CN111179470A - Virtual key sharing method, device, equipment, system and storage medium - Google Patents

Virtual key sharing method, device, equipment, system and storage medium Download PDF

Info

Publication number
CN111179470A
CN111179470A CN201811245979.3A CN201811245979A CN111179470A CN 111179470 A CN111179470 A CN 111179470A CN 201811245979 A CN201811245979 A CN 201811245979A CN 111179470 A CN111179470 A CN 111179470A
Authority
CN
China
Prior art keywords
vehicle
virtual key
user
information
identification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811245979.3A
Other languages
Chinese (zh)
Inventor
塞巴斯蒂安·赫尔曼
杨傲驰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bayerische Motoren Werke AG
Original Assignee
Bayerische Motoren Werke AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bayerische Motoren Werke AG filed Critical Bayerische Motoren Werke AG
Priority to CN201811245979.3A priority Critical patent/CN111179470A/en
Publication of CN111179470A publication Critical patent/CN111179470A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The embodiment of the invention discloses a virtual key sharing method, a virtual key sharing device, virtual key sharing equipment, a virtual key sharing system and a virtual key sharing storage medium. The method comprises the following steps: receiving a sharing request message of a virtual key initiated by a first user end, and determining a virtual key pair for a second user end, wherein the sharing request message comprises identification information of a vehicle, identification information of the second user end and use limit information of the vehicle; sending the user virtual key in the virtual key pair to the second user side according to the identification information of the second user side; and transmitting the vehicle virtual key and the use restriction information in the virtual key pair to the vehicle according to the identification information of the vehicle, wherein the user virtual key is matched with the vehicle virtual key. The embodiment of the invention realizes the control of the vehicle by using the virtual key without being limited by the number and carrying of the physical keys, thereby improving the safety, flexibility and convenience of vehicle control.

Description

Virtual key sharing method, device, equipment, system and storage medium
Technical Field
The embodiment of the invention relates to the field of intelligent equipment, in particular to a virtual key sharing method, device, equipment, system and storage medium.
Background
The intelligent vehicle technology is a new subject field, and integrates an artificial intelligence technology, a computer science technology, a communication and signal processing technology and the like. Many new ideas and solutions for smart vehicles benefit from advances and support in other technology areas.
In the prior art, vehicles are equipped with a physical key, and when a user uses a vehicle, the physical key of the vehicle can be used to perform corresponding control on the vehicle after the physical key of the vehicle is successfully paired with the vehicle. However, the method for controlling the vehicle by using the physical key has the problems of inconvenient use and poor safety, for example, the physical key is easily lost, a user needs to search the physical key from a pocket of clothes or a handbag when opening the vehicle, the user can freely use the vehicle by a borrower after the user borrows the vehicle to other people, the number of people who can use the vehicle is limited by the number of the physical keys equipped in the vehicle, and the like.
Disclosure of Invention
The embodiment of the invention provides a virtual key sharing method, a virtual key sharing device, virtual key sharing equipment, a virtual key sharing system and a virtual key sharing storage medium, which are used for improving the safety, flexibility and convenience of vehicle control.
In a first aspect, an embodiment of the present invention provides a virtual key sharing method, which is applied to a server, and the method includes:
receiving a sharing request message of a virtual key initiated by a first user end, and determining a virtual key pair for a second user end, wherein the sharing request message comprises identification information of a vehicle, identification information of the second user end and use limit information of the vehicle;
sending the user virtual key in the virtual key pair to the second user terminal according to the identification information of the second user terminal; and sending the vehicle virtual key in the virtual key pair and the use limit information to the vehicle according to the identification information of the vehicle, wherein the user virtual key is matched with the vehicle virtual key.
In a second aspect, an embodiment of the present invention further provides a virtual key sharing method, which is applied to a first user side, and the method includes:
generating a sharing request message of the virtual key according to user operation, wherein the sharing request message comprises identification information of a vehicle, identification information of a second user end and use limit information of the vehicle;
determining a virtual key pair for a second user end according to the sharing request message, sending a user virtual key in the virtual key pair to the second user end according to the identification information of the second user end, and sending a vehicle virtual key in the virtual key pair and the use limit information of the vehicle to the vehicle according to the identification information of the vehicle, wherein the user virtual key is matched with the vehicle virtual key.
In a third aspect, an embodiment of the present invention further provides a virtual key sharing method, which is applied to a vehicle control end, and the method includes:
receiving and storing a vehicle virtual key determined for a vehicle and use limit information of the vehicle, which are sent by a first user terminal or a server;
when a vehicle control instruction sent by a second user end is received, matching a user virtual key in the vehicle control instruction with a stored vehicle virtual key, wherein the vehicle virtual key and the user virtual key initiate a determined virtual key pair for the first user end; determining whether to execute the vehicle control instruction according to a matching result; and the number of the first and second groups,
and limiting the use of the vehicle by the second user end based on the use limitation information.
In a fourth aspect, an embodiment of the present invention further provides a virtual key sharing apparatus, which is applied to a server, and the apparatus includes:
the virtual key pair determining module is used for receiving a sharing request message of a virtual key initiated by a first user end and determining a virtual key pair for a second user end, wherein the sharing request message comprises identification information of a vehicle, identification information of the second user end and use limit information of the vehicle;
a virtual key pair sending module, configured to send a user virtual key in the virtual key pair to the second user end according to the identification information of the second user end; and sending the vehicle virtual key in the virtual key pair and the use limit information to the vehicle according to the identification information of the vehicle, wherein the user virtual key is matched with the vehicle virtual key.
In a fifth aspect, an embodiment of the present invention further provides a virtual key sharing apparatus, which is applied to a first user side, and the apparatus includes:
the sharing request message generating module is used for generating a sharing request message of the virtual key according to user operation, wherein the sharing request message comprises identification information of the vehicle, identification information of the second user end and use limit information of the vehicle;
and the virtual key pair sending module is used for determining a virtual key pair for a second user end according to the sharing request message, sending a user virtual key in the virtual key pair to the second user end according to the identification information of the second user end, and sending a vehicle virtual key in the virtual key pair and the use limit information of the vehicle to the vehicle according to the identification information of the vehicle, wherein the user virtual key is matched with the vehicle virtual key.
In a sixth aspect, an embodiment of the present invention further provides a virtual key sharing device, which is applied to a vehicle control end, and the device includes:
the vehicle receiving module is used for receiving and storing the vehicle virtual key determined for the vehicle and the use limit information of the vehicle, which are sent by the first user terminal or the server;
the vehicle control module is used for matching a user virtual key in a vehicle control instruction with a stored vehicle virtual key when the vehicle control instruction sent by a second user end is received, wherein the vehicle virtual key and the user virtual key initiate a determined virtual key pair for the first user end; determining whether to execute the vehicle control instruction according to a matching result; and the number of the first and second groups,
and limiting the use of the vehicle by the second user end based on the use limitation information.
In a seventh aspect, an embodiment of the present invention further provides an electronic device, where the electronic device includes:
one or more processors;
a memory for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement a method according to an embodiment of the present invention.
In an eighth aspect, the embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the method according to the embodiment of the present invention.
In a ninth aspect, an embodiment of the present invention provides a virtual key sharing system, where the system includes:
the system comprises a first user terminal, a second user terminal and a server, wherein the first user terminal is used for generating a sharing request message of a virtual key according to user operation, and the sharing request message comprises identification information of a vehicle, identification information of the second user terminal and use limit information of the vehicle; sending the sharing request message to a server;
the server is used for receiving the sharing request message and determining a virtual key pair for the second user terminal; sending the user virtual key in the virtual key pair to the second user terminal according to the identification information of the second user terminal; and transmitting the vehicle virtual key in the virtual key pair and the use restriction information to the vehicle according to the identification information of the vehicle, wherein the user virtual key is matched with the vehicle virtual key;
a vehicle for receiving and storing the vehicle virtual key and the use restriction information of the vehicle; when a vehicle control instruction sent by a second user side is received, matching a user virtual key in the vehicle control instruction with a stored vehicle virtual key, and determining whether to execute the vehicle control instruction according to a matching result; and limiting the use of the vehicle by the second user terminal based on the use limitation information.
In a tenth aspect, an embodiment of the present invention further provides a virtual key sharing system, where the system includes:
the system comprises a first user terminal, a second user terminal and a server, wherein the first user terminal is used for generating a sharing request message of a virtual key according to user operation, and the sharing request message comprises identification information of a vehicle, identification information of the second user terminal and use limit information of the vehicle; determining a virtual key pair for a second user end according to the sharing request message, sending a user virtual key in the virtual key pair to the second user end according to the identification information of the second user end, and sending a vehicle virtual key in the virtual key pair and the use limit information of the vehicle to the vehicle according to the identification information of the vehicle, wherein the user virtual key is matched with the vehicle virtual key;
a vehicle for receiving and storing the vehicle virtual key and the use restriction information of the vehicle; when a vehicle control instruction sent by a second user side is received, matching a user virtual key in the vehicle control instruction with a stored vehicle virtual key, and determining whether to execute the vehicle control instruction according to a matching result; and limiting the use of the vehicle by the second user terminal based on the use limitation information. In the embodiment of the invention, after receiving a sharing request message of a virtual key initiated by a first user terminal, a server determines a virtual key pair for a second user terminal, wherein the sharing request message comprises identification information of a vehicle, identification information of the second user terminal and use limit information of the vehicle, the virtual key of the user in the virtual key pair is sent to the second user terminal according to the identification information of the second user terminal, the vehicle virtual key and the use limit information in the virtual key pair are sent to the vehicle according to the identification information of the vehicle, and the virtual key of the user is matched with the virtual key of the vehicle; or after the first user terminal generates the sharing request message of the virtual key, the first user terminal determines the virtual key pair for the second user terminal, sends the user virtual key in the virtual key pair to the second user terminal according to the identification information of the second user terminal in the sharing request message, and sends the vehicle virtual key in the virtual key pair and the use limit information of the vehicle to the vehicle according to the identification information of the vehicle in the sharing request message, so that the vehicle is controlled by using the virtual key without the limitation of the number and carrying of the entity keys, and the safety, flexibility and convenience of vehicle control are improved.
Drawings
FIG. 1a is a flowchart of a virtual key sharing method according to a first embodiment of the present invention;
FIG. 1b is a flowchart of another virtual key sharing method according to one embodiment of the present invention;
fig. 2a is a schematic view of an application scenario of a virtual key sharing method according to a second embodiment of the present invention;
fig. 2b is a signaling diagram of a virtual key sharing method according to a second embodiment of the present invention;
fig. 3a is a flowchart of a virtual key sharing method according to a third embodiment of the present invention;
FIG. 3b is a flowchart of another virtual key sharing method according to a third embodiment of the present invention;
fig. 4a is a schematic view of an application scenario of a virtual key sharing method in the fourth embodiment of the present invention;
fig. 4b is a signaling diagram of a virtual key sharing method according to a fourth embodiment of the present invention;
fig. 4c is a schematic view of an application scenario of another virtual key sharing method according to a fourth embodiment of the present invention;
fig. 4d is a signaling diagram of another virtual key sharing method according to the fourth embodiment of the present invention;
FIG. 5a is a flowchart of a virtual key sharing method according to a fifth embodiment of the present invention;
FIG. 5b is a flowchart of another virtual key sharing method according to the fifth embodiment of the present invention;
FIG. 6a is a flowchart of a virtual key sharing method according to a sixth embodiment of the present invention;
FIG. 6b is a flowchart of another virtual key sharing method according to a sixth embodiment of the present invention;
fig. 7a is a signaling diagram of a virtual key sharing method in a seventh embodiment of the present invention;
fig. 7b is a signaling diagram of another virtual key sharing method according to a seventh embodiment of the present invention;
fig. 8 is a schematic structural diagram of a virtual key sharing device according to an eighth embodiment of the present invention;
FIG. 9 is a schematic structural diagram of a virtual key sharing device according to a ninth embodiment of the present invention;
fig. 10 is a schematic structural diagram of a virtual key sharing apparatus according to a tenth embodiment of the present invention;
fig. 11 is a schematic structural diagram of an electronic device in an eleventh embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Example one
Fig. 1a is a flowchart of a virtual key sharing method according to an embodiment of the present invention, where the embodiment is applicable to a case where a vehicle is controlled by using a virtual key, the method may be performed by a virtual key sharing device, the device may be implemented in software and/or hardware, and the device may be configured in a server, such as a computer. As shown in fig. 1a, the method specifically includes the following steps:
step 110, receiving a sharing request message of a virtual key initiated by a first user, and determining a virtual key pair for a second user, wherein the sharing request message includes identification information of a vehicle, identification information of the second user, and use restriction information of the vehicle.
Step 120, sending the user virtual key in the virtual key pair to the second user side according to the identification information of the second user side; and transmitting the vehicle virtual key and the use restriction information of the virtual key pair to the vehicle according to the identification information of the vehicle, wherein the user virtual key is matched with the vehicle virtual key.
In the embodiment of the present invention, the following scenes may exist in real life: scene one: a friend of the first user, which may be called a second user, now needs to borrow a vehicle of the first user, and the first user needs to hand an entity key into a hand of the second user, but for some reason, the first user cannot hand the entity key into the hand of the second user at present, and what manner should be adopted in the scene to meet the vehicle borrowing requirement of the second user; scene two: only two entity keys are allocated for a certain vehicle, the entity keys are respectively held by parents, a child at home needs to use the vehicle, but the parents cannot give the entity keys to the child immediately, the parents can be understood as a first user, the child can be understood as a second user, and the vehicle using requirements of the second user can be met in any mode under the scene; scene three: the first user allows the second user to use a certain vehicle, and in order to reduce the occurrence of unskilled safety problems caused by unfamiliarity with the vehicle or limited driving skills of the second user, the first user needs to control the situation of using the vehicle by the second user, and under the scene, the control requirement of the first user is met by adopting any mode. The three scenarios listed above represent the problem of using or controlling the vehicle by using the physical key from different aspects. In order to solve the above problem, a virtual key sharing method may be adopted, that is, a corresponding relationship between the second user and the vehicle is established by a virtual key, so that the second user can use the vehicle without passing through a physical key, where the virtual key is not a physical substance and is key information. Specifically, the method comprises the following steps:
according to the foregoing, information interaction involving the first user terminal, the second user terminal, and the vehicle may employ a server to process a sharing request message of the virtual key initiated by the first user terminal. More specifically: the server may receive a sharing request message of the virtual key initiated by the first user to determine a virtual key pair for the second user, where the sharing request message may specifically include identification information of the vehicle, identification information of the second user, and usage restriction information of the vehicle. The virtual key pair may specifically include a user virtual key and a vehicle virtual key, and the user virtual key is matched with the vehicle virtual key, so that the user may use the corresponding vehicle according to the matching relationship between the user virtual key and the vehicle virtual key. The identification information of the Vehicle may be used to determine to which Vehicle the virtual key of the virtual key pair is sent, and specifically may refer to information that uniquely identifies the Vehicle, such as, for example, a license plate number or a VIN (Vehicle identification number), where VIN is a set of seventeen quartz, and is used for a set of specific numbers on the Vehicle, and may identify information such as a manufacturer, an engine, a chassis serial number, and other performance of the Vehicle. The identification information of the second user may be used to determine to which second user the virtual key in the virtual key pair is sent, and specifically may refer to account information of the second user, such as, for example, an account name and an account password of the second user. The usage restriction information of the vehicle may be used to restrict the time and functions of the second user end using the vehicle, and specifically may include time restriction information and/or function restriction information. For example, if the second user is a user with immature driving technique, in order to ensure the safety of the driving process, the function limit information may be set, for example, the driving speed may not exceed 60 km/h.
Based on the above, the server may send the user virtual key in the virtual key pair to the corresponding second user according to the identification information of the second user, and the server may send the vehicle virtual key in the virtual key pair to the corresponding vehicle according to the identification information of the vehicle, and simultaneously send the usage restriction information in the sharing request message to the vehicle. Therefore, the server interacts with the first user terminal and the vehicle to establish the corresponding relationship between the second user terminal and the vehicle, so that the second user can use the vehicle, and meanwhile, the vehicle correspondingly sets the vehicle in use because the vehicle receives the use limit information sent by the server, namely, the second user needs to use the vehicle under the set use limit condition.
It should be noted that, the first user side and the second user side may be mobile terminals such as a mobile phone, a tablet computer, or a smart watch, and in order to better implement information interaction between the first user side and the server, and information interaction between the server and the second client side and the vehicle, a special application program may be installed on the first user side and the second user side, at this time, the first user side refers to the mobile terminal where the application program is located when the first user logs in the application program, and the second user side refers to the mobile terminal where the application program is located when the second user logs in the application program.
For example, as the existing first user a, the second user B, and the server C, the first user a owns the vehicle D, the first user a and the second user are both installed with the application E, and the second user B needs to use the vehicle D currently, so the first user may initiate a sharing request message of the virtual key to the server C, where the sharing request message may specifically include the identification information of the vehicle D, the identification information of the second user, and the usage restriction information of the vehicle D. The server C may determine a corresponding virtual key pair for the second user according to the received sharing request message sent by the first user, where the virtual key pair may specifically include a user virtual key and a vehicle virtual key, send the user virtual key in the virtual key pair to the second user according to the identification information of the second user, send the vehicle virtual key in the virtual key pair to the vehicle D according to the identification information of the vehicle D, and send the usage restriction information of the vehicle D to the vehicle D. Thereby, it is achieved that the second user B can use the vehicle D under the use restriction conditions set on the vehicle D.
According to the technical scheme of the embodiment, the server receives a sharing request message of the virtual key initiated by the first user end to determine the virtual key pair for the second user end, the sharing request message comprises identification information of a vehicle, identification information of the second user end and use limitation information of the vehicle, the user virtual key in the virtual key pair is sent to the second user end according to the identification information of the second user end, the vehicle virtual key and the use limitation information in the virtual key pair are sent to the vehicle according to the identification information of the vehicle, the user virtual key is matched with the vehicle virtual key, the vehicle is controlled by the virtual key without being limited by the number and carrying of the entity keys, and therefore safety, flexibility and convenience of vehicle control are improved.
Optionally, on the basis of the above technical solution, the usage restriction information may specifically include: usage time limitation information and/or functional usage limitation information.
In the embodiment of the present invention, the usage time limitation information may be used to limit the time of the user using the vehicle, and may be specifically expressed in a time period, and accordingly, if the time period is not within the time period, the user cannot use the vehicle. For example, the usage time limit information may be 2018.06.25-2018.06.27, or 2018.06.25 08:00-18:00, i.e. the time period may refer to a certain number of days, or a certain number of hours in a day. It is understood that the specific representation form of the usage time limit information may be set according to actual situations, and is not limited specifically herein.
The function use restriction information may be used to correspondingly restrict the use of the relevant function of the vehicle by the user. Illustratively, the travel speed related limit information is set, such as that the travel speed of the vehicle cannot exceed 60km/h when the second user uses the vehicle. And for example, setting limit information related to the performance of the vehicle powertrain. It is to be understood that the specific content included in the function use restriction information may be set according to actual situations, and is not specifically limited herein.
The advantages of the above arrangement are: since the use restriction information of the vehicle is associated with the second user side, the second user can use the vehicle at the will of the first user, and the safety of the second user in using the vehicle is improved to a certain extent.
Optionally, on the basis of the above technical solution, the function use restriction information may specifically include: at least one of traveling speed-related limit information, Dynamic Stability Control (DSC) function-related limit information, and power system performance-related limit information.
In an embodiment of the present invention, the travel speed-related restriction information may be used to restrict the travel speed of the vehicle accordingly, for example, the travel speed of the vehicle may not exceed 60km/h when the second user uses the vehicle. The DSC is similar to the ESP (Electronic Stability Program) which is generally described, and is a further extension of the acceleration antiskid control or tracking control system, and can ensure that the vehicle still has optimal tracking performance when turning, so as to ensure driving Stability. The DSC system is provided with more advanced detection and control equipment for ensuring that the vehicle still has good tracking performance when turning, can detect the rotating speed of the wheels, can detect the rotating amplitude of a steering wheel, the lateral acceleration of the vehicle and the like, judges whether the wheels have the risk of skidding in the turning process according to the information obtained by the detection, if the wheels have the risk of skidding or have skidding, a terminal immediately controls a brake oil pressure system to properly brake the skidding wheels, or reduces the output of engine force by adopting a mode of reducing oil injection quantity and delaying ignition, realizes that the tires cannot skid under various driving conditions, and further ensures that the vehicle can realize good tracking performance no matter in the processes of starting acceleration, reacceleration, turning and the like. The power system may include a power transmission device between the engine and the driving wheel of the automobile, and it ensures the vehicle to have the necessary traction force and speed under various driving conditions, and has the function of coordinating change between the traction force and the speed, so that the vehicle has good power performance and fuel economy. In addition, it also ensures that the vehicle has reverse and the left and right driving wheels can meet the requirements of differential speed, etc., and makes the power transmission smoothly combined or completely and quickly separated according to the requirements. The power system specifically comprises a clutch, a transmission shaft, a main speed reducer, a differential mechanism, a half shaft and the like. Correspondingly, the function use restriction information may specifically include: at least one of the traveling speed-related restriction information, the DSC function-related restriction information, and the powertrain performance-related restriction information.
Optionally, on the basis of the above technical solution, the method may further include: and when the user virtual key in the virtual key pair is sent to the second user terminal, the use limit information is sent to the second user terminal.
In the embodiment of the invention, in order to further improve the safety of the second user in driving the vehicle, when the server sends the user virtual key in the virtual key pair to the second user side, the server also sends the use restriction information to the second user side, so that the second user also knows the use authority of the vehicle when using the vehicle.
Optionally, on the basis of the above technical solution, the method may further include: and acquiring vehicle configuration information of a vehicle corresponding to the second user side (namely the vehicle configuration information set by the second user side for the vehicle) based on the identification information of the second user side. The vehicle configuration information is transmitted to the vehicle when the vehicle virtual key and the use restriction in the virtual key pair are newly transmitted to the vehicle based on the identification information of the vehicle.
In the embodiment of the present invention, the identification information of the second user end may be used to determine which second user end the virtual key of the virtual key pair is assigned to, and the identification information of the second user end may also be used to determine vehicle configuration information of a vehicle corresponding to the second user end, so that when the vehicle virtual key of the virtual key pair and the usage restriction information are sent to the vehicle according to the identification information of the vehicle, the vehicle configuration information may also be sent to the vehicle. Wherein the vehicle configuration information may be used to provide the second user with a vehicle configuration that conforms to their personal usage habits and personal physical conditions when using the vehicle. For example, the vehicle configuration information may specifically include seat configuration information, music configuration information, and the like, the seat configuration information may specifically refer to seat position height information, and the music configuration information may specifically refer to setting a music playlist on the vehicle-mounted system. It should be noted that the vehicle configuration information is associated with the second user.
The advantages of the above arrangement are: the vehicle configuration information of the vehicle corresponding to the second user side is determined according to the identification information of the second user side, the vehicle virtual key and the use limit information in the virtual key pair are sent to the vehicle according to the identification information of the vehicle, and meanwhile the vehicle configuration information is sent to the vehicle.
Optionally, on the basis of the above technical solution, the vehicle configuration information may specifically include: at least one of seat configuration information, music configuration information, and light configuration information.
In an embodiment of the present invention, the vehicle configuration information may specifically include at least one of seat configuration information, music configuration information, and light configuration information, the seat configuration information may be generated based on a physical condition of the second user, and the music configuration information and the light configuration information may be generated based on a personal use habit of the second user. In other words, the seat configuration information may be determined according to the height of the second user, and the music configuration information and the light configuration information may be determined according to the personal use habits of the second user. For example, if a second user is 170cm tall and likes listening to korean songs and soft lighting, the seat configuration information may set the height of the seat matching the height of 170cm, the music configuration information may be a list of korean songs, and the light configuration information may be soft lighting.
Fig. 1b is a flowchart of another virtual key sharing method according to an embodiment of the present invention. As shown in fig. 1b, the method specifically includes the following steps:
step 130, receiving a sharing request message of the virtual key initiated by the first user end, and determining a virtual key pair for the second user end, wherein the sharing request message includes identification information of the vehicle, identification information of the second user end, and use restriction information of the vehicle.
And 140, acquiring vehicle configuration information of the vehicle of the second user side based on the identification information of the second user side.
And 150, sending the user virtual key and the use limit information in the virtual key pair to the second user side according to the identification information of the second user side.
And step 160, transmitting the vehicle virtual key, the use limit information and the vehicle configuration information in the virtual key pair to the vehicle according to the identification information of the vehicle.
In the embodiment of the present invention, it should be noted that, step 130 needs to be executed first and step 140 needs to be executed before step 160, and other steps are not necessarily limited in execution timing, that is, the steps 130 to 160 may be executed in sequence. The method may also be performed by first performing step 130, and then synchronously performing step 140, step 160 and step 150, wherein step 140 and step 160 are performed first, and then step 160 is performed. Alternatively, the step 130 may be performed first, the steps 140 and 160 may be performed in sequence, and the step 150 may be performed. It is also possible to perform step 130, then step 150, and then step 140 and step 160 in sequence. The above-mentioned parameters may be set according to actual conditions, and are not particularly limited herein.
The technical scheme of the embodiment includes that a server receives a sharing request message of a virtual key initiated by a first user end to determine a virtual key pair for a second user end, the sharing request message includes identification information of a vehicle, identification information of the second user end and use restriction information of the vehicle, vehicle configuration information of the vehicle of the second user end is obtained based on the identification information of the second user end, the user virtual key and the use restriction information in the virtual key pair are sent to the second user end according to the identification information of the second user end, the vehicle virtual key, the use restriction information and the vehicle configuration information in the virtual key pair are sent to the vehicle according to the identification information of the vehicle, the user virtual key is matched with the vehicle virtual key, the vehicle is controlled by the virtual key without being limited by the number and carrying of entity keys, thereby improving the safety, flexibility and convenience of vehicle control.
Example two
Fig. 2a is a schematic view of an application scenario of a virtual key sharing method according to a second embodiment of the present invention, in which a server 2 communicates with a first user end 1, a second user end 3, and a vehicle 4 (i.e., a vehicle control end in fig. 2 b) through the internet. The first user terminal 1 sends a sharing request message of the virtual key to the server 2, and the server 2 processes the received sharing request message to establish a corresponding relationship between the second user terminal 3 and the vehicle 4.
Fig. 2b is a signaling diagram of a virtual key sharing method according to a second embodiment of the present invention, and the application scenario shown in fig. 2a can be understood by combining the signaling diagram.
According to the virtual key sharing method provided by the embodiment of the invention, a first user end sends a sharing request message of a virtual key to a server, the sharing request message comprises identification information of a vehicle, identification information of a second user end and use limit information of the vehicle, the server determines a virtual key pair for the second user end according to the sharing request message and obtains vehicle configuration information of the vehicle corresponding to the second user end based on the identification information of the second user end, the user virtual key and the use limit information in the virtual key pair are sent to the second user end according to the identification information of the second user, and the vehicle virtual key, the use limit information and the vehicle configuration information in the virtual key pair are sent to the vehicle according to the identification information of the vehicle.
In the process, the second user end can use the matched vehicle through the virtual key without being limited by the number and carrying of the physical keys, and the use of the vehicle by the second user end is limited. Thus, the safety, flexibility and convenience of vehicle control are improved.
EXAMPLE III
Fig. 3a is a flowchart of a virtual key sharing method according to a third embodiment of the present invention, where the present embodiment is applicable to a situation where a virtual key is used to control a vehicle, the method may be executed by a virtual key sharing device, the device may be implemented in a software and/or hardware manner, and the device may be configured in a first user end, such as a mobile phone and/or a tablet computer. As shown in fig. 3a, the method specifically includes the following steps:
and 310, generating a sharing request message of the virtual key according to the user operation, wherein the sharing request message comprises the identification information of the vehicle, the identification information of the second user end and the use limitation information of the vehicle.
And step 320, determining a virtual key pair for the second user side according to the sharing request message, sending the user virtual key in the virtual key pair to the second user side according to the identification information of the second user side, and sending the vehicle virtual key in the virtual key pair and the use limit information of the vehicle to the vehicle according to the identification information of the vehicle, wherein the user virtual key is matched with the vehicle virtual key.
In the embodiment of the present invention, unlike the foregoing embodiment, it is considered that the sharing request message of the virtual key is directly processed by the first user side without the server in the present embodiment. Specifically, the method comprises the following steps: the sharing request message of the virtual key can be generated by the user performing relevant user operation on the first user terminal. For example, the user operations related to may be: after a first user logs in a setting application program, the first user selects or inputs identification information of a vehicle on an interface of the setting application program, account information of a second user login setting application program selected or input by the first user on the interface of the setting application program is used as identification information of a second user side, and in addition, the first user sets corresponding use restriction information aiming at the selected vehicle on the interface of the setting application program.
The first user terminal generates a sharing request message of the virtual key according to the received user operation, namely the first user terminal generates a corresponding sharing request message of the virtual key according to the received identification information of the vehicle, the identification information of the second user terminal and the use restriction information of the vehicle. The first user side determines a virtual key pair corresponding to the second user side according to the sharing request message, the virtual key pair specifically includes a user virtual key and a vehicle virtual key, the user virtual key is matched with the vehicle virtual key, the first user side can send the user virtual key in the virtual key pair to the corresponding second user side according to the identification information of the second user in the sharing request message, and can also send the vehicle virtual key in the virtual key pair to the corresponding vehicle according to the identification information of the vehicle in the sharing request message, and in addition, can also send the use limit information in the sharing request message to the corresponding vehicle. Therefore, the information interaction between the first user side and the second user side as well as the vehicle establishes the corresponding relationship between the second user side and the vehicle, so that the second user can use the vehicle, and meanwhile, the vehicle correspondingly sets the vehicle in the aspect of use because the vehicle receives the use limit information sent by the first user side, namely the second user needs to use the vehicle under the set use limit condition.
It should be noted that the first user end and the second user end may be mobile terminals such as a mobile phone, a tablet computer, or a smart watch, and in order to better implement information interaction between the first user end and the second client and a vehicle, a special application program may be installed on the first user end and the second user end, at this time, the first user end refers to the mobile terminal where the application program is located when the first user logs in the application program, and the second user end refers to the mobile terminal where the application program is located when the second user logs in the application program.
For example, as the existing first user a and the second user B, the first user a owns the vehicle C, both the first user a and the second user B are installed with the application D, and the second user B needs to use the vehicle C currently, so the first user may generate a sharing request message of the virtual key according to the operation of the first user a, where the sharing request message may specifically include the identification information of the vehicle C, the identification information of the second user, and the usage restriction information of the vehicle C. The first user side may determine a corresponding virtual key pair for the second user side according to the generated sharing request message, where the virtual key pair may specifically include a user virtual key and a vehicle virtual key, and send the user virtual key in the virtual key pair to the second user side according to the identification information of the second user side, and send the vehicle virtual key in the virtual key pair to the vehicle C according to the identification information of the vehicle C, and send the usage restriction information of the vehicle C to the vehicle C at the same time. Thereby, it is achieved that the second user B can use the vehicle C under the use restriction conditions set on the vehicle C.
According to the technical scheme of the embodiment, the sharing request message of the virtual key is generated by the first user side according to the user operation, the sharing request message comprises the identification information of the vehicle, the identification information of the second user side and the use limit information of the vehicle, the virtual key pair is determined for the second user side according to the sharing request message, the user virtual key in the virtual key pair is sent to the second user side according to the identification information of the second user side, the vehicle virtual key in the virtual key pair and the use limit information of the vehicle are sent to the vehicle according to the identification information of the vehicle, the user virtual key is matched with the vehicle virtual key, the vehicle is controlled by the virtual key without the limitation of the number and carrying of the entity keys, and therefore the safety, flexibility and convenience of vehicle control are improved.
Optionally, on the basis of the above technical solution, determining a virtual key pair for the second user end according to the sharing request message, sending the user virtual key in the virtual key pair to the second user end according to the identification information of the second user end, and sending the vehicle virtual key in the virtual key pair and the use restriction information of the vehicle to the vehicle according to the identification information of the vehicle may specifically include: and generating or selecting a virtual key pair for the second user terminal locally at the first user terminal according to the sharing request message. And based on the wireless communication channel of the first user terminal and the second user terminal or through the server forwarding, the user virtual key in the virtual key pair is sent to the second user terminal according to the identification information of the second user terminal, and the vehicle virtual key in the virtual key pair and the use limit information of the vehicle are sent to the vehicle according to the identification information of the vehicle.
In an embodiment of the present invention, the first user terminal may generate or select a virtual key pair for the second user terminal locally at the first user terminal according to the sharing request message, where generating the virtual key pair may be understood as generating the virtual key pair using a key generation algorithm, and selecting the virtual key pair may be understood as displaying at least two options of the virtual key pair locally at the first user terminal, and the user performs a selection operation from the at least two options to complete the operation. Now, the first user needs to send the user virtual key in the virtual key pair to the second user according to the identification information of the second user, and needs to send the vehicle identification in the virtual key pair to the vehicle according to the identification information of the vehicle, and meanwhile needs to send the use limit information of the vehicle to the vehicle according to the identification information of the vehicle. The method can be specifically realized by the following two ways: in the first mode, based on the wireless communication channel between the first user side and the second user side, the first user side sends the user virtual key in the virtual key pair to the second user side according to the identification information of the second user, that is, the first user side and the second user side establish wireless communication connection, so that the first user side can directly send the user virtual key in the virtual key pair to the second user side according to the identification information of the second user, and the forwarding by a third party is not needed, for example, the forwarding by a server is realized. Through the forwarding of the server, the first user side sends the vehicle virtual key in the virtual key pair and the use limit information of the vehicle to the corresponding vehicle according to the identification information of the vehicle, namely the first user side and the vehicle do not directly establish communication connection, but the first user side forwards the use limit information of the vehicle through a third party, for example, the server forwards the use limit information of the vehicle in the virtual key pair and the use limit information of the vehicle to the corresponding vehicle according to the identification information of the vehicle. More specifically, the first user side sends the identification information of the vehicle, the virtual key of the vehicle in the virtual key pair and the use limit information of the vehicle to the server, and the server sends the virtual key of the vehicle and the use limit information of the vehicle to the corresponding vehicle according to the identification information of the vehicle. In the second mode, the first user terminal sends the user virtual key in the virtual key pair to the second user terminal according to the identification information of the second user terminal, and, the vehicle virtual key in the virtual key pair and the use limit information of the vehicle are sent to the corresponding vehicle according to the identification information of the vehicle, that is, the first user end, the second user end and the vehicle do not directly establish communication connection, but transmit through a third party, such as a server, that is, the server establishes wireless communication connections with the first user side, the second user side and the vehicle, respectively, to realize that the first user side sends the user virtual key in the virtual key pair to the second user side according to the identification information of the second user side, and, and sending the vehicle virtual key in the virtual key pair and the use limit information of the vehicle to the corresponding vehicle according to the identification information of the vehicle. More specifically, the first user side sends the identification information of the second user and the virtual key of the user in the virtual key pair to the server, and sends the identification information of the vehicle, the virtual key of the vehicle in the virtual key pair and the use restriction information of the vehicle to the server, and the server sends the virtual key of the user to the second user side according to the identification information of the second user, and sends the virtual key of the vehicle and the use restriction information of the vehicle to the corresponding vehicle according to the identification information of the vehicle.
It is of course understood that, in addition to the two implementations described above, there are two implementations as follows: and in the third mode, the first user side sends the user virtual key in the virtual key pair to the second user side through the server forwarding according to the identification information of the second user side, namely the first user side and the second user side do not directly establish communication connection, but the first user side and the second user side forward through a third party, for example, the server forwarding, namely the server respectively establishes wireless communication connection with the first user side and the second user side, so that the first user side sends the user virtual key in the virtual key pair to the second user side according to the identification information of the second user side. More specifically, the first user side sends the identification information of the second user and the user virtual key in the virtual key pair to the server, and the server sends the user virtual key to the second user side according to the identification information of the second user. Based on the wireless communication channel between the first user side and the vehicle, the first user side sends the vehicle virtual key in the virtual key pair and the use restriction information of the vehicle to the corresponding vehicle according to the identification information of the vehicle, namely, the first user side and the vehicle establish wireless communication connection, so that the first user side can directly send the vehicle virtual key in the virtual key pair and the use restriction information of the vehicle to the corresponding vehicle according to the identification information of the vehicle without forwarding through a third party, for example, the server forwards the information. And based on the wireless communication channel between the first user side and the second user side and the wireless communication channel between the first user side and the vehicle, the first user side sends the virtual key of the virtual key pair to the second user side according to the identification information of the second user side, and sends the virtual key of the vehicle in the virtual key pair and the use limit information of the vehicle to the corresponding vehicle according to the identification information of the vehicle, namely, the first user side establishes wireless communication connection with the second user side and the vehicle respectively, so that the first user side can directly send the virtual key of the user in the virtual key pair to the second user side according to the identification information of the second user side, and send the virtual key of the vehicle in the virtual key pair and the use limit information of the vehicle to the corresponding vehicle according to the identification information of the vehicle without forwarding through a third party, such as server forwarding.
The specific implementation form may be set according to actual conditions, and is not particularly limited herein. In addition, the Wireless communication channels of the first user side and the second user side, the Wireless communication channels of the first user side and the vehicle, and the Wireless communication channels of the server with the first user side, the second user side, and the vehicle, respectively, can be implemented by selecting Wireless communication connections established based on a mobile network, bluetooth, or Wi-Fi (Wireless Fidelity) according to actual situations (such as data transmission distance).
Optionally, on the basis of the above technical solution, generating a sharing request message of the virtual key according to a user operation may specifically include: after the first user logs in the setting application program, the identification information of the vehicle selected or input by the first user on the interface of the setting application program is obtained. And acquiring account information of a second user login setting application program selected or input by the first user on the interface of the setting application program as identification information of the second user. And acquiring the use limit information set by the first user for the vehicle on the interface of the setting application program. And generating a sharing request message of the virtual key based on the identification information of the vehicle, the identification information of the second user terminal and the use limit information of the vehicle.
In the embodiment of the invention, after a first user logs in a setting application program, identification information of a vehicle selected or input by the first user in the setting application program is acquired, account information of a second user in the setting application program selected or input by the first user in an interface of the setting application program is acquired, the account information can be used as identification information of a second user side, and in addition, use limit information set by the first user on the interface of the setting application program for the vehicle is acquired. The first user side can generate the sharing request message of the virtual key according to the acquired identification information of the vehicle, the identification information of the second user side and the use limit information of the vehicle.
The advantages of the above arrangement are: the first user can perform relevant operations locally on the first user terminal according to actual conditions to generate the sharing request message of the virtual key, so that the flexibility and the convenience of generating the sharing request message are improved.
Optionally, on the basis of the above technical solution, the method may further include: and when the user virtual key in the virtual key pair is sent to the second user side according to the identification information of the second user side, the use limit information of the vehicle is sent to the second user side.
In the embodiment of the invention, in order to further improve the safety of the second user in driving the vehicle, when the first user sends the user virtual key in the virtual key pair to the second user, the first user also sends the use limit information of the vehicle to the second user, so that the second user also knows the use authority of the vehicle when using the vehicle.
It should be noted that, in this embodiment, the meanings and roles of the identification information of the vehicle, the identification information of the second user, and the usage restriction information of the vehicle are the same as those in the first embodiment, and detailed description thereof is omitted here.
Fig. 3b is a flowchart of another virtual key sharing method according to a third embodiment of the present invention. As shown in fig. 3b, the method specifically includes the following steps:
step 330, after the first user logs in the setting application program, acquiring the identification information of the vehicle selected or input by the first user on the interface of the setting application program.
And 340, acquiring account information of the second user login setting application program selected or input by the first user on the interface of the setting application program as the identification information of the second user side.
And step 350, acquiring the use limit information set by the first user for the vehicle on the interface of the setting application program.
And step 360, generating a sharing request message of the virtual key based on the identification information of the vehicle, the identification information of the second user terminal and the use limit information of the vehicle.
Step 370, a virtual key pair is generated or selected locally at the first user end for the second user end according to the sharing request message.
Step 380, based on the wireless communication channel of the first user end and the second user end or through the server forwarding, sending the user virtual key and the use restriction information in the virtual key pair to the second user end according to the identification information of the second user end; and transmitting the vehicle virtual key and the use restriction information in the virtual key pair to the vehicle according to the identification information of the vehicle.
In the technical solution of this embodiment, a sharing request message of a virtual key is generated by a first user end according to a user operation, the sharing request message includes identification information of a vehicle, identification information of a second user end, and usage restriction information of the vehicle, determining a virtual key pair for the second user according to the sharing request message, and transmitting the user virtual key in the virtual key pair and the use restriction information of the vehicle to the second user according to the identification information of the second user, and, the virtual key of the vehicle in the virtual key pair and the use limit information of the vehicle are sent to the vehicle according to the identification information of the vehicle, the virtual key of the user is matched with the virtual key of the vehicle, the control of the vehicle by using the virtual key is realized, and the number and carrying of the physical keys are not limited, so that the safety, flexibility and convenience of vehicle control are improved.
Example four
Fig. 4a is a schematic view of an application scenario of a virtual key sharing method according to a fourth embodiment of the present invention, in which a first user terminal 5 communicates with a second user terminal 6 and a vehicle 7 (i.e., a vehicle control terminal in fig. 4 b) via the internet. The first user terminal 5 directly processes the sharing request message of the virtual key to establish the corresponding relationship between the second user terminal 6 and the vehicle 7.
Fig. 4b is a signaling diagram of a virtual key sharing method according to a fourth embodiment of the present invention, and the application scenario shown in fig. 4a can be understood by combining the signaling diagram.
In the virtual key sharing method provided by the embodiment of the invention, after a first user logs in a set application program, a first user terminal acquires identification information of a vehicle selected or input by the first user on a set application program interface, acquires account information of a second user logged in the set application program selected or input by the first user on the set application program interface, and uses the account information as identification information of the second user terminal, acquires use limit information set by the first user on the set application program interface aiming at the vehicle, generates a sharing request message of a virtual key based on the identification information of the vehicle, the identification information of the second user and the use limit information of the vehicle, generates or selects a virtual key pair for the second user terminal locally according to the sharing request message, and sends a user virtual key and the use limit information in the virtual key pair to the second user terminal according to the identification information of the second user terminal, and transmitting the vehicle virtual key and the use restriction information in the virtual key pair to the vehicle according to the identification information of the vehicle.
In the process, the second user end can use the matched vehicle through the virtual key without being limited by the number and carrying of the physical keys, and the use of the vehicle by the second user end is controlled. Thus, the safety, flexibility and convenience of vehicle control are improved.
Fig. 4c is a schematic view of an application scenario of another virtual key sharing method according to the fourth embodiment of the present invention, in which the first user end 8 communicates with the second user end 9 and the server 10 via the internet, and the server 10 communicates with the vehicle 11 (i.e., the vehicle control end in fig. 4 d) via the internet. The first user end 8 cannot directly perform information interaction with the vehicle 11, and needs to forward the information through the server 10, and the first user end 8 can directly perform information interaction with the second user end 9.
Fig. 4d is a signaling diagram of another virtual key sharing method according to a fourth embodiment of the present invention, and the application scenario shown in fig. 4c can be understood by combining the signaling diagram.
In the virtual key sharing method provided by the embodiment of the invention, after a first user logs in a set application program, a first user terminal acquires identification information of a vehicle selected or input by the first user on a set application program interface, acquires account information of a second user logged in the set application program selected or input by the first user on the set application program interface, and uses the account information as identification information of the second user terminal, acquires use limit information set by the first user on the set application program interface aiming at the vehicle, generates a sharing request message of a virtual key based on the identification information of the vehicle, the identification information of the second user and the use limit information of the vehicle, generates or selects a virtual key pair for the second user terminal locally according to the sharing request message, and sends a user virtual key and the use limit information in the virtual key pair to the second user terminal according to the identification information of the second user terminal, and sending the identification information of the vehicle and the vehicle virtual key and the use limit information in the virtual key pair to the server, and sending the vehicle virtual key and the use limit information to the vehicle by the server according to the identification information of the vehicle.
In the process, the second user end can use the matched vehicle through the virtual key without being limited by the number and carrying of the physical keys, and the use of the vehicle by the second user end is controlled. Thus, the safety, flexibility and convenience of vehicle control are improved.
EXAMPLE five
Fig. 5a is a flowchart of a virtual key sharing method according to a fifth embodiment of the present invention, where the present embodiment is applicable to a situation where a virtual key is used to control a vehicle, the method may be executed by a virtual key sharing device, the device may be implemented in a software and/or hardware manner, and the device may be configured in a first user end, such as a mobile phone and/or a tablet computer. As shown in fig. 5a, the method specifically includes the following steps:
and step 510, generating a sharing request message of the virtual key according to the user operation, wherein the sharing request message comprises the identification information of the vehicle, the identification information of the second user side and the use limitation information of the vehicle.
Step 520, sending the sharing request message to the server, so as to request the server to determine a virtual key pair for the second user according to the sharing request message, and sending the user virtual key in the virtual key pair to the second user according to the identification information of the second user, and sending the vehicle virtual key in the virtual key pair and the use restriction information of the vehicle to the vehicle according to the identification information of the vehicle.
In the embodiment of the present invention, unlike the foregoing embodiment, it is considered that a sharing request message for generating a virtual key on the first user side is adopted in the present embodiment, and the sharing request message is sent to the server to request the server to process the sharing request message. Specifically, the method comprises the following steps: the sharing request message of the virtual key can be generated by the user performing relevant user operation on the first user terminal. For example, the user operations related to may be: after the first user logs in the setting application program, the first user selects or inputs the identification information of the vehicle on the interface of the setting application program, the first user selects or inputs the account information of the second user login setting application program on the interface of the setting application program, the account information is used as the identification information of the second user side, and in addition, the first user sets corresponding use restriction information aiming at the selected vehicle on the interface of the setting application program.
The first user terminal generates a sharing request message of the vehicle virtual key according to the received user operation, namely the first user terminal generates a sharing request message of a corresponding virtual key according to the received identification information of the vehicle, the identification information of the second user terminal and the use limit information of the vehicle and sends the sharing request message to the server, so that the server can be requested to determine a virtual key pair for the second user terminal according to the received sharing request message sent by the first user terminal, the virtual key pair specifically comprises the user virtual key and the vehicle virtual key, and the user virtual key is matched with the vehicle virtual key, namely the server can send the user virtual key in the virtual key pair to the corresponding second user terminal according to the identification information of the second user in the sharing request message and send the vehicle virtual key in the virtual key pair to the corresponding vehicle according to the identification information of the vehicle in the sharing request message, further, the usage restriction information in the sharing request message may also be transmitted to the corresponding vehicle. Therefore, the information interaction between the first user side and the server and the information interaction between the server and the second user side and the vehicle respectively are established, so that the second user side can use the vehicle, and meanwhile, the vehicle correspondingly sets the vehicle in the aspect of use as the vehicle receives the use limit information sent by the server, namely the second user needs to use the vehicle under the set use limit condition.
It should be noted that, the first user side and the second user side may be mobile terminals such as a mobile phone, a tablet computer, or a smart watch, and in order to better implement information interaction between the first user side and the server, and information interaction between the server and the second client side and the vehicle, a special application program may be installed on the first user side and the second user side, at this time, the first user side refers to the mobile terminal where the application program is located when the first user logs in the application program, and the second user side refers to the mobile terminal where the application program is located when the second user logs in the application program.
For example, as the existing first user a, the second user B, and the server C, the first user a owns the vehicle D, the first user a and the second user are both installed with the application E, and the second user B needs to use the vehicle D currently, so that the first user may generate a sharing request message of the virtual key according to the operation of the first user a, where the sharing request message may specifically include the identification information of the vehicle D, the identification information of the second user, and the usage restriction information of the vehicle D. The first user side sends a sharing request message to the server C to request the server C to determine a corresponding virtual key pair for the second user side according to the received sharing request message sent by the first user side, wherein the virtual key pair specifically includes a user virtual key and a vehicle virtual key, and sends the user virtual key in the virtual key pair to the second user side according to the identification information of the second user side, and sends the vehicle virtual key in the virtual key pair to the vehicle D according to the identification information of the vehicle D, and simultaneously sends the use restriction information of the vehicle D to the vehicle D. Thereby, it is achieved that the second user B can use the vehicle D under the use restriction conditions set on the vehicle D.
According to the technical scheme of the embodiment, the sharing request message of the virtual key is generated by the first user side according to the user operation, the sharing request message comprises the identification information of the vehicle, the identification information of the second user side and the use limit information of the vehicle, the sharing request message is sent to the server, the server is requested to determine the virtual key pair for the second user side according to the sharing request message, the user virtual key in the virtual key pair is sent to the second user side according to the identification information of the second user side, and the vehicle virtual key in the virtual key pair and the use limit information of the vehicle are sent to the vehicle according to the identification information of the vehicle, so that the vehicle is controlled by the virtual key without the limitation of the number and carrying of the entity keys, and the safety, flexibility and convenience of vehicle control are improved.
Optionally, on the basis of the above technical solution, generating a sharing request message of the virtual key according to a user operation may specifically include: after the first user logs in the setting application program, the identification information of the vehicle selected or input by the first user on the interface of the setting application program is obtained. And acquiring account information of a second user login setting application program selected or input by the first user on the interface of the setting application program as identification information of the second user. And acquiring the use limit information set by the first user for the vehicle on the interface of the setting application program. And generating a sharing request message of the virtual key based on the identification information of the vehicle, the identification information of the second user terminal and the use limit information of the vehicle.
Optionally, on the basis of the above technical solution, the method may further include: and when the user virtual key in the virtual key pair is sent to the second user side according to the identification information of the second user side, the use limit information of the vehicle is sent to the second user side.
It should be noted that, in this embodiment, the meanings and roles of the identification information of the vehicle, the identification information of the second user, and the usage restriction information of the vehicle are the same as those in the first embodiment, and detailed description thereof is omitted here.
Fig. 5b is a flowchart of another virtual key sharing method according to the fifth embodiment of the present invention. As shown in fig. 5b, the method specifically includes the following steps:
step 530, after the first user logs in the setting application program, acquiring the identification information of the vehicle selected or input by the first user on the interface of the setting application program.
And 540, acquiring account information of the second user login setting application program selected or input by the first user on the interface of the setting application program, and taking the account information as the identification information of the second user side.
And step 550, acquiring the use limit information set by the first user for the vehicle on the interface of the setting application program.
Step 560, generating a sharing request message of the virtual key based on the identification information of the vehicle, the identification information of the second user, and the use restriction information of the vehicle.
Step 570, sending the sharing request message to the server, so as to request the server to determine a virtual key pair for the second user according to the sharing request message, and sending the user virtual key and the usage restriction information in the virtual key pair to the second user according to the identification information of the second user, and sending the vehicle virtual key and the usage restriction information in the virtual key pair to the vehicle according to the identification information of the vehicle.
In the technical solution of this embodiment, a sharing request message of a virtual key is generated by a first user end according to a user operation, the sharing request message includes identification information of a vehicle, identification information of a second user end, and usage restriction information of the vehicle, the sharing request message is sent to a server, the request server determines a virtual key pair for the second user end according to the sharing request message, and sends the user virtual key in the virtual key pair and the use limit information of the vehicle to the second user end according to the identification information of the second user end, and, the vehicle virtual key in the virtual key pair and the use limit information of the vehicle are sent to the vehicle according to the identification information of the vehicle, so that the control of the vehicle by using the virtual key is realized, and the number and carrying of the physical keys are not limited, so that the safety, flexibility and convenience of vehicle control are improved.
EXAMPLE six
Fig. 6a is a flowchart of a virtual key sharing method according to a sixth embodiment of the present invention, where the present embodiment is applicable to a case where a virtual key is used to Control a vehicle, the method may be executed by a virtual key sharing device, the device may be implemented in software and/or hardware, and the device may be configured in a vehicle Control end, such as an Electronic Control Unit (ECU) of the vehicle. As shown in fig. 6a, the method specifically includes the following steps:
and step 610, receiving and saving the vehicle virtual key determined for the vehicle and the use limit information of the vehicle, which are sent by the first user terminal or the server.
Step 620, when a vehicle control instruction sent by a second user end is received, matching a user virtual key in the vehicle control instruction with a stored vehicle virtual key, wherein the vehicle virtual key and the user virtual key initiate a determined virtual key pair for the first user end; determining whether to execute a vehicle control instruction according to the matching result; and restricting the use of the vehicle by the second user terminal based on the use restriction information.
In the embodiment of the invention, at the vehicle control end, the vehicle virtual key determined for the vehicle and the use limit information of the vehicle, which are sent by the first user end or the service end, can be received and saved, wherein the vehicle virtual key can be used for matching with the user virtual key. When the vehicle control end receives a vehicle control instruction sent by the second user end, the user virtual key in the vehicle control instruction can be matched with the stored vehicle virtual key, and whether the vehicle control instruction is executed or not is determined according to a matching result, wherein the vehicle control instruction can indicate that the second user needs to start the vehicle at present, the vehicle control instruction specifically comprises the user virtual key and a vehicle operation instruction, and the vehicle virtual key and the user virtual key are a virtual key pair determined by the first user end. If the user virtual key in the vehicle control command is matched with the stored vehicle virtual key, it can be said that the second user can use the vehicle, and further, the vehicle control end can execute the vehicle control command, such as opening the vehicle door. On the contrary, if the user virtual key in the vehicle control command is not matched with the stored vehicle virtual key, it may indicate that the second user cannot use the vehicle temporarily, and further, the vehicle control terminal does not execute the vehicle control command any more. Furthermore, the vehicle control end may restrict the use of the vehicle by the second user end according to the use restriction information of the vehicle. It should be noted that, the vehicle control end limits the use of the vehicle by the second user end according to the use limit information of the vehicle, which may be specifically executed after the vehicle control instruction is executed and/or during the process that the vehicle control end determines whether the vehicle control instruction can be executed, for example, when the vehicle control end determines that the user virtual key in the vehicle unlock instruction matches the saved vehicle virtual key, it further determines whether the current time is within the allowed use time range according to the use time limit information in the use limit information, if the current time is within the allowed use time range, the vehicle unlock instruction is executed, otherwise, the vehicle unlock instruction is not executed. And when the vehicle control end judges that the user virtual key in the vehicle opening instruction is not matched with the stored vehicle virtual key, the vehicle opening instruction is not executed. After the vehicle control end executes the vehicle opening command, the function limitation can be carried out in the use process of the vehicle by the second user end according to the function use limitation information in the use limitation information.
According to the technical scheme of the embodiment, the vehicle control end receives and stores the vehicle virtual key determined for the vehicle and the use limit information of the vehicle, which are sent by the first user end or the server, when the vehicle control instruction sent by the second user end is received, the user virtual key in the vehicle control instruction is matched with the stored vehicle virtual key, the vehicle virtual key and the user virtual key initiate the determined virtual key pair for the first user end, whether the vehicle control instruction is executed or not is determined according to the matching result, the use of the vehicle by the second user end is limited based on the use limit information, the vehicle is controlled by the virtual key, the number and carrying of the entity keys are not limited, and the safety, flexibility and convenience of vehicle control are improved.
Optionally, on the basis of the above technical solution, the usage restriction information may specifically include: usage time limitation information and/or functional usage limitation information.
Optionally, on the basis of the above technical solution, the function use restriction information may specifically include: at least one of the traveling speed-related restriction information, the DSC function-related restriction information, and the powertrain performance-related restriction information.
Optionally, on the basis of the above technical solution, when receiving and storing the vehicle virtual key and the vehicle usage restriction information that are sent by the first user terminal or the server and determined for the vehicle, the method may further include: and receiving vehicle configuration information set by the second user end aiming at the vehicle. And setting hardware and/or software for the vehicle according to the vehicle configuration information when the second user end uses the vehicle.
In the embodiment of the invention, the vehicle control end can receive and store the vehicle virtual key determined for the vehicle and the use limit information of the vehicle sent by the first user end or the server, and can also receive the vehicle configuration information set by the second user end for the vehicle, and when the second user end uses the vehicle, the vehicle control end can set the hardware and/or software of the vehicle according to the vehicle configuration information so as to meet the use requirement of the second user. Wherein the vehicle configuration information may be used to provide the second user with a vehicle configuration that conforms to their personal usage habits and personal physical conditions when using the vehicle. The vehicle configuration information may specifically include: at least one of seat configuration information, music configuration information, and light configuration information.
It should be noted that, in the above embodiments (i.e., the first embodiment, the second embodiment, the fourth embodiment and the fifth embodiment) relating to the determination of the virtual key pair by the server, if necessary, the vehicle configuration information is sent to the vehicle, wherein the vehicle configuration information is specifically sent to the vehicle by the server together with the vehicle virtual key and the usage restriction information of the vehicle. More specifically, the generation of the vehicle configuration information may be realized by a second user in a manner of selecting or inputting an interface of a setting application after logging in the setting application, the second user sends the vehicle configuration information set for the vehicle to the server, and the server receives and stores the vehicle configuration information so that the vehicle configuration information can be sent to the vehicle when the vehicle configuration information needs to be used subsequently.
It should be further noted that, in this embodiment, the meanings and the functions of the vehicle use restriction information and the vehicle configuration information are the same as those in the first embodiment, and detailed description thereof is omitted.
Fig. 6b is a flowchart of another virtual key sharing method according to a sixth embodiment of the present invention. As shown in fig. 6b, the method specifically includes the following steps:
step 630, receiving and saving the vehicle virtual key and the vehicle use restriction information determined for the vehicle and sent by the first user side or the server, and receiving the vehicle configuration information set for the vehicle by the second user side.
And step 640, when a vehicle control instruction sent by the second user end is received, matching the user virtual key in the vehicle control instruction with a stored vehicle virtual key, wherein the vehicle virtual key and the user virtual key initiate a determined virtual key pair for the first user end.
Step 650, judging whether the user virtual key is matched with the vehicle virtual key; if yes, go to step 660; if not, go to step 670.
And 660, setting hardware and/or software for the vehicle according to the vehicle configuration information, executing the vehicle control instruction, and limiting the use of the vehicle by the second user side according to the use limiting information.
And step 670, not executing the vehicle control command.
According to the technical scheme of the embodiment, the vehicle control end receives and stores the vehicle virtual key determined for the vehicle and the use limit information of the vehicle, which are sent by the first user end or the server, when the vehicle control instruction sent by the second user end is received, the user virtual key in the vehicle control instruction is matched with the stored vehicle virtual key, the vehicle virtual key and the user virtual key initiate the determined virtual key pair for the first user end, whether the vehicle control instruction is executed or not is determined according to the matching result, the use of the vehicle by the second user end is limited based on the use limit information, the vehicle is controlled by the virtual key, the number and carrying of the entity keys are not limited, and the safety, flexibility and convenience of vehicle control are improved.
EXAMPLE seven
Fig. 7a is a signaling diagram of a virtual key sharing method according to a seventh embodiment of the present invention, and the application scenario shown in fig. 4a can be understood by referring to the signaling diagram.
In the virtual key sharing method provided by the embodiment of the invention, after a first user logs in a set application program, a first user terminal acquires identification information of a vehicle selected or input by the first user on a set application program interface, acquires account information of a second user logged in the set application program selected or input by the first user on the set application program interface, and uses the account information as identification information of the second user terminal, acquires use limit information set by the first user on the set application program interface aiming at the vehicle, generates a sharing request message of a virtual key based on the identification information of the vehicle, the identification information of the second user and the use limit information of the vehicle, generates or selects a virtual key pair for the second user terminal locally according to the sharing request message, and sends a user virtual key and the use limit information in the virtual key pair to the second user terminal according to the identification information of the second user terminal, and transmitting the vehicle virtual key and the use restriction information in the virtual key pair to the vehicle according to the identification information of the vehicle. And the second user side sends the vehicle configuration information set aiming at the vehicle to the vehicle control side, and sends the vehicle control command to the vehicle control side, the vehicle control side judges whether the virtual key of the user is matched with the virtual key of the vehicle, if the virtual key of the user is matched with the virtual key of the vehicle, the hardware and/or software setting is carried out on the vehicle according to the vehicle configuration information, the vehicle control command is executed, and the use of the vehicle by the second user side is limited according to the use limiting information.
In the process, the second user end can use the matched vehicle through the virtual key without being limited by the number and carrying of the physical keys, and the use of the vehicle by the second user end is controlled. Thus, the safety, flexibility and convenience of vehicle control are improved.
Fig. 7b is a signaling diagram of another virtual key sharing method according to a seventh embodiment of the present invention, and the application scenario shown in fig. 4c can be understood by combining the signaling diagram.
According to the virtual key sharing method provided by the embodiment of the invention, after a first user logs in a set application program, a first user side acquires identification information of a vehicle selected or input by the first user on a set application program interface, acquires account information of a second user logged in the set application program selected or input by the first user on the set application program interface, and uses the account information as identification information of the second user side, acquires use limit information set by the first user on the set application program interface aiming at the vehicle, generates a sharing request message of a virtual key based on the identification information of the vehicle, the identification information of the second user and the use limit information of the vehicle, and sends the sharing request message to a server. And the second user side acquires the vehicle configuration information selected or input by the second user on the interface of the setting application program after the second user logs in the setting application program, and sends the vehicle configuration information to the server. The server determines a virtual key pair for the second user end according to the received sharing request message, sends the user virtual key in the virtual key pair and the use limit information of the vehicle to the second user end according to the identification information of the second user end, and sends the vehicle virtual key, the use limit information and the vehicle configuration information in the virtual key pair to the vehicle according to the identification information of the vehicle. And the second user side sends the vehicle control instruction to the vehicle control side, the vehicle control side judges whether the virtual key of the user is matched with the virtual key of the vehicle, if so, the vehicle control side sets hardware and/or software for the vehicle according to the vehicle configuration information, executes the vehicle control instruction, and limits the use of the vehicle by the second user side according to the use limit information.
In the process, the second user end can use the matched vehicle through the virtual key without being limited by the number and carrying of the physical keys, and the use of the vehicle by the second user end is controlled. Thus, the safety, flexibility and convenience of vehicle control are improved.
Example eight
Fig. 8 is a schematic structural diagram of a virtual key sharing device according to an eighth embodiment of the present invention, where this embodiment is applicable to a case where a virtual key is used to control a vehicle, the device may be implemented in a software and/or hardware manner, and the device may be configured in a server, such as a computer. As shown in fig. 8, the apparatus specifically includes:
the virtual key pair determining module 810 is configured to receive a sharing request message of a virtual key initiated by a first user, and determine a virtual key pair for a second user, where the sharing request message includes identification information of a vehicle, identification information of the second user, and usage restriction information of the vehicle.
A virtual key pair sending module 820, configured to send the user virtual key in the virtual key pair to the second user end according to the identification information of the second user end; and transmitting the vehicle virtual key and the use restriction information in the virtual key pair to the vehicle according to the identification information of the vehicle, wherein the user virtual key is matched with the vehicle virtual key.
According to the technical scheme of the embodiment, the server receives a sharing request message of the virtual key initiated by the first user end to determine the virtual key pair for the second user end, the sharing request message comprises identification information of a vehicle, identification information of the second user end and use limitation information of the vehicle, the user virtual key in the virtual key pair is sent to the second user end according to the identification information of the second user end, the vehicle virtual key and the use limitation information in the virtual key pair are sent to the vehicle according to the identification information of the vehicle, the user virtual key is matched with the vehicle virtual key, the vehicle is controlled by the virtual key without being limited by the number and carrying of the entity keys, and therefore safety, flexibility and convenience of vehicle control are improved.
Optionally, on the basis of the above technical solution, the usage restriction information may specifically include: usage time limitation information and/or functional usage limitation information.
Optionally, on the basis of the above technical solution, the function use restriction information may specifically include: at least one of the traveling speed-related restriction information, the DSC function-related restriction information, and the powertrain performance-related restriction information.
Optionally, on the basis of the above technical solution, the virtual key pair sending module 820 may be further specifically configured to:
and when the user virtual key in the virtual key pair is sent to the second user terminal, the use limit information is sent to the second user terminal.
Optionally, on the basis of the above technical solution, the apparatus may further include:
and the vehicle configuration information acquisition module is used for acquiring the vehicle configuration information of the vehicle corresponding to the second user side based on the identification information of the second user side.
And the vehicle configuration information sending module is used for sending the vehicle configuration information to the vehicle when the vehicle virtual key and the use limit information in the virtual key pair are sent to the vehicle according to the identification information of the vehicle.
Optionally, on the basis of the above technical solution, the vehicle configuration information may specifically include: at least one of seat configuration information, music configuration information, and light configuration information.
The virtual key sharing device configured in the device according to the embodiment of the present invention can execute the virtual key sharing method applied to the device according to any embodiment of the present invention, and has functional modules corresponding to the execution method and advantageous effects.
Example nine
Fig. 9 is a schematic structural diagram of a virtual key sharing device according to a ninth embodiment of the present invention, where the virtual key sharing device is applicable to a situation where a vehicle is controlled by a virtual key, the virtual key sharing device may be implemented in a software and/or hardware manner, and the virtual key sharing device may be configured in a first user end, such as a mobile phone and/or a tablet computer. As shown in fig. 9, the apparatus specifically includes:
a sharing request message generating module 910, configured to generate a sharing request message of the virtual key according to a user operation, where the sharing request message includes identification information of the vehicle, identification information of the second user, and usage restriction information of the vehicle.
The virtual key pair sending module 920 is configured to determine a virtual key pair for the second user end according to the sharing request message, send the user virtual key in the virtual key pair to the second user end according to the identification information of the second user end, and send the vehicle virtual key in the virtual key pair and the use restriction information of the vehicle to the vehicle according to the identification information of the vehicle, where the user virtual key is matched with the vehicle virtual key.
According to the technical scheme of the embodiment, the sharing request message of the virtual key is generated by the first user side according to the user operation, the sharing request message comprises the identification information of the vehicle, the identification information of the second user side and the use limit information of the vehicle, the virtual key pair is determined for the second user side according to the sharing request message, the user virtual key in the virtual key pair is sent to the second user side according to the identification information of the second user side, the vehicle virtual key in the virtual key pair and the use limit information of the vehicle are sent to the vehicle according to the identification information of the vehicle, the user virtual key is matched with the vehicle virtual key, the vehicle is controlled by the virtual key without the limitation of the number and carrying of the entity keys, and therefore the safety, flexibility and convenience of vehicle control are improved.
Optionally, on the basis of the foregoing technical solution, the virtual key pair sending module 920 may specifically include:
and the virtual key pair first sending unit is used for sending the sharing request message to the server so as to request the server to determine a virtual key pair for the second user end according to the sharing request message, sending the user virtual key in the virtual key pair to the second user end according to the identification information of the second user end, and sending the vehicle virtual key in the virtual key pair and the use limit information of the vehicle to the vehicle according to the identification information of the vehicle.
Optionally, on the basis of the foregoing technical solution, the virtual key pair sending module 920 may specifically include:
and the virtual key pair generating unit is used for generating or selecting a virtual key pair for the second user side locally at the first user side according to the sharing request message.
And the second virtual key pair sending unit is used for sending the user virtual key in the virtual key pair to the second user side according to the identification information of the second user side based on the wireless communication channel of the first user side and the second user side or forwarding through the server, and sending the vehicle virtual key in the virtual key pair and the use limit information of the vehicle to the vehicle according to the identification information of the vehicle.
Optionally, on the basis of the above technical solution, the sharing request message generating module 910 may specifically include:
and the identification information generating unit of the vehicle is used for acquiring the identification information of the vehicle selected or input by the first user on the interface of the setting application program after the first user logs in the setting application program.
And the identification information generating unit of the second user side is used for acquiring the account information of the second user login setting application program selected or input by the first user on the interface of the setting application program as the identification information of the second user side.
And the use limit information generating unit of the vehicle is used for acquiring the use limit information set by the first user for the vehicle on the interface of the setting application program.
And a sharing request message generation unit for generating a sharing request message of the virtual key based on the identification information of the vehicle, the identification information of the second user terminal, and the use restriction information.
The virtual key sharing device configured in the device according to the embodiment of the present invention can execute the virtual key sharing method applied to the device according to any embodiment of the present invention, and has functional modules corresponding to the execution method and advantageous effects.
Example ten
Fig. 10 is a schematic structural diagram of a virtual key sharing device according to a tenth embodiment of the present invention, where the present embodiment is applicable to a case where a vehicle is controlled by using a virtual key, the device may be implemented in a software and/or hardware manner, and the device may be configured in a vehicle control end, such as an ECU. As shown in fig. 10, the apparatus specifically includes:
the vehicle receiving module 1100 is configured to receive and store the vehicle virtual key determined for the vehicle and the vehicle usage restriction information sent by the first user or the server.
The vehicle control module 1200 is configured to, when a vehicle control instruction sent by a second user is received, match a user virtual key in the vehicle control instruction with a stored vehicle virtual key, where the vehicle virtual key and the user virtual key initiate a certain virtual key pair for the first user; determining whether to execute a vehicle control instruction according to the matching result; and restricting the use of the vehicle by the second user terminal based on the use restriction information.
According to the technical scheme of the embodiment, the vehicle control end receives and stores the vehicle virtual key determined for the vehicle and the use limit information of the vehicle, which are sent by the first user end or the server, when the vehicle control instruction sent by the second user end is received, the user virtual key in the vehicle control instruction is matched with the stored vehicle virtual key, the vehicle virtual key and the user virtual key initiate the determined virtual key pair for the first user end, whether the vehicle control instruction is executed or not is determined according to the matching result, the use of the vehicle by the second user end is limited based on the use limit information, the vehicle is controlled by the virtual key, the number and carrying of the entity keys are not limited, and the safety, flexibility and convenience of vehicle control are improved.
Optionally, on the basis of the above technical solution, the usage restriction information may specifically include: usage time limitation information and/or functional usage limitation information.
Optionally, on the basis of the above technical solution, the function use restriction information may specifically include: at least one of the traveling speed-related restriction information, the DSC function-related restriction information, and the powertrain performance-related restriction information.
Optionally, on the basis of the above technical solution, the vehicle receiving module 1100 may be further specifically configured to:
and receiving vehicle configuration information set by the second user end aiming at the vehicle.
And setting hardware and/or software for the vehicle according to the vehicle configuration information when the second user end uses the vehicle.
The virtual key sharing device configured in the device according to the embodiment of the present invention can execute the virtual key sharing method applied to the device according to any embodiment of the present invention, and has functional modules corresponding to the execution method and advantageous effects.
EXAMPLE eleven
Fig. 11 is a schematic structural diagram of an electronic device according to an eleventh embodiment of the present invention. FIG. 11 illustrates a block diagram of an exemplary electronic device 612 suitable for use in implementing embodiments of the present invention. The electronic device 612 shown in fig. 11 is only an example and should not bring any limitations to the function and the scope of use of the embodiments of the present invention.
As shown in fig. 11, the electronic device 612 is in the form of a general purpose computing device. The components of the electronic device 612 may include, but are not limited to: one or more processors 616, a system memory 628, and a bus 618 that couples the various system components including the system memory 628 and the processors 616.
Bus 618 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
The electronic device 612 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by mobile terminal 612 and includes both volatile and nonvolatile media, removable and non-removable media.
The system memory 628 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)630 and/or cache memory 632. The electronic device 612 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 634 may be used to read from or write to non-removable, nonvolatile magnetic media (not shown in FIG. 11, and commonly referred to as a "hard drive"). Although not shown in FIG. 11, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In such cases, each drive may be connected to bus 618 by one or more data media interfaces. Memory 628 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
A program/utility 640 having a set (at least one) of program modules 642 may be stored, for example, in memory 628, such program modules 642 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. The program modules 642 generally perform the functions and/or methods of the described embodiments of the present invention.
The electronic device 612 may also communicate with one or more external devices 614 (e.g., keyboard, pointing device, display 624, etc.), with one or more devices that enable a user to interact with the electronic device 612, and/or with any devices (e.g., network card, modem, etc.) that enable the electronic device 612 to communicate with one or more other computing devices. Such communication may occur via input/output (I/O) interfaces 622. Also, the electronic device 612 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the internet) via the network adapter 620. As shown, the network adapter 620 communicates with the other modules of the device 612 via the bus 618. It should be appreciated that although not shown in FIG. 6, other hardware and/or software modules may be used in conjunction with the electronic device 612, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processor 616 executes various functional applications and data processing by executing programs stored in the system memory 628, for example, implementing a virtual key sharing method applied to a server according to an embodiment of the present invention, the method including:
receiving a sharing request message of a virtual key initiated by a first user end, and determining a virtual key pair for a second user end, wherein the sharing request message comprises identification information of a vehicle, identification information of the second user end and use limit information of the vehicle;
sending the user virtual key in the virtual key pair to the second user side according to the identification information of the second user side; and transmitting the vehicle virtual key and the use restriction information in the virtual key pair to the vehicle according to the identification information of the vehicle, wherein the user virtual key is matched with the vehicle virtual key.
An embodiment of the present invention further provides another electronic device, which includes: one or more processors; a memory for storing one or more programs; when the one or more programs are executed by the one or more processors, the one or more processors implement the virtual key sharing method applied to the first user side according to the embodiment of the present invention, where the method includes:
generating a sharing request message of the virtual key according to the user operation, wherein the sharing request message comprises identification information of the vehicle, identification information of a second user end and use limit information of the vehicle;
determining a virtual key pair for the second user side according to the sharing request message, sending a user virtual key in the virtual key pair to the second user side according to the identification information of the second user side, and sending a vehicle virtual key in the virtual key pair and the use limit information of the vehicle to the vehicle according to the identification information of the vehicle; or sending the sharing request message to the server to request the server to determine a virtual key pair for the second user side according to the sharing request message, sending the user virtual key in the virtual key pair to the second user side according to the identification information of the second user side, and sending the vehicle virtual key in the virtual key pair and the use limit information of the vehicle to the vehicle according to the identification information of the vehicle, wherein the user virtual key is matched with the vehicle virtual key.
An embodiment of the present invention further provides another electronic device, which includes: one or more processors; a memory for storing one or more programs; when the one or more programs are executed by the one or more processors, the one or more processors implement the virtual key sharing method applied to the vehicle control end, which is provided by the embodiment of the invention, and the method includes:
receiving and storing a vehicle virtual key determined for a vehicle and use limit information of the vehicle, which are sent by a first user terminal or a server;
when a vehicle control instruction sent by a second user end is received, matching a user virtual key in the vehicle control instruction with a stored vehicle virtual key, wherein the vehicle virtual key and the user virtual key initiate a determined virtual key pair for the first user end; determining whether to execute a vehicle control instruction according to the matching result; and the number of the first and second groups,
and limiting the use of the vehicle by the second user terminal based on the use limiting information.
Of course, those skilled in the art will understand that the processor may also implement the technical solution of the virtual key sharing method applied to the server, the first user terminal, or the vehicle control terminal according to any embodiment of the present invention. The hardware structure and functions of the server, the first user side or the vehicle control side can be explained with reference to the content of the eleventh embodiment.
Example twelve
An twelfth embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements a virtual key sharing method applied to a server according to an embodiment of the present invention, where the method includes:
receiving a sharing request message of a virtual key initiated by a first user end, and determining a virtual key pair for a second user end, wherein the sharing request message comprises identification information of a vehicle, identification information of the second user end and use limit information of the vehicle;
sending the user virtual key in the virtual key pair to the second user side according to the identification information of the second user side; and transmitting the vehicle virtual key and the use restriction information in the virtual key pair to the vehicle according to the identification information of the vehicle, wherein the user virtual key is matched with the vehicle virtual key.
Computer storage media for embodiments of the invention may employ any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
An embodiment of the present invention further provides another computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements a virtual key sharing method applied to a first user end, where the method includes:
and generating a sharing request message of the virtual key according to the user operation, wherein the sharing request message comprises the identification information of the vehicle, the identification information of the second user side and the use limit information of the vehicle.
Determining a virtual key pair for the second user side according to the sharing request message, sending a user virtual key in the virtual key pair to the second user side according to the identification information of the second user side, and sending a vehicle virtual key in the virtual key pair and the use limit information of the vehicle to the vehicle according to the identification information of the vehicle; or sending the sharing request message to the server to request the server to determine a virtual key pair for the second user side according to the sharing request message, sending the user virtual key in the virtual key pair to the second user side according to the identification information of the second user side, and sending the vehicle virtual key in the virtual key pair and the use limit information of the vehicle to the vehicle according to the identification information of the vehicle, wherein the user virtual key is matched with the vehicle virtual key.
Embodiments of the present invention also provide another computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements a virtual key sharing method applied to a vehicle control end, where the method includes:
receiving and storing a vehicle virtual key determined for a vehicle and use limit information of the vehicle, which are sent by a first user terminal or a server;
when a vehicle control instruction sent by a second user end is received, matching a user virtual key in the vehicle control instruction with a stored vehicle virtual key, wherein the vehicle virtual key and the user virtual key initiate a determined virtual key pair for the first user end; determining whether to execute a vehicle control instruction according to the matching result; and the number of the first and second groups,
and limiting the use of the vehicle by the second user terminal based on the use limiting information.
Of course, the embodiment of the present invention provides a storage medium containing computer-readable instructions, and the computer-executable instructions are not limited to the operations of the method described above, and may also perform related operations in a virtual key sharing method applied to a server, a first user terminal or a vehicle control terminal provided in any embodiment of the present invention. The description of the storage medium is explained with reference to the twelfth embodiment.
EXAMPLE thirteen
An embodiment of the present invention provides a virtual key sharing system, including:
the system comprises a first user terminal, a second user terminal and a server, wherein the first user terminal is used for generating a sharing request message of a virtual key according to user operation, and the sharing request message comprises identification information of a vehicle, identification information of the second user terminal and use limit information of the vehicle; sending the sharing request message to a server;
the server is used for receiving the sharing request message and determining a virtual key pair for the second user terminal; sending the user virtual key in the virtual key pair to the second user terminal according to the identification information of the second user terminal; and transmitting the vehicle virtual key in the virtual key pair and the use restriction information to the vehicle according to the identification information of the vehicle, wherein the user virtual key is matched with the vehicle virtual key;
a vehicle control unit for receiving and storing the vehicle virtual key and the use restriction information of the vehicle; when a vehicle control instruction sent by a second user side is received, matching a user virtual key in the vehicle control instruction with a stored vehicle virtual key, and determining whether to execute the vehicle control instruction according to a matching result; and limiting the use of the vehicle by the second user terminal based on the use limitation information.
Example fourteen
An embodiment of the present invention provides another virtual key sharing system, including:
the system comprises a first user terminal, a second user terminal and a server, wherein the first user terminal is used for generating a sharing request message of a virtual key according to user operation, and the sharing request message comprises identification information of a vehicle, identification information of the second user terminal and use limit information of the vehicle; determining a virtual key pair for a second user end according to the sharing request message, sending a user virtual key in the virtual key pair to the second user end according to the identification information of the second user end, and sending a vehicle virtual key in the virtual key pair and the use limit information of the vehicle to the vehicle according to the identification information of the vehicle, wherein the user virtual key is matched with the vehicle virtual key;
a vehicle control unit for receiving and storing the vehicle virtual key and the use restriction information of the vehicle; when a vehicle control instruction sent by a second user side is received, matching a user virtual key in the vehicle control instruction with a stored vehicle virtual key, and determining whether to execute the vehicle control instruction according to a matching result; and limiting the use of the vehicle by the second user terminal based on the use limitation information.
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (22)

1. A virtual key sharing method is applied to a server, and comprises the following steps:
receiving a sharing request message of a virtual key initiated by a first user end, and determining a virtual key pair for a second user end, wherein the sharing request message comprises identification information of a vehicle, identification information of the second user end and use limit information of the vehicle;
sending the user virtual key in the virtual key pair to the second user terminal according to the identification information of the second user terminal; and sending the vehicle virtual key in the virtual key pair and the use limit information to the vehicle according to the identification information of the vehicle, wherein the user virtual key is matched with the vehicle virtual key.
2. The method of claim 1, wherein the usage restriction information comprises: usage time limitation information and/or functional usage limitation information.
3. The method of claim 2, wherein the function usage restriction information comprises: at least one of the traveling speed-related limit information, the dynamic stability control DSC function-related limit information, and the powertrain performance-related limit information.
4. The method of claim 1, further comprising:
and when the user virtual key in the virtual key pair is sent to the second user terminal, sending the use limit information to the second user terminal.
5. The method according to any one of claims 1-4, further comprising:
acquiring vehicle configuration information of the vehicle corresponding to the second user side based on the identification information of the second user side;
and when the vehicle virtual key in the virtual key pair and the use limit information are sent to the vehicle according to the identification information of the vehicle, sending the vehicle configuration information to the vehicle.
6. The method of claim 5, wherein the vehicle configuration information comprises:
at least one of seat configuration information, music configuration information, and light configuration information.
7. A virtual key sharing method is applied to a first user side, and comprises the following steps:
generating a sharing request message of the virtual key according to user operation, wherein the sharing request message comprises identification information of a vehicle, identification information of a second user end and use limit information of the vehicle;
determining a virtual key pair for a second user end according to the sharing request message, sending a user virtual key in the virtual key pair to the second user end according to the identification information of the second user end, and sending a vehicle virtual key in the virtual key pair and the use limit information of the vehicle to the vehicle according to the identification information of the vehicle, wherein the user virtual key is matched with the vehicle virtual key.
8. The method of claim 7, wherein determining a virtual key pair for a second user according to the sharing request message, and sending a user virtual key of the virtual key pair to the second user according to identification information of the second user, and sending a vehicle virtual key of the virtual key pair and usage restriction information of the vehicle to the vehicle according to identification information of the vehicle comprises:
and sending the sharing request message to a server to request the server to determine a virtual key pair for a second user end according to the sharing request message, sending a user virtual key in the virtual key pair to the second user end according to the identification information of the second user end, and sending a vehicle virtual key in the virtual key pair and the use limit information of the vehicle to the vehicle according to the identification information of the vehicle.
9. The method of claim 7, wherein determining a virtual key pair for a second user according to the sharing request message, and sending a user virtual key of the virtual key pair to the second user according to identification information of the second user, and sending a vehicle virtual key of the virtual key pair and usage restriction information of the vehicle to the vehicle according to identification information of the vehicle comprises:
generating or selecting the virtual key pair for the second user terminal locally at the first user terminal according to the sharing request message;
and based on the wireless communication channels of the first user terminal and the second user terminal or through server forwarding, sending the user virtual key in the virtual key pair to the second user terminal according to the identification information of the second user terminal, and sending the vehicle virtual key in the virtual key pair and the use limit information of the vehicle to the vehicle according to the identification information of the vehicle.
10. The method according to claim 7, wherein generating the sharing request message of the virtual key according to the user operation comprises:
after a first user logs in a setting application program, acquiring identification information of a vehicle selected or input by the first user on an interface of the setting application program;
acquiring account information of a second user logging in the set application program selected or input by the first user on the interface of the set application program, wherein the account information is used as identification information of the second user side;
acquiring use limit information set by a first user for the vehicle on an interface of the setting application program;
and generating a sharing request message of the virtual key based on the identification information of the vehicle, the identification information of the second user terminal and the use restriction information.
11. A virtual key sharing method is applied to a vehicle control end, and comprises the following steps:
receiving and storing a vehicle virtual key determined for a vehicle and use limit information of the vehicle, which are sent by a first user terminal or a server;
when a vehicle control instruction sent by a second user end is received, matching a user virtual key in the vehicle control instruction with a stored vehicle virtual key, wherein the vehicle virtual key and the user virtual key initiate a determined virtual key pair for the first user end; determining whether to execute the vehicle control instruction according to a matching result; and the number of the first and second groups,
and limiting the use of the vehicle by the second user end based on the use limitation information.
12. The method of claim 11, wherein the usage restriction information comprises: usage time limitation information and/or functional usage limitation information.
13. The method of claim 12, wherein the function usage restriction information comprises: at least one of the traveling speed-related limit information, the dynamic stability control DSC function-related limit information, and the powertrain performance-related limit information.
14. The method according to any one of claims 11-13, wherein receiving and storing the vehicle virtual key and the vehicle usage restriction information sent by the first client or the server for the vehicle, further comprises:
receiving vehicle configuration information set by the second user terminal aiming at the vehicle;
and setting hardware and/or software of the vehicle according to the vehicle configuration information when the vehicle is used by the second user end.
15. A virtual key sharing apparatus applied to a server, the apparatus comprising:
the virtual key pair determining module is used for receiving a sharing request message of a virtual key initiated by a first user end and determining a virtual key pair for a second user end, wherein the sharing request message comprises identification information of a vehicle, identification information of the second user end and use limit information of the vehicle;
a virtual key pair sending module, configured to send a user virtual key in the virtual key pair to the second user end according to the identification information of the second user end; and sending the vehicle virtual key in the virtual key pair and the use limit information to the vehicle according to the identification information of the vehicle, wherein the user virtual key is matched with the vehicle virtual key.
16. A virtual key pair sharing apparatus, applied to a first user side, the apparatus comprising:
the sharing request message generating module is used for generating a sharing request message of the virtual key according to user operation, wherein the sharing request message comprises identification information of the vehicle, identification information of the second user end and use limit information of the vehicle;
and the virtual key pair sending module is used for determining a virtual key pair for a second user end according to the sharing request message, sending a user virtual key in the virtual key pair to the second user end according to the identification information of the second user end, and sending a vehicle virtual key in the virtual key pair and the use limit information of the vehicle to the vehicle according to the identification information of the vehicle, wherein the user virtual key is matched with the vehicle virtual key.
17. The apparatus of claim 16, wherein the virtual key pair sending module is configured to:
and sending the sharing request message to a server to request the server to determine a virtual key pair for a second user end according to the sharing request message, sending a user virtual key in the virtual key pair to the second user end according to the identification information of the second user end, and sending a vehicle virtual key in the virtual key pair and the use limit information of the vehicle to the vehicle according to the identification information of the vehicle.
18. A virtual key sharing apparatus applied to a vehicle control terminal, the apparatus comprising:
the vehicle receiving module is used for receiving and storing the vehicle virtual key determined for the vehicle and the use limit information of the vehicle, which are sent by the first user terminal or the server;
the vehicle control module is used for matching a user virtual key in a vehicle control instruction with a stored vehicle virtual key when the vehicle control instruction sent by a second user end is received, wherein the vehicle virtual key and the user virtual key initiate a determined virtual key pair for the first user end; determining whether to execute the vehicle control instruction according to a matching result; and the number of the first and second groups,
and limiting the use of the vehicle by the second user end based on the use limitation information.
19. An electronic device, characterized in that the device comprises:
one or more processors;
a memory for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-14.
20. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1 to 14.
21. A virtual key sharing system, the system comprising:
the system comprises a first user terminal, a second user terminal and a server, wherein the first user terminal is used for generating a sharing request message of a virtual key according to user operation, and the sharing request message comprises identification information of a vehicle, identification information of the second user terminal and use limit information of the vehicle; sending the sharing request message to a server;
the server is used for receiving the sharing request message and determining a virtual key pair for the second user terminal; sending the user virtual key in the virtual key pair to the second user terminal according to the identification information of the second user terminal; and transmitting the vehicle virtual key in the virtual key pair and the use restriction information to the vehicle according to the identification information of the vehicle, wherein the user virtual key is matched with the vehicle virtual key;
a vehicle for receiving and storing the vehicle virtual key and the use restriction information of the vehicle; when a vehicle control instruction sent by a second user side is received, matching a user virtual key in the vehicle control instruction with a stored vehicle virtual key, and determining whether to execute the vehicle control instruction according to a matching result; and limiting the use of the vehicle by the second user terminal based on the use limitation information.
22. A virtual key sharing system, the system comprising:
the system comprises a first user terminal, a second user terminal and a server, wherein the first user terminal is used for generating a sharing request message of a virtual key according to user operation, and the sharing request message comprises identification information of a vehicle, identification information of the second user terminal and use limit information of the vehicle; determining a virtual key pair for a second user end according to the sharing request message, sending a user virtual key in the virtual key pair to the second user end according to the identification information of the second user end, and sending a vehicle virtual key in the virtual key pair and the use limit information of the vehicle to the vehicle according to the identification information of the vehicle, wherein the user virtual key is matched with the vehicle virtual key;
a vehicle for receiving and storing the vehicle virtual key and the use restriction information of the vehicle; when a vehicle control instruction sent by a second user side is received, matching a user virtual key in the vehicle control instruction with a stored vehicle virtual key, and determining whether to execute the vehicle control instruction according to a matching result; and limiting the use of the vehicle by the second user terminal based on the use limitation information.
CN201811245979.3A 2018-10-24 2018-10-24 Virtual key sharing method, device, equipment, system and storage medium Pending CN111179470A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811245979.3A CN111179470A (en) 2018-10-24 2018-10-24 Virtual key sharing method, device, equipment, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811245979.3A CN111179470A (en) 2018-10-24 2018-10-24 Virtual key sharing method, device, equipment, system and storage medium

Publications (1)

Publication Number Publication Date
CN111179470A true CN111179470A (en) 2020-05-19

Family

ID=70645973

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811245979.3A Pending CN111179470A (en) 2018-10-24 2018-10-24 Virtual key sharing method, device, equipment, system and storage medium

Country Status (1)

Country Link
CN (1) CN111179470A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111429665A (en) * 2020-02-21 2020-07-17 浙江吉利控股集团有限公司 Vehicle sharing control method, device and equipment
CN112622821A (en) * 2020-12-25 2021-04-09 长城汽车股份有限公司 Vehicle control method, device and system and remote control key
WO2023137757A1 (en) * 2022-01-24 2023-07-27 Oppo广东移动通信有限公司 Digital vehicle key sharing method and apparatus, and device and storage medium
WO2024040564A1 (en) * 2022-08-26 2024-02-29 北京小米移动软件有限公司 Key sharing methods and apparatus, terminal, and computer readable storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104066629A (en) * 2012-02-27 2014-09-24 惠普发展公司,有限责任合伙企业 Method and system for vehicle personalization
US20150183398A1 (en) * 2012-07-02 2015-07-02 S.A. D'leteren N.V. Management System and Method for the Shared Use of Vehicles
CN105292048A (en) * 2014-07-17 2016-02-03 现代自动车株式会社 Sharing a key for a vehicle
CN105416209A (en) * 2015-12-07 2016-03-23 安徽江淮汽车股份有限公司 Vehicle-mounted system and method for automatically presetting user vehicle personalized configuration
CN106373235A (en) * 2016-08-31 2017-02-01 长城汽车股份有限公司 Authorization method and authorization system for virtual keys and server
CN107650863A (en) * 2017-09-19 2018-02-02 大陆汽车投资(上海)有限公司 Vehicle sharing method and system
CN108027989A (en) * 2015-06-12 2018-05-11 法拉姆股份有限公司 The system and method shared for vehicle

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104066629A (en) * 2012-02-27 2014-09-24 惠普发展公司,有限责任合伙企业 Method and system for vehicle personalization
US20150183398A1 (en) * 2012-07-02 2015-07-02 S.A. D'leteren N.V. Management System and Method for the Shared Use of Vehicles
CN105292048A (en) * 2014-07-17 2016-02-03 现代自动车株式会社 Sharing a key for a vehicle
CN108027989A (en) * 2015-06-12 2018-05-11 法拉姆股份有限公司 The system and method shared for vehicle
CN105416209A (en) * 2015-12-07 2016-03-23 安徽江淮汽车股份有限公司 Vehicle-mounted system and method for automatically presetting user vehicle personalized configuration
CN106373235A (en) * 2016-08-31 2017-02-01 长城汽车股份有限公司 Authorization method and authorization system for virtual keys and server
CN107650863A (en) * 2017-09-19 2018-02-02 大陆汽车投资(上海)有限公司 Vehicle sharing method and system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111429665A (en) * 2020-02-21 2020-07-17 浙江吉利控股集团有限公司 Vehicle sharing control method, device and equipment
CN112622821A (en) * 2020-12-25 2021-04-09 长城汽车股份有限公司 Vehicle control method, device and system and remote control key
CN112622821B (en) * 2020-12-25 2022-04-26 长城汽车股份有限公司 Vehicle control method, device and system and remote control key
WO2023137757A1 (en) * 2022-01-24 2023-07-27 Oppo广东移动通信有限公司 Digital vehicle key sharing method and apparatus, and device and storage medium
WO2024040564A1 (en) * 2022-08-26 2024-02-29 北京小米移动软件有限公司 Key sharing methods and apparatus, terminal, and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN111179470A (en) Virtual key sharing method, device, equipment, system and storage medium
EP3104584B1 (en) Data synchronization between an in-vehicle computing device and a mobile device
US9168896B2 (en) Vehicle driving control system and method
CN106059627B (en) Method for accelerated handoff between wireless carriers and in-vehicle computing system
US20140107864A1 (en) Vehicle central processing system integrated with a mobile device
US20170155720A1 (en) Electronic device and method for controlling a transport device thereof
CN109379403B (en) Control method and device of Internet of things equipment, server and terminal equipment
US20220398149A1 (en) Minimizing transport fuzzing reactions
US20190230206A1 (en) Extending mobile-to-vehicle apis to the cloud
WO2022150124A1 (en) Provisioning of external functionality to transports
WO2022134965A1 (en) Configuration method and device for computing resources
US20230276482A1 (en) Resource selection for 5g nr v2x communications
US20220038909A1 (en) Systems and methods for bluetooth authentication using communication fingerprinting
US11623540B2 (en) Transport recharge level determination
US20220300915A1 (en) Decommissioning transport batteries
US20190116255A1 (en) Systems and methods to aggregate vehicle data from infotainment application accessories
US20210316701A1 (en) System and method for identifying a driver of a vehicle after the vehicle has been started
US20230389095A1 (en) Enhanced wireless connectivity
US9954988B2 (en) Phone book synchronization control method and apparatus
US20240019262A1 (en) Vehicle data services configurable deployment
US20230382223A1 (en) Recommended vehicle-related functionality
US20240140264A1 (en) Automated vehicle battery health optimization
CN110223453A (en) Intelligent driving tool and its control method and shared leasing system
US20220191661A1 (en) Communication control device, mobile object, communication control method, and computer-readable storage medium
US20230276409A1 (en) Resource selection for 5g nr v2x pc5 mode 2

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200519