of key includes:
Determine the first key information corresponding with first user terminal;
Create the first business cipher key corresponding with first key information, the vehicles identifications;
Generate first key information corresponding with first business cipher key;
The binding relationship for establishing the vehicle end, first user terminal and the virtual key of the NFC, and by institute
Stating the step of virtual key of NFC is issued to first user terminal includes:
The first key information is pushed into the corresponding vehicle end of the vehicles identifications, to be synchronized to NFC in the vehicle end
The white list of security module;
It applies by described first, first business cipher key is written in first user terminal according to exit passageway permission
NFC encryption chip.
13. according to the method for claim 11, which is characterized in that the method further relates to safety element provider platform,
First user terminal is deployed with the first application corresponding with the Service Provider Platform and provides with the safety element
Corresponding second application of quotient's platform, the virtual key request to create includes a vehicles identifications;The creation and the virtual key
The step of corresponding NFC of spoon request to create virtual key includes:
Determine the first key information corresponding with first user terminal;
Create the first business cipher key corresponding with first key information, the vehicles identifications;
Generate first key information corresponding with first business cipher key;
The binding relationship for establishing the vehicle end, first user terminal and the virtual key of the NFC, and by institute
Stating the step of virtual key of NFC is issued to first user terminal includes:
The first key information is pushed into the corresponding vehicle end of the vehicles identifications, to be synchronized to NFC in the vehicle end
The white list of security module;
By safety element provider platform and second application, first business cipher key write-in described first is used
NFC encryption chip in the terminal of family.
14. a kind of control method of car key, which is characterized in that it is flat to be related to NFC physical key, read-write terminal, service provider
Platform and vehicle end, which comprises
It receives the third key for the NFC physical key that the read-write terminal is sent and generates request;
It is generated and is requested according to the third key, generate third business cipher key corresponding with the NFC physical key;
The binding relationship of the NFC physical key and the vehicle end is established, and the third business cipher key is written to described
NFC physical key, verified to the virtual key of the NFC when the vehicle end detects the NFC physical key,
And vehicle control is carried out when being verified.
15. a kind of vehicle, which is characterized in that including processor, memory and be stored on the memory and can be described
The computer program run on processor realizes such as claim 11 to 14 when the computer program is executed by the processor
Any one of described in car key control method the step of.
16. a kind of computer readable storage medium, which is characterized in that store computer journey on the computer readable storage medium
Sequence realizes the control of the car key as described in any one of claim 11 to 14 when the computer program is executed by processor
The step of method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910406843.4A CN110136306B (en) | 2019-05-16 | 2019-05-16 | Vehicle key control method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910406843.4A CN110136306B (en) | 2019-05-16 | 2019-05-16 | Vehicle key control method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110136306A true CN110136306A (en) | 2019-08-16 |
CN110136306B CN110136306B (en) | 2022-05-13 |
Family
ID=67574578
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910406843.4A Active CN110136306B (en) | 2019-05-16 | 2019-05-16 | Vehicle key control method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110136306B (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110992540A (en) * | 2019-12-19 | 2020-04-10 | 广州中胜物联网络科技有限公司 | Lock opening and closing method and device based on keyless entry system |
CN111491272A (en) * | 2020-04-01 | 2020-08-04 | 支付宝(杭州)信息技术有限公司 | Vehicle unlocking method and system |
CN112562135A (en) * | 2020-12-07 | 2021-03-26 | 中国第一汽车股份有限公司 | Vehicle control method and device, vehicle and storage medium |
CN112896093A (en) * | 2021-01-29 | 2021-06-04 | 成都锐美动力科技有限公司 | Vehicle driving system based on identity recognition |
CN112954654A (en) * | 2019-11-26 | 2021-06-11 | 比亚迪股份有限公司 | Vehicle NFC key registration method, computer device and storage medium |
CN113436372A (en) * | 2021-07-29 | 2021-09-24 | 上海瓶钵信息科技有限公司 | Method and system for passing account of digital key |
CN114025329A (en) * | 2021-11-05 | 2022-02-08 | 上海酉擎物联技术有限公司 | Method for realizing standby NFC key in CCC application mobile terminal |
CN114466357A (en) * | 2022-02-28 | 2022-05-10 | 重庆长安汽车股份有限公司 | Vehicle-mounted NFC card key binding system and method |
CN114670779A (en) * | 2022-04-07 | 2022-06-28 | 浙江极氪智能科技有限公司 | Digital key sharing method and system |
WO2022143469A1 (en) * | 2020-12-30 | 2022-07-07 | 比亚迪股份有限公司 | Sharing system and method for virtual key |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN2513843Y (en) * | 2001-12-20 | 2002-10-02 | 蒋楚明 | Intelligent IC identifying anti-theft lock device for automobile |
CN101281628A (en) * | 2007-04-04 | 2008-10-08 | 晨星半导体股份有限公司 | Automobile lease system and method using vehicle electron and mobile device |
CN101343961A (en) * | 2008-07-29 | 2009-01-14 | 上海世科嘉车辆技术研发有限公司 | Non-key gate control system |
CN106408700A (en) * | 2016-08-31 | 2017-02-15 | 长城汽车股份有限公司 | Mobile terminal, server, vehicle and control system |
CN107393079A (en) * | 2017-07-26 | 2017-11-24 | 北京小米移动软件有限公司 | Management method, device and the storage medium of virtual car key |
CN108108598A (en) * | 2017-12-15 | 2018-06-01 | 蔚来汽车有限公司 | Vehicle authorization management method and system |
CN108876986A (en) * | 2018-05-28 | 2018-11-23 | 优信数享(北京)信息技术有限公司 | A kind of key matching process and system |
CN109067549A (en) * | 2018-09-21 | 2018-12-21 | 北京仁信证科技有限公司 | Virtual key two-way authentication system and method |
CN109727358A (en) * | 2019-02-21 | 2019-05-07 | 深圳四海万联科技有限公司 | Vehicle share system based on bluetooth key |
-
2019
- 2019-05-16 CN CN201910406843.4A patent/CN110136306B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN2513843Y (en) * | 2001-12-20 | 2002-10-02 | 蒋楚明 | Intelligent IC identifying anti-theft lock device for automobile |
CN101281628A (en) * | 2007-04-04 | 2008-10-08 | 晨星半导体股份有限公司 | Automobile lease system and method using vehicle electron and mobile device |
CN101343961A (en) * | 2008-07-29 | 2009-01-14 | 上海世科嘉车辆技术研发有限公司 | Non-key gate control system |
CN106408700A (en) * | 2016-08-31 | 2017-02-15 | 长城汽车股份有限公司 | Mobile terminal, server, vehicle and control system |
CN107393079A (en) * | 2017-07-26 | 2017-11-24 | 北京小米移动软件有限公司 | Management method, device and the storage medium of virtual car key |
CN108108598A (en) * | 2017-12-15 | 2018-06-01 | 蔚来汽车有限公司 | Vehicle authorization management method and system |
CN108876986A (en) * | 2018-05-28 | 2018-11-23 | 优信数享(北京)信息技术有限公司 | A kind of key matching process and system |
CN109067549A (en) * | 2018-09-21 | 2018-12-21 | 北京仁信证科技有限公司 | Virtual key two-way authentication system and method |
CN109727358A (en) * | 2019-02-21 | 2019-05-07 | 深圳四海万联科技有限公司 | Vehicle share system based on bluetooth key |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112954654A (en) * | 2019-11-26 | 2021-06-11 | 比亚迪股份有限公司 | Vehicle NFC key registration method, computer device and storage medium |
CN112954654B (en) * | 2019-11-26 | 2022-10-18 | 比亚迪股份有限公司 | Vehicle NFC key registration method, computer device and storage medium |
CN110992540A (en) * | 2019-12-19 | 2020-04-10 | 广州中胜物联网络科技有限公司 | Lock opening and closing method and device based on keyless entry system |
CN111491272A (en) * | 2020-04-01 | 2020-08-04 | 支付宝(杭州)信息技术有限公司 | Vehicle unlocking method and system |
CN111491272B (en) * | 2020-04-01 | 2022-04-19 | 支付宝(杭州)信息技术有限公司 | Vehicle unlocking method and system |
CN112562135A (en) * | 2020-12-07 | 2021-03-26 | 中国第一汽车股份有限公司 | Vehicle control method and device, vehicle and storage medium |
WO2022143469A1 (en) * | 2020-12-30 | 2022-07-07 | 比亚迪股份有限公司 | Sharing system and method for virtual key |
CN112896093A (en) * | 2021-01-29 | 2021-06-04 | 成都锐美动力科技有限公司 | Vehicle driving system based on identity recognition |
CN113436372A (en) * | 2021-07-29 | 2021-09-24 | 上海瓶钵信息科技有限公司 | Method and system for passing account of digital key |
CN114025329A (en) * | 2021-11-05 | 2022-02-08 | 上海酉擎物联技术有限公司 | Method for realizing standby NFC key in CCC application mobile terminal |
CN114466357A (en) * | 2022-02-28 | 2022-05-10 | 重庆长安汽车股份有限公司 | Vehicle-mounted NFC card key binding system and method |
CN114466357B (en) * | 2022-02-28 | 2024-04-19 | 重庆长安汽车股份有限公司 | Vehicle-mounted NFC card key binding system and method |
CN114670779A (en) * | 2022-04-07 | 2022-06-28 | 浙江极氪智能科技有限公司 | Digital key sharing method and system |
Also Published As
Publication number | Publication date |
---|---|
CN110136306B (en) | 2022-05-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110136306A (en) | Vehicle key control method and system | |
CN110111472A (en) | Vehicle key control method and device | |
CN110091828A (en) | A kind of control method and device of car key | |
CN110103883A (en) | A kind of control method and device of car key | |
CN110065470A (en) | Automobile control method, device, automobile and storage medium based on NFC car key | |
EP3089494B1 (en) | Trusted execution environment initialization method and mobile terminal | |
US8364952B2 (en) | Methods and system for a key recovery plan | |
CN111787530B (en) | Block chain digital identity management method based on SIM card | |
JPWO2005117336A1 (en) | Parent-child card authentication system | |
CN103475471A (en) | Electronic key registration system | |
CN109314703A (en) | Method for managing the state of connection equipment | |
CN110311787A (en) | Authorization management method, system, equipment and computer readable storage medium | |
KR20120053929A (en) | The agent system for digital signature using sign private key with double encryption and method thereof features to store in web storage | |
CN113282944B (en) | Intelligent lock unlocking method and device, electronic equipment and storage medium | |
CN106664294A (en) | Method and system for authentication by means of tokens | |
CN108121904B (en) | Unlocking method, device, electronic equipment and server | |
CN109831435A (en) | A kind of database operation method, system and proxy server and storage medium | |
CN107358118B (en) | SFS access control method and system, SFS and terminal equipment | |
CN109543365A (en) | A kind of authorization method and device | |
CN102368773B (en) | Access control method of mobile memory, mobile memory and system | |
CN110091829A (en) | A kind of control method and device of car key | |
US20020053028A1 (en) | Process and apparatus for improving the security of digital signatures and public key infrastructures for real-world applications | |
CN113763602A (en) | Information processing apparatus, information processing method, and non-transitory storage medium | |
CN110610569A (en) | Intelligent lock system and control method thereof | |
JP2020095393A (en) | Service reservation provision system and reservation provision method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |