CN111047740A - Digital key sharing method - Google Patents

Digital key sharing method Download PDF

Info

Publication number
CN111047740A
CN111047740A CN201911152885.6A CN201911152885A CN111047740A CN 111047740 A CN111047740 A CN 111047740A CN 201911152885 A CN201911152885 A CN 201911152885A CN 111047740 A CN111047740 A CN 111047740A
Authority
CN
China
Prior art keywords
sharing
digital key
key
shared
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911152885.6A
Other languages
Chinese (zh)
Inventor
周良红
程潇
余晓飞
徐前
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ingeek Information Security Consulting Associates Co ltd
Original Assignee
Ingeek Information Security Consulting Associates Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ingeek Information Security Consulting Associates Co ltd filed Critical Ingeek Information Security Consulting Associates Co ltd
Priority to CN201911152885.6A priority Critical patent/CN111047740A/en
Publication of CN111047740A publication Critical patent/CN111047740A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60LPROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
    • B60L53/00Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles
    • B60L53/60Monitoring or controlling charging stations
    • B60L53/66Data transfer between charging stations and vehicles
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F15/00Coin-freed apparatus with meter-controlled dispensing of liquid, gas or electricity
    • G07F15/003Coin-freed apparatus with meter-controlled dispensing of liquid, gas or electricity for electricity
    • G07F15/005Coin-freed apparatus with meter-controlled dispensing of liquid, gas or electricity for electricity dispensed for the electrical charging of vehicles
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00507Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks keyless data carrier having more than one function
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T10/00Road transport of goods or passengers
    • Y02T10/60Other road transportation technologies with climate change mitigation effect
    • Y02T10/70Energy storage systems for electromobility, e.g. batteries
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T10/00Road transport of goods or passengers
    • Y02T10/60Other road transportation technologies with climate change mitigation effect
    • Y02T10/7072Electromobility specific charging systems or methods for batteries, ultracapacitors, supercapacitors or double-layer capacitors
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T90/00Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02T90/10Technologies relating to charging of electric vehicles
    • Y02T90/12Electric charging stations
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T90/00Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02T90/10Technologies relating to charging of electric vehicles
    • Y02T90/16Information or communication technologies improving the operation of electric vehicles
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T90/00Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02T90/10Technologies relating to charging of electric vehicles
    • Y02T90/16Information or communication technologies improving the operation of electric vehicles
    • Y02T90/167Systems integrating technologies related to power network operation and communication or information technologies for supporting the interoperability of electric or hybrid vehicles, i.e. smartgrids as interface for battery charging of electric vehicles [EV] or hybrid vehicles [HEV]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S30/00Systems supporting specific end-user applications in the sector of transportation
    • Y04S30/10Systems supporting the interoperability of electric or hybrid vehicles
    • Y04S30/14Details associated with the interoperability, e.g. vehicle recognition, authentication, identification or billing

Abstract

The embodiment of the invention relates to the technical field of Internet of things and discloses a digital key sharing method. The method comprises the following steps: responding to a digital key sharing request sent by a terminal of a sharer, and determining whether the identity of the sharer is legal or not; if the identity of the sharer is legal, determining whether the sharing request meets the key sharing condition; and if the key sharing condition is met, storing sharing information corresponding to the sharing request, and sharing the digital key according to the sharing information. The invention ensures that the user can safely and conveniently share the digital key to other users for use, thereby improving the utilization rate of equipment.

Description

Digital key sharing method
Technical Field
The invention relates to the technical field of Internet of things, in particular to a digital key sharing method.
Background
Along with the development of new energy vehicles, the popularization of private charging piles has also been promoted at a rapid pace. However, in many cases, the owner of the vehicle needs to authorize the private charging post to be used by other users. At present, the private charging pile needs to identify by means of a physical identity card, so that a car owner cannot safely and conveniently authorize the private charging pile to be used by other users.
Disclosure of Invention
The embodiment of the invention aims to provide a digital key sharing method, so that a user can safely and conveniently share a digital key to other users for use, and the improvement of the utilization rate of equipment is facilitated.
In order to solve the technical problem, an embodiment of the present invention provides a digital key sharing method, which is applied to a cloud server side, and the method includes:
responding to a digital key sharing request sent by a terminal of a sharer, and determining whether the identity of the sharer is legal or not;
if the identity of the sharer is legal, determining whether the sharing request meets key sharing conditions;
and if the key sharing condition is met, storing sharing information corresponding to the sharing request, and sharing the digital key according to the sharing information.
The embodiment of the invention also provides a digital key sharing method, which is applied to a terminal and comprises the following steps:
receiving key sharing parameters input by a sharer;
and generating a digital key sharing request according to the key sharing parameters, and sending the sharing request to a cloud server.
Compared with the prior art, the method and the device for sharing the digital key have the advantages that the user can unlock the equipment such as the charging pile and the like based on the digital key, when the user needs to share the digital key, the cloud server responds to the digital key sharing request of the terminal to determine whether the identity of the sharer is legal or not, if the identity of the sharer is legal, whether the sharing request meets the key sharing condition or not is continuously determined, and the digital key sharing is carried out when the key sharing condition is met. Therefore, the embodiment of the invention can safely and conveniently realize the sharing of the digital key.
As an embodiment, the determining whether the sharing request meets the key sharing condition specifically includes:
and if the identity of the sharee is legal and the number of the shared digital keys is less than a preset threshold value, determining that the sharing request meets the key sharing condition.
As an embodiment, before determining whether the sharing request satisfies the key sharing condition, the method further includes:
determining that the sharee does not currently have a valid sharing digital key.
As an embodiment, the sharing of the digital key according to the sharing information specifically includes:
responding to a use request of a sharing digital key sent by a terminal of a sharee, determining whether the identity of the sharee is legal or not according to the use request and the sharing information, and determining whether the sharing digital key is in a valid period or not;
and if the identity of the shared person is legal and the sharing digital key is in the valid period, issuing the sharing digital key to the shared person terminal.
As an embodiment, further comprising:
determining the priority of the shared digital key of the sharee according to the sharing request;
sharing the digital key according to the sharing information, which specifically comprises:
and if the use time intervals corresponding to the use requests of the shared digital keys conflict, distributing the use time intervals to the shared digital key with the highest priority. Thereby avoiding the conflict of the use time periods of the shared digital key.
As an embodiment, further comprising:
and if a revocation request of the shared digital key is received and the user requesting the revocation is a preset user, revoking the shared digital key. Thereby improving the security of the digital key.
As an embodiment, the sharing of the digital key according to the sharing information specifically includes:
if the shared digital key is not used when the preset time exceeds the starting time of the reserved use time period, sending a prompt of whether to cancel the reserved use time period to a corresponding shared user terminal, and determining whether to cancel the reserved use time period according to feedback of the shared user terminal.
As an embodiment, further comprising:
and if the shared digital key meets the deletion condition, deleting the shared digital key.
As an embodiment, the key sharing parameter includes one or any combination of the following:
identity information, priority level and sharing time period of the sharees.
Drawings
Fig. 1 is a flowchart of a digital key sharing method according to a first embodiment of the present invention;
fig. 2 is a flowchart of a digital key sharing method according to a second embodiment of the present invention;
fig. 3 is a flowchart of a digital key sharing method according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of a digital key sharing device according to a fourth embodiment of the present invention;
fig. 5 is a schematic structural diagram of an electronic device according to a fifth embodiment of the invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, embodiments of the present invention will be described in detail below with reference to the accompanying drawings. However, it will be appreciated by those of ordinary skill in the art that numerous technical details are set forth in order to provide a better understanding of the present invention in its various embodiments. However, the technical solution claimed in the present invention can be implemented without these technical details and various changes and modifications based on the following embodiments.
As shown in fig. 1, a first embodiment of the present invention relates to a digital key sharing method, which is applied to a cloud server. The method includes steps 101 to 103.
Step 101: responding to a digital key sharing request sent by a terminal of a sharer, determining whether the identity of the sharer is legal or not, if the identity of the sharer is legal, executing the step 102, and if the identity of the sharer is illegal, prompting the terminal that the identity of the sharer is illegal, and ending.
The digital key can be arranged on the intelligent terminal to replace the intelligent key and the like to realize unlocking. In step 101, the digital key sharing request is from an intelligent terminal, and the terminal may be a smart phone or an intelligent wearable device. Can be provided with the vehicle APP that charges among the intelligent terminal, share the person when the right of use that needs to fill electric pile to other user authorizations, can open this APP. The sharer can be for the user that registers in advance in this APP, can be provided with the private that binds with this user and fill electric pile and private car in the APP. The number of the private charging piles bound with the registered user can be one or more. Under the default condition, one registered user needs to be bound with at least one charging pile.
When the use right of charging pile needs to be authorized to other users, the sharing person can open the APP, the charging pile needing to be authorized is selected, and the charging pile can be manually set by the sharing person, for example, when the selectable charging piles are multiple, or automatically set by the APP. The intelligent terminal receives a key sharing parameter input by a sharer, and the key sharing parameter can comprise: the sharing method comprises the steps of sharing an account number, shared charging pile information, a shared account number, a sharing time period, a sharing time limit and the like. The sharing time limit is, for example, one or more times, one week or six months. The intelligent terminal generates a sharing request according to the key sharing parameters and sends the sharing request to the cloud server.
When the cloud server receives a digital key sharing request from a terminal of a sharer, key sharing parameters are analyzed from the sharing request, whether the sharer is a stake owner of a shared charging stake is determined based on a pre-stored charging stake-stake owner corresponding relation, and if yes, the identity of the sharer is determined to be legal. Wherein, two and more than stake owner can be bound to one electric pile that fills.
Step 102: and determining whether the sharing request meets the key sharing condition, if so, executing a step 103, otherwise, prompting the terminal that the sharing request does not meet the key sharing condition, and ending.
And if the identity of the shared person is legal and the number of the shared digital keys is less than a preset threshold value, determining that the sharing request meets the key sharing condition. Specifically, if the identity of the shared person is not the owner of the shared charging pile, it can be determined that the identity of the shared person is legal. In order to prevent the number of the shared digital keys from being too large, which causes more conflicts in practical use, the number of the shared digital keys may be limited, for example, the number of the shared digital keys cannot exceed 5, that is, the preset threshold is equal to 5, however, the value of the preset threshold is not specifically limited in this embodiment.
In some examples, before determining whether the sharing request satisfies the key sharing condition in step 102, the method may further include: and determining that no valid sharing digital key currently exists in the sharee. The cloud server determines whether a sharing digital key of a sharee is stored, and if the sharing digital key of the sharee is stored, the shared digital key of the sharee is prompted to a terminal of the sharee, and the current sharing fails; and if the sharing digital key of the sharee is not stored, continuously determining whether the sharing request meets the key sharing condition.
Step 103: and storing sharing information corresponding to the sharing request, and sharing the digital key according to the sharing information.
The sharing information can be set according to key sharing parameters carried by the sharing request. Specifically, sharing information may include: the sharing digital key ID corresponding to the shared person, the shared charging pile, the identity information (such as the mobile phone number of the shared person), the use time period, the use time limit and the like generated by the cloud server. And then, a prompt message of successful sharing of the digital key can be sent to terminals of the sharer and the sharee. The cloud server may send a Short message prompt to the terminal of the sharer and the terminal of the sharee through an SMS (Short message service) platform.
It should be noted that the cloud server may determine, according to the key sharing parameter, that the number of times the digital key is shared is one or more times, and the usage period of the digital key, and the like.
In some examples, the sharing of the digital key according to the sharing information in step 103 specifically includes:
responding to a use request of a sharing digital key sent by a terminal of a sharee, determining whether the identity of the sharee is legal or not according to the use request and sharing information, and determining whether the sharing digital key is in a valid period or not; if the identity of the sharee is legal and the sharing digital key is in the valid period, the sharing digital key is issued to the sharee terminal; if the identity of the sharee is legal and illegal or the sharing digital key of the sharee is not in the validity period, the sharing digital key is not issued to the terminal of the sharee, and the reason for the failure of issuing the sharing digital key can be prompted to the terminal of the sharee.
Here, if the shared digital key of the sharee is in the valid period and the terminal of the sharee is in an online state, the cloud server can issue the shared digital key in response to a shared digital key use request sent by the terminal of the sharee, so that the sharee's terminal can unlock the charging pile. The terminal of the sharee can store the issued sharing digital key in the safe white box. If the shared digital key of the sharee is in the valid period, but the terminal of the sharee is in an offline state, the terminal of the sharee can acquire the shared digital key from the security white box to unlock. It should be noted that the terminal of the sharee may also request the cloud server to issue the sharing digital key when receiving the sharing success information, and store the sharing digital key in the local security white box of the terminal, so as to normally use the sharing digital key to unlock in the offline state. Therefore, the sharees can safely and conveniently use the charging piles.
In one example, if the shared digital key satisfies the deletion condition, the shared digital key is deleted. For example, the cloud server determines that the number of times of use of a certain shared digital key is one time according to the sharing information, and if the shared digital key is used once, it may be determined that the shared digital key satisfies the deletion condition, and deletes the shared digital key. Or, if the service life of a certain shared digital key is 6 months, the cloud server may delete the shared digital key when the service life of the shared digital key is over. Therefore, invalid shared digital keys can be cleared away in time. And the terminal of the sharee can automatically delete the shared digital key downloaded in the terminal security chip or the security white box according to the validity of the shared digital key.
In practical applications, if a revocation request of the sharing digital key is received and the user requesting revocation is a preset user, the sharing digital key is revoked. Specifically, when a revocation request of the shared digital key is received and the user requesting revocation is the stub master user, the shared digital key is revoked, for example, the shared digital key is deleted. The pile master user can check the shared digital key according to actual needs, for example, a sharer (namely the pile master) sends an inquiry instruction to the cloud server through the terminal to inquire a shared digital key list, the cloud server firstly verifies the validity of the user identity, and if the user identity is legal, an inquiry result is fed back to the terminal. Similarly, the sharees can also send query instructions to the cloud server through the terminal to query the state of the sharing digital key.
Compared with the prior art, when the digital key needs to be shared, the cloud server responds to the digital key sharing request of the terminal of the sharer, and if the identity of the sharer is determined to be legal and the sharing request meets the key sharing condition, the digital key can be shared. Therefore, the embodiment of the invention not only ensures that the sharing of the digital key has certain safety, but also can conveniently realize the sharing of the digital key.
A second embodiment of the present invention relates to a digital key sharing method. As shown in fig. 2, the method includes steps 201 to 204.
Step 201: responding to a digital key sharing request sent by a terminal of a sharer, determining whether the identity of the sharer is legal or not, if the identity of the sharer is legal, executing the step 202, and if the identity of the sharer is illegal, prompting the terminal that the identity of the sharer is illegal, and ending.
Step 202: and determining whether the sharing request meets the key sharing condition, if so, executing a step 203, otherwise, prompting the terminal that the sharing request does not meet the key sharing condition, and ending.
Step 201 and step 202 are the same as step 101 and step 102, respectively, and are not described herein again.
Step 203: and storing sharing information corresponding to the sharing request, and determining the priority of the shared digital key of the sharee according to the sharing request.
Step 204: and if the use time intervals corresponding to the use requests of the plurality of shared digital keys conflict, allocating the use time intervals to the shared digital key with the highest priority.
The service life of the shared digital key can be multiple times, and the number of the shared digital keys can be multiple. Generally, a plurality of shared digital keys can request to use the charging pile in different use periods, and can also reserve different use periods to request to use the charging pile, but there may be conflicts in the use periods requested by the plurality of shared digital keys. For example, 2 shared digital keys all request a 21:00 to 22:00 usage period. In step 203, the priority of each sharing digital key may be determined according to the sharing request. For example, the priority of sharing the digital key may be determined according to the time of the sharing request, and the earlier the sharing of the digital key is higher. Or, the sharer may specify a priority in the sharing request, and the cloud server may determine the priority of sharing the digital key according to the priority specified in the sharing request. For example, the sharer may set the priority of the sharee to three levels and assign a priority level for each sharee. In step 204, if there is a conflict between the usage periods corresponding to the usage requests of the two shared digital keys, the usage period is assigned to the shared digital key with the highest priority. Through dividing the priority of sharing the digital key, the shared person of high priority can be guaranteed to preferentially use and fill electric pile.
In one example, the method further comprises the following steps: and if the shared digital key is not used when the preset time exceeds the starting time of the reserved use time period, sending a prompt of whether to cancel the reserved use time period to the corresponding shared user terminal, and determining whether to cancel the reserved use time period according to feedback of the shared user terminal.
Here, the sharees corresponding to the plurality of sharing digital keys can reserve the use time period to avoid the use conflict. If the sharee who has reserved the usage period cannot use the charging pile in the usage period, the cloud server may send a prompt for canceling the reserved usage period to the terminal of the sharee when the shared digital key is not used for a preset time period exceeding the starting time of the reserved usage period, for example, 30 minutes after exceeding the starting time of the reserved usage period. If the feedback of the shared person is that the reserved use time period is prohibited to be cancelled, the cloud server continues to reserve the rest use time period for the shared person, and if the feedback of the shared person is that the reserved use time period is cancelled, the cloud server can open the rest use time period, so that unnecessary occupation of the charging pile is avoided.
Compared with the prior art, when the digital key needs to be shared, the server responds to the digital key sharing request of the terminal of the sharer, and if the identity of the sharer is determined to be legal, the sharing request is determined to meet the key sharing condition, and the digital key is shared. Therefore, the embodiment of the invention not only ensures that the sharing of the digital key has certain safety, but also can conveniently realize the sharing of the digital key. Moreover, the use time periods of a plurality of shared digital keys can be managed by the implementation mode, so that the use efficiency of the charging pile can be improved.
A third embodiment of the present invention relates to a digital key sharing method applied to a terminal, and as shown in fig. 3, the digital key sharing method of the present embodiment includes steps 301 and 302.
Step 301: and receiving the key sharing parameters input by the sharer.
Step 302: and generating a digital key sharing request according to the key sharing parameters, and sending the sharing request to the cloud server.
The key sharing parameters may include one or any combination of the following: identity information, priority level, sharing time period and sharing time limit of the sharees. The identity information of the sharee is, for example, a mobile phone number of the sharee. It can be understood that the key sharing parameter may include a sharing time period, that is, the sharer has defined the use time period in advance, or the key sharing parameter does not include a specific sharing time period, that is, the sharee may reserve the use time period through the cloud server, or temporarily request to use a certain use time period, and the like. When a plurality of sharees exist, the sharer can conveniently determine the sharee capable of using the using period according to the priority level of the sharee by the cloud server by specifying the priority level of the sharee when the using period has conflict.
Compared with the prior art, when the digital key needs to be shared, the terminal generates a digital key sharing request based on key sharing parameters received by a sharer, and sends the sharing request to the cloud server, and the cloud server can share the digital key after the sharing request is verified. Therefore, the embodiment of the invention not only ensures that the sharing of the digital key has certain safety, but also can conveniently realize the sharing of the digital key.
A fourth embodiment of the present invention relates to a digital key sharing apparatus. Referring to fig. 4, the digital key sharing apparatus 400 of the present embodiment includes:
the first confirmation module 401 is configured to respond to a digital key sharing request sent by a terminal of a sharer, and determine whether an identity of the sharer is legal;
a second determining module 402, configured to determine whether the sharing request satisfies the key sharing condition if the identity of the sharer is legal;
the sharing module 403 is configured to store sharing information corresponding to the sharing request if the key sharing condition is met, and perform digital key sharing according to the sharing information.
Optionally, the second determining module 402 is configured to determine that the sharing request meets the key sharing condition if the identity of the sharee is legal and the number of the shared digital keys is smaller than a preset threshold.
Optionally, the sharing module 403 is configured to respond to a usage request of the shared digital key sent by a terminal of the sharee, determine whether the identity of the sharee is legal according to the usage request and the sharing information, and determine whether the shared digital key is in a validity period; and if the identity of the shared person is legal and the sharing digital key is in the valid period, issuing the sharing digital key to the shared person terminal.
Further, the sharing module 403 includes:
the priority determining subunit is used for determining the priority of the shared digital key of the sharee according to the sharing request;
and the allocation subunit is used for allocating the use time interval to the shared digital key with the highest priority if the use time intervals corresponding to the use requests of the plurality of shared digital keys conflict.
Optionally, the sharing module 403 is configured to revoke the sharing digital key if a revocation request of the sharing digital key is received and the user requesting to revoke is a preset user.
Optionally, the sharing module 403 is further configured to send a prompt indicating whether to cancel the reserved usage period to the corresponding sharee terminal if the shared digital key is not used when the preset time exceeds the start time of the reserved usage period, and determine whether to cancel the reserved usage period according to feedback from the sharee terminal.
Preferably, the sharing module 403 is further configured to delete the shared digital key if the shared digital key meets the deletion condition.
Compared with the prior art, when the digital key needs to be shared, the digital key sharing device responds to a digital key sharing request sent by a terminal of a sharer, and if the identity of the sharer is determined to be legal and the sharing request meets the key sharing condition, the digital key is shared. Therefore, the embodiment of the invention not only ensures that the sharing of the digital key has certain safety, but also can conveniently realize the sharing of the digital key. In addition, the embodiment can also manage the use time periods of a plurality of distributed digital keys, so that the use efficiency of the charging pile can be improved.
A fifth embodiment of the present invention relates to an electronic apparatus. The electronic device of the embodiment can be an intelligent terminal such as a smart phone and an intelligent wearable device. As shown in fig. 5, the electronic apparatus includes: a memory 502 and a processor 501;
the memory 502 stores instructions executable by the at least one processor 501, and the instructions are executed by the at least one processor 501 to implement the digital key sharing method according to the first or second embodiment.
The electronic device includes one or more processors 501 and a memory 502, and one processor 501 is taken as an example in fig. 5. The processor 501 and the memory 502 may be connected by a bus or other means, and fig. 5 illustrates the connection by the bus as an example. Memory 502, which is a non-volatile computer-readable storage medium, may be used to store non-volatile software programs, non-volatile computer-executable programs, and modules. The processor 501 executes various functional applications and data processing of the device by executing nonvolatile software programs, instructions, and modules stored in the memory 502, so as to implement the above-described digital key sharing method.
The memory 502 may include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function, and the like. Further, the memory 502 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some embodiments, memory 502 may optionally include memory located remotely from processor 501, which may be connected to an external device via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
One or more modules are stored in the memory 502 and, when executed by the one or more processors 501, perform the digital key sharing method of any of the method embodiments described above.
The above-mentioned device can execute the method provided by the embodiment of the present invention, and has the corresponding functional modules and beneficial effects of the execution method, and reference may be made to the method provided by the embodiment of the present invention for technical details that are not described in detail in the embodiment.
Compared with the prior art, when the digital key needs to be shared, the cloud server responds to the digital key sharing request sent by the terminal of the sharer, and if the identity of the sharer is determined to be legal, and the sharing request meets the key sharing condition, the digital key is shared. Therefore, the embodiment of the invention not only ensures that the sharing of the digital key has certain safety, but also can conveniently realize the sharing of the digital key. In addition, the embodiment can also manage the use time periods of a plurality of distributed digital keys, so that the use efficiency of the charging pile can be improved more fully.
A sixth embodiment of the invention is directed to a non-volatile storage medium storing a computer-readable program for causing a computer to perform some or all of the above method embodiments.
That is, those skilled in the art can understand that all or part of the steps in the method according to the above embodiments may be implemented by a program instructing related hardware, where the program is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, etc.) or a processor (processor) to execute all or part of the steps in the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It will be understood by those of ordinary skill in the art that the foregoing embodiments are specific examples for carrying out the invention, and that various changes in form and details may be made therein without departing from the spirit and scope of the invention in practice.

Claims (10)

1. A digital key sharing method is applied to a cloud server side, and comprises the following steps:
responding to a digital key sharing request sent by a terminal of a sharer, and determining whether the identity of the sharer is legal or not;
if the identity of the sharer is legal, determining whether the sharing request meets key sharing conditions;
and if the key sharing condition is met, storing sharing information corresponding to the sharing request, and sharing the digital key according to the sharing information.
2. The method according to claim 1, wherein the determining whether the sharing request satisfies a key sharing condition specifically includes:
and if the identity of the sharee is legal and the number of the shared digital keys is less than a preset threshold value, determining that the sharing request meets the key sharing condition.
3. The method according to claim 2, further comprising, before determining whether the sharing request satisfies a key sharing condition:
determining that the sharee does not currently have a valid sharing digital key.
4. The method according to claim 1, wherein the sharing of the digital key according to the sharing information specifically includes:
responding to a use request of a sharing digital key sent by a terminal of a sharee, determining whether the identity of the sharee is legal or not according to the use request and the sharing information, and determining whether the sharing digital key is in a valid period or not;
and if the identity of the shared person is legal and the sharing digital key is in the valid period, issuing the sharing digital key to the shared person terminal.
5. The digital key sharing method according to claim 1, further comprising:
determining the priority of the shared digital key of the sharee according to the sharing request;
sharing the digital key according to the sharing information, which specifically comprises:
and if the use time intervals corresponding to the use requests of the shared digital keys conflict, distributing the use time intervals to the shared digital key with the highest priority.
6. The digital key sharing method according to claim 1, further comprising:
and if a revocation request of the shared digital key is received and the user requesting the revocation is a preset user, revoking the shared digital key.
7. The method according to claim 1, wherein the sharing of the digital key according to the sharing information specifically includes:
if the shared digital key is not used when the preset time exceeds the starting time of the reserved use time period, sending a prompt of whether to cancel the reserved use time period to a corresponding shared user terminal, and determining whether to cancel the reserved use time period according to feedback of the shared user terminal.
8. The digital key sharing method according to claim 1, further comprising:
and if the shared digital key meets the deletion condition, deleting the shared digital key.
9. A digital key sharing method is applied to a terminal, and the method comprises the following steps:
receiving key sharing parameters input by a sharer;
and generating a digital key sharing request according to the key sharing parameters, and sending the sharing request to a cloud server.
10. The method according to claim 9, wherein the key sharing parameters include one or any combination of the following:
identity information, priority level and sharing time period of the sharees.
CN201911152885.6A 2019-11-22 2019-11-22 Digital key sharing method Pending CN111047740A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911152885.6A CN111047740A (en) 2019-11-22 2019-11-22 Digital key sharing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911152885.6A CN111047740A (en) 2019-11-22 2019-11-22 Digital key sharing method

Publications (1)

Publication Number Publication Date
CN111047740A true CN111047740A (en) 2020-04-21

Family

ID=70232975

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911152885.6A Pending CN111047740A (en) 2019-11-22 2019-11-22 Digital key sharing method

Country Status (1)

Country Link
CN (1) CN111047740A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112581659A (en) * 2020-12-04 2021-03-30 上海银基信息安全技术股份有限公司 Digital key user passing method, device, system and storage medium
CN113556235A (en) * 2021-07-21 2021-10-26 上海瓶钵信息科技有限公司 Digital key authorization method
CN113965328A (en) * 2021-10-21 2022-01-21 上海交通大学 Authority transfer method and system for digital key offline condition of trusted execution environment
WO2023241337A1 (en) * 2022-06-13 2023-12-21 支付宝(杭州)信息技术有限公司 Multi-device assisted identity-verification method and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140266573A1 (en) * 2013-03-15 2014-09-18 The Chamberlain Group, Inc. Control Device Access Method and Apparatus
CN106330940A (en) * 2016-08-31 2017-01-11 长城汽车股份有限公司 Mobile terminal, vehicle terminal, and virtual key sharing method and system
CN106394486A (en) * 2016-08-31 2017-02-15 长城汽车股份有限公司 Authorization method and system of virtual key and server
CN109361718A (en) * 2018-12-26 2019-02-19 上海银基信息安全技术股份有限公司 Identity identifying method, device and medium
CN109637034A (en) * 2018-12-18 2019-04-16 钛马信息网络技术有限公司 Vehicle timesharing rent method and system based on virtual key
CN109808643A (en) * 2019-03-04 2019-05-28 重庆长安汽车股份有限公司 Bluetooth electronic key system and its control method
KR102146748B1 (en) * 2020-03-03 2020-08-21 (주)케이스마텍 Digital key based service system and method thereof in mobile trusted environment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140266573A1 (en) * 2013-03-15 2014-09-18 The Chamberlain Group, Inc. Control Device Access Method and Apparatus
CN106330940A (en) * 2016-08-31 2017-01-11 长城汽车股份有限公司 Mobile terminal, vehicle terminal, and virtual key sharing method and system
CN106394486A (en) * 2016-08-31 2017-02-15 长城汽车股份有限公司 Authorization method and system of virtual key and server
CN109637034A (en) * 2018-12-18 2019-04-16 钛马信息网络技术有限公司 Vehicle timesharing rent method and system based on virtual key
CN109361718A (en) * 2018-12-26 2019-02-19 上海银基信息安全技术股份有限公司 Identity identifying method, device and medium
CN109808643A (en) * 2019-03-04 2019-05-28 重庆长安汽车股份有限公司 Bluetooth electronic key system and its control method
KR102146748B1 (en) * 2020-03-03 2020-08-21 (주)케이스마텍 Digital key based service system and method thereof in mobile trusted environment

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112581659A (en) * 2020-12-04 2021-03-30 上海银基信息安全技术股份有限公司 Digital key user passing method, device, system and storage medium
CN113556235A (en) * 2021-07-21 2021-10-26 上海瓶钵信息科技有限公司 Digital key authorization method
CN113965328A (en) * 2021-10-21 2022-01-21 上海交通大学 Authority transfer method and system for digital key offline condition of trusted execution environment
WO2023241337A1 (en) * 2022-06-13 2023-12-21 支付宝(杭州)信息技术有限公司 Multi-device assisted identity-verification method and system

Similar Documents

Publication Publication Date Title
CN111047740A (en) Digital key sharing method
CN107650863B (en) Vehicle sharing method and system
KR102426930B1 (en) Method for managing digital key of mobile device for vehicle-sharing and key server using the same
CN109819049B (en) Method, system and device for remotely controlling vehicle
CN109756446B (en) Access method and system for vehicle-mounted equipment
CN110855599B (en) Multi-tenant access control method and device and computer readable storage medium
KR102276141B1 (en) Vehicle management method and device
CN108737440B (en) Method, server and computer readable storage medium for equipment management
CN110009776B (en) Identity authentication method and device
CN110417730B (en) Unified access method of multiple application programs and related equipment
CN103747433A (en) Method and mobile terminal for realizing root request management through manufacturer server
CN109543365B (en) Authorization method and device
CN111092797A (en) Equipment control authority distribution method, device and system
CN111405525B (en) Authentication method and equipment for road side unit and computer readable storage medium
CN112466013B (en) Digital key management method, device, system and storage medium
CN101309279B (en) Control method, system and device for terminal access
CN102971739B (en) Strength evidence protection account security is utilized to set
CN111181931B (en) Authorization system and method based on user terminal authentication
CN114499999B (en) Identity authentication method, device, platform, vehicle, equipment and medium
CN115009076A (en) Charging method and device for charging pile, server and storage medium
CN115242634A (en) Software upgrading method, device and storage medium
CN105243311A (en) Fingerprint information safe calling method, fingerprint information safe calling device and mobile terminal
CN106576239B (en) Method and device for managing content in security unit
CN110601852B (en) Authentication and authorization method and system for electronic equipment of voice conversation platform
CN110351719B (en) Wireless network management method, system, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200421

RJ01 Rejection of invention patent application after publication