CN111148075A - Bluetooth key configuration method and system for configuring Bluetooth key - Google Patents

Bluetooth key configuration method and system for configuring Bluetooth key Download PDF

Info

Publication number
CN111148075A
CN111148075A CN201911396223.3A CN201911396223A CN111148075A CN 111148075 A CN111148075 A CN 111148075A CN 201911396223 A CN201911396223 A CN 201911396223A CN 111148075 A CN111148075 A CN 111148075A
Authority
CN
China
Prior art keywords
authorization
bluetooth
vehicle
key
owner user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911396223.3A
Other languages
Chinese (zh)
Inventor
叶琼青
唐焱
覃树才
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SAIC GM Wuling Automobile Co Ltd
Shanghai Pateo Network Technology Service Co Ltd
Original Assignee
Shanghai Pateo Network Technology Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Pateo Network Technology Service Co Ltd filed Critical Shanghai Pateo Network Technology Service Co Ltd
Priority to CN201911396223.3A priority Critical patent/CN111148075A/en
Publication of CN111148075A publication Critical patent/CN111148075A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/48Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for in-vehicle communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention relates to a method for configuring a Bluetooth key of a non-owner user and a system for configuring the non-owner Bluetooth key. The configuration method comprises the following steps: responding to an application request of a non-owner user, and sending an authorization code to a user terminal of the non-owner user by using a Bluetooth key background; acquiring authorization information of the owner user from the Bluetooth key background by using a user terminal of the non-owner user according to the authorization code; connecting a user terminal of a non-owner user with the vehicle-mounted intelligent computing device through Bluetooth to send a Bluetooth authorization activation request, wherein the Bluetooth authorization activation request comprises authorization information of the owner user; and responding to the Bluetooth authorization activation request, generating a Bluetooth key of the non-owner user by the vehicle-mounted intelligent computing device, and sending the Bluetooth key to the user terminal of the non-owner user. The invention can configure the intelligent virtual Bluetooth key for the non-owner user of the vehicle aiming at the Bluetooth key technology architecture.

Description

Bluetooth key configuration method and system for configuring Bluetooth key
Technical Field
The invention relates to an intelligent virtual Bluetooth key configuration technology of a vehicle, in particular to a configuration method of a Bluetooth key of a non-owner user and a system for configuring the non-owner Bluetooth key.
Background
Bluetooth (Bluetooth) communication technology is a radio technology that supports short-range communication (typically within 10 m) of devices, enabling wireless information exchange between many devices, including mobile phones, PDAs, wireless headsets, laptop computers, related peripherals, etc. The use of the bluetooth communication technology can effectively simplify the communication between mobile communication terminal devices and also successfully simplify the communication between the devices and the internet, thereby making data transmission more rapid and efficient and widening the way for wireless communication.
An intelligent virtual bluetooth key (hereinafter referred to as a bluetooth key) is a software program installed in a mobile device or a wearable device, and can communicate with a vehicle-mounted bluetooth module of a vehicle through a bluetooth communication technology, so that near field communication between a person and the vehicle is realized, and wireless control functions such as vehicle door unlocking/locking, vehicle starting, vehicle window opening and closing are realized.
In the existing Bluetooth key technical framework, the generation and the issuing of the vehicle Bluetooth key are uniformly carried out in a Bluetooth key background at the cloud. This requires that each vehicle must be connected to the bluetooth key background in the cloud for communication, which results in higher equipment cost and potential safety hazard from network attack. Moreover, once the vehicle cannot be connected with the bluetooth key background at the cloud end in a communication manner due to network failure, the bluetooth key cannot be authorized to the user terminal, so that great inconvenience is brought to vehicle users, especially users engaged in vehicle leasing and sharing.
Therefore, in order to overcome the above-mentioned defects in the prior art, there is a need in the art for a bluetooth key technology architecture for reducing the production and operation costs of devices, improving the security of bluetooth key authorization, and solving the problem that a bluetooth key cannot be authorized when a vehicle is offline. For the bluetooth key technology architecture, there is also a need in the art for a smart virtual bluetooth key configuration technique for configuring a smart virtual bluetooth key for a user of a vehicle (particularly a non-owner user).
Disclosure of Invention
The following presents a simplified summary of one or more aspects in order to provide a basic understanding of such aspects. This summary is not an extensive overview of all contemplated aspects, and is intended to neither identify key or critical elements of all aspects nor delineate the scope of any or all aspects. Its sole purpose is to present some concepts of one or more aspects in a simplified form as a prelude to the more detailed description that is presented later.
In order to configure an intelligent virtual bluetooth key for a vehicle user in the above bluetooth key technology architecture, the invention provides a configuration method of a bluetooth key of a non-owner user and a system for configuring the non-owner bluetooth key.
The configuration method of the Bluetooth key provided by the invention comprises the following steps: responding to an application request of a non-owner user, and sending an authorization code to a user terminal of the non-owner user by a Bluetooth key background; acquiring authorization information of the owner user from the Bluetooth key background by the user terminal of the non-owner user according to the authorization code; connecting a vehicle-mounted intelligent computing device by using a user terminal of the non-owner user in a Bluetooth mode to send a Bluetooth authorization activation request, wherein the Bluetooth authorization activation request comprises authorization information of the owner user; and responding to the Bluetooth authorization activation request, generating a Bluetooth key of the non-owner user by the vehicle-mounted intelligent computing device, and sending the Bluetooth key to a user terminal of the non-owner user.
Preferably, in the method for configuring a bluetooth key provided by the present invention, the method may further include the steps of: generating the authorization code by the Bluetooth key background, and encrypting the authorization code by adopting a public key of the vehicle-mounted intelligent computing device to form an authorization certificate; the Bluetooth key background sends the authorization certificate to a user terminal of the owner user; signing the authorization certificate by using a private key of the owner user through a user terminal of the owner user, and sending the signed authorization certificate to the Bluetooth key background; and generating the authorization information of the owner user by the Bluetooth key background according to the authorization code and the signed authorization certificate.
Preferably, in the configuration method of the bluetooth key provided by the present invention, the authorization information of the owner user may further include a public key of the vehicle-mounted intelligent computing device. The bluetooth connection with the vehicle-mounted intelligent computing device by the user terminal of the non-owner user to send the bluetooth authorization activation request may further include the steps of: encrypting the Bluetooth authorization activation request by using a public key of the vehicle-mounted intelligent computing device by a user terminal of the non-owner user; and sending the encrypted Bluetooth authorization activation request to the vehicle-mounted intelligent computing device by using the user terminal of the non-owner user. The method for configuring the bluetooth key may further include the steps of: decrypting the Bluetooth authorization activation request with the in-vehicle smart computing device using its own private key for verification.
Preferably, in the configuration method of the bluetooth key provided by the present invention, the authorization information of the owner user may further include an authorization validity period of the authorization code. The step of sending the encrypted bluetooth authorization activation request to the vehicle-mounted intelligent computing device by using the user terminal bluetooth of the non-owner user may further include the steps of: verifying the authorized validity period of the authorization code by using the user terminal of the non-owner user; and in response to determining that the authorization code is within the authorization validity period, sending the bluetooth authorization activation request to the in-vehicle smart computing device.
Optionally, in the configuration method of the bluetooth key provided by the present invention, the bluetooth authorization activation request may further include the authorization code. The decrypting, with the in-vehicle smart computing device, the bluetooth authorization activation request using its own private key for verification may further include the steps of: verifying, with the vehicle-mounted intelligent computing device, a signature of the authorization credential in the authorization information using a public key of the vehicle owner user; decrypting the authorization credential with the in-vehicle smart computing device using its own private key to verify whether an authorization code in the authorization credential is consistent with an authorization code provided in the Bluetooth authorization activation request; and in response to the signature of the authorization credential being verified and the authorization code in the authorization credential being consistent with the authorization code provided in the bluetooth authorization activation request, determining that the bluetooth authorization activation request is verified.
Optionally, in the method for configuring a bluetooth key provided by the present invention, the request for activating bluetooth authorization may further include an anti-replay random number. The decrypting, with the in-vehicle smart computing device, the bluetooth authorization activation request using its own private key for verification may further include the steps of: verifying, with the in-vehicle smart computing device, whether a locally stored anti-replay nonce is consistent with the anti-replay nonce in the bluetooth authorization activation request; and responding to the locally stored anti-replay random number and the anti-replay random number in the Bluetooth authorization activation request to be consistent, and judging that the Bluetooth authorization activation request is verified.
Optionally, in the configuration method of the bluetooth key provided by the present invention, the bluetooth authorization activation request may further include an authorization validity period of the authorization code. The decrypting, with the in-vehicle smart computing device, the bluetooth authorization activation request using its own private key for verification may further include the steps of: verifying, with the in-vehicle smart computing device, an authorization validity period of the authorization code; and in response to determining that the authorization code is within the authorization validity period, determining that the bluetooth authorization activation request is validated.
Optionally, in the configuration method of the bluetooth key provided by the present invention, the bluetooth authorization activation request may further include a public key of the non-owner user. The transmitting the bluetooth key to the user terminal of the non-owner user may further include the steps of: encrypting the Bluetooth key with the vehicle-mounted intelligent computing device by using the public key of the non-owner user; signing the Bluetooth key by using a private key of the vehicle-mounted intelligent computing device; and sending the encrypted and signed Bluetooth key to the user terminal of the non-owner user by the vehicle-mounted intelligent computing device.
Optionally, in the configuration method of the bluetooth key provided by the present invention, the sending the authorization code to the user terminal of the non-owner user by using the bluetooth key background may further include: and the Bluetooth key background sends the authorization code to a user terminal of a non-owner user in a form of a short message, wherein the short message comprises a mobile phone number indicating identity information of the non-owner user. The obtaining, by the user terminal of the non-owner user, the authorization information of the owner user from the bluetooth key background according to the authorization code may further include: and the user terminal of the non-owner user acquires the authorization information of the owner user from the Bluetooth key background according to the authorization code and the mobile phone number.
Optionally, in the configuration method of the bluetooth key provided by the present invention, the method may further include the steps of: and responding to the vehicle-mounted intelligent computing device to be in communication connection with the Bluetooth key background, and sending the newly generated information of the Bluetooth key to the Bluetooth key background by the vehicle-mounted intelligent computing device.
According to another aspect of the present invention, there is also provided a system for configuring a bluetooth key.
The system for configuring the bluetooth key provided by the invention comprises: the Bluetooth key background is used for responding to an application request of a non-owner user and sending an authorization code to a user terminal of the non-owner user; the user terminal of the non-owner user is used for acquiring the authorization information of the owner user from the Bluetooth key background according to the authorization code, and is connected with the vehicle-mounted intelligent computing device through Bluetooth to send a Bluetooth authorization activation request, wherein the Bluetooth authorization activation request comprises the authorization information of the owner user; and the vehicle-mounted intelligent computing device is used for responding to the Bluetooth authorization activation request, generating a Bluetooth key of the non-owner user through verification, and sending the Bluetooth key to a user terminal of the non-owner user.
Preferably, the system for configuring a bluetooth key provided by the present invention may further include a user terminal of the owner user. The Bluetooth key background can be further used for generating the authorization code and encrypting the authorization code by adopting a public key of the vehicle-mounted intelligent computing device to form an authorization certificate; and sending the authorization certificate to the user terminal of the owner user. The user terminal of the owner user can be used for signing the authorization certificate by adopting the private key of the owner user and sending the signed authorization certificate to the Bluetooth key background. The bluetooth key background can also be used for generating authorization information of the owner user according to the authorization code and the signed authorization certificate.
Preferably, in the above system for configuring a bluetooth key provided by the present invention, the authorization information of the owner user may further include a public key of the vehicle-mounted intelligent computing device. The user terminal of the non-owner user can be further used for encrypting the Bluetooth authorization activation request by using the public key of the vehicle-mounted intelligent computing device; and sending the encrypted Bluetooth authorization activation request to the vehicle-mounted intelligent computing device. The in-vehicle smart computing device may also be configured to decrypt the bluetooth authorization activation request using its own private key for verification.
Preferably, in the system for configuring a bluetooth key provided by the present invention, the authorization information of the owner user may further include an authorization validity period of the authorization code. The user terminal of the non-owner user can also be used for verifying the authorized validity period of the authorization code; and in response to determining that the authorization code is within the authorization validity period, sending the bluetooth authorization activation request to the in-vehicle smart computing device.
Optionally, in the system for configuring a bluetooth key provided by the present invention, the bluetooth authorization activation request may further include the authorization code. The vehicle-mounted intelligent computing device can be further used for verifying the signature of the authorization certificate in the authorization information by using the public key of the vehicle owner user; decrypting the authorization credential using its own private key to verify whether an authorization code in the authorization credential is consistent with an authorization code provided in the Bluetooth authorization activation request; and in response to the signature of the authorization credential being verified and the authorization code in the authorization credential being consistent with the authorization code provided in the bluetooth authorization activation request, determining that the bluetooth authorization activation request is verified.
Optionally, in the above system for configuring a bluetooth key provided by the present invention, the bluetooth authorization activation request may further include an anti-replay random number. The in-vehicle smart computing device may be further configured to verify that a locally stored anti-replay nonce is consistent with the anti-replay nonce in the bluetooth authorization activation request; and responding to the locally stored anti-replay random number and the anti-replay random number in the Bluetooth authorization activation request to be consistent, and judging that the Bluetooth authorization activation request is verified.
Optionally, in the system for configuring a bluetooth key provided by the present invention, the bluetooth authorization activation request may further include an authorization validity period of the authorization code. The in-vehicle smart computing device may be further to verify an authorization validity period of the authorization code; and in response to determining that the authorization code is within the authorization validity period, determining that the bluetooth authorization activation request is validated.
Optionally, in the system for configuring a bluetooth key provided by the present invention, the bluetooth authorization activation request may further include a public key of the non-owner user. The vehicle-mounted intelligent computing device can be further used for encrypting the Bluetooth key by using the public key of the non-owner user; signing the Bluetooth key by using a private key of the Bluetooth key; and sending the encrypted and signed Bluetooth key to the user terminal of the non-owner user.
Optionally, in the system for configuring a bluetooth key provided by the present invention, the bluetooth key background may be further configured to send the authorization code to a user terminal of a non-owner user in a form of a short message, where the short message includes a mobile phone number indicating identity information of the non-owner user. The user terminal of the non-owner user can be further used for obtaining the authorization information of the owner user from the Bluetooth key background according to the authorization code and the mobile phone number.
Optionally, in the system for configuring a bluetooth key provided by the present invention, the vehicle-mounted smart computing device may be further configured to respond to that the vehicle-mounted smart computing device is communicatively connected to the bluetooth key background, and send information of a newly generated bluetooth key to the bluetooth key background.
Drawings
The above features and advantages of the present disclosure will be better understood upon reading the detailed description of embodiments of the disclosure in conjunction with the following drawings. In the drawings, components are not necessarily drawn to scale, and components having similar relative characteristics or features may have the same or similar reference numerals.
Fig. 1 shows an architecture diagram of a system for configuring a bluetooth key provided according to one embodiment of the present invention.
Fig. 2 is a flowchart illustrating a method for configuring a bluetooth key according to an aspect of the present invention.
Fig. 3 shows a schematic diagram of a system for configuring a bluetooth key provided in accordance with another aspect of the present invention.
Reference numerals:
10 vehicle-mounted intelligent computing device;
11 a Bluetooth module;
12 a microprocessor;
20 vehicle owner's user terminal;
21 a Bluetooth module;
30 a user terminal not of the owner;
31 a Bluetooth module;
40, a Bluetooth key background;
201-204 steps of a method for configuring a bluetooth key.
Detailed Description
The following description of the embodiments of the present invention is provided for illustrative purposes, and other advantages and effects of the present invention will become apparent to those skilled in the art from the present disclosure. While the invention will be described in connection with the preferred embodiments, there is no intent to limit its features to those embodiments. On the contrary, the invention is described in connection with the embodiments for the purpose of covering alternatives or modifications that may be extended based on the claims of the present invention. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. The invention may be practiced without these particulars. Moreover, some of the specific details have been left out of the description in order to avoid obscuring or obscuring the focus of the present invention.
In the description of the present invention, it should be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
Additionally, the terms "upper," "lower," "left," "right," "top," "bottom," "horizontal," "vertical" and the like as used in the following description are to be understood as referring to the segment and the associated drawings in the illustrated orientation. The relative terms are used for convenience of description only and do not imply that the described apparatus should be constructed or operated in a particular orientation and therefore should not be construed as limiting the invention.
It will be understood that, although the terms first, second, third, etc. may be used herein to describe various elements, regions, layers and/or sections, these elements, regions, layers and/or sections should not be limited by these terms, but rather are used to distinguish one element, region, layer and/or section from another element, region, layer and/or section. Thus, a first component, region, layer or section discussed below could be termed a second component, region, layer or section without departing from some embodiments of the present invention.
As described above, in the existing bluetooth key technology architecture, the generation and issuance of the vehicle bluetooth key are performed in the cloud bluetooth key background. Once the vehicle cannot be in communication connection with the cloud bluetooth key background due to network failure, the bluetooth key cannot be authorized to the user terminal, so that great inconvenience is brought to vehicle users, especially users engaged in vehicle leasing and sharing.
In order to overcome the defects in the prior art, the invention provides a technical framework of a Bluetooth key, which is used for reducing the production and operation cost of equipment, improving the security of Bluetooth key authorization and solving the problem that the Bluetooth key cannot be authorized when a vehicle is off-line. Aiming at the technical architecture of the Bluetooth key, the invention also provides a configuration method of the Bluetooth key of the non-owner user and a system for configuring the non-owner Bluetooth key, which are used for configuring the intelligent virtual Bluetooth key for the user of the vehicle.
Referring to fig. 1, fig. 1 is a schematic diagram illustrating an architecture of a system for configuring a bluetooth key according to an embodiment of the present invention.
As shown in fig. 1, in the above-mentioned technical architecture of the bluetooth key, the system for configuring the bluetooth key may include an in-vehicle smart computing device 10, a user terminal 20 of an owner, a user terminal 30 of a non-owner, and a bluetooth key backend 40 in a cloud.
The above-mentioned vehicle-mounted intelligent computing device 10 may include a bluetooth module 11 and a microprocessor 12. The Bluetooth module 11 may be configured to perform Bluetooth connection authentication with each of the user terminals 20 and 30 through Bluetooth (Bluetooth) communication technology, thereby performing near field communication with each of the user terminals 20 and 30, respectively. The near field communication may be short range communication within 10 m. The microprocessor 12 may be used to manage bluetooth keys for maintaining the vehicle. The management and maintenance of the vehicle bluetooth key includes, but is not limited to, the generation, issuance, logout, and periodic cleaning of the bluetooth key. Since the non-owner bluetooth key can be directly generated on the vehicle-mounted intelligent computing device 10, the bluetooth architecture shown in fig. 1 can implement the configuration function of the non-owner bluetooth key when the vehicle is offline.
The user terminals 20 and 30 include, but are not limited to, user mobile phones, tablet computers, other handheld smart devices and wearable smart devices. The user terminal 20 may be provided with a bluetooth module 21, and the user terminal 30 may be provided with a bluetooth module 31, which are respectively used for performing near field communication with the in-vehicle intelligent computing device 10. The user terminals 20, 30 may be installed with a bluetooth application and a bluetooth service based on a bluetooth communication technology, respectively. The bluetooth service includes, but is not limited to, a bluetooth channel-based vehicle control service, such as controlling vehicle doors, vehicle windows, and the like. In some embodiments, the user terminal 20 may be a user terminal of an owner user of the vehicle. The user terminal 30 may be a user terminal of a non-owner user of the vehicle. The owner user can be a taxi of the vehicle, and can use the owner Bluetooth key to authorize other non-owner users of the rental vehicle to obtain the non-owner Bluetooth key.
The bluetooth key backend 40 includes, but is not limited to, a content service provider (TSP) cloud platform, and may remotely communicate with one or more in-vehicle intelligent computing devices 10 and each user terminal 20, 30 via the internet. The bluetooth key background 40 can perform management service of the vehicle bluetooth key by sending a control command to each vehicle-mounted intelligent computing device 10, and provide a vehicle borrowing authorization service to non-vehicle-owner users. Specifically, the bluetooth key background 40 may be responsible for providing services such as bluetooth key application, bluetooth key binding with a vehicle, and bluetooth key logout and deferral to the user terminal 20 of the vehicle owner. The bluetooth key background 40 does not directly manage the bluetooth key itself, but merely forwards the request related to the bluetooth key to the corresponding vehicle-mounted intelligent computing device 10, so as to perform corresponding management through the vehicle-mounted intelligent computing device 10. In one embodiment, the bluetooth key backend 40 may also provide services related to account registration, certificate application and issuance, and the like to the user, and provide an authorization service for the non-owner bluetooth key to the non-owner user.
Referring to fig. 2 in combination, fig. 2 is a flow chart illustrating a method for configuring a bluetooth key according to an aspect of the present invention.
As shown in fig. 2, the method for configuring the bluetooth key provided by the present invention may include the steps of:
201: and responding to the application request of the non-owner user, and sending an authorization code to the user terminal of the non-owner user by the Bluetooth key background.
In some embodiments, the user terminal 30 of the non-owner user may send an application request for applying for a bluetooth key to the bluetooth key backend 40 in the cloud. The request may include identification information of the Vehicle for which the bluetooth key is requested, including but not limited to a Vehicle Identification Number (VIN) of the Vehicle and/or identification information (i.e., device ID) of the corresponding in-Vehicle smart computing device 10. In response to the application request, the bluetooth key backend 40 may generate a corresponding authorization code, and encrypt the authorization code with the public key corresponding to the in-vehicle smart computing device 10 to form an authorization credential.
Those skilled in the art will appreciate that in other embodiments, in response to a request from a non-owner user, the owner user may send its own identity Token (Token) and the vehicle identification number of the vehicle to be authorized to the bluetooth key backend 40 via the application program of his user terminal 20 to request an authorization code. In response to the application request, the bluetooth key backend 40 may generate a corresponding authorization code, and encrypt the authorization code with the public key corresponding to the in-vehicle smart computing device 10 to form an authorization credential.
In some embodiments, the owner user may bind his vehicle to the user account in advance through the application program of his user terminal 20, and store the binding relationship in the cloud database to determine his owner identity. The bluetooth key background 40 may confirm the owner identity according to the binding relationship stored in the cloud, and send the generated authorization credential to the user terminal 20 of the owner user of the vehicle that needs to apply for the bluetooth key, so that the vehicle owner can perform signature authorization.
In response to receiving the authorization credential, the owner user may sign and authorize the received authorization credential with the owner user's private key through his user terminal 20 and send the signed authorization credential to the bluetooth key backend 40. In some embodiments, the owner user may also send the phone number of the authorized non-owner user to the bluetooth key backend 40 through his user terminal 20.
In response to receiving the signed authorization credential, the bluetooth key backend 40 may generate authorization information for the owner user based on the authorization code and the signed authorization credential. In some embodiments, the authorization information may include identity information of the vehicle, a bluetooth connection name, a bluetooth connection key, an authorization code, an authorization credential, and an authorization credential signature. The authorization code can be used as an index of authorization information provided by a vehicle owner user and used for indicating the storage position of the authorization information in the cloud. In some embodiments, the bluetooth key backend 40 may store the generated authorization information of the owner user to the bluetooth key authorization code comparison table in the cloud for subsequent verification of the identity of the authorized non-owner user.
In some embodiments, the bluetooth key backend 40 may send the authorization code to the mobile phone terminal 30 of the non-owner user by a short message. The short message may include a mobile phone number indicating identity information of the non-owner user for the bluetooth key backend 40 to perform secondary verification on the identity of the non-owner user.
As shown in fig. 2, the method for configuring a bluetooth key according to the present invention may further include:
202: and the user terminal of the non-owner user acquires the authorization information of the owner user from the Bluetooth key background according to the authorization code.
In some embodiments, the non-owner user may upload the received authorization code and the own mobile phone number to the bluetooth key backend 40 through an application installed in the user terminal 30, and download the authorization information of the owner user from the bluetooth key backend 40. Optionally, in other embodiments, the non-owner user may also jump to the authorization interface of the bluetooth key directly through the short message link to obtain the authorization information of the owner user.
In some embodiments, the bluetooth key backend 40 may query the bluetooth key authorization code lookup table stored in the cloud according to the authorization code uploaded by the non-owner user. In response to the authorization code and the mobile phone number provided by the user terminal 30 matching with the bluetooth key authorization code comparison table stored in the cloud, the bluetooth key backend 40 may confirm the identity of the non-owner user, thereby providing the authorization information of the owner user to the user terminal 30. The authorization information may include identity information of the vehicle, a bluetooth connection name, a bluetooth connection key, an authorization code, an authorization credential, and an authorization credential signature.
As shown in fig. 2, the method for configuring a bluetooth key according to the present invention may further include:
203: and connecting the vehicle-mounted intelligent computing device with the user terminal Bluetooth of the non-owner user so as to send a Bluetooth authorization activation request.
In some embodiments, the non-owner user may select a corresponding Bluetooth connection name on his user terminal 30 and use the downloaded Bluetooth connection key to make a Bluetooth connection with the in-vehicle smart computing device 10. Thereafter, the non-owner user may send a Bluetooth authorization activation request to the in-vehicle smart computing device 10 via its user terminal 30. The bluetooth authorization activation request may include authorization information of the vehicle owner user for authorization verification by the in-vehicle smart computing device 10.
In some embodiments, the authorization information of the owner user may also include the public key of the in-vehicle smart computing device 10. The user terminal 30 of the non-owner user can download the public key of the vehicle-mounted intelligent computing device 10 from the bluetooth key background 40 in the cloud while acquiring the authorization information of the owner user. The user terminal 30 of the non-owner user may encrypt the bluetooth authorization activation request using the public key and send the encrypted bluetooth authorization activation request to the in-vehicle intelligent computing device 10, so that the in-vehicle intelligent computing device 10 may decrypt the bluetooth authorization activation request using its own private key for verification.
In some preferred embodiments, the authorization information of the owner user may further include an authorization validity period of the authorization code. The user terminal 30 of the non-owner user may first verify the authorization validity period of the authorization code before sending the bluetooth authorization activation request to the in-vehicle smart computing device 10. In response to determining that the authorization code is within the authorization validity period, the user terminal 30 sends a bluetooth authorization activation request to the in-vehicle smart computing device 10 for verification by the in-vehicle smart computing device 10.
In some preferred embodiments, the bluetooth authorization activation request may further include an authorization code that is not encrypted with the public key of the in-vehicle smart computing device 10. In response to receiving the bluetooth authorization activation request, the in-vehicle smart computing device 10 may verify the signature of the authorization credential in the authorization information using the public key of the vehicle owner user, and decrypt the authorization credential using its own private key to verify whether the authorization code in the authorization credential is consistent with the unencrypted authorization code. In response to the signature of the authorization credential being verified and the authorization code in the authorization credential being consistent with the authorization code provided in the bluetooth authorization activation request, the in-vehicle smart computing device 10 may determine that the bluetooth authorization activation request is verified.
In some preferred embodiments, the bluetooth authorization activation request may further include an anti-replay nonce. The anti-replay random number may be a random number generated by the in-vehicle intelligent computing device 10 when the user terminal 30 establishes a bluetooth connection with the in-vehicle intelligent computing device 10, stored locally in the in-vehicle intelligent computing device 10, and transmitted to the user terminal 30 of the non-owner user through bluetooth communication. In response to receiving the bluetooth authorization activation request, the in-vehicle smart computing device 10 may verify whether the locally stored anti-replay random number coincides with the anti-replay random number in the bluetooth authorization activation request. In response to the locally stored anti-replay random number coinciding with the anti-replay random number in the bluetooth authorization activation request, the in-vehicle smart computing device 10 may determine that the bluetooth authorization activation request is authenticated.
In some preferred embodiments, the bluetooth authorization activation request may further include an authorization validity period of the authorization code. In response to receiving the bluetooth authorization activation request, the in-vehicle smart computing device 10 may verify the authorization validity period of the authorization code. In response to determining that the authorization code is within the authorization validity period, the in-vehicle smart computing device 10 may determine that the bluetooth authorization activation request is validated.
In some preferred embodiments, in response to receiving the bluetooth authorization activation request, the in-vehicle smart computing device 10 may store the authorization code therein locally for further verification that the authorization code has been used when later verifying the bluetooth authorization activation request. In response to determining that the received authorization code is not the same as the locally stored authorization code, the in-vehicle smart computing device 10 may determine that the bluetooth authorization activation request is validated.
As shown in fig. 2, the method for configuring a bluetooth key according to the present invention may further include:
204: and responding to the verification that the Bluetooth authorization activation request passes, generating a Bluetooth key of the non-owner user by the vehicle-mounted intelligent computing device, and sending the Bluetooth key to a user terminal of the non-owner user.
In some embodiments, the in-vehicle smart computing device 10 may generate a non-owner bluetooth key for the non-owner user based on the received bluetooth authorization activation request. The non-owner Bluetooth key can be an encrypted binary code, and can provide Bluetooth channel-based vehicle control services (such as controlling vehicle doors, vehicle windows and the like) for a vehicle user.
In some embodiments, the in-vehicle smart computing device 10 may add the generated non-owner bluetooth key to the bluetooth key list at the vehicle end for the non-owner user to use to control the vehicle. In a preferred embodiment, the in-vehicle smart computing device 10 may add the generated non-owner bluetooth key to the bluetooth codebook of the vehicle end to improve the information security of the bluetooth key.
In some embodiments, the bluetooth authorization activation request may also include a public key of the non-owner user. The user terminal 30 of the non-owner user may send the public key of the non-owner user to the in-vehicle smart computing device 10 along with the bluetooth authorization activation request. The vehicle-mounted intelligent computing device 10 may encrypt the generated bluetooth key using the public key of the non-vehicle owner user, sign the encrypted bluetooth key using its own private key, and then transmit the encrypted and signed bluetooth key to the user terminal 30 of the non-vehicle owner user.
In some embodiments, the user terminal 30 of the non-owner user may obtain the public key of the in-vehicle smart computing device 10 from the authorization information of the bluetooth key backend 40 to verify the signature of the bluetooth key using the public key. The user terminal 30 of the non-owner user can also decrypt the bluetooth key by using the private key of the user terminal to acquire the bluetooth key to control the vehicle.
In some embodiments, the in-vehicle smart computing device 10 may further associatively send the generated information of the non-owner bluetooth key, the corresponding bluetooth connection name, and the corresponding bluetooth connection key to the bluetooth key backend 40 for recording and filing by the bluetooth key backend 40. In some embodiments, in response to the in-vehicle smart computing device 10 going off-line, that is, the in-vehicle smart computing device 10 cannot communicate with the bluetooth key background 40, the in-vehicle smart computing device 10 may temporarily store the bluetooth key to be sent, the corresponding bluetooth connection name, and the corresponding bluetooth connection key at the vehicle end until the in-vehicle smart computing device 10 obtains a network connection and then sends the bluetooth key to the vehicle end.
Since the non-owner bluetooth key can be directly generated on the vehicle-mounted intelligent computing device 10 and can be directly transmitted to the user terminal 30 of the non-owner user for use through the bluetooth communication technology, the configuration method of the non-owner user bluetooth key provided by the invention can realize the function of authorizing the bluetooth key to the non-owner user under the condition that the vehicle is offline.
While, for purposes of simplicity of explanation, the methodologies are shown and described as a series of acts, it is to be understood and appreciated that the methodologies are not limited by the order of acts, as some acts may, in accordance with one or more embodiments, occur in different orders and/or concurrently with other acts from that shown and described herein or not shown and described herein, as would be understood by one skilled in the art.
According to another aspect of the present invention, there is also provided a system for configuring a bluetooth key, which is configured to implement the method for configuring a bluetooth key provided in any one of the above embodiments. As shown in fig. 1, the system for configuring a bluetooth key provided by the present invention includes a vehicle-mounted intelligent computing device 10 at a vehicle end, a user terminal 20 of a vehicle owner user, a user terminal 30 of a non-vehicle owner user, and a bluetooth key background 40 at a cloud end.
Referring to fig. 3, fig. 3 is a schematic diagram illustrating a system for configuring a bluetooth key according to another aspect of the present invention.
As shown in fig. 3, in one embodiment of the present invention, in order to configure a smart virtual bluetooth key for a vehicle user in the bluetooth key technology architecture, a bluetooth key backend 40 may be used to send an authorization code to a user terminal 30 of a non-owner user. The authorization code can be used as an index of authorization information provided by a vehicle owner user and used for indicating the storage position of the authorization information in the cloud. In response to receiving the authorization code, the user terminal 30 of the non-owner user may be configured to obtain authorization information of the owner user from the bluetooth key backend 40 according to the received authorization code. The user terminal 30 of the non-owner user may then be used to bluetooth connect the in-vehicle smart computing device 10 to send a bluetooth authorization activation request. The bluetooth authorization activation request may include authorization information of the owner user obtained from the bluetooth key backend 40. In response to receiving the Bluetooth authorization activation request, the in-vehicle smart computing device 10 may be used to verify the Bluetooth authorization activation request. In response to the bluetooth authorization activation request being authenticated, the in-vehicle smart computing device 10 may also be configured to generate a bluetooth key for the non-owner user and transmit the bluetooth key to the user terminal 30 of the non-owner user.
Those skilled in the art can understand that the system for configuring a bluetooth key provided by the present invention is configured to implement the method for configuring a bluetooth key provided by any one of the above embodiments, and may have the technical features related to any one of the above embodiments to achieve corresponding technical effects.
Those skilled in the art will also appreciate that the above-described embodiments of the system for configuring a bluetooth key may be implemented by a combination of software and hardware, or may be implemented in software or hardware alone. For a hardware implementation, the processors at each end of the system may be implemented within one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), digital signal processing devices (DAPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), processors, controllers, micro-controllers, microprocessors, other electronic devices designed to perform the functions described above, or a selected combination of such devices. For software implementations, the processors at each end of the system may be implemented by separate software modules running on a common chip, such as program modules (programs) and function modules (functions), each of which may perform one or more of the functions and operations described herein.
Those of skill in the art would understand that information, signals, and data may be represented using any of a variety of different technologies and techniques. For example, data, instructions, commands, information, signals, bits (bits), symbols, and chips that may be referenced throughout the above description may be represented by voltages, currents, electromagnetic waves, magnetic fields or particles, optical fields or particles, or any combination thereof.
Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The various illustrative logical modules, and circuits described in connection with the embodiments disclosed herein may be implemented or performed with a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC. The ASIC may reside in a user terminal. In the alternative, the processor and the storage medium may reside as discrete components in a user terminal.
In one or more exemplary embodiments, the functions described may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software as a computer program product, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Any connection is properly termed a computer-readable medium. For example, if the software is transmitted from a web site, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, Digital Subscriber Line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. Disk (disk) and disc (disc), as used herein, includes Compact Disc (CD), laser disc, optical disc, Digital Versatile Disc (DVD), floppy disk and blu-ray disc where disks (disks) usually reproduce data magnetically, while discs (discs) reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
The previous description of the disclosure is provided to enable any person skilled in the art to make or use the disclosure. Various modifications to the disclosure will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other variations without departing from the spirit or scope of the disclosure. Thus, the disclosure is not intended to be limited to the examples and designs described herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (20)

1. A method for configuring a Bluetooth key, comprising:
responding to an application request of a non-owner user, and sending an authorization code to a user terminal of the non-owner user by a Bluetooth key background;
acquiring authorization information of the owner user from the Bluetooth key background by the user terminal of the non-owner user according to the authorization code;
connecting a vehicle-mounted intelligent computing device by using a user terminal of the non-owner user in a Bluetooth mode to send a Bluetooth authorization activation request, wherein the Bluetooth authorization activation request comprises authorization information of the owner user; and
and responding to the verification that the Bluetooth authorization activation request is verified, generating a Bluetooth key of the non-owner user by the vehicle-mounted intelligent computing device, and sending the Bluetooth key to a user terminal of the non-owner user.
2. The method of configuring a bluetooth key according to claim 1, further comprising:
generating the authorization code by the Bluetooth key background, and encrypting the authorization code by adopting a public key of the vehicle-mounted intelligent computing device to form an authorization certificate;
the Bluetooth key background sends the authorization certificate to a user terminal of the owner user;
signing the authorization certificate by using a private key of the owner user through a user terminal of the owner user, and sending the signed authorization certificate to the Bluetooth key background; and
and generating the authorization information of the owner user by the Bluetooth key background according to the authorization code and the signed authorization certificate.
3. The method for configuring the Bluetooth key of claim 2, wherein the authorization information of the owner user further comprises a public key of the vehicle-mounted intelligent computing device,
the Bluetooth connection of the user terminal of the non-owner user to the vehicle-mounted intelligent computing device to send the Bluetooth authorization activation request comprises the following steps:
encrypting the Bluetooth authorization activation request by using a public key of the vehicle-mounted intelligent computing device by a user terminal of the non-owner user; and
sending an encrypted Bluetooth authorization activation request to the vehicle-mounted intelligent computing device by a user terminal of the non-owner user,
the configuration method of the Bluetooth key further comprises the following steps: decrypting the Bluetooth authorization activation request with the in-vehicle smart computing device using its own private key for verification.
4. The method of claim 3, wherein the authorization information of the owner user further includes an authorization validity period of the authorization code,
the sending the encrypted Bluetooth authorization activation request to the vehicle-mounted intelligent computing device by the user terminal Bluetooth of the non-owner user comprises the following steps:
verifying the authorized validity period of the authorization code by using the user terminal of the non-owner user; and
in response to determining that the authorization code is within the authorization validity period, sending the Bluetooth authorization activation request to the in-vehicle smart computing device.
5. The method of configuring a Bluetooth key of claim 3, wherein the Bluetooth authorization activation request further includes the authorization code,
the decrypting, with the in-vehicle smart computing device, the Bluetooth authorization activation request using its own private key for authentication includes:
verifying, with the vehicle-mounted intelligent computing device, a signature of the authorization credential in the authorization information using a public key of the vehicle owner user;
decrypting the authorization credential with the in-vehicle smart computing device using its own private key to verify whether an authorization code in the authorization credential is consistent with an authorization code provided in the Bluetooth authorization activation request; and
and in response to the signature of the authorization certificate passing verification and the authorization code in the authorization certificate being consistent with the authorization code provided in the Bluetooth authorization activation request, determining that the Bluetooth authorization activation request passes verification.
6. The method of claim 3, wherein the Bluetooth authorization activation request further includes an anti-replay random number,
the decrypting, with the in-vehicle smart computing device, the Bluetooth authorization activation request using its own private key for authentication includes:
verifying, with the in-vehicle smart computing device, whether a locally stored anti-replay nonce is consistent with the anti-replay nonce in the bluetooth authorization activation request; and
and responding to the locally stored anti-replay random number and the anti-replay random number in the Bluetooth authorization activation request to be consistent, and judging that the Bluetooth authorization activation request is verified.
7. The method of configuring a Bluetooth key of claim 3, wherein the Bluetooth authorization activation request further includes an authorization validity period of the authorization code,
the decrypting, with the in-vehicle smart computing device, the Bluetooth authorization activation request using its own private key for authentication includes:
verifying, with the in-vehicle smart computing device, an authorization validity period of the authorization code; and
and in response to determining that the authorization code is within the authorization validity period, determining that the Bluetooth authorization activation request is validated.
8. The method of claim 1, wherein the Bluetooth authorization activation request further includes a public key of the non-owner user,
the sending the bluetooth key to the user terminal of the non-owner user comprises:
encrypting the Bluetooth key with the vehicle-mounted intelligent computing device by using the public key of the non-owner user;
signing the Bluetooth key by using a private key of the vehicle-mounted intelligent computing device; and
and the vehicle-mounted intelligent computing device sends the encrypted and signed Bluetooth key to a user terminal of the non-owner user.
9. The method of claim 1, wherein the sending the authorization code to the user terminal of the non-owner user in the bluetooth key background comprises:
the authorization code is sent to a user terminal of a non-owner user in a form of a short message by the Bluetooth key background, the short message comprises a mobile phone number indicating identity information of the non-owner user, and the obtaining of the authorization information of the owner user from the Bluetooth key background by the user terminal of the non-owner user according to the authorization code comprises:
and the user terminal of the non-owner user acquires the authorization information of the owner user from the Bluetooth key background according to the authorization code and the mobile phone number.
10. The method of configuring a bluetooth key according to claim 1, further comprising:
and responding to the vehicle-mounted intelligent computing device to be in communication connection with the Bluetooth key background, and sending the newly generated information of the Bluetooth key to the Bluetooth key background by the vehicle-mounted intelligent computing device.
11. A system for configuring a bluetooth key, comprising:
the Bluetooth key background is used for responding to an application request of a non-owner user and sending an authorization code to a user terminal of the non-owner user;
the user terminal of the non-owner user is used for acquiring the authorization information of the owner user from the Bluetooth key background according to the authorization code, and is connected with the vehicle-mounted intelligent computing device through Bluetooth to send a Bluetooth authorization activation request, wherein the Bluetooth authorization activation request comprises the authorization information of the owner user; and
the vehicle-mounted intelligent computing device is used for responding to the Bluetooth authorization activation request, generating a Bluetooth key of the non-owner user through verification, and sending the Bluetooth key to a user terminal of the non-owner user.
12. The system of claim 11, further comprising a user terminal of the owner user,
the Bluetooth key background is also used for generating the authorization code and encrypting the authorization code by adopting a public key of the vehicle-mounted intelligent computing device to form an authorization certificate; and sending the authorization credential to a user terminal of the owner user,
the user terminal of the owner user is used for signing the authorization certificate by adopting the private key of the owner user and sending the signed authorization certificate to the Bluetooth key background,
and the Bluetooth key background is also used for generating authorization information of the owner user according to the authorization code and the signed authorization certificate.
13. The system of claim 12, wherein the authorization information of the vehicle owner user further includes a public key of the in-vehicle smart computing device,
the user terminal of the non-owner user is also used for encrypting the Bluetooth authorization activation request by using the public key of the vehicle-mounted intelligent computing device; and sending the encrypted bluetooth authorization activation request to the in-vehicle smart computing device,
the vehicle-mounted intelligent computing device is further used for decrypting the Bluetooth authorization activation request by using the private key of the vehicle-mounted intelligent computing device for verification.
14. The system of claim 13, wherein the authorization information of the owner user further includes an authorization validity period of the authorization code,
the user terminal of the non-owner user is also used for verifying the authorized validity period of the authorization code; and in response to determining that the authorization code is within the authorization validity period, sending the bluetooth authorization activation request to the in-vehicle smart computing device.
15. The system of claim 13, wherein the Bluetooth authorization activation request further includes the authorization code,
the vehicle-mounted intelligent computing device is further used for verifying the signature of the authorization certificate in the authorization information by using the public key of the vehicle owner user; decrypting the authorization credential using its own private key to verify whether an authorization code in the authorization credential is consistent with an authorization code provided in the Bluetooth authorization activation request; and in response to the signature of the authorization credential being verified and the authorization code in the authorization credential being consistent with the authorization code provided in the bluetooth authorization activation request, determining that the bluetooth authorization activation request is verified.
16. The system of claim 13, wherein the Bluetooth authorization activation request further includes an anti-replay nonce,
the vehicle-mounted intelligent computing device is further used for verifying whether the locally stored anti-replay random number is consistent with the anti-replay random number in the Bluetooth authorization activation request; and responding to the locally stored anti-replay random number and the anti-replay random number in the Bluetooth authorization activation request to be consistent, and judging that the Bluetooth authorization activation request is verified.
17. The system of claim 13, wherein the Bluetooth authorization activation request further includes an authorization validity period for the authorization code,
the vehicle-mounted intelligent computing device is further used for verifying the authorization validity period of the authorization code; and in response to determining that the authorization code is within the authorization validity period, determining that the bluetooth authorization activation request is validated.
18. The system of claim 11 wherein the Bluetooth authorization activation request further includes a public key of the non-owner user,
the vehicle-mounted intelligent computing device is also used for encrypting the Bluetooth key by using the public key of the non-owner user; signing the Bluetooth key by using a private key of the Bluetooth key; and sending the encrypted and signed Bluetooth key to the user terminal of the non-owner user.
19. The system of claim 11, wherein the Bluetooth key backend is further configured to send the authorization code to a user terminal of a non-owner user in the form of a short message including a cell phone number indicating identity information of the non-owner user,
and the user terminal of the non-vehicle owner user is also used for acquiring the authorization information of the vehicle owner user from the Bluetooth key background according to the authorization code and the mobile phone number.
20. The system of claim 11, wherein the in-vehicle smart computing device is further configured to send information of the newly generated bluetooth key to the bluetooth key backend in response to the in-vehicle smart computing device communicatively connecting the bluetooth key backend.
CN201911396223.3A 2019-12-30 2019-12-30 Bluetooth key configuration method and system for configuring Bluetooth key Pending CN111148075A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911396223.3A CN111148075A (en) 2019-12-30 2019-12-30 Bluetooth key configuration method and system for configuring Bluetooth key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911396223.3A CN111148075A (en) 2019-12-30 2019-12-30 Bluetooth key configuration method and system for configuring Bluetooth key

Publications (1)

Publication Number Publication Date
CN111148075A true CN111148075A (en) 2020-05-12

Family

ID=70522094

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911396223.3A Pending CN111148075A (en) 2019-12-30 2019-12-30 Bluetooth key configuration method and system for configuring Bluetooth key

Country Status (1)

Country Link
CN (1) CN111148075A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112466013A (en) * 2020-11-30 2021-03-09 上海银基信息安全技术股份有限公司 Digital key management method, device, system and storage medium
CN113709695A (en) * 2021-08-04 2021-11-26 一汽解放汽车有限公司 Vehicle use authorization method and system
CN114500136A (en) * 2022-01-07 2022-05-13 厦门盈趣科技股份有限公司 Smart home networking method, system, equipment and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160277923A1 (en) * 2015-03-20 2016-09-22 Hyundai America Technical Center, Inc. Method and apparatus for performing secure bluetooth communication
CN106302510A (en) * 2016-08-31 2017-01-04 长城汽车股份有限公司 The authorization method of virtual key, system, mobile terminal and server
CN107685714A (en) * 2017-08-30 2018-02-13 上海博泰悦臻电子设备制造有限公司 Intelligent vehicle key system and its control method
CN107689098A (en) * 2017-09-05 2018-02-13 上海博泰悦臻电子设备制造有限公司 The implementation method and system of bluetooth car key
CN109785490A (en) * 2019-01-29 2019-05-21 上海博泰悦臻网络技术服务有限公司 Bi-directional verification method and system, intelligent terminal and the T-BOX of bluetooth key
CN109874125A (en) * 2019-01-29 2019-06-11 上海博泰悦臻网络技术服务有限公司 The car owner's authorization method and system of bluetooth key, storage medium and vehicle Cloud Server
CN109895734A (en) * 2019-01-29 2019-06-18 上海博泰悦臻网络技术服务有限公司 Authorized bluetooth key Activiation method and system, storage medium and T-BOX
WO2019128354A1 (en) * 2017-12-29 2019-07-04 威马智慧出行科技(上海)有限公司 Safety authentication apparatus and method for vehicle anti-theft, device and computer program
WO2019128323A1 (en) * 2017-12-29 2019-07-04 威马智慧出行科技(上海)有限公司 Remote authorization method and system for vehicle

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160277923A1 (en) * 2015-03-20 2016-09-22 Hyundai America Technical Center, Inc. Method and apparatus for performing secure bluetooth communication
CN106302510A (en) * 2016-08-31 2017-01-04 长城汽车股份有限公司 The authorization method of virtual key, system, mobile terminal and server
CN107685714A (en) * 2017-08-30 2018-02-13 上海博泰悦臻电子设备制造有限公司 Intelligent vehicle key system and its control method
CN107689098A (en) * 2017-09-05 2018-02-13 上海博泰悦臻电子设备制造有限公司 The implementation method and system of bluetooth car key
WO2019128354A1 (en) * 2017-12-29 2019-07-04 威马智慧出行科技(上海)有限公司 Safety authentication apparatus and method for vehicle anti-theft, device and computer program
WO2019128323A1 (en) * 2017-12-29 2019-07-04 威马智慧出行科技(上海)有限公司 Remote authorization method and system for vehicle
CN109785490A (en) * 2019-01-29 2019-05-21 上海博泰悦臻网络技术服务有限公司 Bi-directional verification method and system, intelligent terminal and the T-BOX of bluetooth key
CN109874125A (en) * 2019-01-29 2019-06-11 上海博泰悦臻网络技术服务有限公司 The car owner's authorization method and system of bluetooth key, storage medium and vehicle Cloud Server
CN109895734A (en) * 2019-01-29 2019-06-18 上海博泰悦臻网络技术服务有限公司 Authorized bluetooth key Activiation method and system, storage medium and T-BOX

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112466013A (en) * 2020-11-30 2021-03-09 上海银基信息安全技术股份有限公司 Digital key management method, device, system and storage medium
CN112466013B (en) * 2020-11-30 2023-04-18 上海银基信息安全技术股份有限公司 Digital key management method, device, system and storage medium
CN113709695A (en) * 2021-08-04 2021-11-26 一汽解放汽车有限公司 Vehicle use authorization method and system
CN113709695B (en) * 2021-08-04 2024-04-09 一汽解放汽车有限公司 Authorization method and system for vehicle use
CN114500136A (en) * 2022-01-07 2022-05-13 厦门盈趣科技股份有限公司 Smart home networking method, system, equipment and storage medium
CN114500136B (en) * 2022-01-07 2023-12-05 厦门盈趣科技股份有限公司 Smart home networking method, system, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN107948321B (en) Remote authorization method and system for vehicle
CN108122311B (en) Vehicle virtual key implementation method and system
CN110766834B (en) Vehicle-mounted intelligent computing device and vehicle Bluetooth key management and maintenance method
US20200177398A1 (en) System, certification authority, vehicle-mounted computer, vehicle, public key certificate issuance method, and program
CN103477666B (en) Mobile device is connected, is connected to vehicle and the cloud service of internet
TW201927601A (en) Method for generating and using virtual key of vehicle, system for same, and user terminal
CN111132199A (en) Bluetooth key configuration method and system for configuring Bluetooth key
CN111080858A (en) Bluetooth key logout method and device
US11853446B2 (en) Remote hardware access service
CN107650863A (en) Vehicle sharing method and system
CN111163091A (en) Cloud server of Bluetooth key and communication method thereof
CN111148075A (en) Bluetooth key configuration method and system for configuring Bluetooth key
CN111868726B (en) Electronic device and digital key supply method for electronic device
CN104424779A (en) System and method for controlling vehicle by virtue of mobile terminal
CN110758321A (en) Control method and device of Bluetooth key
CN104158819A (en) Safety authentication method of vehicle-mounted information entertainment terminal
CN111148068A (en) Bluetooth key configuration method and system for configuring Bluetooth key
CN112883382B (en) Vehicle writing method, internet of vehicles box, vehicle and storage medium
CN109379403B (en) Control method and device of Internet of things equipment, server and terminal equipment
CN111147501A (en) Bluetooth key inquiry method and device
CN111065081A (en) Bluetooth-based information interaction method and device
KR102553145B1 (en) A secure element for processing and authenticating a digital key and operation metho thereof
US11722307B2 (en) Electronic device for processing digital key, and operation method therefor
CN111200807B (en) Bluetooth-based information interaction method and device
CN103944731A (en) Data security interactive method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
TA01 Transfer of patent application right

Effective date of registration: 20210726

Address after: 19 / F, Meiluo building, 30 Tianyaoqiao Road, Xuhui District, Shanghai, 200233

Applicant after: SHANGHAI PATEO INTERNET TECHNOLOGY SERVICE Co.,Ltd.

Applicant after: SAIC GM WULING AUTOMOBILE Co.,Ltd.

Address before: 19 / F, Meiluo building, 30 Tianyaoqiao Road, Xuhui District, Shanghai, 200233

Applicant before: SHANGHAI PATEO INTERNET TECHNOLOGY SERVICE Co.,Ltd.

TA01 Transfer of patent application right
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200512