WO2019202929A1 - Système de partage - Google Patents
Système de partage Download PDFInfo
- Publication number
- WO2019202929A1 WO2019202929A1 PCT/JP2019/012915 JP2019012915W WO2019202929A1 WO 2019202929 A1 WO2019202929 A1 WO 2019202929A1 JP 2019012915 W JP2019012915 W JP 2019012915W WO 2019202929 A1 WO2019202929 A1 WO 2019202929A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- bullet
- vehicle
- key information
- mobile terminal
- Prior art date
Links
- 238000012545 processing Methods 0.000 claims abstract description 46
- 230000006854 communication Effects 0.000 claims description 71
- 238000004891 communication Methods 0.000 claims description 71
- 230000015654 memory Effects 0.000 claims description 36
- 238000000034 method Methods 0.000 description 68
- 238000012795 verification Methods 0.000 description 44
- 230000004044 response Effects 0.000 description 41
- 230000008569 process Effects 0.000 description 25
- 230000006870 function Effects 0.000 description 16
- 230000005540 biological transmission Effects 0.000 description 7
- 238000010586 diagram Methods 0.000 description 5
- 238000004364 calculation method Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- 125000002066 L-histidyl group Chemical group [H]N1C([H])=NC(C([H])([H])[C@](C(=O)[*])([H])N([H])[H])=C1[H] 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000003213 activating effect Effects 0.000 description 1
- 230000007175 bidirectional communication Effects 0.000 description 1
- 230000000994 depressogenic effect Effects 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 238000010079 rubber tapping Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/24—Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B49/00—Electric permutation locks; Circuits therefor ; Mechanical aspects of electronic locks; Mechanical keys therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M11/00—Telephonic communication systems specially adapted for combination with other electrical systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q9/00—Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station, in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom
Definitions
- the present invention relates to a sharing system that enables a shared object to be used among a plurality of people.
- a car sharing system in which a single vehicle (shared vehicle) is used among a plurality of people is known as a sharing system in which one share object is commonly used by a plurality of people (see Patent Documents 1 and 2). ).
- car share use is registered in advance, for example, a vehicle reservation is made with a mobile terminal (high function mobile phone or the like), and use of the vehicle is permitted within the reservation time. .
- the vehicle is returned using the valet parking service.
- a vehicle operation authority is given to the bullet key through communication or the like from the portable terminal, and the vehicle operation with the bullet key is permitted.
- the usage period of the valet key is a time corresponding to the valid time of the operation authority preset in the mobile terminal at the time of vehicle reservation (the reservation time specified by the mobile terminal). For this reason, there is a possibility that the valid time of the bullet key may suddenly expire during the use of the bullet parking service, or the bullet key may be used for a longer time than the user intends. Therefore, the vehicle cannot be safely returned by the valet parking service.
- An object of the present invention is to provide a sharing system that enables a safe return of an object to be shared.
- a sharing system includes a sharing device provided in a shared object, a bullet key capable of operating the shared object, and key information necessary for using the shared object, and the sharing And a portable terminal capable of operating the share target object when authenticated through communication with the apparatus.
- the sharing system further includes an authority granting unit that grants the bullet key operating authority to the bullet key that enables the manipulation of the share object using the bullet key, and the portable terminal when the share object is returned.
- a re-granting processing unit for newly granting a return bullet key operation authority different from the previously-registered bullet key operation authority to the bullet key.
- a return bullet key operation authority used only at the time of the return is newly granted to the bullet key, and sharing is performed with this bullet key. Make the object operable.
- the return bullet key operating authority to be given at this time is an exclusive authority that is used only when returning the shared object, and is therefore an authority content specialized for the return work. Therefore, it is possible to return the share object safely.
- the reassignment processing unit may delete information in the memory of the mobile terminal when the return bullet key operation authority is granted to the bullet key when the share object is returned.
- the portable terminal can be disabled after the share object is returned, which is further advantageous in improving the security against unauthorized use of the share object.
- the reassignment processing unit automatically deletes the return bullet key operating authority given to the bullet key when a prescribed condition is satisfied. According to this configuration, it is possible to erase the operation authority given to the bullet key when returning the shared object, which is further advantageous in improving the security against unauthorized use of the shared object.
- the return bullet key operation authority granted by the re-grant processing unit is permitted to use the share object, but the use of the share object by the user is not permitted. Unauthorized operation authority. According to this configuration, after the operation authority is re-assigned, the user is not affected even if the share target is used. Therefore, it becomes difficult to use the shared object unintended by the user.
- (A) is a schematic diagram showing a flow of renting a vehicle in the valet parking service
- (b) is a state diagram of each memory at the time of vehicle reservation by another user.
- the flowchart which shows the procedure when another user makes a reservation of vehicle use.
- the flowchart which shows the procedure when giving the operation authority of a vehicle to a bullet key from another user's portable terminal.
- the flowchart which shows the procedure at the time of invalidating the operation authority provided to the bullet key.
- the vehicle 1 includes an electronic key system 4 that performs ID verification with the electronic key 2 wirelessly to execute or permit the operation of the in-vehicle device 3.
- the electronic key system 4 is a key operation-free system that executes ID collation (smart collation) by narrow-band radio in response to communication from the vehicle 1.
- the key operation free system automatically performs ID verification without directly operating the electronic key 2.
- the in-vehicle device 3 includes, for example, a door lock device 5 and an engine 6.
- the vehicle 1 includes a verification ECU (Electronic Control Unit) 9 that performs ID verification, a body ECU 10 that manages the power supply of the on-vehicle electrical components, and an engine ECU 11 that controls the engine 6. These ECUs 9 to 11 are electrically connected via a communication line 12 in the vehicle.
- the communication line 12 is, for example, CAN (Controller Area Network) or LIN (Local Interconnect Network).
- CAN Controller Area Network
- LIN Local Interconnect Network
- the vehicle 1 includes a radio wave transmitter 16 that transmits radio waves and a radio wave receiver 17 that receives radio waves.
- the radio wave transmitter 16 includes, for example, an outdoor unit that transmits radio waves outdoors and an indoor unit that transmits radio waves indoors.
- the radio wave transmitter 16 transmits radio waves in the LF (Low Frequency) band.
- the radio wave receiver 17 receives radio waves in the UHF (Ultra High Frequency) band.
- the electronic key system 4 communicates with the electronic key 2 by bidirectional communication of LF-UHF.
- the electronic key 2 When the wake signal for activating the electronic key 2 is LF transmitted from the radio wave transmitter 16, when the electronic key 2 enters the communication area of the wake signal and receives it, the electronic key 2 is activated from the standby state and communicates with the verification ECU 9 ( ID verification (smart verification) is executed through (smart communication).
- ID verification includes, for example, electronic key ID verification for confirming whether the electronic key ID is correct, challenge response authentication using an encryption key (in this example, an electronic key unique encryption key), and the like.
- the verification ECU 9 permits or executes the locking and unlocking of the vehicle door 13 by the body ECU 10.
- the collation ECU 9 When the collation ECU 9 confirms that the indoor electronic key 2 and ID collation (indoor smart collation) are established, the collation ECU 9 permits the power switch operation by the engine switch 18. Accordingly, for example, when the engine switch 18 is operated in a state where the brake pedal is depressed, the engine 6 is started.
- the vehicle 1 includes a sharing system 21 in which a single vehicle 1 (shared object 19) is shared by a plurality of people.
- the sharing system 21 of this example registers the encrypted key information Dk from the outside (in this example, the server 22) to the mobile terminal 23, and between the mobile terminal 23 and the sharing device 24 provided in the vehicle 1
- the key information Dk is authenticated, and the authentication result is used as one condition for whether or not the vehicle 1 can be operated.
- the key information Dk is preferably a one-time key (one-time password) that is permitted to be used only once, for example.
- the portable terminal 23 includes a terminal control unit 27 that controls the operation of the portable terminal 23, a network communication module 28 that performs network communication, a short-range wireless module 29 that performs short-range wireless communication, and a memory 30 that can rewrite data. With. When the mobile terminal 23 acquires the key information Dk from the server 22 through network communication, the mobile terminal 23 writes and stores this key information Dk in the memory 30.
- the near field communication is preferably, for example, Bluetooth (registered trademark).
- the mobile terminal 23 includes a user interface application 31 that manages the operation of the sharing system 21.
- the user interface application 31 is installed in the terminal control unit 27 by, for example, being downloaded from the server 22.
- the terminal control unit 27 implements various processes such as a reservation procedure for the vehicle 1, user authentication, vehicle operation, operation authority assignment, and operation authority return.
- the sharing device 24 is independent of the hardware of the electronic key system 4 of the vehicle 1 and is separately attached to the vehicle 1.
- the sharing device 24 is a position of an electronic key that is effective only when, for example, the vehicle 1 is reserved for use. Power is supplied to the sharing device 24 from the battery + B of the vehicle 1.
- the sharing device 24 includes a controller 34 that controls the operation of the sharing device 24, a smart communication block 35 that performs smart communication, a short-range wireless module 36 that performs short-range wireless communication, and a memory 37 that can rewrite data. And a timer unit 38 for managing the date and time. Whether or not the controller 34 can correctly decrypt the key information Dk with the encryption key in the memory 37 (in this example, the sharing device unique encryption key) when the key information Dk is received from the portable terminal 23 through short-range wireless communication. Is confirmed to determine whether or not the portable terminal 23 is valid.
- the timer unit 38 is composed of, for example, a soft timer.
- the sharing device 24 has a one-to-one relationship with the vehicle 1 by associating the sharing device ID registered therein with the vehicle ID (body number).
- step 101 when the mobile terminal 23 makes a reservation for using the vehicle 1, the mobile terminal 23 performs user authentication through the server 22 and network communication.
- user authentication for example, login (user ID and password authentication) and a vehicle reservation procedure are performed.
- vehicle reservation procedure for example, the vehicle used and the date and time are input.
- the user ID and password are input to the portable terminal 23 and transmitted to the server 22 through network communication.
- the server 22 receives the user ID and password from the portable terminal 23, the server 22 authenticates them and continues the process if the authentication is established, and forcibly terminates the process if the authentication is not established.
- step 102 when the user authentication is established, the server 22 generates key information Dk and transmits it to the portable terminal 23.
- the server 22 generates key information Dk using, for example, an encryption key (for example, a sharing device unique encryption key) of the sharing device 24 mounted on the reserved vehicle.
- an encryption key for example, a sharing device unique encryption key
- a plaintext including data elements such as “reservation date and time”, “terminal ID”, and “user authentication key” is used as a predetermined encryption key (for example, a sharing device-specific encryption key).
- This is a ciphertext generated by encrypting with an encryption method (encryption algorithm).
- the terminal ID is a unique ID of the mobile terminal 23.
- the user authentication key is a kind of key used in encrypted communication between the mobile terminal 23 and the sharing device 24 when the vehicle 1 is operated with the mobile terminal 23, for example.
- step 103 the portable terminal 23 transmits the key information Dk registered therein by the short-range wireless communication at the start of use of the reserved vehicle.
- the key information Dk is transmitted to the sharing device 24 through, for example, BLE (Bluetooth Low Energy).
- step 104 when the sharing device 24 receives the key information Dk from the portable terminal 23, the sharing device 24 performs an authentication operation of the key information Dk.
- the sharing device 24 decrypts the key information Dk using an encryption key (for example, a sharing device-specific encryption key) and confirms whether or not the decryption is successful.
- the key information Dk received from the portable terminal 23 is correct, so that the authentication of the key information Dk is successful.
- the sharing device 24 can acquire “reservation date / time”, “terminal ID”, and “user authentication key” included in the key information Dk.
- the sharing device 24 shifts to the “authentication completed state” of the key information Dk, and the key function for operating the sharing device 24 as the electronic key 2 is valid (the key function is on). It becomes. Therefore, the sharing device 24 can execute smart communication (smart function) through the electronic key system 4. Further, the sharing device 24 writes and stores the key information Dk and the user authentication key in the memory 37 when the authentication of the key information Dk is established. On the other hand, if the authentication of the key information Dk is not established, the sharing device 24 determines that the key information Dk is incorrect and disconnects the BLE communication.
- the sharing device 24 When the authentication of the key information Dk is established, the sharing device 24 notifies the mobile terminal 23 of the user authentication key acquired in this authentication by short-range wireless communication.
- the mobile terminal 23 receives the user authentication key from the sharing device 24, it registers it in the memory 30. As described above, the user authentication key is registered in both the portable terminal 23 and the sharing device 24.
- step 201 when the portable terminal 23 moves to the authentication completion state, and an operation request button (display button on the screen) is operated on the portable terminal 23, an operation request corresponding to the button is made.
- the signal is transmitted to the sharing device 24 by short-range radio.
- the operation request button is operated, for example, when the vehicle door 13 is unlocked, the unlock request button operated when the vehicle door 13 is locked, and when the vehicle 1 is allowed to start the engine 6.
- the operation request signal is a signal including a command corresponding to the operated operation request button.
- the operation request signal is transmitted after being encrypted with a user authentication key, for example.
- step 202 when the operation request signal is received from the mobile terminal 23, the sharing device 24 performs smart communication with the verification ECU 9, and notifies the verification ECU 9 of the operation request signal received from the mobile terminal 23.
- the sharing device 24 performs smart verification using the electronic key ID and encryption key registered in itself, and in the verification process, the operation request signal received from the portable terminal 23 is sent to the verification ECU 9. Notice.
- step 203 when the collation ECU 9 confirms that the smart collation with the sharing device 24 is established, the collation ECU 9 executes an operation according to the operation request signal notified from the sharing device 24. Thereby, locking / unlocking of the vehicle door 13 and permission of engine start operation are performed.
- the sharing system 21 is compatible with a valet parking service that requests parking or the like from a third party such as a valet staff.
- a third party such as a valet staff.
- the bullet key 41 is a kind of vehicle key (electronic key 2) that can operate the vehicle 1, and is used as a vehicle key lent to a third party.
- the communication between the bullet key 41 and the vehicle 1 is not limited to Bluetooth, and may be, for example, normal smart communication. Even in this case, the communication between the bullet key 41 and the portable terminal 23 is preferably Bluetooth.
- the bullet key 41 includes a key control unit 42 that controls the operation of the bullet key 41, an operation unit 43 that is operated when the vehicle 1 is operated by the bullet key 41, a communication module 44 that is capable of short-range wireless communication, and data And a rewritable memory 45.
- the communication module 44 communicates with the mobile terminal 23 and the sharing device 24 through, for example, Bluetooth communication.
- the operation unit 43 includes an unlock operation unit that is operated when the vehicle door 13 is unlocked, a lock operation unit that is operated when the vehicle door 13 is locked, and an engine start permission that is operated when the engine start is permitted. There are an operation unit and a power supply operation unit that is operated when the power of the bullet key 41 is turned on and off.
- the sharing system 21 includes an authority grant unit 48 that grants the operation authority of the vehicle 1 from the portable terminal 23 to the bullet key 41.
- the authority granting part 48 of this example includes a first authority granting part 48 a provided in the server 22, a second authority granting part 48 b provided in the mobile terminal 23, and a third authority granting part provided in the bullet key 41. 48c.
- first key information Dk1 key information for the portable terminal 23
- second key information Dk2 key information for the bullet key 41
- the first key information Dk1 and the second key information Dk2 are also generated and transmitted to the mobile terminal 23.
- the second authority grant unit 48b transmits the second key information Dk2 for the bullet key 41 to the bullet key 41, and the third authority grant unit 48c The second key information Dk2 is registered in the bullet key 41.
- the first key information Dk1 includes “reservation date and time” when the vehicle 1 is used on the mobile terminal 23, “terminal ID” of the mobile terminal 23, and “user authentication key” used in encrypted communication between the mobile terminal 23 and the sharing device 24. “And other data elements.
- the second key information Dk2 includes “reservation date and time” when the vehicle 1 is used with the bullet key 41, “terminal ID” of the bullet key 41, and “user” used in encrypted communication between the sharing device 24 and the bullet key 41. Includes data elements such as "authentication key”.
- the sharing system 21 includes a reassignment processing unit 49 that grants a new operation authority of the vehicle 1 to the user when the vehicle 1 is returned.
- the reassignment processor 49 includes a first reassignment processor 49 a provided in the server 22, a second reassignment processor 49 b provided in the mobile terminal 23, and a third reassignment process provided in the bullet key 41. Part 49c.
- the reassignment processing unit 49 returns a bullet key operation authority (transfer key information) different from the bullet key operation authority (second key information Dk 2) already registered in the mobile terminal 23. Dk3) is newly assigned to the bullet key 41.
- FIG. 5A it is assumed that the user who has borrowed the vehicle 1 arrives at the destination and drops off the vehicle 1. In this case, the user performs a return process by passing the vehicle 1 and the bullet key 41 to a serviceman or the like.
- the memory 52 of the server 22 since the vehicle 1 was used by the user before arrival at the destination, the memory 52 of the server 22, the memories of the mobile terminal 23 and the sharing device 24, respectively.
- the first key information Dk1 and the second key information Dk2 are already registered.
- the operation authority of the vehicle 1 is not given to the bullet key 41, and neither the first key information Dk1 nor the second key information Dk2 is written in the memory 45.
- FIG. 6 is a flowchart showing a procedure when a legitimate user who has borrowed the vehicle 1 arrives at the destination and performs a return process of the vehicle 1 (use example shown in FIG. 5).
- step 301 when the mobile terminal 23 performs a return operation of the vehicle 1 in a state in which the mobile terminal 23 is in communication connection with the sharing device 24, the mobile terminal 23 notifies that effect.
- a return notification is transmitted to the sharing device 24.
- the return operation of the vehicle 1 is preferably an operation of displaying a return button on the screen of the mobile terminal 23 and tapping this, for example.
- step 302 when the sharing device 24 receives the return notification from the portable terminal 23, the sharing function 24 turns off the key function. That is, the key function that has been previously turned on in the sharing device 24 is switched off.
- step 303 the sharing device 24 transmits a return response to the mobile terminal 23 when the key function is turned off.
- step 304 the portable terminal 23 and the sharing device 24 disconnect the communication between the portable terminal 23 and the sharing device 24 after the key function is turned off. Thereafter, the sharing apparatus 24 shifts to an advertisement packet (hereinafter referred to as “advertisement”) transmission state.
- advertisement an advertisement packet
- step 305 the server 22 (first reassignment processing unit 49a) and the mobile terminal 23 (second reassignment processing unit 49b) perform key information Dk (first key information Dk1 and second key registered in the mobile terminal 23).
- the return process of information Dk2) is executed.
- Return processing of the key information Dk (first key information Dk1 and second key information Dk2) is started, for example, by connecting the mobile terminal 23 to the server 22 and transmitting a return start request from the mobile terminal 23 to the server 22. .
- step 306 when receiving the return start request from the mobile terminal 23, the server 22 (first re-granting processing unit 49a) confirms the mobile terminal 23 that has notified the return start request, and uses the mobile terminal 23 that is renting the vehicle. If it can be recognized, a return permission is transmitted to the portable terminal 23.
- step 307 when the portable terminal 23 (second reassignment processing unit 49b) receives the return permission from the server 22, the key information Dk (first key information Dk1 and second key information) written in the memory 30 of the portable terminal 23 is received.
- the key information Dk2) is deleted. That is, the first key information Dk1 and the second key information Dk2 acquired at the time of vehicle reservation are erased from the memory 30.
- step 308 the portable terminal 23 (second reassignment processing unit 49b) inputs a drop-off rental reservation as a temporary use reservation of the vehicle 1 after the key information is returned.
- the procedure for the lending and lending reservation is, for example, the same processing as the user authentication performed at the time of the above-described vehicle reservation, and for example, a user ID, a password, a vehicle to be used, etc. are input.
- the return rental reservation button on the screen is tapped on the portable terminal 23.
- step 309 the portable terminal 23 (second reassignment processing unit 49 b) transmits the input data at the time of the reserved lending reservation to the server 22.
- the server 22 executes user authentication based on the input data at the time of the lending and lending reservation from the mobile terminal 23.
- the server 22 (first reassignment processing unit 49a) continues the process if the user authentication is established, and forcibly terminates the process if the user authentication is not established.
- the server 22 (first reassignment processing unit 49a) generates the drop-off key information Dk3 necessary for permitting temporary vehicle use after the vehicle is returned.
- the drop-off key information Dk3 is constructed from the same data elements as the first key information Dk1 and the second key information Dk2.
- the drop-off key information Dk3 includes “use time” when the vehicle 1 is temporarily used with the bullet key 41, “terminal ID” of the bullet key 41, and “user authentication” used in encrypted communication between the sharing device 24 and the bullet key 41. Key ”(information different from that included in the second key information Dk2) and the like.
- step 311 the server 22 (first reassignment processing unit 49 a) transmits the generated drop-off key information Dk 3 to the mobile terminal 23.
- step 312 when the portable terminal 23 (second reassignment processing unit 49 b) receives the drop-off key information Dk 3 from the server 22, it writes and saves this drop-off key information Dk 3 in the memory 30.
- the drop-off key information Dk3 is registered instead of the first key information Dk1 and the second key information Dk2 registered at the time of vehicle reservation.
- FIG. 7 is a flowchart showing a procedure for giving the drop-off key information Dk3 as “return bullet key operation authority” to the bullet key 41 from the portable terminal 23.
- the bullet key 41 starts advertisement transmission of Bluetooth communication based on, for example, operation of the operation unit 43 (operation of the power supply operation unit).
- the operation at this time is, for example, a long press of the power supply operation unit.
- step 402 the mobile terminal 23 and the bullet key 41 connect Bluetooth (BLE) communication.
- BLE Bluetooth
- step 403 the bullet key 41 (third reassignment processing unit 49c) transmits a challenge request for requesting transmission of a challenge code to the mobile terminal 23 when communication with the mobile terminal 23 is connected.
- step 404 when receiving the challenge request from the bullet key 41, the portable terminal 23 (second reassignment processing unit 49b) transmits a challenge code used for challenge response authentication to the bullet key 41.
- step 405 upon receiving the challenge code from the mobile terminal 23, the bullet key 41 (third reassignment processing unit 49c) generates a response code using its own encryption key. Then, the bullet key 41 (third reassignment processing unit 49 c) transmits the generated response code to the mobile terminal 23.
- step 406 when the mobile terminal 23 (second reassignment processing unit 49 b) receives the response code from the bullet key 41, the mobile terminal 23 compares the response code obtained through the same calculation with itself and executes response verification. At this time, if the response code calculated by the portable terminal 23 matches the response code calculated by the bullet key 41, the response verification is established and the processing is continued. On the other hand, if these response codes do not match, the response verification is not established and the process is forcibly terminated.
- step 407 the portable terminal 23 (second reassignment processing unit 49b) transmits the drop-off key information Dk3 generated by itself to the bullet key 41 when the response verification is established. That is, the portable terminal 23 (second re-assignment processing unit 49b) grants the drop-off key information Dk3 to the bullet key 41, thereby permitting temporary use of the vehicle 1.
- This drop-off key information Dk3 can be used only by the bullet key 41.
- step 408 upon receiving the drop-off key information Dk3 from the portable terminal 23, the bullet key 41 (the third reassignment processing unit 49c) writes it into the memory 45. Thereby, the bullet key 41 can be temporarily used as a vehicle key.
- step 409 upon completion of writing the drop-off key information Dk3 to the memory 45, the bullet key 41 (third reassignment processing unit 49c) transmits a reception response to that effect to the portable terminal 23.
- step 410 the portable terminal 23 and the bullet key 41 disconnect the communication (Bluetooth communication) connection. Thereby, the communication between the portable terminal 23 and the bullet key 41 is terminated.
- Bluetooth communication Bluetooth communication
- step 411 the portable terminal 23 (second reassignment processing unit 49 b) deletes the information in the memory 30 after transmitting the drop-off key information Dk 3 to the bullet key 41. That is, all the key information Dk is erased from the memory 30 of the portable terminal 23, and the vehicle operation cannot be performed on the portable terminal 23.
- FIG. 8 is a flowchart showing a procedure for receiving the valet parking service.
- the sharing device 24 performs periodic advertisement transmission.
- the transmission of advertisement is continued after the key function of the sharing device 24 is turned off.
- step 502 the sharing device 24 and the bullet key 41 connect Bluetooth (BLE) communication.
- BLE Bluetooth
- step 503 the sharing device 24 transmits a key information request for requesting notification of the key information Dk to the bullet key 41.
- step 504 upon receiving the key information request from the sharing device 24, the bullet key 41 shares the drop-off key information Dk3 registered in the bullet key 41 and the terminal ID that is the unique ID of the bullet key 41. Transmit to the ring device 24.
- step 505 the sharing device 24 executes terminal ID authentication for authenticating the terminal ID of the bullet key 41 that is currently communicating.
- the terminal ID authentication is authentication for comparing the terminal ID obtained by decrypting the drop-off key information Dk3 in the sharing device 24 with the terminal ID received directly from the bullet key 41. At this time, if the terminal ID authentication is established, the process is continued, and if the terminal ID authentication is not established, the process is forcibly terminated.
- step 506 the sharing device 24 executes a reservation time check for confirming whether or not the reservation time notified from the bullet key 41 is valid.
- the reservation time verification is authentication for comparing the reservation date and time obtained by decrypting the drop-off key information Dk3 in the sharing device 24 with the current time of the timer unit 38. At this time, if the reservation time collation is established, the process is continued, and if the reservation time collation is not established, the process is forcibly terminated.
- step 507 the sharing device 24 writes the drop-off key information Dk3 to the memory 37 when both terminal ID authentication and reservation time verification are established.
- the user authentication key calculated from the drop-off key information Dk3 is also written in the memory 37 in addition to the drop-off key information Dk3 and the terminal ID for the bullet key 41.
- step 508 when the information writing to the memory 37 is completed, the sharing device 24 notifies the bullet key 41 of the user authentication key obtained by the calculation. Upon receiving the user authentication key from the sharing device 24, the bullet key 41 writes and stores it in the memory 45. As a result, encrypted communication using the user authentication key is possible between the sharing device 24 and the bullet key 41.
- step 509 the bullet key 41 transmits a key-on request to the sharing device 24 after the user authentication key is written.
- the sharing device 24 receives a key-on request from the bullet key 41, the sharing device 24 turns on the key function. As a result, the sharing device 24 can execute smart communication (smart verification) through the electronic key system 4.
- step 511 when the key function is turned on, the sharing device 24 transmits a key-on notification to that effect to the bullet key 41.
- the bullet key 41 recognizes that the key function of the sharing device 24 is turned on.
- the service person starts the engine 6 of the vehicle 1 using the bullet key 41, and parks the vehicle 1 in a predetermined position.
- FIG. 9 is a flowchart showing a procedure for automatically deleting the drop-off key information Dk3 of the bullet key 41.
- the bullet key 41 third reassignment processing unit 49c
- the sharing device 24 regardless of the connection state after a certain period of time has elapsed since the drop-off key information Dk3 was assigned to the bullet key 41. Disconnect.
- step 602 the bullet key 41 (third reassignment processing unit 49c) deletes the information in the memory 45. That is, the drop-off key information Dk3 and the user authentication key written in the memory 45 of the bullet key 41 are deleted from the memory 45. As a result, the bullet key 41 cannot be used.
- FIG. 10B another user newly makes a reservation for the vehicle 1, so any of the memories 30, 37, 45, of the server 22, the portable terminal 23, and the sharing device 24. Also in 52, the first key information Dk1 and the second key information Dk2 are not registered.
- FIG. 11 is a flowchart showing a procedure when another user makes a reservation for using the vehicle 1 with his / her mobile terminal 23.
- step 701 when the user performs a procedure for using the vehicle 1 with the mobile terminal 23, the mobile terminal 23 acquires user data input during the use procedure.
- the use procedure as described above, for example, a user ID, a password, a use date and time of the vehicle 1 and the like are input.
- the portable terminal 23 transmits user data acquired by the use procedure to the server 22.
- the mobile terminal 23 also transmits the terminal ID of the mobile terminal 23 and the terminal ID of the bullet key 41 as user data.
- step 702 when receiving the user data from the mobile terminal 23, the server 22 (first authority grant unit 48a) generates key information Dk.
- the server 22 (first authority grant unit 48a) issues not only new first key information (hereinafter referred to as new first key information Dk1 ′) to be issued to the mobile terminal 23, but also to the bullet key 41.
- New second key information (hereinafter referred to as new second key information Dk2 ′) is generated.
- the server 22 (first authority giving unit 48a) transmits the generated new first key information Dk1 'and new second key information Dk2' to the mobile terminal 23.
- the new first key information Dk1 'and the new second key information Dk2' include different user authentication keys.
- step 703 when the portable terminal 23 (second authority grant unit 48b) receives the new first key information Dk1 ′ and the new second key information Dk2 ′ from the server 22, the new first key information Dk1 ′ and the new second key information Dk1 ′ are received.
- the key information Dk2 ′ is written and stored in the memory 30.
- the new first key information Dk1 'and the new second key information Dk2' are registered in the portable terminal 23 of another user.
- FIG. 12 is a flowchart showing a procedure when the “operation authority” (new second key information Dk2 ′) of the vehicle 1 is given to the bullet key 41 from the portable terminal 23 of another user.
- the bullet key 41 is switched to a power-on state, for example, when the operation unit 43 is operated.
- the power-on operation is preferably an operation of the power operation unit of the bullet key 41, for example.
- step 802 when the bullet key 41 is switched to power-on, it starts advertising transmission of Bluetooth communication.
- step 803 the portable terminal 23 inputs a selection operation of the bullet key 41 for connecting the Bluetooth communication. That is, the connection destination of Bluetooth communication is selected in the portable terminal 23 of another user.
- step 804 the mobile terminal 23 and the bullet key 41 connect Bluetooth (BLE) communication.
- BLE Bluetooth
- step 805 when communication with the mobile terminal 23 is connected, the bullet key 41 (third authority grant unit 48c) transmits a challenge request for requesting transmission of a challenge code to the mobile terminal 23.
- step 806 when the portable terminal 23 (second authority grant unit 48 b) receives the challenge request from the bullet key 41, it transmits a challenge code used for challenge response authentication to the bullet key 41.
- Step 807 upon receiving the challenge code from the portable terminal 23, the bullet key 41 (third authority grant unit 48c) generates a response code using its own encryption key. Then, the bullet key 41 (third authority granting unit 48 c) transmits the generated response code to the mobile terminal 23.
- step 808 when the mobile terminal 23 (second authority grant unit 48b) receives the response code from the bullet key 41, the mobile terminal 23 compares the response code obtained through the same calculation with itself and executes response verification. At this time, if the response code calculated by the portable terminal 23 matches the response code calculated by the bullet key 41, the response verification is established and the processing is continued. On the other hand, if these response codes do not match, the response verification is not established and the process is forcibly terminated.
- Step 809 when the response verification is established, the mobile terminal 23 (second authority grant unit 48 b) transmits the new second key information Dk ⁇ b> 2 ′ for the bullet key 41 registered in itself to the bullet key 41. That is, the portable terminal 23 (second authority granting part 48 b) gives the second key information Dk 2 ′ (valet key operation authority) for operating the vehicle 1 with the bullet key 41 to the bullet key 41.
- the new second key information Dk2 ' can be used only with the bullet key 41.
- step 810 upon receiving the new second key information Dk2 'from the mobile terminal 23, the bullet key 41 (third authority grant unit 48c) writes the new second key information Dk2' in the memory 45. Thereby, the bullet key 41 can be used as a vehicle key.
- Step 811 the mobile terminal 23 (second authority grant unit 48 b) sets the mobile terminal 23 of another user to the bullet key valid mode.
- the mobile terminal 23 enters the bullet key valid mode, the mobile terminal 23 is in an “unusable” state where it cannot be used as a vehicle key.
- step 812 the mobile terminal 23 and the bullet key 41 disconnect the communication (Bluetooth communication). Thereby, the communication between the portable terminal 23 and the bullet key 41 is terminated. Then, the service person starts the engine 6 of the vehicle 1 using the bullet key 41 and dispatches the vehicle 1 to a predetermined position. Note that the operation for operating the vehicle 1 with the bullet key 41 is the same as the step 401 to the step 411 in FIG.
- FIG. 13 is a flowchart showing a procedure for invalidating the “operation authority” (new second key information Dk2 ′) given to the bullet key 41 from the portable terminal 23.
- steps 901 to 904 are the same processing as steps 801 to 804 described above (see FIG. 12), and thus description thereof is omitted.
- step 905 when the user performs an operation of invalidating the operation authority of the bullet key 41 on the mobile terminal 23, the mobile terminal 23 (second authority granting unit 48b) inputs this operation authority invalidation request.
- the invalidation operation of the operation authority of the bullet key 41 is preferably an aspect in which, for example, an invalidation request button is displayed on the screen of the mobile terminal 23 and this button is selected and operated.
- step 906 the portable terminal 23 (second authority grant unit 48 b) transmits a challenge code when an operation for invalidating the operation authority is performed on the portable terminal 23.
- step 907 upon receiving the challenge code from the mobile terminal 23, the bullet key 41 (third authority granting unit 48c) generates a response code using its own encryption key. Then, the bullet key 41 (third authority granting unit 48 c) transmits the generated response code to the mobile terminal 23.
- step 908 when the portable terminal 23 (second authority grant unit 48b) receives the response code from the bullet key 41, the portable terminal 23 compares the response code obtained through the same calculation with itself and executes response verification. At this time, if the response code calculated by the portable terminal 23 matches the response code calculated by the bullet key 41, the response verification is established and the processing is continued. On the other hand, if these response codes do not match, the response verification is not established and the process is forcibly terminated.
- step 909 when the response verification is established, the mobile terminal 23 (second authority grant unit 48 b) transmits an invalidation request for invalidating the operation authority given to the bullet key 41.
- step 511 upon receiving the invalidation request from the mobile terminal 23, the bullet key 41 (third authority grant unit 48c) invalidates the operation authority of the vehicle 1.
- the new second key information Dk2 '(user authentication key) written in the memory 45 of the bullet key 41 is deleted. As a result, the vehicle 1 cannot be operated with the bullet key 41.
- step 911 the mobile terminal 23 and the bullet key 41 disconnect the communication (Bluetooth communication). Thereby, the communication between the portable terminal 23 and the bullet key 41 is terminated.
- FIG. 14 is a flowchart illustrating a procedure when user authentication is performed between the mobile terminal 23 and the sharing device 24. This is a procedure performed when another user uses the vehicle 1 with his / her mobile terminal 23.
- step 1001 the portable terminal 23 and the sharing device 24 connect Bluetooth (BLE) communication.
- BLE Bluetooth
- step 1002 the sharing apparatus 24 transmits a key information request for requesting the bullet key 41 to notify the key information Dk.
- the mobile terminal 23 receives the key information request from the sharing device 24, the mobile terminal 23 obtains the new first key information Dk1 ′ registered in the mobile terminal 23 and the terminal ID that is the unique ID of the mobile terminal 23. To the sharing device 24.
- step 1004 the sharing device 24 executes terminal ID authentication for authenticating the terminal ID of the mobile terminal 23 that is currently communicating.
- the terminal ID authentication is an authentication for comparing the terminal ID obtained by decrypting the new first key information Dk1 ′ in the sharing device 24 with the terminal ID received directly from the mobile terminal 23. At this time, if the terminal ID authentication is established, the process is continued, and if the terminal ID authentication is not established, the process is forcibly terminated.
- step 1005 the sharing apparatus 24 executes a reservation time check for confirming whether or not the reservation time notified from the mobile terminal 23 is valid.
- the reservation time collation is authentication for comparing the reservation date and time obtained by decrypting the new first key information Dk1 'in the sharing device 24 with the current time of the timer unit 38. At this time, if the reservation time collation is established, the process is continued, and if the reservation time collation is not established, the process is forcibly terminated.
- step 1006 the sharing device 24 writes the new first key information Dk1 'to the memory 37 when both terminal ID authentication and reservation time verification are established.
- the user authentication key calculated from the new first key information Dk1 ′ is also written in the memory 37.
- the same processing as in the above-described steps 508 to 511 is executed, and the key function of the sharing device 24 is turned on.
- the mobile terminal 23 of another user can be used as a vehicle key.
- a return bullet key operating authority (transfer key information Dk3) used only at the time of the return is newly assigned to the bullet key 41. And the vehicle 1 can be operated with the bullet key 41.
- the return bullet key operation authority (drop-off key information Dk3) to be given at this time is a dedicated authority used only when the vehicle 1 is returned, and is therefore an authority content specialized for return work. Therefore, the vehicle 1 can be safely returned using the valet parking service.
- the reassignment processing unit 49 deletes the information in the memory 30 of the portable terminal 23 when the return bullet key operating authority (the drop-off key information Dk3) is granted to the bullet key 41 when the vehicle 1 is returned. Therefore, since the portable terminal 23 can be disabled after the vehicle 1 is returned, it is further advantageous in improving security against unauthorized use of the vehicle 1.
- the re-assignment processing unit 49 sets the drop-off key information Dk3 assigned to the bullet key 41 when a prescribed condition is satisfied (for example, a certain time has elapsed). Let it be erased automatically. Therefore, it is possible to delete the drop-off key information Dk3 assigned to the bullet key 41 when the vehicle 1 is returned, which is further advantageous in improving the security against unauthorized use of the vehicle 1.
- the return bullet key operation authority (discard key information Dk3) granted by the reassignment processing unit 49 is permitted to use the vehicle 1, the operation authority is not considered to be the use of the vehicle 1 by the user. It is.
- the return bullet key operation authority (drop-off key information Dk3) granted by the re-assignment processing unit 49 is an operation authority that is not charged when using the vehicle 1.
- the return bullet key operation authority (removal key information Dk3) is re-assigned, the user is not affected even if the vehicle 1 is used. Therefore, it becomes difficult to use the vehicle 1 that is not intended by the user.
- the operation authority is key information Dk used in authentication between the portable terminal 23 and the sharing device 24, and this key information Dk is a one-time key that can be used only once. Therefore, the situation in which the key information Dk is illegally used and the vehicle 1 is operated is less likely to occur, which is advantageous in improving security against unauthorized use.
- the authority grant unit 48 allows the authorized user to use the bullet key 41 during normal use by providing the bullet key 41 with the second key information Dk2 for the bullet key 41 acquired when the vehicle 1 is reserved for use. . Thereby, when the vehicle 1 is returned, only the process of updating the second key information Dk2 for the bullet key 41 registered in the portable terminal 23 during the reservation procedure of the vehicle 1 to the drop-off key information Dk3 is sufficient. Therefore, the operation imposed on the user when the vehicle 1 is returned can be simplified.
- this embodiment can be implemented with the following modifications.
- the present embodiment and the following modifications can be implemented in combination with each other within a technically consistent range.
- the operation authority given initially and the operation authority given at the time of return of the vehicle 1 are not limited to being a one-time key (key information Dk), These may be different types of information.
- the content included in the drop-off key information Dk3 may be information different from the content included in the key information Dk at the start of use.
- the writing start of the drop-off key information Dk3 to the bullet key 41 is not limited to a long press of the power operation unit, but is changed to other modes such as an operation using the operation unit 43 other than the power operation unit. May be.
- the re-granted operation authority may be registered in the bullet key 41 in a manner different from the operation authority given to the mobile terminal 23 at the start of use.
- the erasure of the drop-off key information Dk3 is not limited to the condition that a certain time has elapsed. For example, you may change into other parameters, such as use frequency and time.
- the sharing device 24 may be retrofitted to the vehicle 1 or may be pre-assembled to the vehicle 1.
- the sharing device 24 may be integrated with the verification ECU 9, and these may be one unit part.
- the mounting location of the sharing device 24 is not particularly limited.
- the reservation procedure for the vehicle 1 is not limited to being performed by the mobile terminal 23 but may be performed by the bullet key 41, for example.
- the reservation procedure for the vehicle 1 may be performed using only the bullet key 41, for example, without passing through the portable terminal 23.
- -Authentication of the portable terminal 23 and the sharing apparatus 24 is not limited to authentication of the key information Dk, It can change into another method.
- the operation authority is not limited to the method of giving the key information Dk to the other party, and may be changed to another method such as a method of giving a use permission command.
- -Short-range wireless communication is not limited to Bluetooth communication, but can be changed to another communication method.
- the key information Dk is not limited to a one-time key, and may be information that is restricted in use.
- the content included in the key information Dk can be changed to a mode other than the embodiment.
- the key information Dk is not limited to being generated by the server 22, and may be anywhere as long as it is external.
- the encryption key used for encryption communication may be any key among, for example, a sharing device unique encryption key, a user authentication key, and an electronic key unique encryption key. For example, switching the encryption key used during the process is advantageous in improving the security of communication. Further, the encryption key to be used is not limited to the above-described key, and may be changed to various types.
- the mobile terminal 23 is not limited to a high-function mobile phone, and can be changed to various terminals.
- the portable terminal 23 and the sharing device 24 may acquire the user authentication key by any procedure or method.
- the key function can be switched on under any condition.
- the authority grant unit 48 and the re-grant processing unit 49 are not limited to those functionally generated by the user interface application 31, but may be generated by other methods or may be constructed from hardware elements. .
- the operation-free electronic key system 4 is not limited to a system that performs smart verification while arranging transmitters inside and outside the vehicle and determining the inside / outside position of the electronic key 2.
- a system may be used in which antennas (LF antennas) are arranged on the left and right sides of the vehicle body, and the position of the electronic key 2 inside and outside the vehicle is determined by checking the combination of responses of the electronic key 2 to radio waves transmitted from these antennas.
- LF antennas LF antennas
- the ID verification imposed on the electronic key system 4 is not limited to verification including challenge response authentication, and may be any authentication or verification as long as at least electronic key ID verification is performed.
- the electronic key system 4 may be, for example, a wireless key system that performs ID collation triggered by communication from the electronic key 2.
- the electronic key 2 is not limited to a smart key (registered trademark), and may be a wireless key.
- the verification ECU 9 and the sharing device 24 are not limited to a wireless communication method, and may be connected by wire, for example. In this case, various commands are transmitted from the sharing device 24 to the verification ECU 9 via a wire. Even in this case, the verification ECU 9 can be operated by a command from the sharing device 24.
- the sharing device 24 is not limited to the configuration using the electronic key system when operating the share object 19. In this case, the sharing device 24 directly sends a command to a controller (CPU) that controls the operation of the share object 19 to operate the share object 19. In this configuration, the key function of the sharing device 24 can be omitted.
- the sharing system 21 is not limited to being applied to the vehicle 1, but may be applied to other devices and devices such as a house (sharing house), a shared delivery box, and a coin parking. Therefore, the share target 19 is not limited to the vehicle 1 and can be changed to another target.
- a sharing method Import key information necessary for using shared objects to mobile devices, Authenticating the portable terminal through communication with a sharing device provided in the sharing target, and enabling the sharing target to be operated by the portable terminal when the portable terminal is authenticated; Granting the bullet key the authority to operate the shared object with the bullet key, When returning the shared object, a sharing method comprising: newly giving a return bullet key operation authority different from the bullet key operation authority already registered in the mobile terminal to the bullet key .
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Health & Medical Sciences (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- Economics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Mechanical Engineering (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Lock And Its Accessories (AREA)
- Selective Calling Equipment (AREA)
- Telephonic Communication Services (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
L'invention concerne un système de partage (21) qui comprend : une unité d'ajout de droit (48 (48a-48c)) destinée à ajouter, à une clé de voiturier (41), un droit d'opération de clé de voiturier (Dk2) pour permettre le fonctionnement par la clé de voiturier (41) d'un objet à partager (19); et une unité de traitement de rajout (49 (49a-49c)) qui, lorsque l'objet (19) en cours de partage est renvoyé, ajoute un nouveau droit d'opération de clé de voiturier (Dk3), qui est séparé du droit d'opération de clé de voiturier (Dk2) déjà enregistré dans un terminal portable (23), pour retourner à la clé de voiturier (41).
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2018-080039 | 2018-04-18 | ||
JP2018080039A JP2019191647A (ja) | 2018-04-18 | 2018-04-18 | シェアリングシステム |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019202929A1 true WO2019202929A1 (fr) | 2019-10-24 |
Family
ID=68239566
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2019/012915 WO2019202929A1 (fr) | 2018-04-18 | 2019-03-26 | Système de partage |
Country Status (2)
Country | Link |
---|---|
JP (1) | JP2019191647A (fr) |
WO (1) | WO2019202929A1 (fr) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115171248A (zh) * | 2022-06-29 | 2022-10-11 | 合众新能源汽车有限公司 | 基于蓝牙钥匙的连接方法、装置及相关设备 |
CN118551406A (zh) * | 2024-07-30 | 2024-08-27 | 杭州君方科技有限公司 | 一种用于数据要素共享的加密处理方法及系统 |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP7389692B2 (ja) * | 2020-03-23 | 2023-11-30 | 株式会社東海理化電機製作所 | 車両の貸し出しシステム |
JP7555848B2 (ja) | 2021-02-25 | 2024-09-25 | 株式会社Subaru | バレーキー配布システム |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2011184962A (ja) * | 2010-03-09 | 2011-09-22 | Tokai Rika Co Ltd | 無線通信システム |
JP2012067489A (ja) * | 2010-09-22 | 2012-04-05 | Tokai Rika Co Ltd | 車両の電子キーシステム |
JP2014227741A (ja) * | 2013-05-23 | 2014-12-08 | 株式会社東海理化電機製作所 | キー格付け変更システム |
JP2015031035A (ja) * | 2013-08-01 | 2015-02-16 | 株式会社東海理化電機製作所 | キー権限貸出システム |
JP2016172472A (ja) * | 2015-03-16 | 2016-09-29 | カルソニックカンセイ株式会社 | 車両用セキュリティシステム |
JP2017225048A (ja) * | 2016-06-16 | 2017-12-21 | 日産自動車株式会社 | 車載装置の制御方法、プログラム及び携帯情報端末装置 |
-
2018
- 2018-04-18 JP JP2018080039A patent/JP2019191647A/ja not_active Ceased
-
2019
- 2019-03-26 WO PCT/JP2019/012915 patent/WO2019202929A1/fr active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2011184962A (ja) * | 2010-03-09 | 2011-09-22 | Tokai Rika Co Ltd | 無線通信システム |
JP2012067489A (ja) * | 2010-09-22 | 2012-04-05 | Tokai Rika Co Ltd | 車両の電子キーシステム |
JP2014227741A (ja) * | 2013-05-23 | 2014-12-08 | 株式会社東海理化電機製作所 | キー格付け変更システム |
JP2015031035A (ja) * | 2013-08-01 | 2015-02-16 | 株式会社東海理化電機製作所 | キー権限貸出システム |
JP2016172472A (ja) * | 2015-03-16 | 2016-09-29 | カルソニックカンセイ株式会社 | 車両用セキュリティシステム |
JP2017225048A (ja) * | 2016-06-16 | 2017-12-21 | 日産自動車株式会社 | 車載装置の制御方法、プログラム及び携帯情報端末装置 |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115171248A (zh) * | 2022-06-29 | 2022-10-11 | 合众新能源汽车有限公司 | 基于蓝牙钥匙的连接方法、装置及相关设备 |
CN115171248B (zh) * | 2022-06-29 | 2023-11-17 | 合众新能源汽车股份有限公司 | 基于蓝牙钥匙的连接方法、装置及相关设备 |
CN118551406A (zh) * | 2024-07-30 | 2024-08-27 | 杭州君方科技有限公司 | 一种用于数据要素共享的加密处理方法及系统 |
Also Published As
Publication number | Publication date |
---|---|
JP2019191647A (ja) | 2019-10-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2019203306A1 (fr) | Système de partage | |
CN107545630B (zh) | 锁定及解锁系统以及钥匙单元 | |
JP6717793B2 (ja) | カーシェアリングシステム及びカーシェア装置 | |
JP5996872B2 (ja) | 貸与システム | |
WO2019202929A1 (fr) | Système de partage | |
JP6633589B2 (ja) | カーシェアリングシステム | |
JP6588518B2 (ja) | カーシェアリングシステム | |
JP6916101B2 (ja) | シェアリングシステム | |
JP6676597B2 (ja) | カーシェアリングシステム | |
JP6924167B2 (ja) | 共用システム及びインロック防止方法 | |
JP6204542B2 (ja) | 貸与システム | |
WO2019203305A1 (fr) | Système de partage | |
JP6993186B2 (ja) | カーシェアリングシステム | |
JP2019091221A (ja) | バレットキー及びバレットキー制御方法 | |
JP7146627B2 (ja) | サービス提供システム及びサービス提供方法 | |
JP2018178461A (ja) | ユーザ認証システム及びユーザ認証方法 | |
JP2019091222A (ja) | バレットキー制御システム及びバレットキー | |
JP2015031035A (ja) | キー権限貸出システム | |
JP2019190110A (ja) | 鍵情報生成システム及び鍵情報生成方法 | |
JP5283432B2 (ja) | 認証装置、移動端末、電気鍵システムおよび認証制御方法 | |
WO2019221017A1 (fr) | Système partagé et procédé de commutation de mode de connexion | |
JP2020004044A (ja) | 認証システム及び認証方法 | |
JP7428995B2 (ja) | 認証システム、及び認証方法 | |
JP7478596B2 (ja) | 救援システム、救援方法、及び救援プログラム | |
JP2022023532A (ja) | シェアリングシステム及びシェアリング方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19788306 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19788306 Country of ref document: EP Kind code of ref document: A1 |