WO2022143469A1 - 一种虚拟钥匙的分享系统及方法 - Google Patents
一种虚拟钥匙的分享系统及方法 Download PDFInfo
- Publication number
- WO2022143469A1 WO2022143469A1 PCT/CN2021/141263 CN2021141263W WO2022143469A1 WO 2022143469 A1 WO2022143469 A1 WO 2022143469A1 CN 2021141263 W CN2021141263 W CN 2021141263W WO 2022143469 A1 WO2022143469 A1 WO 2022143469A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- sharing
- terminal
- information
- authorization
- verification
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 21
- 238000013475 authorization Methods 0.000 claims abstract description 59
- 238000004891 communication Methods 0.000 claims abstract description 28
- 238000012795 verification Methods 0.000 claims description 48
- 230000006870 function Effects 0.000 description 9
- 230000008569 process Effects 0.000 description 6
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 230000004044 response Effects 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 238000003491 array Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/047—Key management, e.g. using generic bootstrapping architecture [GBA] without using a trusted network node as an anchor
- H04W12/0471—Key exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/40—Security arrangements using identity modules
- H04W12/47—Security arrangements using identity modules using near field communication [NFC] or radio frequency identification [RFID] modules
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/01—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/24—Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/084—Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R2325/00—Indexing scheme relating to vehicle anti-theft devices
- B60R2325/10—Communication protocols, communication systems of vehicle anti-theft devices
- B60R2325/103—Near field communication [NFC]
Definitions
- the present disclosure relates to the field of smart keys, in particular to a virtual key sharing system and method.
- the method of sharing car keys on the Internet is relatively cumbersome when the car owner and the authorized user are close to each other. .
- the purpose of the present disclosure is to improve the convenience of smart virtual key transmission, and is equipped with NFC (Near Field Communication, near field communication) short-range communication technology to achieve a more stable, safe and effective transmission method in a short distance.
- NFC Near Field Communication, near field communication
- the present disclosure provides a virtual key sharing system, which solves the problem of cumbersome and inconvenient intelligent virtual keys.
- a sharing terminal used to obtain sharing permission information input by a user, and generate a touch button according to the sharing permission information, so as to obtain a touch signal when the user presses the touch button, Turning on the first NFC communication module, and polling whether there is an authorized terminal through the NFC signal of the first NFC communication module;
- Authorized terminal used to send the information required for authorization to the Sharing terminal;
- vehicle manufacturer server used for receiving the information required for authorization sent by the sharing terminal, so as to generate an authorization certificate according to the information required for authorization.
- the verification terminal is used for receiving the NFC effective communication range sent by the sharing terminal;
- the vehicle manufacturer server sends the authorization certificate to the sharing terminal
- the verification terminal obtains the unique verification information, and sends the verification information and the authorization certificate to the server of the mobile phone manufacturer; the mobile phone manufacturer server sends the verification information and the authorization certificate to the server of the automobile manufacturer; the The car company server determines whether the verification terminal is legal according to the verification information and the authorization certificate.
- a sharing permission instruction is generated, and the sharing permission instruction is sent to the authorized terminal; the authorized terminal executes the sharing permission instruction to control communication with the authorized terminal. Share the vehicle corresponding to the terminal.
- the vehicle manufacturer server generates sharing success information, and sends the sharing success information to the sharing terminal, and the sharing terminal outputs and displays the sharing success information for the vehicle owner to know immediately.
- the sharing failure information is generated, and the sharing success information is sent to the sharing terminal, and the sharing terminal outputs and displays the sharing success information.
- the sharing permission information includes: sharing duration and activatable vehicle status, wherein the activatable vehicle status includes: starting the door, starting the vehicle, and starting the trunk.
- the information required for authorization includes: token information generated by the vehicle manufacturer server and information about an authorized vehicle.
- the authorization credential is a credential for personalizing data.
- a method for sharing a virtual key which includes: a sharing terminal obtains sharing authority information input by a user, and generates a touch button according to the sharing authority information; the sharing terminal obtains the touch of the user pressing the touch button. signal, turn on the first NFC communication module, and poll whether there is an authorized terminal through the NFC signal of the first NFC communication module; when the authorized terminal is polled, the sharing terminal sends an information feedback command to all the authorization terminal; when the authorization terminal receives the information feedback instruction, it sends the information required for authorization to the sharing terminal; the sharing terminal sends the information required for authorization to the server of the vehicle manufacturer, and the vehicle manufacturer The server generates an authorization credential according to the information required for authorization.
- the vehicle manufacturer server sends the authorization certificate to the sharing terminal
- the sharing terminal sends the NFC effective communication range to the verification terminal; the verification terminal obtains the unique verification information, and sends the verification information and the authorization certificate to the mobile phone manufacturer server; the mobile phone manufacturer server sends the verification The information and the authorization certificate are sent to the server of the car company; the server of the car company determines whether the verification terminal is legal according to the verification information and the authorization certificate.
- a computer-readable storage medium stores a virtual key sharing program thereon, and when the virtual key sharing program is executed by a processor, realizes the above-mentioned virtual key sharing method.
- FIG. 1 is a system diagram of an embodiment of a virtual key sharing system of the present disclosure
- FIG. 2 is a flowchart of an embodiment of a virtual key sharing system of the present disclosure.
- the sharing terminal used to obtain the sharing permission information input by the user, and generate a touch button according to the sharing permission information, so as to obtain the touch signal of the user pressing the touch button, and turn on the first touch button.
- an NFC communication module and polls whether there is an authorized terminal through the NFC signal of the first NFC communication module; authorized terminal: used to send the information required for authorization to the sharing terminal when receiving the information feedback command ;
- Vehicle manufacturer server used to receive the information required for authorization sent by the sharing terminal, so as to generate an authorization certificate according to the information required for authorization.
- the required conditions are different: the way to share keys online requires both the car owner and the authorized user to download the same APP (Application), and the way to share keys with NFC touch requires both the car owner and the authorized user to have NFC functions on their mobile phones , currently supports cross-platform sharing of Android phones.
- the way to share keys online requires both the car owner and the authorized user to download the same APP (Application)
- the way to share keys with NFC touch requires both the car owner and the authorized user to have NFC functions on their mobile phones , currently supports cross-platform sharing of Android phones.
- the way to share the key on the network is to transfer the vehicle control authority to the authorized account through the server transfer. Connection, realize the exchange of messages and issue registration information to the vehicle, and ensure the security of sharing keys from both ends of the mobile phone and the vehicle.
- the car owner logs in to the car company APP and clicks the share key button.
- the APP will detect whether the mobile phone NFC has been turned on. If the mobile phone NFC is turned on, the APP will prompt the user to set the permission and validity period of the shared key.
- the car owner can place the back of the mobile phone close to the back of the authorized user's mobile phone who has turned on the mobile phone NFC according to the APP animation prompt and wait; the car company APP requests the certificate from the car manufacturer's server, and sends the certificate to the authorized user's mobile phone through NFC after receiving the response. It is provided by the server of the car manufacturer, and sent to the mobile phone through the server of the mobile phone manufacturer of the car owner.
- the application of NFC short-range communication technology can effectively prevent the information from being stolen and ensure data security; after the authorized user's mobile phone receives the certificate, it is sent to the mobile phone manufacturer's server.
- the mobile phone manufacturer server transfers the certificate (a digital file formed by signing some basic information of the applicant and the applicant's public key with the CA root certificate after the certificate authority authenticates the certificate applicant's identity) to the car manufacturer server for verification.
- the owner's device and the authorized device are authenticated. If the verification is passed, the car manufacturer's server returns a response to the mobile phone manufacturer's server, which is forwarded to the authorized device by the mobile phone manufacturer's server.
- the authorized device returns the mobile phone SEID (security chip unique identification code).
- mobile phone model and other information are encrypted and transmitted to the car owner's device;
- the car owner APP uploads the received information and the vehicle information to be shared to the car manufacturer's server, and obtains the token generated by the car manufacturer's server (the token generated by the server as an identity Authentication certificate), the vehicle information to be authorized, sent to the authorized device through NFC communication, as the certificate to obtain the personalized data of the car key;
- the authorized user's mobile phone uploads the data to the mobile phone factory server, and the mobile phone factory server forwards it to the car manufacturer server;
- the car manufacturer's server performs identity verification. After the verification is passed, it generates personalized data and returns it to the mobile phone factory server, and the mobile phone factory server sends it to the authorized user's mobile phone.
- the authorized user's mobile phone stores the personalized data, returns the notification to the mobile phone factory server, and queries the key registration result; the mobile phone factory server forwards the notification to the car manufacturer's server, and the car manufacturer's server generates the registration data on the vehicle side and sends it to the vehicle side, and the vehicle side stores the registration data. Data and return the result to the car manufacturer server; the car manufacturer server synchronizes the vehicle registration result to the authorized device mobile phone manufacturer server, and the authorized device queries the result and displays it in the APP.
- the devices communicate through NFC, which further ensures the security of data; the authorized device sends information such as tokens to the mobile phone manufacturer server, and then sends it to the automobile manufacturer server through the mobile phone manufacturer server.
- the communication between the servers It is also safe; although both the owner and the authorized user device are the keys of the same vehicle, the data of each key is unique.
- Authorized users can use the shared NFC key to use the vehicle without turning on the mobile phone network, and it can still be used when the battery is low, which is more convenient and fast.
- the NFC positions of different mobile phones are different, and the animation displayed by the APP should be designed to be as general as possible.
- the verification terminal is used to receive the NFC effective communication range sent by the sharing terminal;
- the vehicle manufacturer server sends the authorization certificate to the sharing terminal
- the verification terminal obtains the unique verification information, and sends the verification information and the authorization certificate to the server of the mobile phone manufacturer; the mobile phone manufacturer server sends the verification information and the authorization certificate to the server of the automobile manufacturer; the The car company server determines whether the verification terminal is legal according to the verification information and the authorization certificate, and when the verification terminal is legal, generates a sharing permission instruction, and sends the sharing permission instruction to the authorized terminal; the authorization The terminal executes the sharing permission instruction to control the vehicle corresponding to the sharing terminal.
- the vehicle manufacturer server generates sharing success information, and sends the sharing success information to the sharing terminal, and the sharing terminal outputs and displays the sharing success information for the vehicle owner to know immediately.
- the sharing failure information is generated, and the sharing success information is sent to the sharing terminal, and the sharing terminal outputs and displays the sharing success information.
- the authorized user's mobile phone After receiving the request from the owner's mobile phone, the authorized user's mobile phone verifies the certificate, and if the verification passes, returns the mobile phone SEID, mobile phone model and other information to the car owner's mobile phone;
- the owner's mobile phone After the owner's mobile phone receives the response, it sends the authorization data (token, certificate, timestamp, etc., provided by the car manufacturer) to the authorized user's mobile phone; the authorized user's mobile phone uploads the data to the mobile phone factory server, and the mobile phone factory server forwards it to the car manufacturer's server; After receiving the data, the car manufacturer's server performs identity verification. After the verification is passed, it generates personalized data and returns it to the mobile phone factory server. The mobile phone factory server sends it to the authorized user's mobile phone; the authorized user's mobile phone stores the personalized data and returns a notification to the mobile phone factory.
- the authorization data token, certificate, timestamp, etc., provided by the car manufacturer
- the mobile phone factory server forwards the notification to the car manufacturer server, the car manufacturer server generates the vehicle registration data and sends it to the vehicle end, the vehicle end stores the registration data and returns the result to the car manufacturer server; the car manufacturer server synchronizes The vehicle registration result is sent to the authorized device mobile phone manufacturer's server, and the authorized device queries the result and displays it in the APP.
- the registration result of the authorized user's mobile phone can be displayed on the car company's APP sent to the car owner through the car manufacturer's server, and managed by the car owner.
- the sharing permission information includes: sharing duration and activatable vehicle status, wherein the activatable vehicle status includes: starting the vehicle door, starting the vehicle running, and starting the trunk.
- the NFC signal of the first NFC communication module it is determined whether there is an authorized terminal that has passed the polling within the preset polling time threshold.
- the information required for the authorization includes: the token information generated by the vehicle manufacturer server and the information of the authorized vehicle.
- the authorization credential is a credential for personalizing data.
- the sharing mobile phone confirms to start sharing the NFC virtual key
- the sharing terminal, and the sharing terminal is the owner terminal has the right to control, you can still control the sharing permission of the key after the sharing key is determined, for example, set the sharing time length to one day, and now the owner terminal can To manually correct the time, you can change it to share only half a day or set a few hours or even choose to stop directly. After the set time is up, the system will automatically stop sharing without human control.
- the authorized terminal does not need to store the data shared by the sharing terminal, because the NFC key sharing is a regenerated smart key every time it is shared, and it is not repeated each time.
- first and second are only used for descriptive purposes, and should not be construed as indicating or implying relative importance or implying the number of indicated technical features. Thus, a feature delimited with “first”, “second” may expressly or implicitly include at least one of that feature.
- plurality means at least two, such as two, three, etc., unless expressly and specifically defined otherwise.
- a "computer-readable medium” can be any device that can contain, store, communicate, propagate, or transport the program for use by or in connection with an instruction execution system, apparatus, or apparatus.
- computer readable media include the following: electrical connections with one or more wiring (electronic devices), portable computer disk cartridges (magnetic devices), random access memory (RAM), Read Only Memory (ROM), Erasable Editable Read Only Memory (EPROM or Flash Memory), Fiber Optic Devices, and Portable Compact Disc Read Only Memory (CDROM).
- the computer readable medium may even be paper or other suitable medium on which the program may be printed, as the paper or other medium may be optically scanned, for example, followed by editing, interpretation, or other suitable medium as necessary process to obtain the program electronically and then store it in computer memory.
- portions of the present disclosure may be implemented in hardware, software, firmware, or a combination thereof.
- various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system.
- a suitable instruction execution system For example, if implemented in hardware as in another embodiment, it can be implemented by any one of the following techniques known in the art, or a combination thereof: discrete with logic gates for implementing logic functions on data signals Logic circuits, application specific integrated circuits with suitable combinational logic gates, Programmable Gate Arrays (PGA), Field Programmable Gate Arrays (FPGA), etc.
- each functional unit in each embodiment of the present disclosure may be integrated into one processing module, or each unit may exist physically alone, or two or more units may be integrated into one module.
- the above-mentioned integrated modules can be implemented in the form of hardware, and can also be implemented in the form of software function modules. If the integrated modules are implemented in the form of software functional modules and sold or used as independent products, they may also be stored in a computer-readable storage medium.
- the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, and the like.
Abstract
Description
Claims (12)
- 一种虚拟钥匙的分享系统,其特征在于:分享终端:用于获取用户输入的分享权限信息,并根据所述分享权限信息生成触控按钮,以获取到用户按触所述触控按钮的触控信号时,开启第一NFC通信模块,并通过所述第一NFC通信模块的NFC信号轮询是否有授权终端;授权终端:用于在接收到所述信息反馈指令时,以发送授权所需信息至所述分享终端;车企厂商服务器:用于接收所述分享终端发送所述授权所需信息,以根据所述授权所需信息生成授权凭证。
- 如权利要求1所述的虚拟钥匙的分享系统,其特征在于,校验终端:用于接收所述分享终端发送的NFC有效通信范围;所述车企厂商服务器发送所述授权凭证至所述分享终端;所述校验终端获取唯一校验信息,并发送校验信息和所述授权凭证至手机厂商服务器;所述手机厂商服务器发送所述校验信息和所述授权凭证至车企厂商服务器;所述车企服务器根据所述校验信息和所述授权凭证判断校验终端是否合法。
- 如权利要求2所述的虚拟钥匙的分享系统,其特征在于,当校验终端合法时,生成分享允许指令,并将所述分享允许指令发送至所述授权终端;所述授权终端执行所述分享允许指令,以控制与所述分享终端对应的车辆。
- 如权利要求3所述的虚拟钥匙的分享系统,其特征在于,所述车企厂商服务器生成分享成功信息,并将分享成功信息发送至所述分享终端,所述分享终端输出显示所述分享成功信息,以供车主即时获知。
- 如权利要求3或4所述的虚拟钥匙的分享系统,其特征在于,当校验终端不合法时,生成分享失败信息,并将分享成功信息发送至所述分享终端,所述分享终端输出显示所述分享成功信息。
- 如权利要求1-5中任一项所述的虚拟钥匙的分享系统,其特征在于,所述分享权限信息包括:分享时长和可启用车辆状态,其中可启用车辆状态包括:启动车门,启动车辆行驶,启动后备箱。
- 如权利要求1-6中任一项所述的虚拟钥匙的分享系统,其特征在于,根据所述第一NFC通信模块的NFC信号判断预设轮询时间阈值内是否有通过轮询的所述授权终端。
- 如权利要求1-7中任一项所述的虚拟钥匙的分享系统,其特征在于,所述授权所需信息包括:所述车企厂商服务器生成token信息和授权车辆的信息。
- 如权利要求1-8中任一项所述的虚拟钥匙的分享系统,其特征在于,所述授权凭证 为个人化数据的凭证。
- 一种虚拟钥匙的分享方法,其特征在于,其包括:分享终端获取用户输入的分享权限信息,并根据所述分享权限信息生成触控按钮;所述分享终端获取到用户按触所述触控按钮的触控信号时,开启第一NFC通信模块,并通过所述第一NFC通信模块的NFC信号轮询是否有授权终端;当轮询到有所述授权终端时,所述分享终端发送信息反馈指令至所述授权终端;所述授权终端接收到所述信息反馈指令时,发送授权所需信息至所述分享终端;所述分享终端发送所述授权所需信息至车企厂商服务器,所述车企厂商服务器根据所述授权所需信息生成授权凭证。
- 如权利要求10所述的虚拟钥匙的分享方法,其特征在于,所述车企厂商服务器发送所述授权凭证至所述分享终端;所述分享终端发送NFC有效通信范围至校验终端;所述校验终端获取唯一校验信息,并发送校验信息和所述授权凭证至手机厂商服务器;所述手机厂商服务器发送所述校验信息和所述授权凭证至车企厂商服务器;所述车企服务器根据所述校验信息和所述授权凭证判断校验终端是否合法。
- 一种计算机可读存储介质,其特征在于,其上存储有虚拟钥匙的分享程序,该虚拟钥匙的分享程序被处理器执行时实现根据权利要求10或11所述的虚拟钥匙的分享方法。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP21914206.4A EP4247022A4 (en) | 2020-12-30 | 2021-12-24 | SYSTEM AND METHOD FOR SHARING A VIRTUAL KEY |
KR1020237021655A KR20230110613A (ko) | 2020-12-30 | 2021-12-24 | 가상 키 공유 시스템 및 방법 |
JP2023540483A JP2024504036A (ja) | 2020-12-30 | 2021-12-24 | バーチャルキーの共有システム及び方法 |
US18/212,670 US20230336982A1 (en) | 2020-12-30 | 2023-06-21 | Virtual key sharing system and method |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011609923.9A CN114697925A (zh) | 2020-12-30 | 2020-12-30 | 一种虚拟钥匙的分享系统及方法 |
CN202011609923.9 | 2020-12-30 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/212,670 Continuation US20230336982A1 (en) | 2020-12-30 | 2023-06-21 | Virtual key sharing system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022143469A1 true WO2022143469A1 (zh) | 2022-07-07 |
Family
ID=82132874
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/141263 WO2022143469A1 (zh) | 2020-12-30 | 2021-12-24 | 一种虚拟钥匙的分享系统及方法 |
Country Status (6)
Country | Link |
---|---|
US (1) | US20230336982A1 (zh) |
EP (1) | EP4247022A4 (zh) |
JP (1) | JP2024504036A (zh) |
KR (1) | KR20230110613A (zh) |
CN (1) | CN114697925A (zh) |
WO (1) | WO2022143469A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115174266A (zh) * | 2022-08-09 | 2022-10-11 | 宁波奥克斯电气股份有限公司 | 空调控制方法、装置、电子设备和计算机可读存储介质 |
CN115174266B (zh) * | 2022-08-09 | 2024-05-10 | 宁波奥克斯电气股份有限公司 | 空调控制方法、装置、电子设备和计算机可读存储介质 |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2021141534A (ja) * | 2020-03-09 | 2021-09-16 | パナソニックIpマネジメント株式会社 | 車載装置および車載システム |
CN116582839B (zh) * | 2023-07-12 | 2023-09-22 | 安羚科技(杭州)有限公司 | 去中心化的车辆权限管理系统及方法 |
CN117134910B (zh) * | 2023-10-24 | 2024-03-15 | 深圳市纽创信安科技开发有限公司 | 一种密钥共享方法、系统及存储介质 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108569250A (zh) * | 2018-03-30 | 2018-09-25 | 上海汽车集团股份有限公司 | 基于共享汽车的蓝牙钥匙的自动授权方法 |
CN109637034A (zh) * | 2018-12-18 | 2019-04-16 | 钛马信息网络技术有限公司 | 基于虚拟钥匙的车辆分时租赁方法及系统 |
CN109936833A (zh) * | 2017-12-15 | 2019-06-25 | 蔚来汽车有限公司 | 车辆虚拟钥匙生成使用方法及其系统以及用户终端 |
CN110136306A (zh) * | 2019-05-16 | 2019-08-16 | 广州小鹏汽车科技有限公司 | 一种车钥匙的控制方法和系统 |
WO2020254521A1 (fr) * | 2019-06-19 | 2020-12-24 | Sigfox | Système de partage de véhicules et procédé d'accès à un véhicule d'un tel système |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8947202B2 (en) * | 2011-10-20 | 2015-02-03 | Apple Inc. | Accessing a vehicle using portable devices |
US9460577B2 (en) * | 2014-07-17 | 2016-10-04 | Hyundai Motor Company | Sharing a key for a vehicle |
US10924924B1 (en) * | 2019-09-09 | 2021-02-16 | Ford Global Technologies, Llc | Out-of-band key sharing using near-field communication |
-
2020
- 2020-12-30 CN CN202011609923.9A patent/CN114697925A/zh active Pending
-
2021
- 2021-12-24 JP JP2023540483A patent/JP2024504036A/ja active Pending
- 2021-12-24 EP EP21914206.4A patent/EP4247022A4/en active Pending
- 2021-12-24 WO PCT/CN2021/141263 patent/WO2022143469A1/zh active Application Filing
- 2021-12-24 KR KR1020237021655A patent/KR20230110613A/ko unknown
-
2023
- 2023-06-21 US US18/212,670 patent/US20230336982A1/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109936833A (zh) * | 2017-12-15 | 2019-06-25 | 蔚来汽车有限公司 | 车辆虚拟钥匙生成使用方法及其系统以及用户终端 |
CN108569250A (zh) * | 2018-03-30 | 2018-09-25 | 上海汽车集团股份有限公司 | 基于共享汽车的蓝牙钥匙的自动授权方法 |
CN109637034A (zh) * | 2018-12-18 | 2019-04-16 | 钛马信息网络技术有限公司 | 基于虚拟钥匙的车辆分时租赁方法及系统 |
CN110136306A (zh) * | 2019-05-16 | 2019-08-16 | 广州小鹏汽车科技有限公司 | 一种车钥匙的控制方法和系统 |
WO2020254521A1 (fr) * | 2019-06-19 | 2020-12-24 | Sigfox | Système de partage de véhicules et procédé d'accès à un véhicule d'un tel système |
Non-Patent Citations (1)
Title |
---|
See also references of EP4247022A4 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115174266A (zh) * | 2022-08-09 | 2022-10-11 | 宁波奥克斯电气股份有限公司 | 空调控制方法、装置、电子设备和计算机可读存储介质 |
CN115174266B (zh) * | 2022-08-09 | 2024-05-10 | 宁波奥克斯电气股份有限公司 | 空调控制方法、装置、电子设备和计算机可读存储介质 |
Also Published As
Publication number | Publication date |
---|---|
CN114697925A (zh) | 2022-07-01 |
EP4247022A4 (en) | 2024-05-08 |
EP4247022A1 (en) | 2023-09-20 |
KR20230110613A (ko) | 2023-07-24 |
JP2024504036A (ja) | 2024-01-30 |
US20230336982A1 (en) | 2023-10-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2022143469A1 (zh) | 一种虚拟钥匙的分享系统及方法 | |
US11888594B2 (en) | System access using a mobile device | |
JP6682592B2 (ja) | 期限付セキュアアクセス | |
US10645578B2 (en) | System for using mobile terminals as keys for vehicles | |
US7185199B2 (en) | Apparatus and methods for providing secured communication | |
CN102983970B (zh) | 便携式媒体设备 | |
WO2018040639A1 (zh) | 虚拟钥匙的授权方法、系统、移动终端及服务器 | |
JP2019521414A (ja) | 車載端末のための決済認証方法、装置、及び、システム | |
US20070079122A1 (en) | Apparatus and method for executing security function using smart card | |
US9111079B2 (en) | Trustworthy device claims as a service | |
JP2020077353A (ja) | 認証及び承認方法並びに認証サーバー | |
EP4089978A1 (en) | Authentication method and apparatus for vehicle-mounted device | |
WO2023185492A1 (zh) | 车辆控制器诊断方法、装置、设备和介质 | |
US20200226275A1 (en) | Activating or deactivating a feature of a vehicle | |
CN113765655A (zh) | 访问控制方法、装置、设备及存储介质 | |
KR102490395B1 (ko) | 외부 전자 장치의 키를 공유하는 전자 장치 및 전자 장치의 동작 방법 | |
US10973060B2 (en) | Methods and systems for management of an association between a user and a vehicle | |
US20140150116A1 (en) | Controlling release of secure data | |
JP2009212625A (ja) | 会員認証システム及び携帯端末装置 | |
US11734972B2 (en) | Systems and methods for securely managing vehicle information | |
CN117882337A (zh) | 数据中心处作为服务的证书撤销 | |
CN110808832A (zh) | 数字钥匙密码分享方法及装置 | |
JP2020160639A (ja) | 入力情報管理システム | |
KR20200050828A (ko) | 이모빌라이저 토큰 관리 시스템 | |
KR102366869B1 (ko) | 디지털 키 서비스 확장 및 제공 시스템 및 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21914206 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2021914206 Country of ref document: EP Effective date: 20230615 |
|
ENP | Entry into the national phase |
Ref document number: 20237021655 Country of ref document: KR Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2023540483 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |