US20190381971A1 - Internet of vehicles system performing connection authentication through a public network and connection method - Google Patents
Internet of vehicles system performing connection authentication through a public network and connection method Download PDFInfo
- Publication number
- US20190381971A1 US20190381971A1 US16/059,844 US201816059844A US2019381971A1 US 20190381971 A1 US20190381971 A1 US 20190381971A1 US 201816059844 A US201816059844 A US 201816059844A US 2019381971 A1 US2019381971 A1 US 2019381971A1
- Authority
- US
- United States
- Prior art keywords
- cloud server
- mobile device
- bluetooth key
- broadcast name
- vehicular computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/24—Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
- B60R25/241—Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user whereby access privileges are related to the identifiers
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/24—Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C5/00—Registering or indicating the working of vehicles
- G07C5/008—Registering or indicating the working of vehicles communicating information to a remotely located station
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/50—Secure pairing of devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/005—Discovery of network devices, e.g. terminals
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R2325/00—Indexing scheme relating to vehicle anti-theft devices
- B60R2325/10—Communication protocols, communication systems of vehicle anti-theft devices
- B60R2325/101—Bluetooth
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R2325/00—Indexing scheme relating to vehicle anti-theft devices
- B60R2325/20—Communication devices for vehicle anti-theft devices
- B60R2325/205—Mobile phones
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00412—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
Definitions
- the present invention relates to an Internet of Vehicles (IoV) system and, more particularly, to an IoV system performing connection authentication through a public network and a connection method.
- IoV Internet of Vehicles
- users may employ mobile devices to establish connection with a vehicular computer of the vehicle through a Bluetooth connection, such that the mobile devices can control the vehicle door to be locked or unlocked or the vehicular computer to issue an alarm.
- mobile devices just need to build up their connection with the vehicular computer for the first time to be directly connected to the vehicular computer later on. Supposing that a mobile device has no protection against insecure connection in operation, when the mobile device is lost, anyone who finds the mobile phone can establish connection with the vehicular computer to control the vehicle, making prevention of vehicle theft uneasy.
- An objective of the present invention is to provide an Internet of Vehicles (IoV) system performing connection authentication through a public network and a connection method, which are implemented for secure connection with a vehicular computer after an online identity authentication and a data exchange identity authentication simultaneously performed by a mobile device to enhance connection security between the mobile device and the vehicular computer.
- IoV Internet of Vehicles
- the IoV system includes a cloud server, a vehicular computer and a mobile device.
- the cloud server is located at a remote end and stores and compares data.
- the vehicular computer is located at a local end, is installed in a vehicle to control various types of electronic equipment of the vehicle, and has a first broadcast name and a first Bluetooth key pre-stored therein.
- the mobile device is connected to the cloud server and the vehicular computer and has a second broadcast name and a second Bluetooth key.
- the mobile device acquires an authentication code and transmits the authentication code to the cloud server to complete an online identity authentication, searches the vehicular computer according to a Bluetooth protocol, transmits the second broadcast name and the second Bluetooth key to the vehicular computer in exchange of the first broadcast name and the first Bluetooth key in the vehicular computer transmitted from the vehicular computer, and after the vehicular computer successfully authenticates the exchanged second broadcast name and the exchanged second Bluetooth key with the first broadcast name and the first Bluetooth key transmitted from the mobile device, establishes connection with the vehicular computer.
- the mobile device after completing the online identity authentication with the cloud server, the mobile device searches the vehicular computer through the Bluetooth connection, and establishes connection with the vehicular computer after completion of data exchange and information authentication, so as to enhance connection security and lower vehicle theft.
- connection method performing connection authentication through a public network is performed by an Internet of vehicles (IoV) system with a mobile device connected to a cloud server at a remote end and a vehicular computer at a local end and the connection method comprises steps of:
- IoV Internet of vehicles
- the mobile device after completing the online identity authentication with the cloud server, the mobile device searches the vehicular computer through the Bluetooth connection, and establishes connection with the vehicular computer after completion of authentication of exchanged data, so as to enhance connection security and lower risk of vehicle theft.
- FIG. 1 is a first functional block diagram showing a system architecture of an IoV system performing connection authentication through a public network in accordance with the present invention
- FIG. 2 is a second functional block diagram showing a system architecture of an IoV system performing connection authentication through a public network in accordance with the present invention
- FIG. 3 is a third functional block diagram showing a system architecture of an IoV system performing connection authentication through a public network in accordance with the present invention
- FIG. 4 is a flow diagram showing that a vehicular computer of the IoV system in FIGS. 1, 2 and 3 acquires a first Bluetooth key and a first broadcast name;
- FIG. 5 is a flow diagram showing that a mobile device of the IoV system in FIGS. 1, 2 and 3 acquires a second Bluetooth key and a second broadcast name;
- FIG. 6 is a first flow diagram showing a connection method in accordance with the present invention.
- FIG. 7 is a second flow diagram showing a connection method in accordance with the present invention.
- FIG. 8 is a third flow diagram showing a connection method in accordance with the present invention.
- the mobile device 30 is connected to the cloud server 10 and the vehicular computer 20 .
- the vehicular computer 20 is installed in a vehicle to control various types of electronic equipment of the vehicle.
- the mobile device 30 may be a smart phone, a tablet personal computer, or a wearable smart device.
- the vehicular computer 20 includes a first processor 21 , a first storage unit 22 and a first Bluetooth unit 23 .
- the first processor 21 is connected to the first storage unit 22 and the first Bluetooth unit 23 and processes received data.
- the first storage unit 22 serves to store data.
- the first Bluetooth unit 23 serves to connect the mobile device 30 and transmit and receive data to and from the mobile device 30 .
- the first storage unit 22 has a first broadcast name and a first Bluetooth key pre-stored therein. The way of pre-storing is explained later.
- the first Bluetooth unit 23 complies with a Bluetooth protocol, which may be Bluetooth 1.0, Bluetooth 2.0, Bluetooth 3.0, Bluetooth 4.0, Bluetooth 5.0 or a newer Bluetooth protocol.
- the mobile device 30 includes a second processor 31 , a second storage unit 32 , a communication unit 33 , a second Bluetooth unit 34 and a touch display module 35 .
- the second processor 31 is connected to the second storage unit 32 , the communication unit 33 , the second Bluetooth unit 34 and the touch display module 35 and processes received data.
- the second storage unit 32 serves to store data.
- the communication unit 33 is connected to the cloud server 10 through a network to transmit and receive data from the cloud server 10 .
- the second Bluetooth unit 34 serves to connect the first Bluetooth unit 23 of the vehicular computer 20 and transmit and receive data to and from the vehicular computer 20 .
- the touch display module 35 serves to input data, and transmits the inputted data to the second processor 31 for processing or display information under the control of the second processor 31 .
- the touch display module 35 may be a touch screen.
- the mobile device 30 has an application installed therein for users to operate the application through the touch display module 35 so as to transmit and receive data to and from and authenticate data through or establish connection with the cloud server 10 and the vehicular computer 20 .
- the second storage unit 32 has a second broadcast name and a second Bluetooth key pre-stored therein.
- the way of pre-storing is explained later.
- the second Bluetooth unit 34 complies with a Bluetooth protocol, which may be Bluetooth 1.0, Bluetooth 2.0, Bluetooth 3.0, Bluetooth 4.0, Bluetooth 5.0 or a newer Bluetooth protocol.
- a security data mapping table which includes multiple pieces of security data differing from each other, is pre-stored in the cloud server 10 .
- Each piece of security data has a first broadcast name, a first Bluetooth key, a second broadcast name, a second Bluetooth key, identity information, and an authentication code.
- the first broadcast name and the second broadcast name may be the same, and the first Bluetooth key and the second Bluetooth key are symmetric keys or asymmetric keys, such as Hash, AES, RSA, PKCS, or other more reliable authentication schemes.
- the vehicular computer 20 can be connected to the cloud server 10 in a wired or wireless manner and the IoV system performs the following steps.
- Step S 41 The vehicular computer transmits a configuration notice to the cloud server 10 .
- Step S 42 The cloud server selects one piece of the multiple pieces of security data in the security data mapping table when the receiving the configuration notice.
- Step S 43 The cloud server 10 transmits the first broadcast name and the first Bluetooth key in the selected piece of security data to the vehicular computer 20 .
- Step S 44 The vehicular computer 20 stores the first broadcast name and the first Bluetooth key.
- the name of the vehicular computer is set up to be the same as the first broadcast name.
- the IoV system performs the following steps.
- Step S 51 The mobile device 30 transmits the identity information to the cloud server 10 through the communication unit 33 .
- Step S 52 When receiving the identity information, the cloud server 10 searches if any of the multiple pieces of security data contains the identity information therein identical to the received identity information.
- Step S 53 When the identical identity information in any of the multiple pieces of security data is found, the cloud server 10 transmits the second Bluetooth key, the second broadcast name and the authentication code to the communication unit 33 of the mobile device 30 .
- Step S 54 The second processor 31 receives and stores the second Bluetooth key and the second broadcast name in the second storage unit 32 , and displays the received authentication code on the touch display module 35 .
- the identity information includes a user's ID (identification) and a user's password.
- the vehicle can be controlled by the mobile device 30 only after the mobile device 30 establishes connection with the vehicular computer 20 .
- the way of establishing connection between the mobile device 30 and the vehicular computer 20 is elaborated as follows.
- a user operates the touch display module 35 to control the second processor 31 to execute the application in the mobile device 30 and input the authentication code acquired from the cloud server 10 .
- the second processor 31 transmits the authentication code to the cloud server 10 through the communication unit 33 .
- the cloud server 10 performs an online identity authentication.
- the cloud server 10 transmits an identity authentication completion notice to the communication unit 33 , and the second processor 31 instructs the touch display module 35 to display the identity authentication completion notice.
- the cloud server 10 transmits an identity authentication error notice to the communication unit 33 , and the second processor 31 instructs the touch display module 35 to display the identity authentication error notice.
- the online identity authentication means that the cloud server 10 identifies if the authentication code in any of the multiple pieces of security data is identical to the received authentication code, when both authentication codes are identical, the online identity authentication is completed, and otherwise, the online identity authentication is incomplete.
- the application can then control the mobile device 30 to connect with the vehicular computer 20 , thus preventing unauthorized persons from accessing the vehicle and attaining a first protection scheme for secure connection.
- the mobile device 30 After completion of the online identity authentication, a user can then perform the application, the mobile device 30 searches the vehicular computer 20 to exchange information with the vehicular computer 20 and establishes connection with the vehicular computer after authentication of the exchanged information.
- the way of exchanging and authenticating information includes the following two parts.
- the user can operate the application through the touch display module 35 , allowing the second processor 31 to control the second Bluetooth unit 34 of the mobile device 30 in search of the first broadcast name broadcasted by the first Bluetooth unit 23 of the vehicular computer 20 .
- the second processor 31 receives the first broadcast name through the second Bluetooth unit 34 and compares whether the received first broadcast name is identical to the second broadcast name stored in the second storage unit 32 or not.
- the second processor 31 controls the touch display module 35 to display a broadcast authentication completion notice for user's awareness.
- a broadcast authentication error notice is displayed for user's awareness.
- the second processor 31 transmits the second Bluetooth key to the first Bluetooth unit 23 of the vehicular computer 20 through the second Bluetooth unit 34 .
- the first processor 21 authenticates the received second Bluetooth key with the first Bluetooth key stored in the first storage unit 22 .
- the first processor 21 transmits a key authentication completion notice to the second Bluetooth unit 34 through the first Bluetooth unit 23 .
- the second processor 31 controls the touch display module 35 to display the key authentication completion notice and allows the mobile device 30 to connect with the vehicular computer 20 for the user to control the vehicle through operation of the application.
- the vehicular computer 20 transmits a key authentication error notice to the mobile device 30 and the key authentication error notice is displayed on the touch display module 35 for user's awareness, thus preventing the mobile device 30 from connecting to a vehicular computer 20 unpaired with the mobile device 30 , reducing an error rate of unsuccessful connection, and attaining a second protection scheme for secure connection.
- the first Bluetooth key and the second Bluetooth key may be symmetric keys. Under the circumstance, the successful authentication for the first Bluetooth key and the second Bluetooth key means that the first Bluetooth key is identical to the second Bluetooth key. Alternatively, the first Bluetooth key and the second Bluetooth key may be asymmetric keys. Under the circumstance, the successful authentication for the first Bluetooth key and the second Bluetooth key means that the first Bluetooth key and the second Bluetooth key are paired with each other.
- connection method using the IoV system can be further derived.
- the mobile device 30 is connected to the cloud server 10 at the remote end and the vehicular computer 20 at the local end.
- the connection method is performed by the IoV system and includes the following steps.
- Step S 61 The mobile device 30 acquires the authentication code.
- Step S 62 The mobile device 30 transmits the authentication code to the cloud server 10 at the remote end to complete the online identity authentication.
- Step S 63 The mobile device 30 searches the vehicular computer 20 at the local end through the Bluetooth connection, exchanges information with the vehicular computer 20 , and authenticates the exchanged information.
- Step S 64 The mobile device 30 connects to the vehicular computer 20 .
- step S 62 further includes the following steps.
- Step S 621 The mobile device 30 transmits the authentication code to the cloud server 10 at the remote end.
- Step S 622 The cloud server 10 compares if the authentication code is identical to that stored therein. If the comparison result is positive, perform step S 623 . Otherwise, perform step S 624 .
- Step S 623 The cloud server 10 transmits the identity authentication completion notice to the mobile device 30 .
- Step S 624 The cloud server 10 transmits the identity authentication error notice to the mobile device 30 and resumes the step S 621 .
- step S 63 further includes the following steps.
- Step S 631 The mobile device 30 receives the first broadcast name of the vehicular computer 20 .
- Step S 632 The mobile device 30 determines if the received first broadcast name is identical to the second broadcast name of the mobile device. If the determination result is positive, perform step S 633 . Otherwise, perform step S 637 and then resume the step S 631 .
- Step S 633 The mobile device 30 displays the broadcast authentication completion notice for user's awareness.
- Step S 634 The mobile device 30 transmits the second Bluetooth key to the vehicular computer 20 .
- Step S 635 The vehicular computer 20 determines if the received second Bluetooth key is successfully authenticated with the first Bluetooth key thereof. If the determination result is positive, perform step S 636 and then resume the step S 64 . Otherwise, perform step S 638 and then resume step S 631 .
- Step S 636 The vehicular computer 20 transmits the key authentication completion notice to the mobile device 30 for user's awareness.
- Step S 637 The mobile device 30 displays the broadcast authentication error notice for user's awareness.
- Step S 638 The vehicular computer 20 transmits the key authentication error notice to the mobile device 30 for user's awareness.
- the present invention includes the following features:
- the mobile device 30 By inputting the identity information in exchange of the authentication code, every time when the mobile device 30 needs to establish connection with the vehicular computer 20 , the mobile device 30 must carry out the online identity authentication through the cloud server 10 to authenticate the authentication code.
- Such authentication approach provides the first protection scheme for secure connection requiring that users necessarily acquire the privilege to operate the mobile device 30 to connect to the vehicular computer 20 .
- the vehicular computer 20 that is controllable to the mobile device 30 can be recognized through the broadcast name of the mobile device 30 and the vehicular computer 20 , thereby addressing the issue of erroneous connection or unauthorized connection and attaining the second protection scheme for secure connection.
- the authentication for the Bluetooth keys in the mobile device 30 and the vehicular computer 20 can prevent the chance of unauthorized connection arising from the negligence of not taking inconsistency between the Bluetooth keys in the mobile device 30 and the vehicular computer into account and attains the second protection scheme for secure connection.
- the present invention achieves a multifold protection mechanism for secure connection, which effectively increases the protection effect for secure connection and against vehicle theft.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mechanical Engineering (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Mobile Radio Communication Systems (AREA)
- Lock And Its Accessories (AREA)
- Theoretical Computer Science (AREA)
- Small-Scale Networks (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
Abstract
Description
- The present invention relates to an Internet of Vehicles (IoV) system and, more particularly, to an IoV system performing connection authentication through a public network and a connection method.
- Owing to rapid information technology development driving other industrial chains to undergo a transformation process, given the automotive industry as an example, to enhance driving comfort, maneuverability, safety and the like of drivers, vehicle manufacturers in succession equip vehicles with many intelligent driving assistance systems.
- To wirelessly control a vehicle, currently, users may employ mobile devices to establish connection with a vehicular computer of the vehicle through a Bluetooth connection, such that the mobile devices can control the vehicle door to be locked or unlocked or the vehicular computer to issue an alarm. However, mobile devices just need to build up their connection with the vehicular computer for the first time to be directly connected to the vehicular computer later on. Supposing that a mobile device has no protection against insecure connection in operation, when the mobile device is lost, anyone who finds the mobile phone can establish connection with the vehicular computer to control the vehicle, making prevention of vehicle theft uneasy.
- An objective of the present invention is to provide an Internet of Vehicles (IoV) system performing connection authentication through a public network and a connection method, which are implemented for secure connection with a vehicular computer after an online identity authentication and a data exchange identity authentication simultaneously performed by a mobile device to enhance connection security between the mobile device and the vehicular computer.
- To achieve the foregoing objective, the IoV system includes a cloud server, a vehicular computer and a mobile device.
- The cloud server is located at a remote end and stores and compares data.
- The vehicular computer is located at a local end, is installed in a vehicle to control various types of electronic equipment of the vehicle, and has a first broadcast name and a first Bluetooth key pre-stored therein.
- The mobile device is connected to the cloud server and the vehicular computer and has a second broadcast name and a second Bluetooth key.
- The mobile device acquires an authentication code and transmits the authentication code to the cloud server to complete an online identity authentication, searches the vehicular computer according to a Bluetooth protocol, transmits the second broadcast name and the second Bluetooth key to the vehicular computer in exchange of the first broadcast name and the first Bluetooth key in the vehicular computer transmitted from the vehicular computer, and after the vehicular computer successfully authenticates the exchanged second broadcast name and the exchanged second Bluetooth key with the first broadcast name and the first Bluetooth key transmitted from the mobile device, establishes connection with the vehicular computer.
- As can be seen from the foregoing system, after completing the online identity authentication with the cloud server, the mobile device searches the vehicular computer through the Bluetooth connection, and establishes connection with the vehicular computer after completion of data exchange and information authentication, so as to enhance connection security and lower vehicle theft.
- To achieve the foregoing objective, the connection method performing connection authentication through a public network is performed by an Internet of vehicles (IoV) system with a mobile device connected to a cloud server at a remote end and a vehicular computer at a local end and the connection method comprises steps of:
- acquiring an authentication code through the mobile device;
- transmitting the authentication code to the cloud server through the mobile device to complete an online identity authentication;
- searching the vehicular computer, exchanging information with the vehicular computer, and authenticating the exchanged information through the mobile device; and
- establishing connection with the vehicular computer through the mobile device.
- From the foregoing connection method, after completing the online identity authentication with the cloud server, the mobile device searches the vehicular computer through the Bluetooth connection, and establishes connection with the vehicular computer after completion of authentication of exchanged data, so as to enhance connection security and lower risk of vehicle theft.
- Other objectives, advantages and novel features of the invention will become more apparent from the following detailed description when taken in conjunction with the accompanying drawings.
-
FIG. 1 is a first functional block diagram showing a system architecture of an IoV system performing connection authentication through a public network in accordance with the present invention; -
FIG. 2 is a second functional block diagram showing a system architecture of an IoV system performing connection authentication through a public network in accordance with the present invention; -
FIG. 3 is a third functional block diagram showing a system architecture of an IoV system performing connection authentication through a public network in accordance with the present invention; -
FIG. 4 is a flow diagram showing that a vehicular computer of the IoV system inFIGS. 1, 2 and 3 acquires a first Bluetooth key and a first broadcast name; -
FIG. 5 is a flow diagram showing that a mobile device of the IoV system inFIGS. 1, 2 and 3 acquires a second Bluetooth key and a second broadcast name; -
FIG. 6 is a first flow diagram showing a connection method in accordance with the present invention; -
FIG. 7 is a second flow diagram showing a connection method in accordance with the present invention; and -
FIG. 8 is a third flow diagram showing a connection method in accordance with the present invention. - With reference to
FIG. 1 , an IoV (Internet of Vehicles) system performing connection authentication through a public network in accordance with the present invention includes acloud server 10 at a remote end, avehicular computer 20 at a local end, and amobile device 30. Themobile device 30 is connected to thecloud server 10 and thevehicular computer 20. Thevehicular computer 20 is installed in a vehicle to control various types of electronic equipment of the vehicle. Themobile device 30 may be a smart phone, a tablet personal computer, or a wearable smart device. - With reference to
FIGS. 2 and 3 , thevehicular computer 20 includes afirst processor 21, afirst storage unit 22 and a first Bluetoothunit 23. Thefirst processor 21 is connected to thefirst storage unit 22 and the first Bluetoothunit 23 and processes received data. Thefirst storage unit 22 serves to store data. The first Bluetoothunit 23 serves to connect themobile device 30 and transmit and receive data to and from themobile device 30. - The
first storage unit 22 has a first broadcast name and a first Bluetooth key pre-stored therein. The way of pre-storing is explained later. The first Bluetoothunit 23 complies with a Bluetooth protocol, which may be Bluetooth 1.0, Bluetooth 2.0, Bluetooth 3.0, Bluetooth 4.0, Bluetooth 5.0 or a newer Bluetooth protocol. - The
mobile device 30 includes asecond processor 31, asecond storage unit 32, acommunication unit 33, a second Bluetoothunit 34 and atouch display module 35. Thesecond processor 31 is connected to thesecond storage unit 32, thecommunication unit 33, the second Bluetoothunit 34 and thetouch display module 35 and processes received data. Thesecond storage unit 32 serves to store data. Thecommunication unit 33 is connected to thecloud server 10 through a network to transmit and receive data from thecloud server 10. The second Bluetoothunit 34 serves to connect the first Bluetoothunit 23 of thevehicular computer 20 and transmit and receive data to and from thevehicular computer 20. Thetouch display module 35 serves to input data, and transmits the inputted data to thesecond processor 31 for processing or display information under the control of thesecond processor 31. Thetouch display module 35 may be a touch screen. - The
mobile device 30 has an application installed therein for users to operate the application through thetouch display module 35 so as to transmit and receive data to and from and authenticate data through or establish connection with thecloud server 10 and thevehicular computer 20. - The
second storage unit 32 has a second broadcast name and a second Bluetooth key pre-stored therein. The way of pre-storing is explained later. The second Bluetoothunit 34 complies with a Bluetooth protocol, which may be Bluetooth 1.0, Bluetooth 2.0, Bluetooth 3.0, Bluetooth 4.0, Bluetooth 5.0 or a newer Bluetooth protocol. - A security data mapping table, which includes multiple pieces of security data differing from each other, is pre-stored in the
cloud server 10. Each piece of security data has a first broadcast name, a first Bluetooth key, a second broadcast name, a second Bluetooth key, identity information, and an authentication code. What is worth mentioning is that the first broadcast name and the second broadcast name may be the same, and the first Bluetooth key and the second Bluetooth key are symmetric keys or asymmetric keys, such as Hash, AES, RSA, PKCS, or other more reliable authentication schemes. - Regarding the way of pre-storing the first broadcast name and the first Bluetooth key in the
vehicular computer 20, with reference toFIG. 4 , when a manufacturer of thevehicular computer 20 intends to configure thevehicular computer 20, thevehicular computer 20 can be connected to thecloud server 10 in a wired or wireless manner and the IoV system performs the following steps. - Step S41: The vehicular computer transmits a configuration notice to the
cloud server 10. - Step S42: The cloud server selects one piece of the multiple pieces of security data in the security data mapping table when the receiving the configuration notice.
- Step S43: The
cloud server 10 transmits the first broadcast name and the first Bluetooth key in the selected piece of security data to thevehicular computer 20. - Step S44: The
vehicular computer 20 stores the first broadcast name and the first Bluetooth key. In the present embodiment, the name of the vehicular computer is set up to be the same as the first broadcast name. - Regarding the way of pre-storing the second broadcast name and the second Bluetooth key in the
mobile device 30, with reference toFIG. 5 , when purchasing thevehicular computer 20, a user will receive a card pairing with thevehicular computer 20. The card has identity information of thevehicular computer 20 recorded therein. When thesecond processor 31 of themobile device 30 receives the identity information inputted by the user through thetouch display module 35, the IoV system performs the following steps. - Step S51: The
mobile device 30 transmits the identity information to thecloud server 10 through thecommunication unit 33. - Step S52: When receiving the identity information, the
cloud server 10 searches if any of the multiple pieces of security data contains the identity information therein identical to the received identity information. - Step S53: When the identical identity information in any of the multiple pieces of security data is found, the
cloud server 10 transmits the second Bluetooth key, the second broadcast name and the authentication code to thecommunication unit 33 of themobile device 30. - Step S54: The
second processor 31 receives and stores the second Bluetooth key and the second broadcast name in thesecond storage unit 32, and displays the received authentication code on thetouch display module 35. In the present embodiment, the identity information includes a user's ID (identification) and a user's password. - The vehicle can be controlled by the
mobile device 30 only after themobile device 30 establishes connection with thevehicular computer 20. The way of establishing connection between themobile device 30 and thevehicular computer 20 is elaborated as follows. A user operates thetouch display module 35 to control thesecond processor 31 to execute the application in themobile device 30 and input the authentication code acquired from thecloud server 10. When receiving the authentication code, thesecond processor 31 transmits the authentication code to thecloud server 10 through thecommunication unit 33. When receiving the authentication code, thecloud server 10 performs an online identity authentication. When the online identity authentication is completed, thecloud server 10 transmits an identity authentication completion notice to thecommunication unit 33, and thesecond processor 31 instructs thetouch display module 35 to display the identity authentication completion notice. Otherwise, thecloud server 10 transmits an identity authentication error notice to thecommunication unit 33, and thesecond processor 31 instructs thetouch display module 35 to display the identity authentication error notice. In the present embodiment, the online identity authentication means that thecloud server 10 identifies if the authentication code in any of the multiple pieces of security data is identical to the received authentication code, when both authentication codes are identical, the online identity authentication is completed, and otherwise, the online identity authentication is incomplete. - By completing the online identity authentication, the application can then control the
mobile device 30 to connect with thevehicular computer 20, thus preventing unauthorized persons from accessing the vehicle and attaining a first protection scheme for secure connection. - After completion of the online identity authentication, a user can then perform the application, the
mobile device 30 searches thevehicular computer 20 to exchange information with thevehicular computer 20 and establishes connection with the vehicular computer after authentication of the exchanged information. The way of exchanging and authenticating information includes the following two parts. - Firstly, the user can operate the application through the
touch display module 35, allowing thesecond processor 31 to control thesecond Bluetooth unit 34 of themobile device 30 in search of the first broadcast name broadcasted by thefirst Bluetooth unit 23 of thevehicular computer 20. When the first broadcast name is found, thesecond processor 31 receives the first broadcast name through thesecond Bluetooth unit 34 and compares whether the received first broadcast name is identical to the second broadcast name stored in thesecond storage unit 32 or not. When the first broadcast name and the second broadcast name are compared to be the same, thesecond processor 31 controls thetouch display module 35 to display a broadcast authentication completion notice for user's awareness. In the present embodiment, when both first broadcast names are compared not to be the same, a broadcast authentication error notice is displayed for user's awareness. - Secondly, the
second processor 31 transmits the second Bluetooth key to thefirst Bluetooth unit 23 of thevehicular computer 20 through thesecond Bluetooth unit 34. Thefirst processor 21 authenticates the received second Bluetooth key with the first Bluetooth key stored in thefirst storage unit 22. When the authentication is successful, thefirst processor 21 transmits a key authentication completion notice to thesecond Bluetooth unit 34 through thefirst Bluetooth unit 23. Thesecond processor 31 then controls thetouch display module 35 to display the key authentication completion notice and allows themobile device 30 to connect with thevehicular computer 20 for the user to control the vehicle through operation of the application. When the authentication is not successful, thevehicular computer 20 then transmits a key authentication error notice to themobile device 30 and the key authentication error notice is displayed on thetouch display module 35 for user's awareness, thus preventing themobile device 30 from connecting to avehicular computer 20 unpaired with themobile device 30, reducing an error rate of unsuccessful connection, and attaining a second protection scheme for secure connection. The first Bluetooth key and the second Bluetooth key may be symmetric keys. Under the circumstance, the successful authentication for the first Bluetooth key and the second Bluetooth key means that the first Bluetooth key is identical to the second Bluetooth key. Alternatively, the first Bluetooth key and the second Bluetooth key may be asymmetric keys. Under the circumstance, the successful authentication for the first Bluetooth key and the second Bluetooth key means that the first Bluetooth key and the second Bluetooth key are paired with each other. - Based on the foregoing description, a connection method using the IoV system can be further derived. With reference to
FIG. 6 , themobile device 30 is connected to thecloud server 10 at the remote end and thevehicular computer 20 at the local end. The connection method is performed by the IoV system and includes the following steps. - Step S61: The
mobile device 30 acquires the authentication code. - Step S62: The
mobile device 30 transmits the authentication code to thecloud server 10 at the remote end to complete the online identity authentication. - Step S63: The
mobile device 30 searches thevehicular computer 20 at the local end through the Bluetooth connection, exchanges information with thevehicular computer 20, and authenticates the exchanged information. - Step S64: The
mobile device 30 connects to thevehicular computer 20. - With reference to
FIG. 7 , the step S62 further includes the following steps. - Step S621: The
mobile device 30 transmits the authentication code to thecloud server 10 at the remote end. - Step S622: The
cloud server 10 compares if the authentication code is identical to that stored therein. If the comparison result is positive, perform step S623. Otherwise, perform step S624. - Step S623: The
cloud server 10 transmits the identity authentication completion notice to themobile device 30. - Step S624: The
cloud server 10 transmits the identity authentication error notice to themobile device 30 and resumes the step S621. - With reference to
FIG. 8 , the step S63 further includes the following steps. - Step S631: The
mobile device 30 receives the first broadcast name of thevehicular computer 20. - Step S632: The
mobile device 30 determines if the received first broadcast name is identical to the second broadcast name of the mobile device. If the determination result is positive, perform step S633. Otherwise, perform step S637 and then resume the step S631. - Step S633: The
mobile device 30 displays the broadcast authentication completion notice for user's awareness. - Step S634: The
mobile device 30 transmits the second Bluetooth key to thevehicular computer 20. - Step S635: The
vehicular computer 20 determines if the received second Bluetooth key is successfully authenticated with the first Bluetooth key thereof. If the determination result is positive, perform step S636 and then resume the step S64. Otherwise, perform step S638 and then resume step S631. - Step S636: The
vehicular computer 20 transmits the key authentication completion notice to themobile device 30 for user's awareness. - Step S637: The
mobile device 30 displays the broadcast authentication error notice for user's awareness. - Step S638: The
vehicular computer 20 transmits the key authentication error notice to themobile device 30 for user's awareness. - In sum, the present invention includes the following features:
- 1. By inputting the identity information in exchange of the authentication code, every time when the
mobile device 30 needs to establish connection with thevehicular computer 20, themobile device 30 must carry out the online identity authentication through thecloud server 10 to authenticate the authentication code. Such authentication approach provides the first protection scheme for secure connection requiring that users necessarily acquire the privilege to operate themobile device 30 to connect to thevehicular computer 20. - 2. The
vehicular computer 20 that is controllable to themobile device 30 can be recognized through the broadcast name of themobile device 30 and thevehicular computer 20, thereby addressing the issue of erroneous connection or unauthorized connection and attaining the second protection scheme for secure connection. - 3. The authentication for the Bluetooth keys in the
mobile device 30 and thevehicular computer 20 can prevent the chance of unauthorized connection arising from the negligence of not taking inconsistency between the Bluetooth keys in themobile device 30 and the vehicular computer into account and attains the second protection scheme for secure connection. - By virtue of the online identity authentication, information exchange, and authentication of exchanged information, the present invention achieves a multifold protection mechanism for secure connection, which effectively increases the protection effect for secure connection and against vehicle theft.
- Even though numerous characteristics and advantages of the present invention have been set forth in the foregoing description, together with details of the structure and function of the invention, the disclosure is illustrative only. Changes may be made in detail, especially in matters of shape, size, and arrangement of parts within the principles of the invention to the full extent indicated by the broad general meaning of the terms in which the appended claims are expressed.
Claims (16)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW107120476A | 2018-06-14 | ||
TW107120476 | 2018-06-14 | ||
TW107120476A TWI670960B (en) | 2018-06-14 | 2018-06-14 | Vehicle networking system for verifying connection under public network and connection method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
US10493955B1 US10493955B1 (en) | 2019-12-03 |
US20190381971A1 true US20190381971A1 (en) | 2019-12-19 |
Family
ID=64920793
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/059,844 Active US10493955B1 (en) | 2018-06-14 | 2018-08-09 | Internet of vehicles system performing connection authentication through a public network and connection method |
Country Status (4)
Country | Link |
---|---|
US (1) | US10493955B1 (en) |
JP (1) | JP2019220936A (en) |
CN (1) | CN109195136A (en) |
TW (1) | TWI670960B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117119449A (en) * | 2023-10-20 | 2023-11-24 | 长江量子(武汉)科技有限公司 | Vehicle cloud safety communication method and system |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA3127454A1 (en) * | 2019-01-25 | 2020-07-30 | Thor Tech, Inc. | Mobile device tools for authenticated smart vehicle pairing and wireless routing configuration and methods of use |
CN110481502A (en) * | 2019-08-05 | 2019-11-22 | 浙江合众新能源汽车有限公司 | Automobile short range unlocking method and system based on bluetooth |
ES2969587T3 (en) * | 2019-09-03 | 2024-05-21 | Esmart Tech Sa | Device pairing system and methods |
CN112541988B (en) * | 2019-09-05 | 2022-09-23 | 华为技术有限公司 | Method and device for storing and transmitting data through vehicle key |
CN113978349A (en) * | 2021-09-24 | 2022-01-28 | 合众新能源汽车有限公司 | Intelligent vehicle welcoming method and device |
CN114220198B (en) * | 2021-11-22 | 2024-03-26 | 江铃汽车股份有限公司 | Bluetooth key automatic activation method, system, computer and readable storage medium |
CN114679482B (en) * | 2022-03-28 | 2024-04-30 | 广州小鹏汽车科技有限公司 | Vehicle control method, vehicle, and storage medium |
TWI795256B (en) * | 2022-03-31 | 2023-03-01 | 穎利科研國際事業有限公司 | Internet of Vehicles Information Security Protection System |
CN115035634B (en) * | 2022-04-26 | 2024-03-26 | 江铃汽车股份有限公司 | Bluetooth key ID resetting method, system, readable storage medium and computer |
CN116669027B (en) * | 2022-12-19 | 2024-04-12 | 荣耀终端有限公司 | Authentication method, authentication system, terminal equipment and Bluetooth equipment |
Family Cites Families (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6748244B2 (en) * | 2001-11-21 | 2004-06-08 | Intellisist, Llc | Sharing account information and a phone number between personal mobile phone and an in-vehicle embedded phone |
JP4226816B2 (en) | 2001-09-28 | 2009-02-18 | 株式会社東芝 | Microprocessor |
US7181620B1 (en) * | 2001-11-09 | 2007-02-20 | Cisco Technology, Inc. | Method and apparatus providing secure initialization of network devices using a cryptographic key distribution approach |
JP4186549B2 (en) * | 2002-08-09 | 2008-11-26 | 三菱ふそうトラック・バス株式会社 | Vehicle management method, vehicle management system, and vehicle control apparatus |
JP2007108973A (en) | 2005-10-13 | 2007-04-26 | Eath:Kk | Authentication server device, authentication system and authentication method |
EP2211499A4 (en) | 2007-11-16 | 2017-06-21 | Fujitsu Ten Limited | Authentication method, authentication system, on-vehicle device, and authentication device |
KR102094130B1 (en) * | 2009-06-08 | 2020-03-30 | 집카, 인크 | Mobile device application for communicating with vehicles |
US11042816B2 (en) * | 2009-10-30 | 2021-06-22 | Getaround, Inc. | Vehicle access control services and platform |
JP5558950B2 (en) * | 2010-07-20 | 2014-07-23 | 株式会社東海理化電機製作所 | Portable machine |
US20120173128A1 (en) * | 2010-12-30 | 2012-07-05 | Theresa Peeler | System and Method for Preventing the Operation of a Motor Vehicle Without Required Insurance |
US9032493B2 (en) | 2011-03-31 | 2015-05-12 | Intel Corporation | Connecting mobile devices, internet-connected vehicles, and cloud services |
KR101881167B1 (en) * | 2011-06-13 | 2018-07-23 | 주식회사 케이티 | Car control system |
JP2013126197A (en) * | 2011-12-15 | 2013-06-24 | Mitsubishi Motors Corp | Antitheft system |
JP5950225B2 (en) * | 2012-01-10 | 2016-07-13 | クラリオン株式会社 | Server device, in-vehicle terminal, information communication method, and information distribution system |
US9131376B2 (en) * | 2012-04-20 | 2015-09-08 | Bank Of America Corporation | Proximity-based dynamic vehicle navigation |
US8750832B2 (en) * | 2012-07-30 | 2014-06-10 | GM Global Technology Operations LLC | Connecting a personal mobile device to a vehicle communication unit |
EP2743868A1 (en) * | 2012-12-14 | 2014-06-18 | Seven Principles AG | Virtual vehicle key |
JP5643860B2 (en) * | 2013-02-26 | 2014-12-17 | 株式会社Nttドコモ | Vehicle management system, vehicle management device, vehicle management method, and program |
US9402174B2 (en) * | 2013-05-06 | 2016-07-26 | Verizon Telematics Inc. | Vehicle driver identification using portable device |
US20150003607A1 (en) * | 2013-06-26 | 2015-01-01 | Samsung Electronics Co., Ltd. | Secure connection method and apparatus of electronic device |
US20150024686A1 (en) * | 2013-07-16 | 2015-01-22 | GM Global Technology Operations LLC | Secure simple pairing through embedded vehicle network access device |
US20150024688A1 (en) * | 2013-07-16 | 2015-01-22 | GM Global Technology Operations LLC | Automatic Pairing of a Vehicle and a Mobile Communications Device |
JP6244215B2 (en) * | 2014-02-04 | 2017-12-06 | 株式会社東海理化電機製作所 | In-vehicle communication system |
US9516024B2 (en) * | 2014-04-17 | 2016-12-06 | Honda Motor Co., Ltd. | Connection authentication |
CN103945373B (en) * | 2014-04-25 | 2018-05-01 | 上汽大众汽车有限公司 | The safe encryption method of bluetooth data transmission |
JP6321449B2 (en) * | 2014-05-19 | 2018-05-09 | 株式会社東海理化電機製作所 | Portable terminal key system |
FR3030818B1 (en) * | 2014-12-23 | 2016-12-23 | Valeo Comfort & Driving Assistance | METHOD FOR SECURELY TRANSMITTING A VIRTUAL KEY AND METHOD OF AUTHENTICATING A MOBILE TERMINAL |
KR101673308B1 (en) | 2015-08-20 | 2016-11-07 | 현대자동차주식회사 | Method And Apparatus For Automatic Bluetooth Connection Using Bluetooth Dual_Mode |
CN106603470A (en) * | 2015-10-16 | 2017-04-26 | 上海汽车集团股份有限公司 | Vehicle control method, apparatus, vehicle key generation method and system |
CN105976466B (en) * | 2016-05-03 | 2020-01-10 | 科世达(上海)管理有限公司 | Automobile entrance guard door opening method |
CN106657063A (en) * | 2016-12-22 | 2017-05-10 | 江苏萝卜交通科技有限公司 | Unlocking method for electric vehicle, vehicle cloud platform and mobile terminal |
CN108111998B (en) * | 2017-12-18 | 2023-06-20 | 北京博创联动科技有限公司 | Wireless unlocking method and system |
CN108109239A (en) * | 2017-12-20 | 2018-06-01 | 东峡大通(北京)管理咨询有限公司 | A kind of method for unlocking of smart lock, mobile terminal and unlocking system |
-
2018
- 2018-06-14 TW TW107120476A patent/TWI670960B/en active
- 2018-08-07 CN CN201810889885.3A patent/CN109195136A/en active Pending
- 2018-08-09 US US16/059,844 patent/US10493955B1/en active Active
- 2018-09-03 JP JP2018164516A patent/JP2019220936A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117119449A (en) * | 2023-10-20 | 2023-11-24 | 长江量子(武汉)科技有限公司 | Vehicle cloud safety communication method and system |
Also Published As
Publication number | Publication date |
---|---|
CN109195136A (en) | 2019-01-11 |
TW202002566A (en) | 2020-01-01 |
US10493955B1 (en) | 2019-12-03 |
JP2019220936A (en) | 2019-12-26 |
TWI670960B (en) | 2019-09-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10493955B1 (en) | Internet of vehicles system performing connection authentication through a public network and connection method | |
EP2657917B1 (en) | Electronic key registration system and corresponding method | |
US20160150407A1 (en) | Method And System For Connecting A Mobile Communication Device To An Automobile | |
US8918643B2 (en) | Authentication method, authentication system, in-vehicle device, and authentication apparatus | |
JP5247124B2 (en) | Authentication device, in-vehicle device, and authentication system | |
US20240208461A1 (en) | Vehicle control system, vehicle control method in vehicle control system, portable device, control method for portable device, in-vehicle controller, and control method for in-vehicle controller | |
US20130179005A1 (en) | Vehicle operation authorization system | |
JP6588518B2 (en) | Car sharing system | |
US20050030151A1 (en) | Secure authentication of a user to a system and secure operation thereafter | |
JP2018531826A (en) | How to start the vehicle | |
CN107407106A (en) | Electron key system | |
KR101754876B1 (en) | Smart key system applied double security and double security method for vehicle using the same | |
CN109695383B (en) | Key unit, control system, control method, and non-transitory computer-readable storage medium having program stored therein | |
CN111845624A (en) | Method for starting vehicle without key | |
CN104954132A (en) | Information processing apparatus, information processing method, and recording medium | |
JP4075544B2 (en) | Authentication system | |
US20130340073A1 (en) | Identification to Access Portable Computing Device | |
US10169940B1 (en) | Electric lock and control method thereof | |
JP7206794B2 (en) | mobile control system | |
CN109955934A (en) | Electric vehicle identity authorization system and method | |
KR101674125B1 (en) | Method and apparatus for connecting multi-terminal by using authentication | |
CN113763603B (en) | Information processing apparatus, information processing method, computer-readable storage medium, and portable terminal | |
KR101576039B1 (en) | Network authentication method for secure user identity verification using user positioning information | |
US20230242076A1 (en) | Fingerprint Data Reset System and Fingerprint Data Reset Method | |
JP2023178671A (en) | Authentication device, authentication method, and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: IVTES LTD., TAIWAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CHEN, CHI-TING;REEL/FRAME:046606/0756 Effective date: 20180808 |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 4 |