WO2018040639A1 - 虚拟钥匙的授权方法、系统、移动终端及服务器 - Google Patents

虚拟钥匙的授权方法、系统、移动终端及服务器 Download PDF

Info

Publication number
WO2018040639A1
WO2018040639A1 PCT/CN2017/086435 CN2017086435W WO2018040639A1 WO 2018040639 A1 WO2018040639 A1 WO 2018040639A1 CN 2017086435 W CN2017086435 W CN 2017086435W WO 2018040639 A1 WO2018040639 A1 WO 2018040639A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
authorization
server
virtual key
application
Prior art date
Application number
PCT/CN2017/086435
Other languages
English (en)
French (fr)
Inventor
应世明
牛域辉
李琦
Original Assignee
长城汽车股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 长城汽车股份有限公司 filed Critical 长城汽车股份有限公司
Publication of WO2018040639A1 publication Critical patent/WO2018040639A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys

Definitions

  • the present invention relates to the field of information security technologies, and in particular, to a method, system, mobile terminal, and server for authorizing a virtual key.
  • mobile devices such as mobile phones combine mobile phones and keys. Since mobile phones are used as a kind of convenient mobile devices and widely used in daily life, the use of mobile phones as a key and a platform for authorization has become a trend.
  • a related art has proposed a vehicle operation authority granting system, comprising: a server that receives identification information identifying a first portable electronic device used as an electronic key of a vehicle from a first portable electronic device, and The validity of the identification information is confirmed, and an operation permission signal is transmitted to the vehicle, and the operation permission signal permits the vehicle operation corresponding to the request from the first portable electronic device; the key registration unit provides the confidentiality provided by the server. The key is registered in the first portable electronic device; and the access right granting unit grants access to the access server to the second portable electronic device by using the key registered in the first portable electronic device, and 2 Portable electronic devices operate as electronic keys with vehicle operating authority.
  • the disadvantage of this method is that there is a security in which a key password exists at the same time. If the authorized person still has the right to control the car during the driving process, the authorized person is at risk, and the authorized person often uses it as a temporary use. The security experience is not good in the process of using the key.
  • the related art also discloses a method, system and terminal for authorizing a vehicle, the method comprising: an authorized mobile terminal Passing the Bluetooth key application to generate the borrowing request information, and transmitting the borrowing request information to the authorized mobile terminal; authorizing the mobile terminal to receive the borrowing request information; authorizing the mobile terminal to import the borrowing request information and setting the borrowing time of the vehicle, and identifying the
  • the information, the borrowing time, and the account and password of the vehicle's Bluetooth key are encrypted to generate authorization information; the authorized mobile terminal is authorized to transmit the authorization information to the authorized mobile terminal; the authorized mobile terminal receives the authorization information, and imports the authorization information, and obtains its own identification.
  • the information is controlled, and when the identification information of the self is consistent with the identification information in the authorization information, the vehicle is controlled within the borrowing time.
  • the disadvantage of this method is that although there are prompts to control the time of use in the authorization, there is no description of the number of uses or other rights, and there is no way to implement similar restrictions in the authorization.
  • the invention aims to propose a method for authorizing a virtual key, which reduces the interaction process of obtaining an authorization code, improves efficiency, ensures the security of the transmission process, and provides a better operation experience for both parties of the key authorization. , convenience and security.
  • a method for authorizing a virtual key comprising the steps of: receiving, by a first mobile terminal, an authorization request sent by a second mobile terminal; transmitting the authorization request to a server, to receive, after the server is authenticated, receiving from the server a callback address and an authorization code; the callback address is sent to the second mobile terminal by the first application of the first mobile terminal, so that the second mobile terminal confirms by using the first application in the second mobile terminal And transmitting, by the callback address, the first application to the first mobile terminal; the first application sending the authorization code to the second mobile terminal, so that the second mobile terminal is configured according to the The authorization code is used to access the vehicle.
  • the communication between the first mobile terminal and the server, and the communication between the first mobile terminal and the second mobile terminal are tunnel encrypted.
  • the first application is an APP, an SMS, or an IE.
  • the first mobile terminal when the first mobile terminal sends the authorization request to the server, it is further configured to send the first mobile terminal identity information to the server, so that the server authenticates the first mobile terminal.
  • the authorization method of the virtual key according to the present invention has the following advantages:
  • the first mobile terminal receives the authorization request of the second mobile terminal, and sends the authorization request to the server, and after receiving the server certificate, receives the callback address and the authorization code, and sends the callback address to the second
  • the mobile terminal is configured to feed back the first mobile terminal through the callback address after the confirmation, and then the first mobile terminal sends the authorization code to the second mobile terminal to complete the authorization process. Therefore, the method reduces the interaction process of obtaining the authorization code, improves the efficiency, and adopts tunnel encryption technology (TLS) in the transmission process to ensure the security of the transmission process, and can provide a better operation experience for both parties of the key authorization. Convenience and security.
  • TLS tunnel encryption technology
  • a second object of the present invention is to provide a virtual key authorization system that reduces the acquisition of an authorization code.
  • the interactive process improves efficiency while ensuring the security of the transmission process, providing a better operational experience, convenience and security for both parties.
  • An authorization system for a virtual key comprising: a first mobile terminal, a second mobile terminal, and a server, wherein the first mobile terminal receives an authorization request sent by the second mobile terminal, and sends the authorization request to the server, Receiving, after the server is authenticated, a callback address and an authorization code sent by the server, and sending the callback address to the second mobile terminal by using a first application in the first mobile terminal, After the second mobile terminal confirms by the first application in the second mobile terminal, the first application is fed back to the first application of the first mobile terminal by using the callback address, and the first application The code is transmitted to the second mobile terminal such that the second mobile terminal accesses the vehicle according to the authorization code.
  • the communication between the first mobile terminal and the server, and the communication between the first mobile terminal and the second mobile terminal are tunnel encrypted.
  • the first application is an APP, an SMS, or an IE.
  • the first mobile terminal when the first mobile terminal sends the authorization request to the server, it is further configured to send the first mobile terminal identity information to the server, so that the server authenticates the first mobile terminal.
  • the authorization system of the virtual key and the authorization method of the virtual key described above have the same advantages as those of the prior art, and details are not described herein again.
  • a third object of the present invention is to provide a mobile terminal that reduces the interaction process of acquiring an authorization code, improves efficiency, and ensures the security of the transmission process, and can provide better cooperation for both parties of the key authorization. Operational experience, convenience and security.
  • a mobile terminal which is the first mobile terminal in the authorization system of the virtual key according to the above embodiment of the present invention.
  • a fourth object of the present invention is to provide a mobile terminal, which reduces the interaction process of acquiring an authorization code, improves efficiency, and ensures the security of the transmission process, and can provide better for both parties of the key authorization. Operational experience, convenience and security.
  • a mobile terminal which is a second mobile terminal in an authorization system of a virtual key according to the above embodiment of the present invention.
  • the mobile terminal has the same advantages as the above-mentioned virtual key authorization system with respect to the prior art. This will not be repeated here.
  • a fifth object of the present invention is to provide a server that reduces the interaction process for obtaining an authorization code, improves efficiency, and ensures the security of the transmission process, and provides a better operational experience for both parties of the key authorization. , convenience and security.
  • a server which is a server in an authorization system of a virtual key according to the above embodiment of the present invention.
  • a sixth object of the present invention is to provide an apparatus that reduces the interaction process of acquiring an authorization code, improves efficiency, and ensures the security of the transmission process, and provides a better operational experience for both parties of the key authorization. , convenience and security.
  • An apparatus comprising: one or more processors; a memory; one or more programs, the one or more programs being stored in the memory, when executed by the one or more processors, executing the present
  • the authorization method of the virtual key of the above embodiment is invented.
  • a seventh object of the present invention is to provide a non-volatile computer storage medium that reduces the interaction process of acquiring an authorization code, improves efficiency, and ensures the security of the transmission process. Both parties to the key are authorized to provide a better operating experience, convenience and security.
  • a non-volatile computer storage medium storing one or more programs, when the one or more programs are executed by a device, causing the device to perform the above-described embodiments of the present invention
  • the authorization method of the virtual key is not limited to:
  • the non-volatile computer storage medium and the above-mentioned virtual key authorization method have the same advantages as those of the prior art, and are not described herein again.
  • FIG. 1 is a flowchart of a method for authorizing a virtual key according to an embodiment of the present invention
  • FIG. 2 is a schematic block diagram of a method for authorizing a virtual key according to an embodiment of the present invention
  • FIG. 3 is a schematic diagram of virtual key sharing authorization according to an embodiment of the present invention.
  • FIG. 4 is a schematic diagram of relationship between modules in a key sharing authorization process according to an embodiment of the present invention.
  • FIG. 5 is a schematic diagram of an authorization mechanism of a method for authorizing a virtual key according to an embodiment of the present invention
  • FIG. 6 is a structural block diagram of an authorization system of a virtual key according to an embodiment of the present invention.
  • 100-virtual key authorization system 110-first mobile terminal, 120-second mobile terminal, 130-server.
  • 1 is a flow chart of a method of authorizing a virtual key in accordance with one embodiment of the present invention.
  • 2 is a functional block diagram of a method of authorizing a virtual key in accordance with one embodiment of the present invention.
  • the method for authorizing a virtual key includes the following steps:
  • Step S1 The first mobile terminal receives an authorization request sent by the second mobile terminal.
  • the first mobile terminal is the smart phone 1 shown in FIG. 2
  • the second mobile terminal is the smart phone 2 shown in FIG. 2
  • the server is the cloud server in FIG. 2.
  • Step S2 Send the authorization request to the server to receive the callback address and the authorization code sent from the server after the server is authenticated.
  • the first mobile terminal when the first mobile terminal sends the authorization request to the server, the first mobile terminal is further configured to send the first mobile terminal identity information to the server, so that the server authenticates the first mobile terminal.
  • Step S3 Send the callback address to the second mobile terminal by using the first application of the first mobile terminal, so that the second mobile terminal feeds back to the first mobile through the callback address after confirming by the first application in the second mobile terminal The first application of the terminal.
  • the first application is, for example, an APP, an SMS, or an IE.
  • Step S4 The first application sends the authorization code to the second mobile terminal, so that the second mobile terminal accesses the vehicle according to the authorization code.
  • communication between the first mobile terminal and the server, and communication between the first mobile terminal and the second mobile terminal employs tunnel encryption.
  • the renter (all of the smart phone 2) Sending an authorization request to the owner (the owner of the smartphone 1), after receiving the authorization certificate of the owner, the renter transmits the authorization certificate transmitted by the owner's smartphone 1 to the cloud server, and receives the key access verification code from the server.
  • the verification code is saved to the smartphone 2 of the authorized person (the renter), and the authorized person carries the protected resource saved to the authorized smart phone 2, and matches with the PEPS integrated Bluetooth module car to complete the key authentication communication.
  • the process, the specific authorization process is shown in Figure 3, as follows:
  • the renter initiates an authorization request to the owner to obtain the authorization credential from the owner's mobile device 1 (ie, the smartphone 1 or the first mobile terminal).
  • This authorization certificate is used to indicate that the owner agrees to authorize the renter.
  • the renter sends the authorization certificate and the renter mobile device certificate to the cloud server to request the authorization code to obtain the final access certificate.
  • the cloud server authenticates the subscriber mobile device 2 (ie, the smartphone 2 or the second mobile terminal) and verifies the validity of the authorization credential. If the authentication is completed, the cloud server returns the access credential authorization code to the mobile device 2.
  • the renter uses the access credential authorization code to represent the owner of the car to make a data request to the car PEPS.
  • the PEPS verifies that the protected resource is returned to the renter mobile device 2 after passing the authorization code.
  • Figure 4 lists the relationship between the relevant modules in the key authorization process, as follows:
  • the renter mobile device 2 requests an access authorization code from the owner mobile device 1 through the intermediate system.
  • the owner mobile device 1 returns an access authorization code to the renter mobile device 2 after the user authorization and the authentication of the renter information are passed.
  • the renter mobile device 2 uses the access authorization code to invoke the open platform data interface to access the protected user resources, and the access is captured by the cloud server.
  • the cloud server obtains the access authorization code, and requests the owner of the relevant user type and authority information of the authorization code.
  • the owner mobile device 1 returns the authentication information.
  • the cloud server verifies the permission information included in the request authorization code and the permission information required for resource approval.
  • the embodiment of the present invention adopts an implicit authorization mechanism mode, that is, the renter sends a request authorization to the owner mobile device 1 through the mobile device 2, and the owner passes the device.
  • the cloud server After the APP, IE, etc. input the account password and select the authorization of the request of the renter, the cloud server does not return the temporary token to the third-party application, but directly returns the authorization code to the mobile device 2 in the form of a URI fragment.
  • the detailed authorization mechanism is shown in Figure 5, as follows:
  • the renter's mobile device 2 boots the authorization process to the authorized data exchange node of the cloud server through a customized APP or the like.
  • the mobile device 2 requests the custom APP to the cloud server, it will bring the client id, the client device id, the request permission range, the status code, and the callback address for the cloud server to call back.
  • the cloud server After the owner mobile device 1 inputs the user credentials on the cloud server, the cloud server authenticates the identity of the owner, and then the owner decides whether to authorize the request of the client of the mobile device 2.
  • the cloud server starts the corresponding processing flow according to the owner's authorization mode, and then attaches the authorization code in the form of a URI fragment to the callback address passed in step 1.
  • the owner's custom APP needs to keep the authorization code locally and request the storage resource of the callback address from the subscriber's custom APP.
  • the Subscriber Custom APP parses a script with a full callback address that can retrieve the authorization code information returned in step 3.
  • the owner-defined APP runs the script locally to obtain the authorization code, and returns the obtained authorization code to the mobile device 2.
  • the first mobile terminal receives an authorization request of the second mobile terminal, and sends the request to the server, and after receiving the server certificate, receives the callback address and the authorization code, and The callback address is sent to the second mobile terminal, so that after the second mobile terminal confirms, the callback address is fed back to the first mobile terminal, and then the first mobile terminal sends the authorization code to the second mobile terminal to complete the authorization process. Therefore, the method reduces the interaction process of obtaining the authorization code, improves the efficiency, and adopts tunnel encryption technology (TLS) in the transmission process to ensure the security of the transmission process, and can provide a better operation experience for both parties of the key authorization. Convenience and security.
  • TLS tunnel encryption technology
  • an embodiment of the present invention discloses a virtual key authorization system 100, including: a first mobile terminal 110, a second mobile terminal 120, and a server 130.
  • the first mobile terminal 110 receives the authorization request sent by the second mobile terminal 120, and sends an authorization request to the server 130 to receive the callback address and the authorization code sent from the server 130 after the server 130 passes the authentication, and to pass the first move.
  • the first application in the terminal 110 sends the callback address to the second mobile terminal 120, so that the second mobile terminal 120 feeds back to the first mobile terminal 110 through the callback address after being confirmed by the first application in the second mobile terminal 120.
  • the first application the first application sends an authorization code to the second mobile terminal 120, so that the second mobile terminal 120 accesses the vehicle according to the authorization code.
  • the first application is, for example, an APP, an SMS, or an IE.
  • communication between the first mobile terminal 110 and the server 130, and communication between the first mobile terminal 110 and the second mobile terminal 120 employs tunnel encryption.
  • the first mobile terminal 110 when the first mobile terminal 110 sends an authorization request to the server 130, it is further configured to send the first mobile terminal 110 identity information to the server 130, so that the server 130 authenticates the first mobile terminal 110. .
  • the first mobile terminal receives the authorization request of the second mobile terminal, and sends the request to the server, and after receiving the server certificate, receives the callback address and the authorization code, and The callback address is sent to the second mobile terminal, so that after the second mobile terminal confirms, the callback address is fed back to the first mobile terminal, and then the first mobile terminal sends the authorization code to the second mobile terminal to complete the authorization process. Therefore, the system is reduced The interaction process for obtaining the authorization code is reduced, and the efficiency is improved.
  • tunnel encryption technology TLS is used in the transmission process to ensure the security of the transmission process, which can provide better operation experience, convenience and security for both parties of the key authorization. Guarantee.
  • an embodiment of the present invention discloses a mobile terminal, for example, a first mobile terminal in an authorization system of a virtual key described in the above embodiment of the present invention. Therefore, for a detailed description of the mobile terminal, reference is made to the above description of the first mobile terminal portion of the present invention.
  • the mobile terminal reduces the interaction process of acquiring the authorization code, improves the efficiency, ensures the security of the transmission process, and provides a better operation experience and convenience for both parties of the key authorization. Security.
  • an embodiment of the present invention discloses a mobile terminal, for example, a second mobile terminal in an authorization system of a virtual key described in the above embodiment of the present invention. Therefore, for a detailed description of the mobile terminal, reference is made to the above description of the second mobile terminal portion of the present invention.
  • the mobile terminal reduces the interaction process of acquiring the authorization code, improves the efficiency, ensures the security of the transmission process, and provides a better operation experience and convenience for both parties of the key authorization. Security.
  • an embodiment of the present invention discloses a server, such as a server in an authorization system of a virtual key described in the above embodiments of the present invention. Therefore, for a detailed description of the server, reference is made to the above description of the server portion of the present invention.
  • the server according to the embodiment of the present invention reduces the interaction process of obtaining the authorization code, improves the efficiency, ensures the security of the transmission process, and provides a better operation experience, convenience and security for both parties of the key authorization. Guarantee.
  • embodiments of the present invention disclose an apparatus comprising: one or more processors; a memory; one or more programs, one or more programs stored in the memory, when processed by one or more
  • the authorization method of the virtual key described in the above embodiment of the present invention is executed.
  • the device reduces the interaction process of obtaining the authorization code and improves the efficiency.
  • the tunnel encryption technology TLS is used in the transmission process to ensure the security of the transmission process, which can provide a better operation experience and convenience for both parties of the key authorization. And security.
  • embodiments of the present invention disclose a non-volatile computer storage medium storing one or more programs that, when executed by a device, cause the device to perform the above-described embodiments of the present invention
  • the authorization method of the virtual key described in the embodiment reduces the acquisition authorization code
  • the interaction process improves efficiency, and tunnel encryption technology (TLS) is used in the transmission process to ensure the security of the transmission process, which can provide better operation experience, convenience and security for both parties.
  • TLS tunnel encryption technology

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明提供了一种虚拟钥匙的授权方法、系统、移动终端及服务器,方法包括:第一移动终端接收第二移动终端发送的授权请求;将授权请求发送给服务器,以在服务器认证通过后,接收来自服务器发送的回调地址和授权码;通过第一移动终端的第一应用程序将回调地址发送给第二移动终端,以便第二移动终端通过第二移动终端中的第一应用程确认后,通过回调地址反馈给第一移动终端的第一应用程序;第一应用程序将授权码发送给第二移动终端,以便第二移动终端根据授权码访问车辆。本发明减少了获取授权码的交互流程,提高了效率,同时保证了传输过程的安全性,能够给钥匙授权的双方提供了更好的操作体验、便利性和安全保障。

Description

虚拟钥匙的授权方法、系统、移动终端及服务器
相关申请的交叉引用
本申请要求长城汽车股份有限公司于2016年08月31日提交的、发明名称为“虚拟钥匙的授权方法、系统、移动终端及服务器”的、中国专利申请号“201610792870.6”的优先权。
技术领域
本发明涉及信息安全技术领域,特别涉及一种虚拟钥匙的授权方法、系统、移动终端及服务器。
背景技术
随着电子产品技术的快速发展,对生活中的便捷和安全要求越来越高。作为在生活中必不可少的安全锁系统,例如应用在汽车、家居等领域的电子锁系统,其设计已越来越贴近用户的期望需求。而普通钥匙的借用,需要将实物(包括机械钥匙、电子钥匙、非接触磁卡等)交给借用人,造成了时间和空间上的不方便。如今智能电子钥匙的出现为广大用户提供了新的钥匙分享平台,用户之间可以通过某些通讯方式,在电子设备上将钥匙授权给他人,解决了普通钥匙分享时间和空间上的局限性。
根据用户的需求,各种智能电子钥匙被设计出来,移动设备例如手机,将手机和钥匙结合。由于手机作为便捷性移动设备的一种,在日常生活中应用广泛,以手机作为一种钥匙的使用和授权的平台已经成为一种趋势。
目前,相关技术提出了一种车辆操作权限授予系统,具备:服务器,其从第1便携型电子设备接收对作为车辆的电子钥匙来使用的第1便携型电子设备进行识别的识别信息,且对识别信息的正当性进行确认,且将动作许可信号发送至车辆,该动作许可信号对与来自于第1便携型电子设备的要求相应的车辆操作进行许可;钥匙登录部,将服务器所提供的密钥登录在第1便携型电子设备中;以及访问权授予部,其通过使用登录在第1便携型电子设备中的密钥将访问服务器的访问权授予给第2便携型电子设备,并且使第2便携型电子设备作为具有车辆操作权限的电子钥匙来动作。该方法的缺点在于,存在一个钥匙密码同时存在的安全性,如果被授权者在开车的过程中,授权者仍有权限控制汽车,会给被授权者带来危险,被授权者往往作为临时使用者,在使用钥匙的过程中安全体验并不好。
相关技术还公开了一种车辆的授权方法、系统和终端,方法包括:被授权移动终端通 过蓝牙钥匙应用程序生成借车请求信息,并将借车请求信息发送至授权移动终端;授权移动终端接收借车请求信息;授权移动终端导入借车请求信息并设置车辆的借用时间,并且将标识信息、借用时间以及车辆蓝牙钥匙的账号和密码进行加密以生成授权信息;授权移动终端将授权信息发送至被授权移动终端;被授权移动终端接收授权信息,并导入授权信息,及获取自身的标识信息,且当自身的标识信息与授权信息中的标识信息一致时,在借用时间内控制车辆。该方法的缺点在于,虽然有提示在授权中控制使用的时间,但并没有对使用次数或其他权限做出说明,更没有对授权中如何实现类似限制做出方案。
发明内容
本发明旨在提出一种虚拟钥匙的授权方法,该方法减少了获取授权码的交互流程,提高了效率,同时保证了传输过程的安全性,能够给钥匙授权的双方提供了更好的操作体验、便利性和安全保障。
为达到上述目的,本发明的技术方案是这样实现的:
一种虚拟钥匙的授权方法,包括以下步骤:第一移动终端接收第二移动终端发送的授权请求;将所述授权请求发送给服务器,以在所述服务器认证通过后,接收来自所述服务器发送的回调地址和授权码;通过第一移动终端的第一应用程序将所述回调地址发送给所述第二移动终端,以便所述第二移动终端通过第二移动终端中的第一应用程确认后,通过所述回调地址反馈给所述第一移动终端的第一应用程序;所述第一应用程序将所述授权码发送给所述第二移动终端,以便所述第二移动终端根据所述授权码访问车辆。
进一步地,所述第一移动终端与所述服务器之间的通信,以及所述第一移动终端与所述第二移动终端之间的通信采用隧道加密。
进一步地,所述第一应用程序为APP、SMS或者IE。
进一步地,所述第一移动终端将所述授权请求发送给服务器时,还用于将第一移动终端身份信息发送给所述服务器,以便所述服务器对所述第一移动终端进行认证。
相对于现有技术,本发明所述的虚拟钥匙的授权方法具有以下优势:
本发明的虚拟钥匙的授权方法,第一移动终端接收第二移动终端的授权请求,并发送给服务器,并在服务器人证通过后,接收回调地址和授权码,并将回调地址发送给第二移动终端,以便第二移动终端在确认后,通过回调地址反馈给第一移动终端,然后第一移动终端将授权码发送给第二移动终端,完成授权过程。因此,该方法减少了获取授权码的交互流程,提高了效率,同时在传输过程中采用隧道加密技术(TLS)保证传输过程的安全性,能够给钥匙授权的双方提供了更好的操作体验、便利性和安全保障。
本发明的第二个目的在于提出一种虚拟钥匙的授权系统,该系统减少了获取授权码的 交互流程,提高了效率,同时保证了传输过程的安全性,能够给钥匙授权的双方提供了更好的操作体验、便利性和安全保障。
为达到上述目的,本发明的技术方案是这样实现的:
一种虚拟钥匙的授权系统,包括:第一移动终端、第二移动终端和服务器,其中,所述第一移动终端接收第二移动终端发送的授权请求,并将所述授权请求发送给服务器,以在所述服务器认证通过后,接收来自所述服务器发送的回调地址和授权码,以及通过所述第一移动终端中的第一应用程序将所述回调地址发送给所述第二移动终端,以便所述第二移动终端通过第二移动终端中的第一应用程序确认后,通过所述回调地址反馈给所述第一移动终端的第一应用程序,所述第一应用程序将所述授权码发送给所述第二移动终端,以便所述第二移动终端根据所述授权码访问车辆。
进一步地,所述第一移动终端与所述服务器之间的通信,以及所述第一移动终端与所述第二移动终端之间的通信采用隧道加密。
进一步地,所述第一应用程序为APP、SMS或者IE。
进一步地,所述第一移动终端将所述授权请求发送给服务器时,还用于将第一移动终端身份信息发送给所述服务器,以便所述服务器对所述第一移动终端进行认证。
所述的虚拟钥匙的授权系统与上述的虚拟钥匙的授权方法相对于现有技术所具有的优势相同,在此不再赘述。
本发明的第三个目的在于提出一种移动终端,该移动终端减少了获取授权码的交互流程,提高了效率,同时保证了传输过程的安全性,能够给钥匙授权的双方提供了更好的操作体验、便利性和安全保障。
为达到上述目的,本发明的技术方案是这样实现的:
一种移动终端,所述移动终端为本发明上述实施例所述的虚拟钥匙的授权系统中的第一移动终端。
所述的移动终端与上述的虚拟钥匙的授权系统相对于现有技术所具有的优势相同,在此不再赘述。
本发明的第四个目的在于提出一种移动终端,该移动终端减少了获取授权码的交互流程,提高了效率,同时保证了传输过程的安全性,能够给钥匙授权的双方提供了更好的操作体验、便利性和安全保障。
为达到上述目的,本发明的技术方案是这样实现的:
一种移动终端,所述移动终端为本发明上述实施例所述的虚拟钥匙的授权系统中的第二移动终端。
所述的移动终端与上述的虚拟钥匙的授权系统相对于现有技术所具有的优势相同,在 此不再赘述。
本发明的第五个目的在于提出一种服务器,该服务器减少了获取授权码的交互流程,提高了效率,同时保证了传输过程的安全性,能够给钥匙授权的双方提供了更好的操作体验、便利性和安全保障。
为达到上述目的,本发明的技术方案是这样实现的:
一种服务器,所述服务器为本发明上述实施例所述的虚拟钥匙的授权系统中的服务器。
所述的服务器与上述的虚拟钥匙的授权系统相对于现有技术所具有的优势相同,在此不再赘述。
本发明的第六个目的在于提出一种设备,该设备减少了获取授权码的交互流程,提高了效率,同时保证了传输过程的安全性,能够给钥匙授权的双方提供了更好的操作体验、便利性和安全保障。
为达到上述目的,本发明的技术方案是这样实现的:
一种设备,包括:一个或者多个处理器;存储器;一个或者多个程序,所述一个或者多个程序存储在所述存储器中,当被所述一个或者多个处理器执行时,执行本发明上述实施例的虚拟钥匙的授权方法。
所述的设备与上述的虚拟钥匙的授权方法相对于现有技术所具有的优势相同,在此不再赘述。
本发明的第七个目的在于提出一种非易失性计算机存储介质,该非易失性计算机存储介质减少了获取授权码的交互流程,提高了效率,同时保证了传输过程的安全性,能够给钥匙授权的双方提供了更好的操作体验、便利性和安全保障。
为达到上述目的,本发明的技术方案是这样实现的:
一种非易失性计算机存储介质,所述计算机存储介质存储有一个或者多个程序,当所述一个或者多个程序被一个设备执行时,使得所述设备执行本发明上述实施例所述的虚拟钥匙的授权方法。
所述的非易失性计算机存储介质与上述的虚拟钥匙的授权方法相对于现有技术所具有的优势相同,在此不再赘述。
附图说明
构成本发明的一部分的附图用来提供对本发明的进一步理解,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:
图1为本发明实施例的虚拟钥匙的授权方法的流程图;
图2为本发明一个实施例的虚拟钥匙的授权方法的原理框图;
图3为本发明一个实施例的虚拟钥匙分享授权示意图;
图4为本发明一个实施例的钥匙分享授权过程中各模块关系示意图;
图5为本发明一个实施例的虚拟钥匙的授权方法的授权机制示意图;以及
图6为本发明实施例的虚拟钥匙的授权系统的结构框图。
附图标记说明:
100-虚拟钥匙的授权系统、110-第一移动终端、120-第二移动终端、130-服务器。
具体实施方式
需要说明的是,在不冲突的情况下,本发明中的实施例及实施例中的特征可以相互组合。
下面将参考附图并结合实施例来详细说明本发明。
图1是根据本发明一个实施例的虚拟钥匙的授权方法的流程图。图2是根据本发明一个实施例的虚拟钥匙的授权方法的原理框图。
如图1所示,并结合图2,本发明实施例的虚拟钥匙的授权方法包括以下步骤:
步骤S1:第一移动终端接收第二移动终端发送的授权请求。具体地,第一移动终端即为图2中所示的智能手机1,第二移动终端即为图2中所示的智能手机2,服务器即为图2中的云端服务器。
步骤S2:将授权请求发送给服务器,以在服务器认证通过后,接收来自服务器发送的回调地址和授权码。
进一步地,在本发明的一个实施例中,第一移动终端将授权请求发送给服务器时,还用于将第一移动终端身份信息发送给服务器,以便服务器对第一移动终端进行认证。
步骤S3:通过第一移动终端的第一应用程序将回调地址发送给第二移动终端,以便第二移动终端通过第二移动终端中的第一应用程确认后,通过回调地址反馈给第一移动终端的第一应用程序。
其中,第一应用程序例如为APP、SMS或者IE。
步骤S4:第一应用程序将授权码发送给第二移动终端,以便第二移动终端根据授权码访问车辆。
在本发明的一个实施例中,例如,第一移动终端与服务器之间的通信,以及第一移动终端与第二移动终端之间的通信采用隧道加密。
为了便于更好地理解本发明,以下结合附图,以具体示例对本发明实施例的方法进行更为详细具体地说明。
结合图2所示,本发明实施例的方法的原理主要概述为:租用者(智能手机2的所有 者)向车主(智能手机1的所有者)发送授权请求,在接收到车主的授权凭证后,租车者将车主的智能手机1传输的授权凭证传输到云端服务器,从服务器接收到钥匙访问验证码,将该验证码保存到被授权者(租车者)的智能手机2,被授权者携带保存到被授权智能手机2上的受保护资源,与PEPS集成蓝牙模块汽车进行匹配,完成钥匙的认证通讯过程,具体的授权过程例如图3所示,具体如下:
租用者向车主发起授权请求,从车主的移动设备1(即智能手机1或第一移动终端)获取授权凭证。这个授权凭证是用来表示车主同意对该租车者进行授权。租车者获得车主的授权凭证后,再将授权凭证及租车者移动设备凭证发送到云端服务器,进行请求授权码获得最终访问凭证。云端服务器对租用者移动设备2(即智能手机2或第二移动终端)进行认证,并验证授权凭证的有效性,如果通过验证后,云端服务器将返回访问凭证授权码给移动设备2。租车者使用访问凭证授权码代表车主向汽车PEPS进行数据请求。PEPS验证通过授权码后将受保护的资源返回给租用者移动设备2,图4列出了钥匙授权过程中各相关模块之间的关系,具体如下:
(1)租用者移动设备2通过中间系统需向车主移动设备1请求访问授权码。
(2)车主移动设备1根据用户授权及对租用者信息认证通过后,向租用者移动设备2返回访问授权码。
(3)租用者移动设备2使用访问授权码调用开放平台数据接口访问受保护的用户资源,访问被云端服务器捕捉。
(4)云端服务器获取访问授权码,向车主请求授权码的相关用户类型、权限信息。
(5)车主移动设备1返回认证信息。
(6)云端服务器对请求中授权码所包含的权限信息与资源核准需要的权限信息进行校验。
(7)对于通过权限充分的请求通过云端服务器向汽车PEPS进行进一步的数据请求。
(8)汽车PEPS返回受保护的资源数据。
基于上述提到的授权流程及各模块之间的关系,本发明的实施例采用了隐式的授权机制模式,即租车者通过移动设备2向车主移动设备1发送请求授权,车主通过设备上的APP、IE等应用进行账号密码的输入并对租用者的请求选择授权后,云端服务器并不是返回临时令牌给第三方应用,而是直接将授权码以URI片段的形式返回给移动设备2客户端,详细的授权机制例如图5所示,具体如下:
1)租车者的移动设备2通过自定义的APP等引导至云端服务器的授权数据交换节点开启授权流程。移动设备2自定义APP向云端服务器请求时,会带上客户端id、客户端设备id、请求权限范围、状态码以及用于云端服务器进行回调的回调地址。
2)车主移动设备1在云端服务端输入用户凭证后,云端服务器对车主身份进行认证,然后由车主决定是否对移动设备2客户端的请求进行授权。
3)假设车主通过了授权,云端服务器根据车主的授权模式启动相应的处理流程,之后以URI片段的形式将授权码附在利用步骤1传入的回调地址后面。
4)车主的自定义APP需保留授权码在本地,同时向租用者自定义APP发送回调地址的存储资源的请求。
5)租用者自定义APP解析带有能够获取步骤3中返回的有授权码信息的完整回调地址的脚本。
6)车主自定义APP在本地运行脚本获取到授权码,将获取的授权码返回移动设备2。
综上,根据本发明实施例的虚拟钥匙的授权方法,第一移动终端接收第二移动终端的授权请求,并发送给服务器,并在服务器人证通过后,接收回调地址和授权码,并将回调地址发送给第二移动终端,以便第二移动终端在确认后,通过回调地址反馈给第一移动终端,然后第一移动终端将授权码发送给第二移动终端,完成授权过程。因此,该方法减少了获取授权码的交互流程,提高了效率,同时在传输过程中采用隧道加密技术(TLS)保证传输过程的安全性,能够给钥匙授权的双方提供了更好的操作体验、便利性和安全保障。
进一步地,如图6所示,本发明的实施例公开了一种虚拟钥匙的授权系统100,包括:第一移动终端110、第二移动终端120和服务器130。
第一移动终端110接收第二移动终端120发送的授权请求,并将授权请求发送给服务器130,以在服务器130认证通过后,接收来自服务器130发送的回调地址和授权码,以及通过第一移动终端110中的第一应用程序将回调地址发送给第二移动终端120,以便第二移动终端120通过第二移动终端120中的第一应用程序确认后,通过回调地址反馈给第一移动终端110的第一应用程序,第一应用程序将授权码发送给第二移动终端120,以便第二移动终端120根据授权码访问车辆。其中,第一应用程序例如为APP、SMS或者IE。
在本发明的一个实施例中,第一移动终端110与服务器130之间的通信,以及第一移动终端110与第二移动终端120之间的通信采用隧道加密。
在本发明的一个实施例中,第一移动终端110将授权请求发送给服务器130时,还用于将第一移动终端110身份信息发送给服务器130,以便服务器130对第一移动终端110进行认证。
综上,根据本发明实施例的虚拟钥匙的授权系统,第一移动终端接收第二移动终端的授权请求,并发送给服务器,并在服务器人证通过后,接收回调地址和授权码,并将回调地址发送给第二移动终端,以便第二移动终端在确认后,通过回调地址反馈给第一移动终端,然后第一移动终端将授权码发送给第二移动终端,完成授权过程。因此,该系统减减 少了获取授权码的交互流程,提高了效率,同时在传输过程中采用隧道加密技术(TLS)保证传输过程的安全性,能够给钥匙授权的双方提供了更好的操作体验、便利性和安全保障。
需要说明的是,本发明实施例的虚拟钥匙的授权系统的具体实现方式与本发明实施例的虚拟钥匙的授权方法的具体实现方式类似,具体请参见方法部分的描述,为了减少冗余,此处不做赘述。
进一步地,本发明的实施例公开了一种移动终端,该移动终端例如为本发明上述实施例所描述的虚拟钥匙的授权系统中的第一移动终端。因此,关于该移动终端的具体详细描述参见本发明上述对第一移动终端部分的描述。
因此,根据本发明实施例的移动终端,减少了获取授权码的交互流程,提高了效率,同时保证了传输过程的安全性,能够给钥匙授权的双方提供了更好的操作体验、便利性和安全保障。
进一步地,本发明的实施例公开了一种移动终端,该移动终端例如为本发明上述实施例所描述的虚拟钥匙的授权系统中的第二移动终端。因此,关于该移动终端的具体详细描述参见本发明上述对第二移动终端部分的描述。
因此,根据本发明实施例的移动终端,减少了获取授权码的交互流程,提高了效率,同时保证了传输过程的安全性,能够给钥匙授权的双方提供了更好的操作体验、便利性和安全保障。
进一步地,本发明的实施例公开了一种服务器,该服务器例如为本发明上述实施例所描述的虚拟钥匙的授权系统中的服务器。因此,关于该服务器的具体详细描述参见本发明上述对服务器部分的描述。
因此,根据本发明实施例的服务器,减少了获取授权码的交互流程,提高了效率,同时保证了传输过程的安全性,能够给钥匙授权的双方提供了更好的操作体验、便利性和安全保障。
进一步地,本发明的实施例公开了一种设备,该设备包括:一个或者多个处理器;存储器;一个或者多个程序,一个或者多个程序存储在存储器中,当被一个或者多个处理器执行时,执行本发明上述实施例所描述的虚拟钥匙的授权方法。该设备减少了获取授权码的交互流程,提高了效率,同时在传输过程中采用隧道加密技术(TLS)保证传输过程的安全性,能够给钥匙授权的双方提供了更好的操作体验、便利性和安全保障。
进一步地,本发明的实施例公开了一种非易失性计算机存储介质,该计算机存储介质存储有一个或者多个程序,当一个或者多个程序被一个设备执行时,使得设备执行本发明上述实施例所描述的虚拟钥匙的授权方法。该非易失性计算机存储介质减少了获取授权码 的交互流程,提高了效率,同时在传输过程中采用隧道加密技术(TLS)保证传输过程的安全性,能够给钥匙授权的双方提供了更好的操作体验、便利性和安全保障。
以上所述仅为本发明的较佳实施例而已,并不用以限制本发明,凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。

Claims (13)

  1. 一种虚拟钥匙的授权方法,其特征在于,包括以下步骤:
    第一移动终端接收第二移动终端发送的授权请求;
    将所述授权请求发送给服务器,以在所述服务器认证通过后,接收来自所述服务器发送的回调地址和授权码;
    通过第一移动终端的第一应用程序将所述回调地址发送给所述第二移动终端,以便所述第二移动终端通过第二移动终端中的第一应用程确认后,通过所述回调地址反馈给所述第一移动终端的第一应用程序;
    所述第一应用程序将所述授权码发送给所述第二移动终端,以便所述第二移动终端根据所述授权码访问车辆。
  2. 根据权利要求1所述的虚拟钥匙的授权方法,其特征在于,所述第一移动终端与所述服务器之间的通信,以及所述第一移动终端与所述第二移动终端之间的通信采用隧道加密。
  3. 根据权利要求1所述的虚拟钥匙的授权方法,其特征在于,所述第一应用程序为APP、SMS或者IE。
  4. 根据权利要求1所述的虚拟钥匙的授权方法,其特征在于,所述第一移动终端将所述授权请求发送给服务器时,还用于将第一移动终端身份信息发送给所述服务器,以便所述服务器对所述第一移动终端进行认证。
  5. 一种虚拟钥匙的授权系统,其特征在于,包括:第一移动终端、第二移动终端和服务器,其中,
    所述第一移动终端接收第二移动终端发送的授权请求,并将所述授权请求发送给服务器,以在所述服务器认证通过后,接收来自所述服务器发送的回调地址和授权码,以及通过所述第一移动终端中的第一应用程序将所述回调地址发送给所述第二移动终端,以便所述第二移动终端通过第二移动终端中的第一应用程序确认后,通过所述回调地址反馈给所述第一移动终端的第一应用程序,所述第一应用程序将所述授权码发送给所述第二移动终端,以便所述第二移动终端根据所述授权码访问车辆。
  6. 根据权利要求5所述的虚拟钥匙的授权系统,其特征在于,所述第一移动终端与所述服务器之间的通信,以及所述第一移动终端与所述第二移动终端之间的通信采用隧道加密。
  7. 根据权利要求5所述的虚拟钥匙的授权系统,其特征在于,所述第一应用程序为APP、SMS或者IE。
  8. 根据权利要求5所述的虚拟钥匙的授权系统,其特征在于,所述第一移动终端将所述授权请求发送给服务器时,还用于将第一移动终端身份信息发送给所述服务器,以便所述服务器对所述第一移动终端进行认证。
  9. 一种移动终端,其特征在于,所述移动终端为根据权利要求5-8任一项所述的虚拟钥匙的授权系统中第一移动终端。
  10. 一种移动终端,其特征在于,所述移动终端为根据权利要求5-8任一项所述的虚拟钥匙的授权系统中第二移动终端。
  11. 一种服务器,其特征在于,所述服务器为根据权利要求5-8任一项所述的虚拟钥匙的授权系统中服务器。
  12. 一种设备,其特征在于,包括:
    一个或者多个处理器;
    存储器;
    一个或者多个程序,所述一个或者多个程序存储在所述存储器中,当被所述一个或者多个处理器执行时,执行如权利要求1-4任一项所述的虚拟钥匙的授权方法。
  13. 一种非易失性计算机存储介质,其特征在于,所述计算机存储介质存储有一个或者多个程序,当所述一个或者多个程序被一个设备执行时,使得所述设备执行如权利要求1-4任一项所述的虚拟钥匙的授权方法。
PCT/CN2017/086435 2016-08-31 2017-05-27 虚拟钥匙的授权方法、系统、移动终端及服务器 WO2018040639A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610792870.6 2016-08-31
CN201610792870.6A CN106302510B (zh) 2016-08-31 2016-08-31 虚拟钥匙的授权方法、系统、移动终端及服务器

Publications (1)

Publication Number Publication Date
WO2018040639A1 true WO2018040639A1 (zh) 2018-03-08

Family

ID=57672410

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/086435 WO2018040639A1 (zh) 2016-08-31 2017-05-27 虚拟钥匙的授权方法、系统、移动终端及服务器

Country Status (2)

Country Link
CN (1) CN106302510B (zh)
WO (1) WO2018040639A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110619221A (zh) * 2019-08-09 2019-12-27 深圳市轱辘汽车维修技术有限公司 一种虚拟授权方法、装置、终端设备及存储介质
CN113554786A (zh) * 2021-08-02 2021-10-26 南马实业(深圳)有限公司 一种蓝牙车钥匙的控车方法及系统

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106302510B (zh) * 2016-08-31 2019-07-26 长城汽车股份有限公司 虚拟钥匙的授权方法、系统、移动终端及服务器
CN106671936A (zh) * 2017-01-17 2017-05-17 北京汽车研究总院有限公司 一种汽车启动方法及装置
DE102017115298A1 (de) * 2017-07-07 2019-01-10 Huf Hülsbeck & Fürst Gmbh & Co. Kg Verfahren zur Delegation von Zugriffsrechten
KR102385474B1 (ko) * 2017-07-19 2022-04-13 현대자동차주식회사 차량 시스템 및 그 제어방법
JP6571847B1 (ja) * 2018-09-03 2019-09-04 笠▲衆▼實業有限公司 インテリジェント車両電子キーシステム
CN113554787B (zh) * 2018-09-29 2023-01-24 百度在线网络技术(北京)有限公司 车锁控制方法和装置
CN110290525A (zh) * 2019-06-21 2019-09-27 湖北亿咖通科技有限公司 一种车辆数字钥匙的分享方法及系统、移动终端
CN111148075A (zh) * 2019-12-30 2020-05-12 上海博泰悦臻网络技术服务有限公司 一种蓝牙钥匙的配置方法及用于配置蓝牙钥匙的系统
CN112153640A (zh) * 2020-06-24 2020-12-29 上汽通用五菱汽车股份有限公司 车辆控制方法、系统、用户终端、车辆及可读存储介质
CN112459617A (zh) * 2020-11-27 2021-03-09 黄志刚 一种汽车的遥控器操控盒、门锁控制系统及共享系统
CN112572344A (zh) * 2020-11-27 2021-03-30 黄志刚 一种汽车的门锁控制及共享方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103035054A (zh) * 2012-12-29 2013-04-10 江苏中科天安智联科技有限公司 具有许可及授权功能的nfc智能汽车钥匙系统
CN105491228A (zh) * 2015-11-24 2016-04-13 大连楼兰科技股份有限公司 分享车辆控制权的方法及系统
US20160236653A1 (en) * 2013-10-17 2016-08-18 Denso Corporation Electronic key system, onboard apparatus, and portable apparatus
CN106302510A (zh) * 2016-08-31 2017-01-04 长城汽车股份有限公司 虚拟钥匙的授权方法、系统、移动终端及服务器
CN106375312A (zh) * 2016-08-31 2017-02-01 长城汽车股份有限公司 虚拟钥匙的授权方法、系统、移动终端及服务器

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2743868A1 (en) * 2012-12-14 2014-06-18 Seven Principles AG Virtual vehicle key
CN104424679B (zh) * 2013-08-30 2017-04-12 比亚迪股份有限公司 无线终端中智能钥匙的授权方法、系统、终端及服务器
CN105083214B (zh) * 2014-04-28 2018-09-11 比亚迪股份有限公司 车辆的授权方法、系统、授权移动终端和被授权移动终端
CN105788037B (zh) * 2014-12-26 2018-12-21 比亚迪股份有限公司 车辆智能钥匙的授权系统和方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103035054A (zh) * 2012-12-29 2013-04-10 江苏中科天安智联科技有限公司 具有许可及授权功能的nfc智能汽车钥匙系统
US20160236653A1 (en) * 2013-10-17 2016-08-18 Denso Corporation Electronic key system, onboard apparatus, and portable apparatus
CN105491228A (zh) * 2015-11-24 2016-04-13 大连楼兰科技股份有限公司 分享车辆控制权的方法及系统
CN106302510A (zh) * 2016-08-31 2017-01-04 长城汽车股份有限公司 虚拟钥匙的授权方法、系统、移动终端及服务器
CN106375312A (zh) * 2016-08-31 2017-02-01 长城汽车股份有限公司 虚拟钥匙的授权方法、系统、移动终端及服务器

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110619221A (zh) * 2019-08-09 2019-12-27 深圳市轱辘汽车维修技术有限公司 一种虚拟授权方法、装置、终端设备及存储介质
CN110619221B (zh) * 2019-08-09 2023-10-31 深圳市轱辘车联数据技术有限公司 一种虚拟授权方法、装置、终端设备及存储介质
CN113554786A (zh) * 2021-08-02 2021-10-26 南马实业(深圳)有限公司 一种蓝牙车钥匙的控车方法及系统
CN113554786B (zh) * 2021-08-02 2023-05-30 广东南马智能技术有限公司 一种蓝牙车钥匙的控车方法及系统

Also Published As

Publication number Publication date
CN106302510B (zh) 2019-07-26
CN106302510A (zh) 2017-01-04

Similar Documents

Publication Publication Date Title
WO2018040639A1 (zh) 虚拟钥匙的授权方法、系统、移动终端及服务器
CN106375312B (zh) 虚拟钥匙的授权方法、系统、移动终端及服务器
US11888594B2 (en) System access using a mobile device
WO2018040641A1 (zh) 移动终端、车辆终端、虚拟钥匙分享方法及系统
US10645578B2 (en) System for using mobile terminals as keys for vehicles
US11777936B2 (en) Friend key sharing
CN107113315B (zh) 一种身份认证方法、终端及服务器
US9120452B2 (en) Vehicle operation authorization system
WO2021135258A1 (zh) 一种基于智能钥匙的车辆使用方法及装置
US20210168602A1 (en) Vehicle digital key sharing service method and system
CN110637328A (zh) 一种基于便携式设备的车辆访问方法
US20140189827A1 (en) System and method for scoping a user identity assertion to collaborative devices
US9691204B2 (en) Method and apparatus for secure vehicle system access from a remote system
KR101690989B1 (ko) Fido 인증모듈을 이용한 전자서명 방법
US11722529B2 (en) Method and apparatus for policy-based management of assets
KR20150036371A (ko) 클라우드 서버를 위한 바우처 인가
JP2005032241A (ja) リソースにアクセスする許可の付与
US20160285843A1 (en) System and method for scoping a user identity assertion to collaborative devices
US20220014353A1 (en) Method by which device shares digital key
WO2018207174A1 (en) Method and system for sharing a network enabled entity
WO2023137757A1 (zh) 数字车钥匙的分享方法、装置、设备及存储介质
CN115987636B (zh) 一种信息安全的实现方法、装置及存储介质
CN117841907A (zh) 车辆控制方法、装置、设备及存储介质
KR101295832B1 (ko) Usim 카드 내장형 휴대 단말기를 이용한 컴퓨터의 보안 인증방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17844946

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17844946

Country of ref document: EP

Kind code of ref document: A1