CN110808832A - Digital key password sharing method and device - Google Patents

Digital key password sharing method and device Download PDF

Info

Publication number
CN110808832A
CN110808832A CN201911073919.2A CN201911073919A CN110808832A CN 110808832 A CN110808832 A CN 110808832A CN 201911073919 A CN201911073919 A CN 201911073919A CN 110808832 A CN110808832 A CN 110808832A
Authority
CN
China
Prior art keywords
information
authorization
acquiring
terminal
sending
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911073919.2A
Other languages
Chinese (zh)
Inventor
吴尧尧
宋艳红
刘乾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Kuwozhixing Technology Co Ltd
Original Assignee
Nanjing Kuwozhixing Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Kuwozhixing Technology Co Ltd filed Critical Nanjing Kuwozhixing Technology Co Ltd
Priority to CN201911073919.2A priority Critical patent/CN110808832A/en
Publication of CN110808832A publication Critical patent/CN110808832A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00412Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted

Abstract

The invention provides a method and a device for sharing a digital key password, which are characterized in that authorization information is obtained according to an authorization request of an authorization end by obtaining the authorization request, and the authorization information is sent to the authorization end; acquiring verification information of the authorized terminal, acquiring information to be confirmed according to the verification information, and sending the information to be confirmed to the authorized terminal; and acquiring the confirmation success information of the authorization terminal, acquiring the digital key password information according to the confirmation success information, and sending the digital key password information to the authorized terminal and the vehicle-mounted terminal. The convenience of key sharing is improved.

Description

Digital key password sharing method and device
Technical Field
The invention relates to the technical field of internet, in particular to a method and a device for sharing a digital key password.
Background
With the development of the times, automobiles are more and more, and the necessary condition for starting the automobiles is the need of automobile keys. And the automobile leasing market is gradually expanded under the promotion of the market.
In the prior art, most automobile keys are physical keys, and when an automobile owner rents out an automobile, the automobile owner needs to send the physical keys to an automobile renting party on the spot, and the automobile can be started after the automobile renting party takes the physical keys.
However, in the prior art, the key sharing is troublesome, and the physical key is easy to forget and lose although the size is small.
Disclosure of Invention
The embodiment of the invention provides a method and a device for sharing a digital key password, which improve the convenience of key sharing.
In a first aspect, the present invention provides a method for sharing a digital key password, which is applied to a server side, and includes:
obtaining an authorization request of an authorization end, obtaining authorization information according to the authorization request, and sending the authorization information to the authorization end;
acquiring verification information of the authorized terminal, acquiring information to be confirmed according to the verification information, and sending the information to be confirmed to the authorized terminal;
and acquiring the confirmation success information of the authorization terminal, acquiring the digital key password information according to the confirmation success information, and sending the digital key password information to the authorized terminal and the vehicle-mounted terminal.
Optionally, in a possible implementation manner of the first aspect, the digital key password information includes RSA public key information and RSA private key information;
correspondingly, the acquiring a digital key password according to the confirmation success information and sending the digital key password to the authorized terminal and the vehicle-mounted terminal includes:
acquiring the RSA public key information and the RSA private key information according to the confirmation success information;
and sending the RSA public key information to the authorized terminal, and sending the RSA private key information to the vehicle-mounted terminal.
Optionally, in a possible implementation manner of the first aspect, after acquiring the confirmation success information of the authorization end, acquiring digital key password information according to the confirmation success information, and sending the digital key password information to the authorized end and the vehicle-mounted end, the method further includes:
and acquiring the authorization canceling information of the authorization end, and processing the RSA private key information of the authorized end into an invalid state according to the authorization canceling information.
Optionally, in a possible implementation manner of the first aspect, after acquiring the confirmation success information of the authorization end, acquiring digital key password information according to the confirmation success information, and sending the digital key password information to the authorized end and the vehicle-mounted end, the method further includes:
and acquiring authorization success information and sending the authorization success information to the authorization terminal.
Optionally, in a possible implementation manner of the first aspect, the authorization information includes two-dimensional code information;
correspondingly, the obtaining of the authorization request of the authorization end, obtaining authorization information according to the authorization request, and sending the authorization information to the authorization end includes:
and acquiring the authorization request of the authorization end, acquiring the two-dimension code information according to the authorization request, and sending the two-dimension code information to the authorization end.
Optionally, in a possible implementation manner of the first aspect, before the obtaining, according to the authorization request, authorization information of the authorization obtaining end, and sending the authorization information to the authorization obtaining end, the method further includes:
and obtaining a login request of the authorization terminal, and determining that the login request is qualified.
Optionally, in a possible implementation manner of the first aspect, the login request carries the RSA public key information;
correspondingly, the obtaining of the login request of the authorized terminal and the determining that the login request is qualified include:
and acquiring RSA public key information of the authorization end, and verifying the RSA public key information to be correct to determine that the login request is qualified.
In a second aspect, the present invention provides a method for sharing a digital key password, which is applied to an authorized end, and includes:
sending an authorization request to the server side, and acquiring authorization information of the server side;
and acquiring the information to be confirmed of the server side, acquiring confirmation success information according to the information to be confirmed, and sending the confirmation success information to the server side.
In a third aspect, the present invention provides a digital key password sharing apparatus, applied to a server, including:
the authorization module is used for acquiring an authorization request of an authorization end, acquiring authorization information according to the authorization request and sending the authorization information to the authorization end;
the confirmation module is used for acquiring the verification information of the authorized terminal, acquiring the information to be confirmed according to the verification information and sending the information to be confirmed to the authorized terminal;
and the password module is used for acquiring the confirmation success information of the authorization terminal, acquiring the digital key password information according to the confirmation success information, and sending the digital key password information to the authorized terminal and the vehicle-mounted terminal.
In a fourth aspect, the present invention provides an apparatus comprising: the device comprises a memory, a processor and a computer program, wherein the computer program is stored in the memory, and the processor runs the computer program to execute the digital key password sharing method.
The invention provides a digital key password sharing method and a device, which can obtain authorization information according to an authorization request by obtaining the authorization request of an authorization terminal and sending the authorization information to the authorization terminal, and can understand that when an authorizer shares the password with an authorizee, the authorizer firstly sends the authorization request to a server to obtain information for the authorizee to verify, then the authorizee verifies the information and sends verification information to the server, the server obtains information to be confirmed and sends the information to be confirmed to the authorization terminal after confirming the information, after receiving the authorization information, the authorizer clicks to confirm the authorization and sends the information to be confirmed to the server, the server obtains the digital key password information according to the information to be confirmed, and sends the digital key password information to the authorized terminal and the vehicle terminal, the authorization terminal can start the vehicle terminal, and in the key sharing process, need not the physical key appearance, only need with self verification information send for by the mandated end can, it is quick convenient, and for the physical key, be difficult to forget, lose.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 is a schematic flow chart of a method for sharing a digital key password according to the present invention;
fig. 2 is a schematic flow chart illustrating another method for sharing a password of a digital key according to the present invention;
FIG. 3 is a block diagram of a digital key code sharing device according to the present invention;
fig. 4 is a schematic diagram of a hardware structure of an apparatus according to an embodiment of the present invention.
With the foregoing drawings in mind, certain embodiments of the disclosure have been shown and described in more detail below. These drawings and written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the concepts of the disclosure to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein.
It should be understood that, in various embodiments of the present invention, the sequence numbers of the processes do not mean the execution sequence, and the execution sequence of the processes should be determined by the functions and the internal logic of the processes, and should not constitute any limitation on the implementation process of the embodiments of the present invention.
It should be understood that in the present application, "comprising" and "having" and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The application scenario of the invention can be in the field of internet automobiles, and can also be in the field of intelligent door locks and other IoT intelligent switches and lock devices.
Taking an internet automobile as an example, with the development of the times, automobiles are more and more, and the necessary condition for starting the automobiles is that an automobile key is needed. And the automobile leasing market is gradually expanded under the promotion of the market. In the prior art, most automobile keys are physical keys, and when an automobile owner rents out an automobile, the automobile owner needs to send the physical keys to an automobile renting party on the spot, and the automobile can be started after the automobile renting party takes the physical keys. However, in the prior art, the key sharing is troublesome, and the physical key is easy to forget and lose although the size is small.
In order to solve the above technical problems in the prior art, the invention provides a method for sharing a digital key password, which realizes key sharing and improves the convenience of key sharing.
The following describes the technical solutions of the present invention and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present invention will be described below with reference to the accompanying drawings.
Fig. 1 is a schematic flow chart of a method for sharing a digital key password according to the present invention, and an execution main body of the method shown in fig. 1 may be a software and/or hardware device. The method shown in fig. 1 includes steps S101 to S106, which are specifically as follows:
s101, the authorization end sends an authorization request to the server end.
Specifically, taking an internet automobile as an example, the authorization end may be a terminal owned by an owner, such as an electronic device like a mobile phone and an iPad. The server side may be a cloud platform, for example, a TSP platform. In some embodiments, the authorization end may be connected to the TSP cloud platform by using a secure SSL connection to complete Encryption between the two and prevent information from being stolen, wherein the SSL connection protocol is used to ensure data transmission security on the Internet, and a data Encryption (Encryption) technology is used to ensure that data is not intercepted and eavesdropped during transmission on the network, so as to provide a secure support for data communication, and the SSL mainly provides service 1) to authenticate a user server and ensure that data is sent to a correct server; 2) data are encrypted, and the data are prevented from being stolen and used in the process of data transmission; 3) and maintaining data integrity and verifying whether the data is lost in the transmission process.
The authorization request may be a request sent by a vehicle owner to the server side when a person uses a vehicle, for example, the authorization request may be a request for sending authorization information for the authorized side to verify.
In some embodiments, before the authorization side sends the authorization request, login may be performed first to complete connection with the server, specifically, the login request may be sent to the server side first, and the server side performs verification after obtaining the login request of the authorization side, and performs subsequent steps after determining that the login request is qualified. In other implementations, if the authentication is unsuccessful, the connection between the authorization side and the server side cannot be completed.
S102, obtaining an authorization request of an authorization end, obtaining authorization information according to the authorization request, and sending the authorization information to the authorization end.
Specifically, after acquiring the authorization request, the server sends out authorization information according to the corresponding authorization request, and then sends the authorization information to the authorization terminal. The terminal authorization information may include two-dimensional code information, or any other information that can complete identity verification.
S103, obtaining the authorization information of the server side.
Specifically, the authorization side acquires the authorization information and waits for the verification of the authorized side. In some embodiments, the authorized person may hold the authorized terminal to scan the authorization information in the meantime, such as scanning a two-dimensional code. In other embodiments, the server may also send the authorization information to an authorized end, for example, send the two-dimensional code information to an authorized person through chat software, and after receiving the authorization information, the authorized person verifies the authorization information.
S104, acquiring the verification information of the authorized terminal, acquiring the information to be confirmed according to the verification information, and sending the information to be confirmed to the authorized terminal.
Specifically, after the authorized terminal completes verification of the authorization information, verification information is sent to the server terminal, the server terminal verifies the verification information, and if the verification is passed, information to be confirmed is sent to the authorized terminal for the vehicle owner to finally confirm.
In some embodiments, the information to be confirmed may include identity information of the authorized terminal, such as name, gender, etc. of the user of the authorized terminal displayed on the authorized terminal; in other embodiments, information such as the authorized time may also be included, for example, the authorized time is 5 hours; information such as a fee may also be included, for example, a fee of 100 dollars may be available after authorization. The embodiment of the present invention does not limit the information to be confirmed.
And S105, the authorization terminal acquires the information to be confirmed of the server terminal, acquires the information of success of confirmation according to the information to be confirmed, and sends the information of success of confirmation to the server terminal.
Specifically, after verifying that the to-be-confirmed information is correct, the authorization terminal may send out a confirmation success information, for example, whether authorization is performed or not may be displayed on the authorization terminal, and two keys of "yes" and "no" are displayed, the vehicle owner may select according to an actual situation, and if yes, the confirmation success information may be sent to the server terminal to inform the server terminal of confirmation of authorization.
S106, obtaining the confirmation success information of the authorization terminal, obtaining the digital key password information according to the confirmation success information, and sending the digital key password information to the authorized terminal and the vehicle-mounted terminal.
Specifically, after the server side obtains the confirmation success information, the digital key password information is obtained and sent to the authorized side and the vehicle-mounted side, and then the authorized side can start the vehicle-mounted side without a physical key. It is understood that the vehicle-mounted terminal may be a terminal for controlling the start of the vehicle, and may be a TBox device, for example.
The digital key cipher information may be asymmetric (secret key) encryption, for example, it may include RSA public key information and RSA private key information, the asymmetric (secret key) encryption belongs to the second level discipline of network security under the communication technology, and refers to an encryption method composed of a corresponding pair of unique secret keys (i.e. public key and private key), it solves the issue and management problem of secret key, and it is the core of current commercial cipher. In the public key cryptosystem, a private key is not disclosed, and a public key is disclosed. Correspondingly, acquiring a digital key password according to the confirmation success information, and sending the digital key password to the authorized terminal and the vehicle-mounted terminal, wherein the method specifically comprises the steps of acquiring RSA public key information and RSA private key information according to the confirmation success information; and sending the RSA public key information to an authorized end, and sending the RSA private key information to a vehicle-mounted end.
In some embodiments, after obtaining the authorization success information and sending the authorization success information to the authorization terminal, the authorization terminal may display to indicate to the authorization terminal that authorization is completed.
According to the digital key password sharing method disclosed by the embodiment, the sharing of the digital key is realized through the interaction of the three ends of the authorization end, the authorized end and the server end, and the inconvenience of carrying and sharing of a physical key is solved.
Fig. 2 is a schematic flow chart of another digital key password sharing method provided by the present invention, and an execution main body of the method shown in fig. 2 may be a software and/or hardware device. The method shown in fig. 1 includes steps S201 to S207, which are specifically as follows:
s201, the authorization end sends an authorization request to the server end.
S202, obtaining an authorization request of an authorization end, obtaining authorization information according to the authorization request, and sending the authorization information to the authorization end.
S203, obtaining the authorization information of the server side.
S204, obtaining the verification information of the authorized terminal, obtaining the information to be confirmed according to the verification information, and sending the information to be confirmed to the authorized terminal.
S205, the authorization terminal acquires the information to be confirmed of the server terminal, acquires the information of success of confirmation according to the information to be confirmed, and sends the information of success of confirmation to the server terminal.
S206, obtaining the confirmation success information of the authorization terminal, obtaining the digital key password information according to the confirmation success information, and sending the digital key password information to the authorized terminal and the vehicle-mounted terminal.
Steps S201 to S206 are the same as steps S101 to S106 in the embodiment of fig. 1 in the implementation process and effect, and are not described herein again.
S207, obtaining the canceling authorization information of the authorization end, and processing the RSA private key information of the authorized end into an invalid state according to the canceling authorization information.
Specifically, for example, in the internet automobile, in the process of using the vehicle by the authorized person, if the vehicle owner needs to cancel the authority of controlling the vehicle by the authorized person for some reason, the operation of canceling the authorization only needs to be performed at the authorization end, the server end changes the RSA public key of the authorized person into an invalid state, and issues invalid information to the TBox device, so that the authorized person cannot operate the vehicle through the mobile phone. The vehicle owner realizes the permission of withdrawing the vehicle.
Fig. 3 is a schematic structural diagram of a digital key password sharing device according to the present invention, and the digital key password sharing device 30 shown in fig. 3 includes:
the authorization module 31 is configured to obtain an authorization request of an authorization end, obtain authorization information according to the authorization request, and send the authorization information to the authorization end;
the confirmation module 32 is configured to obtain verification information of the authorized terminal, obtain information to be confirmed according to the verification information, and send the information to be confirmed to the authorized terminal;
and the password module 33 is configured to obtain the confirmation success information of the authorization end, obtain the digital key password information according to the confirmation success information, and send the digital key password information to the authorized end and the vehicle-mounted end.
The digital key password sharing apparatus in the embodiment shown in fig. 3 can be correspondingly used to execute the steps in the method embodiment shown in fig. 1, and the implementation principle and technical effect are similar, which are not described herein again.
Optionally, the digital key password information includes RSA public key information and RSA private key information;
correspondingly, the cryptographic module 33 obtains the digital key password according to the confirmation success information, and sends the digital key password to the authorized terminal and the vehicle-mounted terminal, including:
obtaining RSA public key information and RSA private key information according to the confirmation success information;
and sending the RSA public key information to an authorized end, and sending the RSA private key information to a vehicle-mounted end.
Optionally, after sending the digital key password information to the authorized terminal and the vehicle-mounted terminal, the password module 33 further includes:
and acquiring the authorization canceling information of the authorization end, and processing the RSA private key information of the authorized end into an invalid state according to the authorization canceling information.
Optionally, after the cryptographic module 33 sends the digital key cryptographic information to the authorized terminal and the vehicle-mounted terminal, the method further includes:
and acquiring the successful authorization information and sending the successful authorization information to the authorization end.
Optionally, the authorization information includes two-dimensional code information;
correspondingly, the authorization module 31 acquires the authorization request from the authorization end, acquires the authorization information according to the authorization request, and sends the authorization information to the authorization end, including:
and acquiring an authorization request of the authorization terminal, acquiring the two-dimension code information according to the authorization request, and sending the two-dimension code information to the authorization terminal.
Optionally, before the authorization module 31 sends the authorization information to the authorization end, the method further includes:
and obtaining a login request of the authorized terminal, and determining that the login request is qualified.
Optionally, the login request carries RSA public key information;
correspondingly, obtaining a login request of an authorized terminal and determining that the login request is qualified comprises the following steps:
and acquiring RSA public key information of the authorization terminal, and verifying the RSA public key information to be correct to determine that the login request is qualified.
Referring to fig. 4, which is a schematic diagram of a hardware structure of an apparatus according to an embodiment of the present invention, the apparatus 40 includes: a processor 41, memory 42 and computer programs; wherein
A memory 42 for storing a computer program, which may also be a flash memory (flash). The computer program is, for example, an application program, a functional module, or the like that realizes the above method.
A processor 41 for executing the computer program stored in the memory to implement the steps performed by the apparatus in the above method. Reference may be made in particular to the description relating to the preceding method embodiment.
Alternatively, the memory 42 may be separate or integrated with the processor 41.
When the memory 42 is a device independent of the processor 41, the apparatus may further include:
a bus 43 for connecting the memory 42 and the processor 41.
The present invention also provides a readable storage medium, in which a computer program is stored, which, when being executed by a processor, is adapted to implement the methods provided by the various embodiments described above.
The readable storage medium may be a computer storage medium or a communication medium. Communication media includes any medium that facilitates transfer of a computer program from one place to another. Computer storage media may be any available media that can be accessed by a general purpose or special purpose computer. For example, a readable storage medium is coupled to the processor such that the processor can read information from, and write information to, the readable storage medium. Of course, the readable storage medium may also be an integral part of the processor. The processor and the readable storage medium may reside in an Application Specific Integrated Circuits (ASIC). Additionally, the ASIC may reside in user equipment. Of course, the processor and the readable storage medium may also reside as discrete components in a communication device. The readable storage medium may be a read-only memory (ROM), a random-access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
The present invention also provides a program product comprising execution instructions stored in a readable storage medium. The at least one processor of the device may read the execution instructions from the readable storage medium, and the execution of the execution instructions by the at least one processor causes the device to implement the methods provided by the various embodiments described above.
In the above embodiments of the apparatus, it should be understood that the Processor may be a Central Processing Unit (CPU), other general purpose processors, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor, or in a combination of the hardware and software modules within the processor.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A digital key password sharing method is applied to a server side and comprises the following steps:
obtaining an authorization request of an authorization end, obtaining authorization information according to the authorization request, and sending the authorization information to the authorization end;
acquiring verification information of the authorized terminal, acquiring information to be confirmed according to the verification information, and sending the information to be confirmed to the authorized terminal;
and acquiring the confirmation success information of the authorization terminal, acquiring the digital key password information according to the confirmation success information, and sending the digital key password information to the authorized terminal and the vehicle-mounted terminal.
2. The method of claim 1, wherein the digital key cryptographic information includes RSA public key information and RSA private key information;
correspondingly, the acquiring a digital key password according to the confirmation success information and sending the digital key password to the authorized terminal and the vehicle-mounted terminal includes:
acquiring the RSA public key information and the RSA private key information according to the confirmation success information;
and sending the RSA public key information to the authorized terminal, and sending the RSA private key information to the vehicle-mounted terminal.
3. The method according to claim 1 or 2, wherein after acquiring the confirmation success information of the authorized terminal, acquiring the digital key password information according to the confirmation success information, and sending the digital key password information to the authorized terminal and the vehicle-mounted terminal, the method further comprises:
and acquiring the authorization canceling information of the authorization end, and processing the RSA private key information of the authorized end into an invalid state according to the authorization canceling information.
4. The method according to claim 1 or 2, wherein after acquiring the confirmation success information of the authorized terminal, acquiring the digital key password information according to the confirmation success information, and sending the digital key password information to the authorized terminal and the vehicle-mounted terminal, the method further comprises:
and acquiring authorization success information and sending the authorization success information to the authorization terminal.
5. The method of claim 1, wherein the authorization information comprises two-dimensional code information;
correspondingly, the obtaining of the authorization request of the authorization end, obtaining authorization information according to the authorization request, and sending the authorization information to the authorization end includes:
and acquiring the authorization request of the authorization end, acquiring the two-dimension code information according to the authorization request, and sending the two-dimension code information to the authorization end.
6. The method according to claim 1, wherein before the obtaining the authorization request of the authorization terminal, obtaining the authorization information according to the authorization request, and sending the authorization information to the authorization terminal, the method further comprises:
and obtaining a login request of the authorization terminal, and determining that the login request is qualified.
7. The method according to claim 6, wherein the login request carries the RSA public key information;
correspondingly, the obtaining of the login request of the authorized terminal and the determining that the login request is qualified include:
and acquiring RSA public key information of the authorization end, and verifying the RSA public key information to be correct to determine that the login request is qualified.
8. A digital key password sharing method is applied to an authorization end and comprises the following steps:
sending an authorization request to the server side, and acquiring authorization information of the server side;
and acquiring the information to be confirmed of the server side, acquiring confirmation success information according to the information to be confirmed, and sending the confirmation success information to the server side.
9. The utility model provides a device is shared to digital key password which characterized in that, is applied to the server side, includes:
the authorization module is used for acquiring an authorization request of an authorization end, acquiring authorization information according to the authorization request and sending the authorization information to the authorization end;
the confirmation module is used for acquiring the verification information of the authorized terminal, acquiring the information to be confirmed according to the verification information and sending the information to be confirmed to the authorized terminal;
and the password module is used for acquiring the confirmation success information of the authorization terminal, acquiring the digital key password information according to the confirmation success information, and sending the digital key password information to the authorized terminal and the vehicle-mounted terminal.
10. An apparatus, comprising: memory, a processor and a computer program, the computer program being stored in the memory, the processor running the computer program to perform the method of any of claims 1 to 7.
CN201911073919.2A 2019-11-06 2019-11-06 Digital key password sharing method and device Pending CN110808832A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911073919.2A CN110808832A (en) 2019-11-06 2019-11-06 Digital key password sharing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911073919.2A CN110808832A (en) 2019-11-06 2019-11-06 Digital key password sharing method and device

Publications (1)

Publication Number Publication Date
CN110808832A true CN110808832A (en) 2020-02-18

Family

ID=69501302

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911073919.2A Pending CN110808832A (en) 2019-11-06 2019-11-06 Digital key password sharing method and device

Country Status (1)

Country Link
CN (1) CN110808832A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111404993A (en) * 2020-02-21 2020-07-10 吉利汽车研究院(宁波)有限公司 Digital key sharing method, device and equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050198170A1 (en) * 2003-12-12 2005-09-08 Lemay Michael Secure electronic message transport protocol
CN105788037A (en) * 2014-12-26 2016-07-20 比亚迪股份有限公司 Vehicle intelligent key authorization system and method
CN109017676A (en) * 2018-07-23 2018-12-18 奇瑞汽车股份有限公司 Control method for vehicle, device and storage medium
CN109249896A (en) * 2017-07-13 2019-01-22 上海擎感智能科技有限公司 A kind of control method and device of automobile, storage medium, terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050198170A1 (en) * 2003-12-12 2005-09-08 Lemay Michael Secure electronic message transport protocol
CN105788037A (en) * 2014-12-26 2016-07-20 比亚迪股份有限公司 Vehicle intelligent key authorization system and method
CN109249896A (en) * 2017-07-13 2019-01-22 上海擎感智能科技有限公司 A kind of control method and device of automobile, storage medium, terminal
CN109017676A (en) * 2018-07-23 2018-12-18 奇瑞汽车股份有限公司 Control method for vehicle, device and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111404993A (en) * 2020-02-21 2020-07-10 吉利汽车研究院(宁波)有限公司 Digital key sharing method, device and equipment
CN111404993B (en) * 2020-02-21 2023-05-19 吉利汽车研究院(宁波)有限公司 Digital key sharing method, device and equipment

Similar Documents

Publication Publication Date Title
CN108805573B (en) Information verification method, server and storage medium
CN109150548B (en) Digital certificate signing and signature checking method and system and digital certificate system
WO2017197974A1 (en) Biometric characteristic-based security authentication method, device and electronic equipment
CN107358419B (en) Airborne terminal payment authentication method, device and system
CN109895734B (en) Authorized Bluetooth key activation method and system, storage medium and T-BOX
CN110391913B (en) Vehicle binding method and device
US20040103312A1 (en) Domain-based digital-rights management system with easy and secure device enrollment
JP2018532301A (en) User authentication method and apparatus
CN110324335B (en) Automobile software upgrading method and system based on electronic mobile certificate
CN109920100B (en) Unlocking method and system of intelligent lock
CN111538784A (en) Block chain-based digital asset transaction method and device and storage medium
CN115484025A (en) Vehicle encrypted communication method and device
CN113810410B (en) Method, system and storage medium for encryption of non-abusive key decentralization attribute base
CN112437068B (en) Authentication and key agreement method, device and system
CN114499876A (en) Internet of things data evidence storing method based on block chain and NB-IoT chip
CN110808832A (en) Digital key password sharing method and device
JP2004102872A (en) Online commerce system for personal information protection
CN111460427A (en) Binding method and device of power supply equipment, storage medium and equipment
CN110830263A (en) Automatic login method and device for vehicle-mounted system
WO2013067792A1 (en) Method, device and system for querying smart card
CN112506267B (en) RTC calibration method, vehicle-mounted terminal, user and storage medium
CN114139121A (en) Identity verification method and device, electronic equipment and computer readable storage medium
CN110555756A (en) Unattended car renting method and device
CN117641352B (en) Secure access method and device, cloud terminal device and storage medium
CN116691415B (en) Charging information management method, system, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200218