CN115700857B - Vehicle key sharing method of security chip and security chip device - Google Patents

Vehicle key sharing method of security chip and security chip device Download PDF

Info

Publication number
CN115700857B
CN115700857B CN202211498097.4A CN202211498097A CN115700857B CN 115700857 B CN115700857 B CN 115700857B CN 202211498097 A CN202211498097 A CN 202211498097A CN 115700857 B CN115700857 B CN 115700857B
Authority
CN
China
Prior art keywords
terminal
security chip
information
vehicle
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211498097.4A
Other languages
Chinese (zh)
Other versions
CN115700857A (en
Inventor
刘曼
张奇惠
王帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Wise Security Technology Co Ltd
Original Assignee
Guangzhou Wise Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Wise Security Technology Co Ltd filed Critical Guangzhou Wise Security Technology Co Ltd
Priority to CN202211498097.4A priority Critical patent/CN115700857B/en
Publication of CN115700857A publication Critical patent/CN115700857A/en
Application granted granted Critical
Publication of CN115700857B publication Critical patent/CN115700857B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The application discloses a vehicle key sharing method of a security chip, a security chip device, equipment and a medium, and belongs to the technical field of communication. The method comprises the following steps: the processing unit receives a vehicle key sharing request sent by a second terminal through a first terminal interaction unit; the processing unit verifies the request, and the first terminal interaction unit sends authority authentication information to the second terminal after passing the request; the second terminal displays a user information input box and inputs user human body characteristic information; the processing unit receives the information through the first terminal interaction unit, the identification unit identifies the information, and if the information is consistent with the user characteristic information prestored in the first security chip storage unit, the authority exists; the processing unit sends the vehicle key information through the first terminal interaction unit, and the vehicle key information is used for unlocking the automobile by the second terminal. According to the scheme, the remote sharing of the vehicle keys between the vehicle owners and the trusted non-vehicle owners can be realized, and the flexibility of sharing the vehicle keys is improved. The multiple authentication of the shared vehicle key is realized, and the safety of the shared vehicle key is improved.

Description

Vehicle key sharing method of security chip and security chip device
Technical Field
The application belongs to the technical field of communication, and particularly relates to a vehicle key sharing method of a security chip, a security chip device, equipment and a medium.
Background
At present, the global automobile market is walking into the full electrified era, not only is the power type changed, but also the intelligence of the automobile is continuously enhanced, and some intelligent functions are continuously developed. Nowadays, unlocking automobiles does not need to rely on traditional automobile keys, more and more automobile types begin to unlock automobiles by using digital keys, and meanwhile, the trouble of many automobile scenes is solved by the digital key sharing function. In this context, there is a study of security at the time of digital key sharing.
The sharing of the digital key is that the owner sends a key generation key authorization request to the cloud server through the owner mobile phone terminal; after receiving the key authorization request, the cloud server authorizes the vehicle related authority to the non-vehicle owner mobile phone terminal; the non-vehicle owner mobile phone terminal establishes communication connection with the mobile phone terminal, calibration is carried out, and after the calibration is passed, the starting operation of the vehicle can be carried out by using a key in the authorized time.
However, the technology of sharing the digital key can only be connected through bluetooth, the connection range of bluetooth is generally about 10m, and when owners of the vehicle and non-owners who want to use the digital key are not together, the digital key sharing can not be completed, and the technology is very inconvenient in actual sharing. And only the mobile phone number can be verified during authorization verification, and the risk of vehicle theft can occur if the mobile phone of the non-vehicle owner is lost. Therefore, how to enlarge the connection range so that the authorized non-vehicle owners can share the digital key when the non-vehicle owners and the vehicle owners are not in the same place; and the sharing of the digital key can be completed after the non-vehicle owner passes the authentication is a problem to be solved in the field.
Disclosure of Invention
The embodiment of the application provides a vehicle key sharing method of a security chip, a security chip device, equipment and a medium, and aims to solve the problems that in the prior art, a vehicle key cannot be shared remotely, and a verification mode is too simple, so that a user cannot use the vehicle key conveniently and the vehicle is easy to steal. By the vehicle key sharing method provided with the security chip, the vehicle key can be remotely shared by the vehicle owners and trusted non-vehicle owners, and the flexibility of sharing the vehicle key is improved. Meanwhile, multiple authentications are realized to share the vehicle key, so that the safety of sharing the vehicle key is improved.
In a first aspect, an embodiment of the present application provides a vehicle key sharing method of a security chip, where the method is performed by a first security chip, the first security chip is disposed on a first terminal, and the first terminal is connected to a second terminal; the second terminal is provided with a second security chip; the method comprises the following steps:
the processing unit receives a vehicle key sharing request sent by a second terminal through an interaction unit of the first terminal, wherein the sharing request comprises a second terminal ID and a second security chip ID;
the processing unit verifies the sharing request, and sends authority authentication information to a second terminal through an interaction unit of the first terminal after verification is passed; the authority authentication information is used for displaying a user information input box after the second terminal receives the authority authentication information so as to input human body characteristic information of a user;
The processing unit receives the human body characteristic information through the interaction unit of the first terminal, and identifies the human body characteristic information through the identification unit, and if the identification is consistent with the user characteristic information prestored in the storage unit of the first security chip, the existence authority is determined;
the processing unit sends out the vehicle key information through the interaction unit of the first terminal, and the vehicle key information is stored by the second security chip of the second terminal, so that the stored vehicle key information is called when the second terminal unlocks the vehicle.
Further, the processing unit verifies the sharing request, including:
the processing unit performs integrity check on the sharing request;
if the integrity check is passed, the sharing request is analyzed to obtain request authority information, a second terminal ID and a second security chip ID which are included in the sharing request;
carrying out relevance verification on the second terminal according to the second terminal ID; if the verification is passed, the second security chip ID is verified by the common key;
if the shared secret key exists, the shared request is determined to pass verification.
Further, performing relevance verification on the second terminal according to the second terminal ID, including:
Acquiring whether a preset condition is met between the second terminal and the first terminal; the preset conditions comprise at least one of Bluetooth connection, connection with a local area network and positioning result within a preset range;
and if the preset condition is met, determining that the relevance verification is passed.
Further, the verifying the second secure chip ID with the common key includes:
reading the second security chip ID;
determining whether the association relation between the first security chip ID and the second security chip ID exists in the security chip association relation table; the security chip association relation table is stored in a storage unit of the first security chip;
if so, reading a common secret key of the first security chip and the second security chip;
if not, determining that the first security chip and the second security chip do not have a common key.
Further, the request authority information comprises independent unlocking authorities and close unlocking authorities;
the close-range unlocking authority is used for unlocking authority which is provided when the second terminal and the first terminal are within a preset distance range.
Further, if the request permission information is an independent unlocking permission, sending permission authentication information to a second terminal through an interaction unit of the first terminal after verification is passed, including:
After verification, sending first-level authority authentication information to a second terminal through an interaction unit of the first terminal; the first-level authority authentication information comprises authentication information of a user face and/or a user fingerprint;
if the request permission information is a close-range unlocking permission, sending permission authentication information to a second terminal through an interaction unit of the first terminal after verification is passed, wherein the method comprises the following steps:
after verification, sending second-level authority authentication information to a second terminal through an interaction unit of the first terminal; the second-level authority authentication information comprises at least one of authentication information of a user face, a user fingerprint and an unlocking password.
In a second aspect, an embodiment of the present application provides a vehicle key sharing security chip device of a security chip, where the device is configured on a first security chip, the first security chip is disposed on a first terminal, and the first terminal is connected to a second terminal; the second terminal is provided with a second security chip; the device comprises:
the processing unit is used for receiving a vehicle key sharing request sent by a second terminal through the interaction unit of the first terminal, wherein the sharing request comprises a second terminal ID and a second security chip ID;
The processing unit is also used for verifying the sharing request, and sending authority authentication information to a second terminal through the interaction unit of the first terminal after verification is passed; the authority authentication information is used for displaying a user information input box after the second terminal receives the authority authentication information so as to input human body characteristic information of a user;
the processing unit is also used for receiving the human body characteristic information through the interaction unit of the first terminal, identifying through the identification unit, and determining that the permission exists if the identification is consistent with the user characteristic information prestored by the storage unit of the first security chip;
the processing unit is further configured to send out vehicle key information through the interaction unit of the first terminal, and store the vehicle key information in the second security chip of the second terminal, so as to invoke the stored vehicle key information when the second terminal unlocks the vehicle.
Further, the processing unit is further configured to:
carrying out integrity check on the sharing request;
if the integrity check is passed, the sharing request is analyzed to obtain request authority information, a second terminal ID and a second security chip ID which are included in the sharing request;
carrying out relevance verification on the second terminal according to the second terminal ID; if the verification is passed, the second security chip ID is verified by the common key;
If the shared secret key exists, the shared request is determined to pass verification.
In a third aspect, an embodiment of the present application provides an electronic device, including a processor, a memory, and a program or instructions stored on the memory and executable on the processor, the program or instructions implementing the steps of the vehicle key sharing method of the security chip according to the first aspect when executed by the processor.
In a fourth aspect, an embodiment of the present application provides a readable storage medium having stored thereon a program or instructions which, when executed by a processor, implement the steps of the vehicle key sharing method of the security chip according to the first aspect.
In the embodiment of the application, the processing unit receives a vehicle key sharing request sent by a second terminal through the interaction unit of the first terminal, wherein the sharing request comprises a second terminal ID and a second security chip ID; the processing unit verifies the sharing request, and sends authority authentication information to a second terminal through an interaction unit of the first terminal after verification is passed; the authority authentication information is used for displaying a user information input box after the second terminal receives the authority authentication information so as to input human body characteristic information of a user; the processing unit receives the human body characteristic information through the interaction unit of the first terminal, and identifies the human body characteristic information through the identification unit, and if the identification is consistent with the user characteristic information prestored in the storage unit of the first security chip, the existence authority is determined; the processing unit sends out the vehicle key information through the interaction unit of the first terminal, and the vehicle key information is stored by the second security chip of the second terminal, so that the stored vehicle key information is called when the second terminal unlocks the vehicle. By the vehicle key sharing method of the security chip, the vehicle key can be remotely shared by the vehicle owner and the trusted non-vehicle owner, and the flexibility of sharing the vehicle key is improved. Meanwhile, multiple authentications are realized to share the vehicle key, so that the safety of sharing the vehicle key is improved.
Drawings
Fig. 1 is a flow chart of a vehicle key sharing method of a security chip according to an embodiment of the application;
fig. 2 is a flow chart of a vehicle key sharing method of a security chip according to a second embodiment of the present application;
fig. 3 is a schematic structural diagram of a vehicle key sharing device with a security chip according to a third embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device according to a fourth embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the following detailed description of specific embodiments of the present application is given with reference to the accompanying drawings. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting thereof. It should be further noted that, for convenience of description, only some, but not all of the matters related to the present application are shown in the accompanying drawings. Before discussing exemplary embodiments in more detail, it should be mentioned that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart depicts operations (or steps) as a sequential process, many of the operations can be performed in parallel, concurrently, or at the same time. Furthermore, the order of the operations may be rearranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figures. The processes may correspond to methods, functions, procedures, subroutines, and the like.
The technical solutions of the embodiments of the present application will be clearly described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which are obtained by a person skilled in the art based on the embodiments of the present application, fall within the scope of protection of the present application.
The terms first, second and the like in the description and in the claims, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged, as appropriate, such that embodiments of the present application may be implemented in sequences other than those illustrated or described herein, and that the objects identified by "first," "second," etc. are generally of a type, and are not limited to the number of objects, such as the first object may be one or more. Furthermore, in the description and claims, "and/or" means at least one of the connected objects, and the character "/", generally means that the associated object is an "or" relationship.
The vehicle key sharing method, the security chip device, the equipment and the medium of the security chip provided by the embodiment of the application are described in detail below through specific embodiments and application scenes thereof with reference to the accompanying drawings.
Example 1
Fig. 1 is a flow chart of a vehicle key sharing method of a security chip according to an embodiment of the application. The method is executed by a first security chip, wherein the first security chip is arranged at a first terminal, and the first terminal is connected with a second terminal; the second terminal is provided with a second security chip. As shown in fig. 1, the method specifically comprises the following steps:
s101, the processing unit receives a vehicle key sharing request sent by a second terminal through the interaction unit of the first terminal, wherein the sharing request comprises a second terminal ID and a second security chip ID.
First, the execution scenario of the scheme may be a scenario in which the owner shares the digital key of the vehicle to the trusted non-owner. Specifically, the smart phone terminal of the vehicle owner and the smart phone terminal of the non-vehicle owner can be connected through Bluetooth or wireless communication technology, and then digital key sharing is performed.
Based on the above usage scenario, it can be appreciated that the execution subject of the present application may be a security chip, which is not limited herein.
In the scheme, the method is executed by a first security chip, the first security chip is arranged at a first terminal, and the first terminal is connected with a second terminal; the second terminal is provided with a second security chip.
The security chip can be a device capable of independently generating and encrypting and decrypting the secret key, is internally provided with an independent processor and a storage unit, can store the secret key and characteristic data, and provides encryption and security authentication services for the upper computer. The encryption is carried out by the security chip, the secret key is stored in hardware, and the stolen data cannot be decrypted, so that the data security is protected.
The first terminal may be a smart phone terminal of the vehicle owner, and the first security chip may be a security chip in the smart phone terminal of the vehicle owner. The second terminal may be a smart phone terminal of a non-vehicle owner, and specifically, the non-vehicle owner may be a family, a friend, a colleague, and the like of the vehicle owner. The second security chip may be a security chip within a non-owner's smart phone terminal.
The connection may be a process of connecting two devices to share a digital key through bluetooth or wireless communication technology. The Bluetooth connection can be used for car owners and non-car owners with relatively short distance, namely, when the car owners and non-car owners are located at the same place. The Bluetooth function of the mobile phone is required to be opened by the vehicle owner and the non-vehicle owner simultaneously through Bluetooth connection, the Bluetooth name belonging to the non-vehicle owner mobile phone end is found out in the Bluetooth window of the vehicle owner mobile phone end, after clicking pairing, clicking agrees with the pairing at the non-vehicle owner mobile phone end, namely, the interconnection of the two mobile phones is completed, and then the operation of sharing the vehicle digital key can be carried out. The wireless communication refers to remote transmission communication between a plurality of nodes without transmission through conductors or cables, after a request for sharing a digital key is sent out by a non-owner mobile phone end through wireless communication, the request is transmitted to the owner mobile phone end through a wireless communication technology, and the owner mobile phone end transmits the digital key to the non-owner mobile phone end through the wireless communication technology, so that the interconnection of the two mobile phones is completed.
In this scheme, the processing unit may be a microprocessor of a security chip, which is a central processing unit composed of one or a few large-scale integrated circuits. These circuits perform the functions of control means and arithmetic logic means. The microprocessor can complete the operations of fetching instructions, executing instructions, exchanging information with the external memory and the logic component, and the like, and is an operation control part of the microcomputer. It can be combined with memory and peripheral circuit chip into microcomputer.
The interaction unit may be a data unit used for information transmission between the first terminal and the second terminal, and specifically, the interaction may be performed through an antenna. The mobile phone antenna is a device for receiving signals on a mobile phone, and radio frequency signal power output by the second terminal device is transmitted to the antenna through a feeder line (cable) and radiated out in an electromagnetic wave form by the antenna. After the electromagnetic wave reaches the receiving site, it is then transmitted by the antenna to the first terminal device via the feeder line. When the mobile phone antenna transmits signals, a modulator and a demodulator are needed to be used, wherein the modulator refers to equipment for modulating low-frequency digital signals (such as audio, video, data and the like) into high-frequency digital signals through a digital signal processing technology so as to transmit the signals. A demodulator refers to a device that restores a low frequency digital signal modulated in a high frequency digital signal by a digital signal processing technique. The digital signal generated by the second terminal device may be modulated by the modulator into an analog signal that may be transmitted by the antenna, which is transmitted by the antenna to the first terminal device, which demodulator converts the input analog signal into a corresponding digital signal.
The vehicle key sharing request may be a request sent by the second terminal device to the first terminal device for sharing the vehicle digital key, where the request includes the second terminal ID and the second security chip ID. The second terminal ID may be a serial number of the second terminal, i.e. a serial number of a smartphone terminal of the non-vehicle owner. The serial number is generally a globally unique identification code of the electronic product, is commonly used for anti-counterfeiting, and has the greatest characteristic of being unique, and can be a combination of numbers and letters. The second security chip ID may be the number of the security chip of the second terminal, that is, the number of the security chip of the smart phone terminal of the non-owner, or a combination of a number and a letter.
The receiving may be a process that the interaction unit of the first terminal receives the vehicle key sharing request sent by the second terminal, specifically, may be a process that the vehicle key sharing request sent by the smart phone terminal of the non-vehicle owner is modulated by a modulator, and after the signal is sent by an antenna, the demodulator of the smart phone terminal of the vehicle owner receives the signal and demodulates the signal.
S102, the processing unit verifies the sharing request, and authority authentication information is sent to a second terminal through an interaction unit of the first terminal after verification is passed; the right authentication information is used for displaying a user information input box after the second terminal receives the right authentication information so as to input human body characteristic information of a user.
The authority authentication information may be information issued by the first terminal to verify whether the second terminal has authority to share the car digital key. The authority authentication information includes a request for the second terminal user to input own human body characteristic information, which may be face information, fingerprint information, sound information, etc. of the second terminal user. If the human body characteristic information is consistent with the information prestored by the first terminal, the authentication is considered to pass; if the human body characteristic information is inconsistent with the information stored in the first terminal in advance, the authentication is not passed.
The user information input box may be a prompt box prompting the second terminal user to input face information, fingerprint information, or voice information. The input of the face information can be that a user is prompted to put the face into a designated frame selection area through a mobile phone screen, and an image or video stream containing the face is collected through a mobile phone camera. The input fingerprint information can be that a user is prompted to press a finger on a relevant position of a screen through a mobile phone screen, after the user presses the finger on a relevant area of the screen, the area of the fingerprint firstly lights the screen, light rays are transmitted to a sensor downwards through gaps of pixels, then the light rays are filtered through a filter, useless light rays are filtered out, then the collected points are amplified through the fine lenses on each pixel point, and finally a gray image is drawn. The input sound information may be to prompt the user to speak the preset unlocking password through the mobile phone screen, and the user speaks the unlocking password through the built-in microphone and then sends out a high-frequency sound signal which is hardly audible and is 20 khz through the speaker of the mobile phone. This sound signal will reflect from the moving chin, lips and tongue and create a unique "mouth print".
The authentication may be a process in which the first terminal verifies the second terminal ID and the second security chip ID in the sharing request issued by the first terminal to the second terminal. Specifically, if the second terminal is paired with the first terminal, the storage unit of the first terminal stores the second terminal ID and the second security chip ID. When a second terminal sends a shared key request, a processing unit of a first terminal firstly identifies a second terminal ID and a second security chip ID, then searches a storage unit for whether the second terminal ID and the second security chip ID exist, and if so, the second terminal ID and the second security chip ID are considered to pass verification, and the next operation of sending authority authentication information is performed; if the authorization information does not exist, the authorization information is considered to be not verified, and the next operation of sending the authorization information is not performed.
The issuing of the authority authentication information may be a process of automatically generating the authority authentication information and transmitting the same to the interaction unit of the first terminal after the processing unit authenticates the sharing request, and the first terminal interaction unit forwards the authority authentication information to the second terminal. In particular, this information may be forwarded to the second terminal via bluetooth or wireless communication technology.
And S103, the processing unit receives the human body characteristic information through the interaction unit of the first terminal, performs identification through the identification unit, and determines that the permission exists if the identification is consistent with the user characteristic information pre-stored in the storage unit of the first security chip.
The identification unit may include a demodulator, and since the transmitted human body characteristic information is modulated by the modulator and then transmitted through the antenna, the human body characteristic information needs to be restored by the demodulator. The identification unit may also compare the restored human body characteristic information with pre-stored user characteristic information in the storage unit, and the user characteristic information may be face information, fingerprint information, and sound information of a vehicle owner or non-vehicle owner (family, friends, and colleagues) pre-stored in the first terminal.
The receiving may be a process in which the interaction unit of the first terminal receives the human body characteristic information transmitted by the second terminal through the wireless communication technology. The received face information may be that after the modulator modulates the face image or the video stream into a high frequency digital signal, the high frequency digital signal is transmitted to the first terminal interaction unit through the antenna, the interaction unit of the first terminal forwards the signal to the demodulator of the recognition unit, and the demodulator demodulates the signal into the face image or the video stream. The fingerprint information may be received by modulating the gray image of the fingerprint into a high frequency digital signal by the modulator, transmitting the high frequency digital signal to the first terminal interaction unit through the antenna, and forwarding the signal to the demodulator of the identification unit by the interaction unit of the first terminal, and demodulating the signal into the gray image of the fingerprint by the demodulator. The received sound information may be that the modulator modulates the unique "watermark" into a high frequency digital signal, and then sends the signal to the first terminal interaction unit through the antenna, and the interaction unit of the first terminal forwards the signal to the demodulator of the identification unit, and the demodulator demodulates the signal into the "watermark".
After the demodulator restores the human body characteristic information, the identification unit searches the storage unit for whether the human body characteristic information exists or not, namely, the human body characteristic information is compared with the pre-stored user characteristic information, if the comparison is successful, the user of the second terminal is determined to have the authority of sharing the vehicle digital key, and the operation of sending the vehicle key information in the next step can be performed; if the comparison fails, the user of the second terminal is determined not to have the authority of sharing the vehicle digital key, and the vehicle key information is not sent out.
And S104, the processing unit sends out the vehicle key information through the interaction unit of the first terminal, and the vehicle key information is stored by the second security chip of the second terminal so as to call the stored vehicle key information when the second terminal unlocks the vehicle.
The vehicle key information may be a digital key of the vehicle, and may be understood as an encryption key, and the transmitted digital key may include a vehicle identifier, a key identifier, and the like. The vehicle identifier is a vehicle that uniquely identifies the vehicle associated with the digital key, the 8-byte vehicle identifier uniquely identifies a vehicle, and the identifier is not equivalent to a VIN code within the automotive industry, and is transmitted during wireless transactions by the vehicle. The key identifier is a value provided by the vehicle to the owner device for identifying which key to use, which value is communicated upon wireless transactions, and when the key is shared, the owner device or the vendor server provides a key identifier value to the friend device for the friend device to create a friend device key. In the scheme, a first terminal of a vehicle owner stores a digital key, identifiers of different types are arranged in the digital key, and a vehicle terminal stores a decryption key algorithm corresponding to the digital key. Therefore, after the vehicle owner shares the vehicle identifier and the key identifier to the second terminal of the non-vehicle owner through the first terminal, the non-vehicle owner can generate an encryption key through the same encryption algorithm as the first terminal of the vehicle owner and transmit the encryption key to the vehicle terminal when the non-vehicle owner wants to unlock the vehicle, and the vehicle terminal calls the corresponding decryption key algorithm according to the encryption key to generate a decryption key and automatically unlocks the vehicle.
The transmitting may be a process of modulating the vehicle key information into a high frequency signal by the modulator of the first terminal, and then forwarding the high frequency signal to the demodulator of the second terminal by the first terminal interaction unit, and demodulating the signal into the vehicle key information by the demodulator of the second terminal.
The storing may be a process of storing the vehicle key information in the second security chip after the demodulator demodulates the signal into the vehicle key information.
When the second terminal is to unlock the vehicle, the second terminal firstly invokes the vehicle key information (namely the encryption key algorithm) stored in the second security chip, then generates an encryption key, and transmits the encryption key to the vehicle terminal, so that the vehicle terminal invokes the decryption key algorithm to generate a corresponding decryption key according to the encryption key and unlock the vehicle.
According to the technical scheme provided by the embodiment, the processing unit receives a vehicle key sharing request sent by a second terminal through the interaction unit of the first terminal, wherein the sharing request comprises a second terminal ID and a second security chip ID; the processing unit verifies the sharing request, and sends authority authentication information to a second terminal through an interaction unit of the first terminal after verification is passed; the authority authentication information is used for displaying a user information input box after the second terminal receives the authority authentication information so as to input human body characteristic information of a user; the processing unit receives the human body characteristic information through the interaction unit of the first terminal, and identifies the human body characteristic information through the identification unit, and if the identification is consistent with the user characteristic information prestored in the storage unit of the first security chip, the existence authority is determined; the processing unit sends out the vehicle key information through the interaction unit of the first terminal, and the vehicle key information is stored by the second security chip of the second terminal, so that the stored vehicle key information is called when the second terminal unlocks the vehicle. By the vehicle key sharing method of the security chip, the vehicle key can be remotely shared by the vehicle owner and the trusted non-vehicle owner, and the flexibility of sharing the vehicle key is improved. Meanwhile, multiple authentications are realized to share the vehicle key, so that the safety of sharing the vehicle key is improved.
Example two
Fig. 2 is a flow chart of a vehicle key sharing method of a security chip according to a second embodiment of the present application, as shown in fig. 2, the specific method includes the following steps:
s201, the processing unit performs integrity check on the sharing request.
The integrity check may be a request to verify whether the sharing request sent by the second terminal arrives at the first terminal as being complete. A typical sharing request may be split into a plurality of data and sent out when sent out, and may include header data, trailer data, middle portion data, and the like. When the data transmission is incomplete, the sharing request cannot be analyzed, so that the integrity of the sharing request needs to be checked, namely, whether the transmitted sharing request comprises complete header data, package tail data and middle part data is verified. If the data is complete after verification, confirming that the integrity verification is passed, and then carrying out the operation of analyzing the sharing request in the next step; if the data is incomplete after verification, the fact that the integrity verification is not passed is confirmed, the next operation of analyzing the sharing request cannot be performed, and the second terminal can be informed to resend the sharing request.
S202, if the integrity check is passed, the sharing request is analyzed to obtain request authority information, a second terminal ID and a second security chip ID which are included in the sharing request.
The request permission information may be a mode of unlocking the automobile, which is possessed by the second terminal, and specifically may include an independent unlocking permission and a close-range unlocking permission. The independent unlocking right may be a right that the second terminal can unlock separately. The close-range unlocking authority can be authority that the second terminal can be used for unlocking when the second terminal and the first terminal are in the same range.
Parsing may be a process in which the processing unit reads the request authority information, the second terminal ID, and the second security chip ID from the sharing request.
On the basis of the technical scheme, optionally, the request authority information comprises independent unlocking authorities and close unlocking authorities;
the close-range unlocking authority is used for unlocking authority which is provided when the second terminal and the first terminal are within a preset distance range.
The close-range unlocking authority may be that the second terminal has unlocking authority when the second terminal and the first terminal are within a preset distance range, that is, the second terminal and the first terminal have unlocking authority at the same time when the second terminal and the first terminal are within the preset distance range.
The preset distance range may be a distance range in which the short-distance unlocking authority of the second terminal is determined to take effect, that is, the short-distance unlocking authority starts to take effect with the first terminal within the preset distance range.
In this scheme, through dividing into independent unlocking authority and closely unblanking authority with the authority of unblanking, guarantee to obtain the second terminal of vehicle key can not lose the authority of unblanking yet with first terminal in the range of predetermineeing the distance, reduced the complexity that second terminal user unblocked the car.
On the basis of the above technical solution, optionally, if the request permission information is an independent unlocking permission, after verification is passed, permission authentication information is sent to a second terminal through an interaction unit of the first terminal, including:
after verification, sending first-level authority authentication information to a second terminal through an interaction unit of the first terminal; the first-level authority authentication information comprises authentication information of a user face and/or a user fingerprint;
if the request permission information is a close-range unlocking permission, sending permission authentication information to a second terminal through an interaction unit of the first terminal after verification is passed, wherein the method comprises the following steps:
after verification, sending second-level authority authentication information to a second terminal through an interaction unit of the first terminal; the second-level authority authentication information comprises at least one of authentication information of a user face, a user fingerprint and an unlocking password.
The first-level authority authentication information may be authentication information for determining a user identity, which is sent by the first terminal when the second terminal sends an independent unlocking instruction, and includes user face information and user fingerprint information. The second terminal user of the second terminal can input one kind of information to unlock, and can also input two kinds of information to unlock.
The second-level authority authentication information can be authentication information which is sent by the first terminal and used for determining the identity of the user when the second terminal sends a close-range unlocking instruction, and comprises user face information, user fingerprint information and an unlocking password. The second terminal user needs to input at least one kind of information to complete unlocking, and the unlocking password can be a 6-digit password preset by the first terminal user when an automobile unlocking instruction is sent.
The sending of the first level authority authentication information and the second level authority authentication information may be a process in which the processing unit of the first terminal generates the first level authority authentication information and the second level authority authentication information, modulates the authority authentication information into a high-frequency signal through the modulator, and then the first terminal interaction unit forwards the signal to the second terminal.
In the scheme, when the second terminal user sends out different unlocking instructions, the mode of verifying the identity of the second terminal user is set, so that the vehicle key sharing process is safer. If the second terminal user only needs to input the unlocking password when unlocking in a short distance, the vehicle is stolen if the mobile phone is lost and the password is leaked, and the risk of the vehicle being stolen is reduced to a certain extent by setting a mode that human body characteristic information is required to be input after the password is input.
S203, carrying out relevance verification on the second terminal according to the second terminal ID; and if the verification is passed, verifying the second security chip ID by using a common key.
The relevance verification may be verification for verifying whether the second terminal and the first terminal have relevance, and specifically, the two terminals may be in the same area or paired once to be regarded as having relevance. If the two terminals are paired, the first terminal storage unit stores the second terminal ID, and the second terminal ID can be successfully compared with the second terminal ID stored in the storage unit in advance when the second terminal ID is received again, so that the verification of the relevance is confirmed. If the two terminals are in the same range, the first terminal automatically recognizes the distance between the two terminals when receiving the ID of the second terminal, and determines that the relevance verification is passed when the distance is close enough.
The verification of the shared key may be verifying whether the security chip of the second terminal and the security chip of the first terminal have a common encryption algorithm. After the first terminal transmits the vehicle identifier and the key identifier to the second terminal, if the same encryption algorithm does not exist, the generated encryption keys are different, and after the first terminal transmits the vehicle identifier and the key identifier to the vehicle terminal, the vehicle terminal cannot generate a corresponding decryption key according to the encryption key, so that the vehicle cannot be unlocked. When the first terminal receives the second security chip ID, the first terminal can inquire whether the first security chip and the second security chip have the same encryption algorithm according to the second security chip ID. Specifically, two terminals with the same mobile phone brand or the same security chip type can be regarded as having the same encryption algorithm.
On the basis of the above technical solution, optionally, performing relevance verification on the second terminal according to the second terminal ID includes:
acquiring whether a preset condition is met between the second terminal and the first terminal; the preset conditions comprise at least one of Bluetooth connection, connection with a local area network and positioning result within a preset range;
and if the preset condition is met, determining that the relevance verification is passed.
In this solution, the preset condition may be a condition set by determining whether the second terminal and the first terminal can pass the association check, that is, a condition set by determining whether the second terminal and the first terminal have an association. Judging whether the second terminal and the first terminal meet the preset conditions or not can be carried out sequentially, firstly judging whether Bluetooth connection is carried out or not, judging whether the same local area network connection is carried out or not if Bluetooth connection is not carried out, judging whether a positioning result is in a preset range or not if the same local area network connection is not carried out, and if one of the three conditions is met, judging that the relevance verification is passed; if all the three conditions are not satisfied, the relevance verification is not passed. After the connection with the local area network is carried out, the two terminals can have the wireless local area network address, when the first terminal receives the second terminal ID, the address of the connected wireless local area network can be inquired according to the second terminal ID, if the wireless local area network address connected with the second terminal can be found in the storage unit of the first terminal, the two devices are determined to be connected with the same wireless local area network, and the relevance verification is further determined to be passed. The positioning result may be that the two terminal devices have relevance only when the distance between the two terminal devices is within a certain range, for example, the distance between the two terminal devices may be set to be within 50m as a preset range, and if the distance between the two terminal devices exceeds 50m, the relevance is considered to be absent.
According to the scheme, through setting three ways of relevance verification, more possibility is provided for verifying whether relevance exists between the second terminal and the first terminal, and convenience in vehicle key sharing is improved for a user. And the relevance verification is set, so that whether the corresponding user of the second terminal has a relation with the corresponding user of the first terminal or not can be determined from the side, and the risk that a stranger initiates an attack when the first terminal and the second terminal share the vehicle key is avoided, and the vehicle is unlocked by using the stolen vehicle key is avoided.
On the basis of the above technical solution, optionally, the verifying the common key for the second security chip ID includes:
reading the second security chip ID;
determining whether the association relation between the first security chip ID and the second security chip ID exists in the security chip association relation table; the security chip association relation table is stored in a storage unit of the first security chip;
if so, reading a common secret key of the first security chip and the second security chip;
if not, determining that the first security chip and the second security chip do not have a common key.
In this scheme, the association table may be an ID for storing the ID of the security chip and IDs of other security chips of the same type as the first security chip, that is, IDs of security chips having the same encryption algorithm as the first security algorithm, stored in the first security chip storage unit.
The reading may be a process of identifying the second secure chip ID in the sharing request after the processing unit acquires the sharing request.
The determining may be that after the second security chip ID is obtained, the processing unit searches for whether the second security chip ID exists in the association table, and if so, determines that the first security chip and the second security chip belong to the same type, and the same encryption algorithm exists. When the same encryption algorithm is determined to exist, the processing unit identifies the shared key of the first security chip and the second security chip, i.e. reads the shared key of the first security chip and the second security chip. If the second security chip ID does not exist in the association table, the first security chip and the second security chip are determined not to belong to the same type, the same encryption algorithm does not exist, and further the first security chip and the second security chip are determined not to have the shared secret key.
In the scheme, through setting the association relation table, all the IDs of the same type of security chips can be stored, and when the common secret key verification is carried out, whether the association relation exists between the two security chips or not can be quickly searched, namely whether the two security chips belong to the same type and have the same encryption algorithm or not, so that the efficiency of the common secret key verification is improved.
S204, if the shared secret key exists, determining that the shared request passes verification.
When the integrity check, the relevance check and the common key check are confirmed to pass, the processing unit confirms that the sharing request passes the verification, and the next operation of verifying the human body characteristic information is automatically carried out.
According to the technical scheme provided by the embodiment, the sharing request sent by the second terminal is verified in a multi-step verification mode of setting integrity verification, relevance verification and sharing key verification, so that the efficiency and safety of a vehicle key sharing process are improved, and a mat is laid for subsequent human body characteristic information verification and interaction with the vehicle terminal. If the verification modes do not exist, the fact that the request information is incomplete is possibly caused when the human body characteristic information is verified, and the fact that the vehicle terminal cannot decrypt the encryption key generated by the second terminal when the vehicle terminal interacts with the vehicle terminal is possibly caused, so that the vehicle key sharing efficiency is reduced. And if the relevance verification is not carried out, the vehicle key can be attacked from the outside during sharing, so that the risk of vehicle theft is increased.
Example III
Fig. 3 is a schematic structural diagram of a vehicle key sharing security chip device of a security chip according to a third embodiment of the present application. The device is configured on a first security chip, the first security chip is arranged on a first terminal, and the first terminal is connected with a second terminal; the second terminal is provided with a second security chip; as shown in fig. 3, the apparatus includes:
A processing unit 301, configured to receive, through an interaction unit of the first terminal, a vehicle key sharing request sent by a second terminal, where the sharing request includes a second terminal ID and a second security chip ID;
the processing unit 301 is further configured to verify the sharing request, and send permission authentication information to the second terminal through the interaction unit of the first terminal after the verification is passed; the authority authentication information is used for displaying a user information input box after the second terminal receives the authority authentication information so as to input human body characteristic information of a user;
the processing unit 301 is further configured to receive the human body feature information through the interaction unit of the first terminal, identify the human body feature information through the identification unit 302, and determine that the permission exists if the identification is consistent with the user feature information pre-stored in the storage unit 303 of the first security chip;
the processing unit 301 is further configured to send out, through the interaction unit of the first terminal, vehicle key information for storage by the second security chip of the second terminal, so as to invoke the stored vehicle key information when the second terminal unlocks the vehicle.
Further, the processing unit 301 is further configured to:
carrying out integrity check on the sharing request;
If the integrity check is passed, the sharing request is analyzed to obtain request authority information, a second terminal ID and a second security chip ID which are included in the sharing request;
carrying out relevance verification on the second terminal according to the second terminal ID; if the verification is passed, the second security chip ID is verified by the common key;
if the shared secret key exists, the shared request is determined to pass verification.
According to the technical scheme provided by the embodiment, the processing unit is used for receiving a vehicle key sharing request sent by a second terminal through the interaction unit of the first terminal, wherein the sharing request comprises a second terminal ID and a second security chip ID; the processing unit is also used for verifying the sharing request, and sending authority authentication information to a second terminal through the interaction unit of the first terminal after verification is passed; the authority authentication information is used for displaying a user information input box after the second terminal receives the authority authentication information so as to input human body characteristic information of a user; the processing unit is also used for receiving the human body characteristic information through the interaction unit of the first terminal, identifying through the identification unit, and determining that the permission exists if the identification is consistent with the user characteristic information prestored by the storage unit of the first security chip; the processing unit is further configured to send out vehicle key information through the interaction unit of the first terminal, and store the vehicle key information in the second security chip of the second terminal, so as to invoke the stored vehicle key information when the second terminal unlocks the vehicle. By means of the vehicle key sharing device of the security chip, vehicle keys can be shared remotely by a vehicle owner and a trusted non-vehicle owner, and flexibility of sharing the vehicle keys is improved. Meanwhile, multiple authentications are realized to share the vehicle key, so that the safety of sharing the vehicle key is improved.
The vehicle key sharing device of the security chip provided by the embodiment of the present application can implement each process implemented by the method embodiments of fig. 1 to 2, and in order to avoid repetition, a description is omitted here.
Example IV
Fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application. As shown in fig. 4, the embodiment of the present application further provides an electronic device 400, which includes a processor 401, a memory 402, and a program or an instruction stored in the memory 402 and capable of running on the processor 401, where the program or the instruction implements each process of the above-mentioned vehicle key sharing method embodiment of the security chip when executed by the processor 401, and the process can achieve the same technical effect, so that repetition is avoided, and no further description is given here.
The electronic device in the embodiment of the application includes the mobile electronic device and the non-mobile electronic device.
Example five
The embodiment of the application also provides a readable storage medium, wherein the readable storage medium stores a program or an instruction, and the program or the instruction realizes each process of the vehicle key sharing method embodiment of the security chip when being executed by the processor, and can achieve the same technical effect, so that repetition is avoided and redundant description is omitted.
Wherein the processor is a processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium such as a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk or an optical disk, and the like.
The foregoing description is only of the preferred embodiments of the application and the technical principles employed. The present application is not limited to the specific embodiments described herein, but is capable of numerous modifications, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the application. Therefore, while the application has been described in connection with the above embodiments, the application is not limited to the embodiments, but may be embodied in many other equivalent forms without departing from the spirit of the application, the scope of which is set forth in the following claims.

Claims (8)

1. The vehicle key sharing method of the security chip is characterized in that the method is executed by a first security chip, the first security chip is arranged at a first terminal, and the first terminal is connected with a second terminal; the second terminal is provided with a second security chip; the method comprises the following steps:
The processing unit receives a vehicle key sharing request sent by a second terminal through an interaction unit of the first terminal, wherein the sharing request comprises a second terminal ID and a second security chip ID;
the processing unit verifies the sharing request, and sends authority authentication information to a second terminal through an interaction unit of the first terminal after verification is passed; the authority authentication information is used for displaying a user information input box after the second terminal receives the authority authentication information so as to input human body characteristic information of a user; the processing unit verifies the sharing request, and the processing unit performs integrity verification on the sharing request; if the integrity check is passed, the sharing request is analyzed to obtain request authority information, a second terminal ID and a second security chip ID which are included in the sharing request; carrying out relevance verification on the second terminal according to the second terminal ID; if the verification is passed, the second security chip ID is verified by the common key; if the shared secret key exists, determining that the shared request passes verification;
the processing unit receives the human body characteristic information through the interaction unit of the first terminal, and identifies the human body characteristic information through the identification unit, and if the identification is consistent with the user characteristic information prestored in the storage unit of the first security chip, the existence authority is determined;
The processing unit sends out the vehicle key information through the interaction unit of the first terminal, and the vehicle key information is stored by the second security chip of the second terminal, so that the stored vehicle key information is called when the second terminal unlocks the vehicle.
2. The method of claim 1, wherein performing the association check on the second terminal according to the second terminal ID comprises:
acquiring whether a preset condition is met between the second terminal and the first terminal; the preset conditions comprise at least one of Bluetooth connection, connection with a local area network and positioning result within a preset range;
and if the preset condition is met, determining that the relevance verification is passed.
3. The method of claim 1, wherein verifying the second secure chip ID for the common key comprises:
reading the second security chip ID;
determining whether the association relation between the first security chip ID and the second security chip ID exists in the security chip association relation table; the security chip association relation table is stored in a storage unit of the first security chip;
if so, reading a common secret key of the first security chip and the second security chip;
If not, determining that the first security chip and the second security chip do not have a common key.
4. The method of claim 1, wherein the request rights information includes independent unlocking rights and close unlocking rights;
the close-range unlocking authority is used for unlocking authority which is provided when the second terminal and the first terminal are within a preset distance range.
5. The method of claim 4, wherein if the request authority information is an independent unlocking authority, sending authority authentication information to a second terminal through an interaction unit of the first terminal after verification is passed, comprising:
after verification, sending first-level authority authentication information to a second terminal through an interaction unit of the first terminal; the first-level authority authentication information comprises authentication information of a user face and/or a user fingerprint;
if the request permission information is a close-range unlocking permission, sending permission authentication information to a second terminal through an interaction unit of the first terminal after verification is passed, wherein the method comprises the following steps:
after verification, sending second-level authority authentication information to a second terminal through an interaction unit of the first terminal; the second-level authority authentication information comprises at least one of authentication information of a user face, a user fingerprint and an unlocking password.
6. The vehicle key sharing device of the safety chip is characterized in that the device is configured on a first safety chip, the first safety chip is arranged on a first terminal, and the first terminal is connected with a second terminal; the second terminal is provided with a second security chip; the device comprises:
the processing unit is used for receiving a vehicle key sharing request sent by a second terminal through the interaction unit of the first terminal, wherein the sharing request comprises a second terminal ID and a second security chip ID;
the processing unit is also used for verifying the sharing request, and sending authority authentication information to a second terminal through the interaction unit of the first terminal after verification is passed; the authority authentication information is used for displaying a user information input box after the second terminal receives the authority authentication information so as to input human body characteristic information of a user;
the processing unit is also used for carrying out integrity check on the sharing request;
if the integrity check is passed, the sharing request is analyzed to obtain request authority information, a second terminal ID and a second security chip ID which are included in the sharing request;
carrying out relevance verification on the second terminal according to the second terminal ID; if the verification is passed, the second security chip ID is verified by the common key;
If the shared secret key exists, determining that the shared request passes verification;
the processing unit is also used for receiving the human body characteristic information through the interaction unit of the first terminal, identifying through the identification unit, and determining that the permission exists if the identification is consistent with the user characteristic information prestored by the storage unit of the first security chip;
the processing unit is further configured to send out vehicle key information through the interaction unit of the first terminal, and store the vehicle key information in the second security chip of the second terminal, so as to invoke the stored vehicle key information when the second terminal unlocks the vehicle.
7. An electronic device comprising a processor, a memory and a program or instruction stored on the memory and executable on the processor, the program or instruction when executed by the processor implementing the steps of the vehicle key sharing method of a security chip as claimed in any one of claims 1 to 5.
8. A readable storage medium, characterized in that it has stored thereon a program or instructions which, when executed by a processor, implement the steps of the vehicle key sharing method of a security chip as claimed in any one of claims 1 to 5.
CN202211498097.4A 2022-11-28 2022-11-28 Vehicle key sharing method of security chip and security chip device Active CN115700857B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211498097.4A CN115700857B (en) 2022-11-28 2022-11-28 Vehicle key sharing method of security chip and security chip device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211498097.4A CN115700857B (en) 2022-11-28 2022-11-28 Vehicle key sharing method of security chip and security chip device

Publications (2)

Publication Number Publication Date
CN115700857A CN115700857A (en) 2023-02-07
CN115700857B true CN115700857B (en) 2023-11-24

Family

ID=85121112

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211498097.4A Active CN115700857B (en) 2022-11-28 2022-11-28 Vehicle key sharing method of security chip and security chip device

Country Status (1)

Country Link
CN (1) CN115700857B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110290525A (en) * 2019-06-21 2019-09-27 湖北亿咖通科技有限公司 A kind of sharing method and system, mobile terminal of vehicle number key
CN113362504A (en) * 2021-06-30 2021-09-07 江铃汽车股份有限公司 NFC mobile phone intelligent key implementation method
CN113538076A (en) * 2020-04-15 2021-10-22 长城汽车股份有限公司 Keyless entry car renting method based on face recognition
CN113989958A (en) * 2021-10-14 2022-01-28 广州小鹏汽车科技有限公司 Digital key sharing system, method and apparatus, vehicle and storage medium
CN114095256A (en) * 2021-11-23 2022-02-25 广州市诺的电子有限公司 Terminal authentication method, system, equipment and storage medium based on edge calculation
CN114697898A (en) * 2020-12-14 2022-07-01 中国移动通信有限公司研究院 Digital vehicle key processing method, sharing method and device, SIM card and vehicle
CN115188102A (en) * 2022-06-23 2022-10-14 一汽奔腾轿车有限公司 Control method and control system for shared vehicle
CN115396191A (en) * 2022-08-24 2022-11-25 重庆长安汽车股份有限公司 Vehicle-end digital key pushing method and system, electronic equipment and readable storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110290525A (en) * 2019-06-21 2019-09-27 湖北亿咖通科技有限公司 A kind of sharing method and system, mobile terminal of vehicle number key
CN113538076A (en) * 2020-04-15 2021-10-22 长城汽车股份有限公司 Keyless entry car renting method based on face recognition
CN114697898A (en) * 2020-12-14 2022-07-01 中国移动通信有限公司研究院 Digital vehicle key processing method, sharing method and device, SIM card and vehicle
CN113362504A (en) * 2021-06-30 2021-09-07 江铃汽车股份有限公司 NFC mobile phone intelligent key implementation method
CN113989958A (en) * 2021-10-14 2022-01-28 广州小鹏汽车科技有限公司 Digital key sharing system, method and apparatus, vehicle and storage medium
CN114095256A (en) * 2021-11-23 2022-02-25 广州市诺的电子有限公司 Terminal authentication method, system, equipment and storage medium based on edge calculation
CN115188102A (en) * 2022-06-23 2022-10-14 一汽奔腾轿车有限公司 Control method and control system for shared vehicle
CN115396191A (en) * 2022-08-24 2022-11-25 重庆长安汽车股份有限公司 Vehicle-end digital key pushing method and system, electronic equipment and readable storage medium

Also Published As

Publication number Publication date
CN115700857A (en) 2023-02-07

Similar Documents

Publication Publication Date Title
CN107650863B (en) Vehicle sharing method and system
CN107689092B (en) Method and apparatus for using digital temporary vehicle keys
JP6838211B2 (en) Autonomous driving control device, autonomous mobile vehicle and autonomous mobile vehicle control system
CN108122311B (en) Vehicle virtual key implementation method and system
CN104380764B (en) For the method for the customer data base for the characteristic of vehicle being registered in Internet Server equipment
JP6445235B2 (en) Method of pairing mobile phone and automobile, and locking / unlocking system
CN110290525A (en) A kind of sharing method and system, mobile terminal of vehicle number key
CN105187442A (en) Vehicle authorization method, device, vehicle-mounted terminal, terminal and system
CN110995710B (en) Smart home authentication method based on eUICC
CN109714769B (en) Information binding method, device, equipment and storage medium
KR20150064910A (en) Method and apparatus for vehicle control by using mobile terminal
CN111080858A (en) Bluetooth key logout method and device
CN111083696B (en) Communication verification method and system, mobile terminal and vehicle machine side
CN110648431B (en) Lock control method, system and storage medium based on Bluetooth communication technology
CN105848091A (en) Vehicle control method and device without keys
JPH10145354A (en) Remote function changing method
CN109643473A (en) A kind of method, apparatus and system of identity legitimacy verifying
CN105760723A (en) Mobile terminal and unlocking method thereof
CN111845624A (en) Method for starting vehicle without key
CN105279831A (en) Method for controlling locking based on mobile equipment audio coding
US10805276B2 (en) Device and methods for safe control of vehicle equipment secured by encrypted channel
CN103152326A (en) Distributed authentication method and authentication system
JP5178249B2 (en) Key authentication system
JP2015035104A (en) Image distribution system, on-vehicle apparatus, image distribution device, computer program and image distribution method
CN115868189A (en) Method, vehicle, terminal and system for establishing vehicle safety communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant