Movatterモバイル変換


[0]ホーム

URL:


CN119049161B - Physical key activation method, electronic device and storage medium - Google Patents

Physical key activation method, electronic device and storage medium
Download PDF

Info

Publication number
CN119049161B
CN119049161BCN202411546304.8ACN202411546304ACN119049161BCN 119049161 BCN119049161 BCN 119049161BCN 202411546304 ACN202411546304 ACN 202411546304ACN 119049161 BCN119049161 BCN 119049161B
Authority
CN
China
Prior art keywords
key
target
physical key
target physical
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202411546304.8A
Other languages
Chinese (zh)
Other versions
CN119049161A (en
Inventor
王效金
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Yinji Technology Co ltd
Original Assignee
Shanghai Yinji Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Yinji Technology Co ltdfiledCriticalShanghai Yinji Technology Co ltd
Priority to CN202411546304.8ApriorityCriticalpatent/CN119049161B/en
Publication of CN119049161ApublicationCriticalpatent/CN119049161A/en
Application grantedgrantedCritical
Publication of CN119049161BpublicationCriticalpatent/CN119049161B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

The embodiment of the invention relates to the field of intelligent keys and discloses a physical key activation method, electronic equipment and a storage medium, wherein the method comprises the steps of sending an activation instruction to a target physical key successfully paired with a mobile terminal through the mobile terminal; the target physical key initiates a key downloading request to acquire a target key corresponding to the target physical key in response to the activation instruction, the target physical key is in pairing connection with a target vehicle after the target key is acquired, the target vehicle writes the target physical key into a white list of the target vehicle, the target vehicle sends a control authority request to the target physical key, the target physical key acquires and caches authority data corresponding to the control authority request from a digital key server and returns to the target vehicle, and the target physical key completes activation. The method can solve the problems that most of existing vehicles are only provided with mobile phone digital keys when leaving factories, and part of users are not used to use the mobile phone digital keys, so that experience is poor.

Description

Physical key activation method, electronic device and storage medium
Technical Field
The present invention relates to the field of smart keys, and in particular, to a physical key activation method, an electronic device, and a storage medium.
Background
Along with the gradual entering of the digital key into the popularization period, the on-board configuration of the digital key is being extended and popularized from new energy sources to fuel vehicles and from autonomous brands to joint venues, and the upgrading of the experience brought by the digital key to users is becoming the standard configuration of new vehicles.
A digital key generally refers to a security tool that uses a digital code or password to grant access to a particular system or service. Such keys may take a variety of forms, such as PIN codes, passwords, digital certificates, security tokens, or electronic devices for systems such as cell phone payments.
At present, a mobile phone digital key is generally mounted in an automobile, and a user can control the on-off of the automobile through the mobile phone after the mobile phone logs in an owner account to activate the digital key for the automobile. However, a part of users who are used to use the traditional physical keys are not used to use the mobile phone digital keys, so that experience is poor.
Disclosure of Invention
The invention aims to provide a physical key activation method, electronic equipment and a storage medium, wherein a physical key is used for being connected with a mobile terminal and a vehicle end, and the physical key is activated to replace a mobile phone digital key to control an automobile through cooperative confirmation of the mobile terminal, the vehicle end, the physical key end and a digital key server end, so that the problem that a user using a traditional physical key in habit is bad in experience caused by unaccustomed use of the mobile phone digital key is prevented.
In order to solve the technical problems, the embodiment of the invention provides a physical key activation method, which comprises the steps that a user sends an activation instruction to a target physical key which is successfully paired with a mobile terminal through the mobile terminal, a key downloading request is initiated by the target physical key to obtain a target key corresponding to the target physical key in response to the activation instruction, after the target key is obtained, the target physical key is paired with a target vehicle, the target vehicle writes the target physical key into a white list of the target vehicle, the target vehicle is a vehicle which is bound with the mobile terminal in advance, the target vehicle sends a control authority request to the target physical key, and the target physical key obtains and caches authority data corresponding to the control authority request from a digital key server and returns the authority data to the target vehicle at the same time, so that the activation of the target physical key is completed.
The embodiment of the application also provides electronic equipment, which comprises at least one processor and a memory, wherein the memory is in communication connection with the at least one processor;
Wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the physical key activation method as described above.
Embodiments of the present application also provide a computer readable storage medium storing a computer program which, when executed by a processor, implements a physical key activation method as described above.
The method comprises the steps of carrying out Bluetooth pairing on a mobile terminal and a target physical key to be activated, sending an activation instruction to the target physical key successfully paired with the mobile terminal through the mobile terminal, carrying out pairing connection on the target physical key and a target vehicle after key verification, writing the target physical key into a white list of the target physical key by the target vehicle so that the target physical key can access and acquire data of the target vehicle, sending a control authority request to the target physical key by the target vehicle, acquiring and caching authority data corresponding to the control authority request from a digital key server by the target physical key, returning the authority data to the target vehicle, and completing activation by the target physical key after the authority data are acquired by the target physical key. The activated physical key acquires the authority data corresponding to the control authority request, so that the specific function control on the target vehicle can be realized through the target physical key, and the specific function is a function corresponding to the control authority request and can be realized through the authority data. The physical key is activated through the scheme, and the physical key is connected with the vehicle end through the terminal, so that the activated physical key can replace the mobile phone digital key to realize the control of related functions of the automobile, and the problem that the experience is poor due to the fact that a user of the traditional physical key used to the mobile phone digital key is not used to the mobile phone digital key is prevented.
In some embodiments, before the mobile terminal sends the activation instruction to the target physical key successfully paired with the mobile terminal, the method further comprises the steps that the mobile terminal receives Bluetooth broadcasts of all physical keys in a preset range, one physical key is selected, the mobile terminal initiates an activation state inquiry request of the digital key of the target vehicle to the digital key server, and when the activation state is activated, bluetooth pairing connection is carried out between the target physical key and the mobile terminal.
In some embodiments, after the mobile terminal sends the activation instruction to the target physical key successfully paired with the mobile terminal, the method includes that the target physical key detects the self-electricity quantity, and if the self-electricity quantity is lower than a preset electricity quantity value, the target physical key stops activation and returns an activation failure message to the mobile terminal.
In some embodiments, after the mobile terminal sends the activation instruction to the target physical key successfully paired with the mobile terminal, the method includes that the target physical key judges whether the activation instruction is received for the first time, wherein the activation instruction at least comprises a user ID, if not, whether the activation instruction and the activation instruction received for the first time come from the same user is judged, and if not, the target physical key stops activation and returns an activation failure message to the mobile terminal.
In some embodiments, the target physical key initiates a key downloading request to obtain a target key corresponding to the target physical key, the method includes that the target physical key initiates the key downloading request to the mobile terminal, the mobile terminal forwards the key downloading request to the digital key server, the key downloading request carries information of the target physical key, the digital key server analyzes the key downloading request to determine the target key corresponding to the target physical key, a private key corresponding to the target physical key is used for signing and encrypting the target key to obtain an encryption key, the encryption key is returned to the target physical key, the target physical key decrypts and verifies the encryption key by using a public key stored in the target physical key, and the verification is passed to obtain the target key, wherein the private key and the public key are a group of public-private pairs which are generated in advance for the target physical key by the digital key.
In some embodiments, signing the target key as described above includes signing the target key using an elliptic curve digital signature algorithm.
In some embodiments, after the target physical key and the target vehicle are connected in a pairing manner, the method further comprises the steps that the target vehicle sends a version negotiation request to the target physical key, the target physical key returns ICCE protocol version information supported by the target physical key to the target vehicle according to the version negotiation request, if the target vehicle supports an ICCE protocol corresponding to the ICCE protocol version information, the target vehicle writes the target physical key into a white list of the target vehicle, and if the target vehicle does not support the ICCE protocol corresponding to the ICCE protocol version information, an activation failure message is returned to the mobile terminal.
In some embodiments, before the target vehicle writes the target physical key into the white list of the target vehicle, the target vehicle initiates an authentication request to the target physical key to request negotiation of a session key with the target physical key, the authentication request comprises a vehicle-end random number generated by the target vehicle and a frame number of the target vehicle, the target physical key forwards the authentication request to the mobile terminal, the mobile terminal generates a first terminal random number to generate a terminal session key and sends the terminal session key to the target vehicle, the target vehicle decrypts the terminal session key, compares the correctness of the vehicle-end random number to obtain a second terminal random number, generates a first verification value and a vehicle-end session key and sends the first verification value to the mobile terminal, the mobile terminal decrypts the vehicle-end session key to obtain the first verification value, generates a terminal hash value according to the first verification value and encrypts the first verification value to obtain a terminal encryption value and sends the terminal encryption value to the target vehicle, and the target vehicle decrypts the terminal hash value and sends the terminal hash value to the mobile terminal according to the comparison result.
In some embodiments, the target vehicle writing the target physical key into the white list of the target vehicle comprises the steps that the target vehicle initiates a white list request to the target physical key, the target physical key synchronizes the white list request to the mobile terminal, the mobile terminal sends the white list request to the digital key server, the digital key server returns signed white list data matched with the white list request according to the white list request and forwards the white list data to the target vehicle through the target physical key, the target vehicle checks the signed white list data, and the target physical key is written into the white list of the target vehicle after successful signature verification.
In some embodiments, the target physical key acquires and caches authority data corresponding to the control authority request from a digital key server and returns the authority data to the target vehicle, wherein the target physical key synchronizes the control authority request to the mobile terminal, the mobile terminal sends the control authority request to the digital key server, the digital key server returns the authority data matched with the control authority request to the mobile terminal according to the control authority request and forwards the authority data to the target physical key, the target physical key sends the authority data to the target vehicle, and simultaneously caches the authority data and updates the self-activation identification, and the authority data is data required by the target physical key for realizing control of the target vehicle for a specific function corresponding to the control authority request.
In some embodiments, the method further comprises the steps that the target physical key sends a message of successful activation to the mobile terminal as an activation result responding to the activation instruction, the mobile terminal reports the activation result to the digital key server, and the digital key server stores the activation state of the target physical key.
Drawings
One or more embodiments are illustrated by way of example and not limitation in the figures of the accompanying drawings.
FIG. 1 is a specific flow chart of a physical key activation method according to one embodiment of the present invention;
FIG. 2 is a detailed flow chart II of a physical key activation method according to another embodiment of the present invention;
FIG. 3 is a detailed flow chart III of a physical key activation method according to another embodiment of the present invention;
fig. 4 is a schematic structural view of an electronic device according to an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the following detailed description of the embodiments of the present application will be given with reference to the accompanying drawings. However, those of ordinary skill in the art will understand that in various embodiments of the present application, numerous technical details have been set forth in order to provide a better understanding of the present application. The claimed application may be practiced without these specific details and with various changes and modifications based on the following embodiments. The following embodiments are divided for convenience of description, and should not be construed as limiting the specific implementation of the present application, and the embodiments can be mutually combined and referred to without contradiction.
An embodiment of the present application relates to a physical key activation method, and it should be noted that the following details are provided for understanding, and are not necessary to implement the present embodiment.
Before specifically stating the scheme of the embodiment of the present application, the preconditions required before the implementation of the scheme will be explained first. The mobile phone digital key technology is combined with the software and hardware technology, so that a mobile phone (mobile terminal) has the function of a car key, and a car owner can control a car through the mobile phone to finish operations such as door opening, door closing and the like. Therefore, the owner needs to activate the mobile phone digital key before using the physical key activation method in the present solution to replace the mobile phone digital key with the target physical key. However, the present application is not limited in this regard, as different vehicle manufacturers may have different settings for the specific step of activating the digital key of the cell phone.
As shown in fig. 1, the physical key activation method according to the embodiment of the present invention specifically includes the following steps.
And 101, the user sends an activation instruction to a target physical key successfully paired with the mobile terminal through the mobile terminal.
The mobile terminal is an electronic device with a bluetooth function and capable of installing an application program, and may be a mobile phone, a tablet computer, etc., which is not particularly limited in the present application. The target physical key in the application is a physical Bluetooth key, such as Keyfob, a small hard disk device with a built-in verification mechanism.
Specifically, the mobile terminal sending the activation instruction needs to be pre-installed with a physical key management application program developed by a manufacturer of the target physical key successfully paired with the mobile terminal, wherein the application program is used for managing the life cycle of the target physical key, including creation, activation, use, logout and the like of the target physical key, and the target physical key is the physical key to be activated selected by a user. The user needs to log in the physical key management application program with the identity of the vehicle owner, an 'activation' button can be arranged in the physical key management application program, and the user can trigger sending an activation instruction to a target physical key successfully paired with the mobile terminal after clicking the button. It should be noted that, in this solution, the user is the owner of the target vehicle, the mobile terminal is the mobile phone used by the owner, and all actions executed by the mobile terminal in this solution are performed in the physical key management application program installed by the mobile terminal, which will not be described in detail below.
And starting timing at the moment when the user sends an activation instruction to the target physical key which is successfully paired with the mobile terminal, and if the activation success message returned by the target physical key is not received within the set time, judging that the activation fails, automatically ending the activation flow by the mobile terminal and sending an activation failure message prompt to the user. The specific setting of the specific set time may be determined according to the actual communication condition of the mobile terminal when the activation command is triggered, the network environment, and other factors, for example, 30s, 45s, 60s, 90s, 120s, 150s, and the like, which is not particularly limited in the present application.
Step 102, responding to the activation instruction, and initiating a key downloading request by the target physical key to acquire a target key corresponding to the target physical key.
Specifically, after the target physical key receives the activation instruction sent by the mobile terminal, an activation process is started. Firstly, a target physical key initiates a key downloading request to a mobile terminal so as to acquire a target key corresponding to the target physical key, and at the same time, the validity of an activation instruction of the mobile terminal is verified. After receiving the key downloading request, the mobile terminal can request the digital key server to download the target key and return the target physical key. The subsequent activation step can only be performed if the target physical key has obtained the corresponding target key.
Step 103, after the target key is obtained, the target physical key is in pairing connection with the target vehicle, and the target vehicle writes the target physical key into a white list of the target vehicle;
the target vehicle is a vehicle which is bound with the mobile terminal in advance.
Specifically, after the target physical key obtains the corresponding target key, the target physical key actively initiates pairing connection with the target vehicle, and the pairing mode may be performed by adopting a justwork pairing mode of bluetooth, which is not limited in this embodiment. It should be noted that, if the target vehicle is a vehicle that is bound to the mobile terminal in advance, and if the user is a vehicle owner of a plurality of vehicles, the mobile terminal binds the plurality of vehicles, and the user needs to select a specific vehicle in advance and then enter the activation step of the physical key after logging in the physical key management application program with the identity of the vehicle owner. For example, the mobile terminal of the user binds the vehicle a and the vehicle B together, when the user selects to log in the physical key management application program with the owner identity, the user needs to select to log in with the owner identity of the vehicle a or log in with the owner identity of the vehicle B, and if the user selects the vehicle a, the vehicle a is the target vehicle which is in pairing connection with the target physical key when the target physical key is activated subsequently. After the target physical key is in pairing connection with the target vehicle, the target vehicle writes the target physical key into a white list of the target vehicle, so that the target physical key can realize access to the target vehicle.
104, The target vehicle sends a control authority request to the target physical key, the target physical key acquires and caches authority data corresponding to the control authority request from the digital key server, and meanwhile, the authority data is returned to the target vehicle, so that the target physical key is activated.
Specifically, in order to achieve the purpose of performing function control on the target vehicle by using the target physical key instead of the mobile phone digital key, the target physical key has related data for performing specific function control on the target vehicle in addition to enabling the target physical key to access the target vehicle. Based on the purpose, the target vehicle sends a control authority request to the target physical key, the target physical key receives the control authority request and then forwards the control authority request to the digital key server (DIGITAL KEY SERVICE, DKS), the digital key server returns authority data corresponding to the control authority request to the target physical key, and the target physical key receives and caches the authority data and synchronously sends the authority data to the target vehicle. The permission data is the related data which can realize the specific function corresponding to the control permission request. At this point, the target physical key has already been able to achieve control of the target vehicle, i.e., it is representative that the target physical key has completed activation.
Compared with the related art, the method and the device have the advantages that Bluetooth pairing is conducted on the mobile terminal and the target physical key to be activated, an activation instruction is sent to the target physical key successfully paired with the mobile terminal through the mobile terminal, the target physical key is paired with the target vehicle after key verification, the target vehicle writes the target physical key into a white list of the target physical key, so that the target physical key can access and acquire data of the target vehicle, the target vehicle sends a control authority request to the target physical key, the target physical key acquires and caches authority data corresponding to the control authority request from the digital key server, meanwhile, the target physical key returns to the target vehicle, and activation is completed after the target physical key acquires the authority data. The activated physical key acquires the authority data corresponding to the control authority request, so that the specific function control on the target vehicle can be realized through the target physical key, and the specific function is a function corresponding to the control authority request and can be realized through the authority data. The physical key is activated through the scheme, and the physical key is connected with the vehicle end through the terminal, so that the activated target physical key can replace the mobile phone digital key to realize the control of related functions of the automobile, and the problem that the experience is poor due to the fact that a user of the traditional physical key used in habit is not used to the mobile phone digital key is prevented.
Another embodiment of the present invention relates to a physical key activation method, and the physical key activation method in the foregoing embodiment is supplemented, and specific details thereof are as follows.
In one example, as shown in fig. 2, before step 101, the method further includes the following steps:
Step 201, the mobile terminal receives bluetooth broadcast of all physical keys within a preset range, and selects one physical key as a target physical key.
Specifically, to make a bluetooth pairing connection with a mobile terminal, the physical key needs to be within the connectable range of the vehicle and the mobile terminal and at the same time turn on a connectable broadcast. The mobile terminal may receive all broadcasts within the connectable range, display a connectable list, from which the user selects one physical key to activate as the target physical key to be paired with the terminal.
Step 202, the mobile terminal initiates an activation state inquiry request of a digital key of a target vehicle to a digital key server.
Specifically, the activation state of the digital key of the target vehicle is stored in a Digital Key Server (DKS), and the target physical key can only re-etch the relevant functions of the mobile phone digital key to realize the control of the target vehicle when the digital key of the target vehicle (mobile phone digital key) is in the activated state.
And 203, when the activated state is activated, carrying out Bluetooth pairing connection on the target physical key and the mobile terminal.
Specifically, when the activation state of the digital key of the target vehicle is inquired to be activated, the target physical key can be in Bluetooth pairing connection with the mobile terminal to perform a subsequent target physical key activation step, and when the activation state of the digital key of the target vehicle is inquired to be not activated, the mobile terminal prompts a user that the user cannot be in pairing connection with the target physical key to perform the subsequent target physical key activation step.
In one example, after step 101, the method further includes the steps of detecting the self-power of the target physical key, and if the self-power is lower than a preset power value, stopping activation of the target physical key and returning an activation failure message to the mobile terminal.
Specifically, after the target physical key receives the activation instruction, whether the self electric quantity can meet the power consumption in the normal working state is detected. The preset electric quantity value which can meet the power consumption of the normal working state of the target physical key can be preset, the self electric quantity detected by the target physical key is compared with the preset electric quantity value, and if the self electric quantity detected by the target physical key is lower than the preset electric quantity value, the target physical key stops activating and returns an activation failure message to the mobile terminal. The preset electric quantity value can be set to be any electric quantity value in 1% -50%, such as 20%, 25%, 30%, 35% and the like, and the specific value can be determined according to the normal working state power consumption of the actual target physical key in the preset time, and the application is not particularly limited to the specific value.
In another example, after step 101, the method further includes the step of determining whether the target physical key receives the activation instruction for the first time, where the activation instruction at least includes a user ID;
if not, judging whether the activation instruction and the first received activation instruction come from the same user, and if not, stopping activating the target physical key and returning an activation failure message to the mobile terminal.
Specifically, if the target physical key can be successfully activated, the target physical key is required to be activated by the activation instruction received for the first time, or by the activation instruction sent by the same user and the activation instruction received for the user again. Therefore, the target physical key needs to judge whether the activation instruction is received for the first time after receiving the activation instruction, if so, each step of subsequent response to the activation instruction is executed, and if the target physical key does not receive the activation instruction for the first time, whether the activation instruction received for the first time and the activation instruction received in history come from the same user is judged. It should be noted that, because the activation instruction is sent, the user is required to log in the physical key management application program installed in the mobile terminal with the identity of the owner, and the activation instruction is triggered by the physical key management application program to send to the target physical key successfully paired with the mobile terminal. Therefore, when the activation instruction is sent, the logged-in user ID can be carried in the activation instruction, the target physical key can learn the user information of the activation instruction, and whether the user ID is from the same user can be judged by comparing the user ID carried in the activation instruction received at the time with the user information carried in the activation instruction received in history. And if the received activating instruction and the activating instruction received in the history are not from the same user, not allowing the other user to activate the target physical key again, and sending an activation failure prompt message to the mobile terminal.
Under the condition that other target physical keys and target vehicles can only be activated in a unique corresponding mode, the activation instruction comprises a frame number of the target vehicle in addition to the user ID, when the target physical key does not receive the activation instruction for the first time, whether the received activation instruction and the received activation instruction received in the history come from the same user or not needs to be judged, if so, whether the received activation instruction and the received activation instruction received in the history are the activation of the same vehicle by the same user or not needs to be judged, and the unique corresponding activation of one physical key and one vehicle can be ensured by verifying the user ID and the frame number. In addition, in consideration of different activation requirements, the activation instruction can also comprise a unique code of a target physical key besides the user ID and the frame number of the target vehicle, and the specific information contained in the activation instruction is not limited.
In one example, as shown in fig. 3, after the target physical key in step 102 initiates a key verification request to the mobile terminal, the method further includes the following steps:
Step 301, a target physical key initiates a key downloading request to a mobile terminal, the mobile terminal forwards the key downloading request to a digital key server, and the key downloading request carries identification information of the target physical key.
Specifically, when the mobile terminal receives a key download request of a target physical key, the key download request is forwarded to a digital key server storing the target key of the target physical key. The digital server analyzes the request, and can obtain the unique identification information, such as user ID, of the target physical key carried in the key downloading request, and determine the target key corresponding to the unique identification information according to the unique identification information of the target physical key.
Step 302, the digital key server analyzes the key downloading request to determine a target key corresponding to the target physical key, signs and encrypts the target key by using a private key corresponding to the target physical key to obtain an encryption key, and returns the encryption key to the target physical key.
Specifically, before the physical keys are activated, the digital key server generates a set of public and private key pairs for each physical key in advance in the crypto machine according to an ECC (Elliptic Curve Cryptography ) P256 algorithm, the private keys are stored in the digital key server, and the public keys are preset in the corresponding physical keys.
The key request sent by the target physical key to the mobile terminal can carry the unique identification information of the target physical key, and the mobile terminal forwards the key request to the digital key server. Similarly, the key stored in the digital key server may also have unique identification information for identifying the corresponding physical key, and the target key of the target physical key may be determined according to the parsed unique identification information. After the target key is determined, since the private key of the target physical key is stored in the digital key server in advance, the target key can be signed and encrypted by using the private key of the target physical key to obtain an encryption key, and the encryption key is returned to the target physical key. In particular, the target key may be signed using an elliptic curve digital signature algorithm (Elliptic Curve Digital Signature Algorith, ECDSA), which is not particularly limited by the present application.
And 303, decrypting the encryption key by using the public key stored in the target physical key, checking the signature, and obtaining the target key after the signature passes, wherein the private key and the public key are a group of public-private key pairs which are generated by the digital key server in advance for the target physical key.
Specifically, after the target key corresponding to the key download request is returned to the target physical key after being signed and encrypted, the public key belonging to the same public-private key pair as the private key for encrypting the target key is already preset inside the target physical key. Therefore, the encryption key is decrypted and checked by utilizing the public key stored in the target physical key, if the decryption and the check are successful, the public key in the target physical key and the private key for encrypting the key are proved to be the same public-private key pair, and the target key can be successfully obtained.
In one example, after the target physical key in step 102 is paired with the target vehicle, the method further includes the steps that the target vehicle sends a version negotiation request to the target physical key, the target physical key returns ICCE protocol version information supported by the target physical key to the target vehicle according to the version negotiation request, if the target vehicle supports an ICCE protocol corresponding to the ICCE protocol version information, the target vehicle writes the target physical key into a white list of the target vehicle, and if the target vehicle does not support the ICCE protocol corresponding to the ICCE protocol version information, an activation failure message is returned to the mobile terminal.
The ICCE (INTELLIGENT CAR Connectivity Industry Ecosystem Alliance, ecological alliance of the intelligent car co-production industry) is an open platform which is jointly manufactured by main stream manufacturers in the field of China intelligent terminals and automobiles, and has been developed into the largest industry alliance in the field of the domestic car co-production industry for years.
Specifically, since ICCE has been released from its birth, if a target physical key is required to control a target vehicle, the same ICCE protocol needs to be supported by both. Therefore, the target vehicle can send a version negotiation request to the target physical key to acquire the ICCE protocol version supported by the target physical key, and after acquiring the information, the target vehicle judges whether the target vehicle supports the ICCE protocol version supported by the target physical key. If the information is supported, the target vehicle writes the target physical key into a white list of the target vehicle, the target physical key can be communicated with the target vehicle later, and if the information is not supported, a message of activation failure is returned to the mobile terminal.
In addition, before the target vehicle writes the target physical key into a white list of the target vehicle, the method further comprises the steps that the target vehicle initiates an authentication request to the target physical key to request to negotiate a session key with the target physical key, the authentication request comprises a vehicle-end random number generated by the target vehicle and a frame number of the target vehicle, the target physical key forwards the authentication request to a mobile terminal, the mobile terminal generates a first terminal random number to generate a terminal session key and sends the terminal session key to the target vehicle, the target vehicle decrypts the terminal session key, compares the correctness of the vehicle-end random number to obtain a second terminal random number, generates a first verification value and a vehicle-end session key and sends the first verification value to the mobile terminal, the mobile terminal decrypts the vehicle-end session key to obtain a first verification value, generates a terminal hash value according to the first verification value and encrypts the terminal hash value and sends the terminal hash value to the target vehicle, and the target vehicle decrypts the terminal hash value to generate a vehicle-end hash value, and compares the terminal hash value and returns an authentication result according to a comparison result.
Specifically, the authentication and authentication are performed after version negotiation is completed, and the main process includes three steps, namely, a session material exchange process initiated by the target vehicle, a session key of the mobile terminal and the target vehicle will be calculated respectively after the exchange is completed, and a correctness stage for confirming the session key negotiation, and whether the authority of the current user is legal or not is judged at the stage. Thirdly, after authentication is completed, the target vehicle informs the mobile terminal of the current authentication result, so that the mobile terminal can carry out corresponding notification and the like on the user. That is, the authentication process between the target vehicle and the target physical key is to negotiate a session key and verify the validity of the session key. The method comprises the steps of receiving an authentication request from a target vehicle, wherein the authentication request comprises a vehicle-end random number generated by the target vehicle and a frame number of the target vehicle, forwarding the authentication request to a mobile terminal by a target physical key, generating a first terminal random number by the mobile terminal, generating a terminal session key by the mobile terminal and sending the terminal session key to the target vehicle, decrypting the terminal session key by the target vehicle, comparing the correctness of the vehicle-end random number to obtain a second terminal random number, generating a first verification value and the vehicle-end session key, and sending the first verification value and the vehicle-end session key to a session material exchange process initiated by the mobile terminal for the target vehicle. The terminal session key comprises a second key, wherein the second terminal random number and the vehicle-end random number are obtained by encrypting a target key of a target physical key, the vehicle-end random number and the first terminal random number. The target vehicle decrypts the terminal encryption hash value, simultaneously generates a vehicle end hash value by using the first verification value, compares the terminal hash value with the vehicle end hash value, and returns an authentication result as a second stage and a third stage process according to the comparison result. The vehicle-end session key comprises a first terminal random number, a second terminal random number and a first verification value. The mobile terminal calculates a vehicle end hash value according to the vehicle end random number and the first verification value, and the vehicle end calculates a terminal hash value according to the vehicle end random number and the first verification value.
In another example, the target vehicle in step 102 writes the target physical key to the white list of the target vehicle, specifically including the steps of:
The method comprises the steps that a target vehicle initiates a white list request to a target physical key, the target physical key synchronizes the white list request to a mobile terminal, the mobile terminal sends the white list request to a digital key server, the digital key server returns white list data matched with the white list request according to the white list request and forwards the white list data to the target physical key, and the target physical key synchronizes the white list data to the target vehicle, so that the target vehicle writes the target physical key into the white list of the target vehicle.
Specifically, the target physical key forwards the white list request to the digital key server through the mobile terminal, and the digital key server assembles and issues white list information according to the white list request and returns the white list information to the target physical key through the mobile terminal. The white list information issued contains information of the target vehicle, and the white list information can be signed at the digital key server before being issued. After the target vehicle receives the white list information issued by the digital key server, the white list information is checked, and if the check is successful, the target physical key is successfully written into the white list of the target vehicle. If the signature verification fails, the process is terminated, and a message of activation failure is returned.
In yet another example, the target physical key in step 103 obtains and caches rights data corresponding to the control rights request from the digital key server, and returns rights data to the target vehicle, including:
the target physical key synchronizes the control authority request to the mobile terminal, and the mobile terminal sends the control authority request to the digital key server; the digital key server returns the authority data matched with the control authority request to the mobile terminal according to the control authority request, and the mobile terminal forwards the authority data to the target physical key;
the permission data is data required by the target physical key to control the target vehicle for a specific function corresponding to the control permission request.
Specifically, after the target vehicle writes the target physical key into the white list of the target vehicle, the target vehicle sends a control authority request to the target physical key, wherein the control authority request comprises a personalized data request and a calibration data request, the personalized data request is used for requesting authority for opening a specific function, and the calibration data request is used for requesting specific data required for realizing the specific function. The specific functions comprise at least one of vehicle unlocking, locking, vehicle window opening and closing, vehicle air conditioner inside, approaching unlocking, vehicle locking and the like, and all functions which can be realized by the mobile phone digital key can be realized by the target physical key.
The digital key server returns right data matched with the control right request to the mobile terminal according to the control right request, wherein the right data comprises personalized data requested by the personalized data request and calibration data requested by the calibration data request. After the target physical key caches the permission data and the target vehicle also receives the permission data, the target physical key can control the target vehicle according to the specific function corresponding to the control permission request, such as controlling at least one function of unlocking and locking the target vehicle, opening and closing a vehicle window, an air conditioner in the vehicle, approaching and unlocking, locking off the vehicle and the like. The target physical key updates its own activation identification, which is the frame number (vin) of the target vehicle, while the target physical key caches the rights data.
On the basis, the target physical key sends a message of successful activation to the mobile terminal as an activation result responding to the activation instruction, the mobile terminal reports the activation result to the digital key server, and the digital key server stores the activation state of the target physical key.
Another embodiment of the invention is directed to an electronic device, as shown in fig. 4, comprising at least one processor 402, and a memory 401 communicatively coupled to the at least one processor 402, wherein the memory 401 stores instructions executable by the at least one processor 402, the instructions being executable by the at least one processor 402 to enable the at least one processor 402 to perform an embodiment of any one of the physical key activation methods described above.
Where memory 401 and processor 402 are connected by a bus, the bus may comprise any number of interconnected buses and bridges, the buses connecting together one or more of the processor 402 and the various circuits of the memory 401. The bus may also connect various other circuits such as peripherals, voltage regulators, and power management circuits, which are well known in the art, and therefore, will not be described any further herein. The bus interface provides an interface between the bus and the transceiver. The transceiver may be one element or may be a plurality of elements, such as a plurality of receivers and transmitters, providing a means for communicating with various other apparatus over a transmission medium. The data processed by the processor 402 is transmitted over a wireless medium via an antenna, which in turn receives the data and transmits the data to the processor 402.
The processor 402 is responsible for managing the bus and general processing and may also provide various functions including timing, peripheral interfaces, voltage regulation, power management, and other control functions. And memory 401 may be used to store data used by processor 402 in performing operations. The electronic device in this embodiment may be a physical key, a mobile phone terminal, or the like, and the present application is not particularly limited thereto.
Another embodiment of the present invention relates to a computer-readable storage medium storing a computer program. Embodiments of any of the physical key activation methods described above are implemented when a computer program is executed by a processor.
That is, it will be understood by those skilled in the art that all or part of the steps in implementing the methods of the embodiments described above may be implemented by a program stored in a storage medium, where the program includes several instructions for causing a device (which may be a single-chip microcomputer, a chip or the like) or a processor (processor) to perform all or part of the steps in the methods of the embodiments of the application. The storage medium includes a U disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, an optical disk, or other various media capable of storing program codes.
It will be understood by those of ordinary skill in the art that the foregoing embodiments are specific examples of carrying out the invention and that various changes in form and details may be made therein without departing from the spirit and scope of the invention.

Claims (13)

Translated fromChinese
1.一种物理钥匙激活方法,其特征在于,包括:1. A physical key activation method, comprising:用户通过移动终端向与所述移动终端配对成功的目标物理钥匙发送激活指令;The user sends an activation instruction to the target physical key that is successfully paired with the mobile terminal through the mobile terminal;响应于所述激活指令,所述目标物理钥匙发起密钥下载请求以获取所述目标物理钥匙对应的目标密钥;In response to the activation instruction, the target physical key initiates a key download request to obtain a target key corresponding to the target physical key;获取到所述目标密钥后,所述目标物理钥匙与目标车辆进行配对连接,所述目标车辆将所述目标物理钥匙写入所述目标车辆的白名单中;其中,所述目标车辆为预先与所述移动终端绑定的车辆;After acquiring the target key, the target physical key is paired with the target vehicle, and the target vehicle writes the target physical key into the white list of the target vehicle; wherein the target vehicle is a vehicle pre-bound to the mobile terminal;所述目标车辆向所述目标物理钥匙发出控制权限请求,所述目标物理钥匙从数字钥匙服务器处获取并缓存与所述控制权限请求相对应的权限数据,使得所述目标物理钥匙复刻存储在所述移动终端中所述目标车辆的数字钥匙的控制功能以实现对所述目标车辆的控制;其中,所述数字钥匙在所述数字钥匙服务器中为已激活状态;The target vehicle sends a control authority request to the target physical key, and the target physical key obtains and caches authority data corresponding to the control authority request from the digital key server, so that the target physical key replicates the control function of the digital key of the target vehicle stored in the mobile terminal to achieve control of the target vehicle; wherein the digital key is in an activated state in the digital key server;所述目标物理钥匙返回所述权限数据给所述目标车辆后,所述目标物理钥匙具有针对所述控制权限请求对应的特定功能实现对所述目标车辆的控制的权限,所述目标物理钥匙完成激活;After the target physical key returns the authority data to the target vehicle, the target physical key has the authority to control the target vehicle for the specific function corresponding to the control authority request, and the target physical key completes activation;其中,所述权限数据为所述目标物理钥匙针对与所述控制权限请求相对应的特定功能实现对所述目标车辆的控制所需的数据。The authority data is data required for the target physical key to control the target vehicle for a specific function corresponding to the control authority request.2.根据权利要求1所述的方法,其特征在于,所述通过移动终端向与所述移动终端配对成功的目标物理钥匙发送激活指令之前,还包括:2. The method according to claim 1, characterized in that before sending the activation instruction to the target physical key successfully paired with the mobile terminal through the mobile terminal, it also includes:所述移动终端接收预设范围内所有物理钥匙的蓝牙广播,选择一个物理钥匙作为所述目标物理钥匙;The mobile terminal receives the Bluetooth broadcasts of all physical keys within a preset range, and selects one physical key as the target physical key;所述移动终端向所述数字钥匙服务器发起所述目标车辆的所述数字钥匙的激活状态查询请求;The mobile terminal initiates an activation status query request of the digital key of the target vehicle to the digital key server;在所述激活状态为所述已激活状态时,将所述目标物理钥匙与所述移动终端进行蓝牙配对连接。When the activation state is the activated state, the target physical key is paired with the mobile terminal through Bluetooth.3.根据权利要求1所述的方法,其特征在于,所述通过移动终端向与所述移动终端配对成功的目标物理钥匙发送激活指令之后,包括:3. The method according to claim 1, characterized in that after sending the activation instruction to the target physical key successfully paired with the mobile terminal through the mobile terminal, it comprises:所述目标物理钥匙检测自身电量;The target physical key detects its own power level;若自身电量低于预设电量值,则所述目标物理钥匙停止激活并向所述移动终端返回激活失败的消息。If the battery level of the target physical key is lower than a preset battery level, the target physical key stops activating and returns an activation failure message to the mobile terminal.4.根据权利要求1所述的方法,其特征在于,所述通过移动终端向与所述移动终端配对成功的目标物理钥匙发送激活指令之后,包括:4. The method according to claim 1, characterized in that after sending the activation instruction to the target physical key successfully paired with the mobile terminal through the mobile terminal, it comprises:所述目标物理钥匙判断是否为首次收到所述激活指令;其中,所述激活指令中至少包含用户ID;The target physical key determines whether it is the first time to receive the activation instruction; wherein the activation instruction at least includes a user ID;若否,则判断所述激活指令与首次收到的激活指令是否来自同一用户;If not, determining whether the activation instruction and the activation instruction received for the first time are from the same user;若否,则所述目标物理钥匙停止激活并向所述移动终端返回激活失败的消息。If not, the target physical key stops activating and returns a message of activation failure to the mobile terminal.5.根据权利要求1所述的方法,其特征在于,所述目标物理钥匙发起密钥下载请求以获取所述目标物理钥匙对应的目标密钥,包括:5. The method according to claim 1, characterized in that the target physical key initiates a key download request to obtain a target key corresponding to the target physical key, comprising:所述目标物理钥匙向所述移动终端发起所述密钥下载请求,所述移动终端将所述密钥下载请求转发至所述数字钥匙服务器;所述密钥下载请求中携带所述目标物理钥匙的信息;The target physical key initiates the key download request to the mobile terminal, and the mobile terminal forwards the key download request to the digital key server; the key download request carries information of the target physical key;所述数字钥匙服务器解析所述密钥下载请求以确定所述目标物理钥匙对应的目标密钥,利用所述目标物理钥匙对应的私钥对所述目标密钥进行签名并加密,得到加密密钥,并将所述加密密钥返回所述目标物理钥匙;The digital key server parses the key download request to determine the target key corresponding to the target physical key, signs and encrypts the target key using the private key corresponding to the target physical key to obtain an encrypted key, and returns the encrypted key to the target physical key;所述目标物理钥匙利用其内部存储的公钥对所述加密密钥进行解密并验签,验签通过后获取到所述目标密钥;其中,所述私钥与所述公钥为所述数字钥匙服务器预先为所述目标物理钥匙生成的一组公私钥对。The target physical key uses the public key stored internally to decrypt and verify the encryption key, and obtains the target key after the verification; wherein, the private key and the public key are a set of public-private key pairs generated in advance by the digital key server for the target physical key.6.根据权利要求5所述的方法,其特征在于,所述对所述目标密钥进行签名包括:采用椭圆曲线数字签名算法对所述目标密钥进行签名。6. The method according to claim 5 is characterized in that signing the target key comprises: signing the target key using an elliptic curve digital signature algorithm.7.根据权利要求5所述的方法,其特征在于,所述目标物理钥匙与目标车辆进行配对连接之后,还包括:7. The method according to claim 5, characterized in that after the target physical key is paired with the target vehicle, it also includes:所述目标车辆向所述目标物理钥匙发出版本协商请求;The target vehicle sends a version negotiation request to the target physical key;所述目标物理钥匙根据所述版本协商请求向所述目标车辆返回所述目标物理钥匙支持的ICCE协议版本信息;The target physical key returns the ICCE protocol version information supported by the target physical key to the target vehicle according to the version negotiation request;若所述目标车辆支持所述ICCE协议版本信息对应的ICCE协议,则所述目标车辆将所述目标物理钥匙写入所述目标车辆的白名单中;If the target vehicle supports the ICCE protocol corresponding to the ICCE protocol version information, the target vehicle writes the target physical key into the whitelist of the target vehicle;若所述目标车辆不支持所述ICCE协议版本信息对应的ICCE协议,则向所述移动终端返回激活失败的消息。If the target vehicle does not support the ICCE protocol corresponding to the ICCE protocol version information, an activation failure message is returned to the mobile terminal.8.根据权利要求7所述的方法,其特征在于,所述目标车辆将所述目标物理钥匙写入所述目标车辆的白名单中之前,还包括:8. The method according to claim 7, characterized in that, before the target vehicle writes the target physical key into the white list of the target vehicle, it also includes:所述目标车辆向所述目标物理钥匙发起鉴权认证请求,请求与所述目标物理钥匙协商会话密钥;所述鉴权认证请求中包含所述目标车辆生成的车端随机数与所述目标车辆的车架号;The target vehicle initiates an authentication request to the target physical key, requesting to negotiate a session key with the target physical key; the authentication request includes a vehicle-side random number generated by the target vehicle and a frame number of the target vehicle;所述目标物理钥匙转发所述鉴权认证请求至所述移动终端,所述移动终端生成第一终端随机数,生成终端会话密钥并发送至所述目标车辆;The target physical key forwards the authentication request to the mobile terminal, and the mobile terminal generates a first terminal random number, generates a terminal session key and sends it to the target vehicle;所述目标车辆解密所述终端会话密钥,对比所述车端随机数的正确性,得到第二终端随机数,生成第一验证值与车辆端会话密钥并发送至所述移动终端;The target vehicle decrypts the terminal session key, compares the correctness of the vehicle-side random number, obtains a second terminal random number, generates a first verification value and a vehicle-side session key, and sends them to the mobile terminal;所述移动终端解密所述车辆端会话密钥,得到所述第一验证值,并根据所述第一验证值生成终端哈希值并加密得到终端加密哈希值,发送至所述目标车辆;The mobile terminal decrypts the vehicle-side session key to obtain the first verification value, generates a terminal hash value according to the first verification value, encrypts the value to obtain a terminal encrypted hash value, and sends the value to the target vehicle;所述目标车辆解密所述终端加密哈希值,同时利用所述第一验证值生成车端哈希值,对比所述终端哈希值与所述车端哈希值,根据对比结果返回鉴权认证结果。The target vehicle decrypts the terminal encrypted hash value, and uses the first verification value to generate a vehicle-side hash value, compares the terminal hash value with the vehicle-side hash value, and returns an authentication result based on the comparison result.9.根据权利要求1所述的方法,其特征在于,所述目标车辆将所述目标物理钥匙写入所述目标车辆的白名单中,包括:9. The method according to claim 1, characterized in that the target vehicle writes the target physical key into the white list of the target vehicle, comprising:所述目标车辆向所述目标物理钥匙发起白名单请求,所述目标物理钥匙将所述白名单请求同步至所述移动终端,由所述移动终端将所述白名单请求发送至所述数字钥匙服务器;The target vehicle initiates a whitelist request to the target physical key, the target physical key synchronizes the whitelist request to the mobile terminal, and the mobile terminal sends the whitelist request to the digital key server;所述数字钥匙服务器根据所述白名单请求返回与所述白名单请求匹配的加签后的白名单数据,并由所述移动终端经所述目标物理钥匙转发给所述目标车辆,所述目标车辆对加签后的所述白名单数据进行验签,成功验签后所述目标物理钥匙被写入所述目标车辆的白名单中。The digital key server returns the signed whitelist data that matches the whitelist request according to the whitelist request, and the mobile terminal forwards it to the target vehicle via the target physical key. The target vehicle verifies the signed whitelist data, and after successful verification, the target physical key is written into the whitelist of the target vehicle.10.根据权利要求9所述的方法,其特征在于,所述目标物理钥匙从数字钥匙服务器处获取并缓存与所述控制权限请求相对应的权限数据,所述目标物理钥匙返回所述权限数据给所述目标车辆,包括:10. The method according to claim 9, characterized in that the target physical key obtains and caches the authority data corresponding to the control authority request from the digital key server, and the target physical key returns the authority data to the target vehicle, comprising:所述目标物理钥匙将所述控制权限请求同步至所述移动终端,由所述移动终端将所述控制权限请求发送至所述数字钥匙服务器;The target physical key synchronizes the control authority request to the mobile terminal, and the mobile terminal sends the control authority request to the digital key server;所述数字钥匙服务器根据所述控制权限请求返回与所述控制权限请求匹配的权限数据至所述移动终端,由所述移动终端转发至所述目标物理钥匙;The digital key server returns permission data matching the control authority request to the mobile terminal according to the control authority request, and the mobile terminal forwards the permission data to the target physical key;所述目标物理钥匙将所述权限数据发送至所述目标车辆的同时,缓存所述权限数据并更新自身激活标识;其中,所述权限数据为所述目标物理钥匙针对与所述控制权限请求相对应的特定功能实现对所述目标车辆的控制所需的数据。The target physical key caches the authority data and updates its own activation flag while sending the authority data to the target vehicle; wherein the authority data is the data required for the target physical key to control the target vehicle for a specific function corresponding to the control authority request.11.根据权利要求10所述的方法,其特征在于,所述方法还包括:11. The method according to claim 10, characterized in that the method further comprises:所述目标物理钥匙向所述移动终端发送激活成功的消息作为响应所述激活指令的激活结果;The target physical key sends a message of successful activation to the mobile terminal as an activation result in response to the activation instruction;所述移动终端将所述激活结果上报至所述数字钥匙服务器,所述数字钥匙服务器保存所述目标物理钥匙的激活状态。The mobile terminal reports the activation result to the digital key server, and the digital key server saves the activation status of the target physical key.12.一种电子设备,其特征在于,包括:12. An electronic device, comprising:至少一个处理器;以及,at least one processor; and,与所述至少一个处理器通信连接的存储器;其中,a memory communicatively connected to the at least one processor; wherein,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够执行如权利要求1至11中任一项所述的物理钥匙激活方法。The memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor to enable the at least one processor to perform the physical key activation method according to any one of claims 1 to 11.13.一种计算机可读存储介质,存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现权利要求1至11中任一项所述的物理钥匙激活方法。13. A computer-readable storage medium storing a computer program, wherein when the computer program is executed by a processor, the physical key activation method according to any one of claims 1 to 11 is implemented.
CN202411546304.8A2024-11-012024-11-01Physical key activation method, electronic device and storage mediumActiveCN119049161B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202411546304.8ACN119049161B (en)2024-11-012024-11-01Physical key activation method, electronic device and storage medium

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202411546304.8ACN119049161B (en)2024-11-012024-11-01Physical key activation method, electronic device and storage medium

Publications (2)

Publication NumberPublication Date
CN119049161A CN119049161A (en)2024-11-29
CN119049161Btrue CN119049161B (en)2025-02-14

Family

ID=93572840

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202411546304.8AActiveCN119049161B (en)2024-11-012024-11-01Physical key activation method, electronic device and storage medium

Country Status (1)

CountryLink
CN (1)CN119049161B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN119942685A (en)*2025-04-072025-05-06重庆长安汽车股份有限公司 Vehicle key learning method, system, storage medium and product

Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN107748840A (en)*2017-10-242018-03-02东信和平科技股份有限公司A kind of system and method for chip on activation IC-card
CN110111472A (en)*2019-05-162019-08-09广州小鹏汽车科技有限公司Vehicle key control method and device
CN115273289A (en)*2022-09-202022-11-01上海银基信息安全技术股份有限公司Physical key activation method, system, device, equipment and medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN110298936B (en)*2018-03-222021-04-20比亚迪股份有限公司Vehicle key configuration method, system and equipment thereof
CN110310389B (en)*2018-08-302024-11-12林德(中国)叉车有限公司 An identity authentication and information storage system based on forklift key and forklift key
US11454047B2 (en)*2019-06-202022-09-27International Business Machines CorporationConstructing physical keys by way of digital keys
CN116884119B (en)*2023-07-182024-04-09小米汽车科技有限公司Pairing method, device, storage medium and system of fob key
CN117041877A (en)*2023-09-252023-11-10长城汽车股份有限公司Bluetooth key learning system, method and vehicle

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN107748840A (en)*2017-10-242018-03-02东信和平科技股份有限公司A kind of system and method for chip on activation IC-card
CN110111472A (en)*2019-05-162019-08-09广州小鹏汽车科技有限公司Vehicle key control method and device
CN115273289A (en)*2022-09-202022-11-01上海银基信息安全技术股份有限公司Physical key activation method, system, device, equipment and medium

Also Published As

Publication numberPublication date
CN119049161A (en)2024-11-29

Similar Documents

PublicationPublication DateTitle
CN110126782B (en)Vehicle intelligent key application method and device
CN108122311B (en)Vehicle virtual key implementation method and system
CN109842862B (en)Establishing a secure short-range wireless communication connection in a vehicle
CN107948321B (en)Remote authorization method and system for vehicle
CN103201996B (en)The method that radio machine motor-car is accessed is provided
CN113920616B (en) Method for safe connection between vehicle and bluetooth key, bluetooth module, bluetooth key
US20180326947A1 (en)Operating a key fob in a car sharing system
CN113920615B (en) Method for connecting bluetooth key to vehicle, vehicle bluetooth system, bluetooth key
WO2015196943A1 (en)Vehicle control system, method and device, and computer readable storage medium
CN104424779A (en)System and method for controlling vehicle by virtue of mobile terminal
CN104080658A (en)Vehicle remote operation information provision device, vehicle-mounted remote operation information acquisition device, and vehicle remote operation system comprising these devices
CN119049161B (en)Physical key activation method, electronic device and storage medium
CN108092991A (en)The method for identifying ID and device of vehicle
CN110288729A (en)A kind of vehicle starting method and system based on wireless near field communication
CN105844738B (en)Electronic key registration system
US10291412B2 (en)Information processing system, wireless communication chip, peripheral device, server, computer-readable non-transitory storage medium having application program stored therein, and information processing method
CN115426650B (en) Vehicle control method, system, medium and vehicle
CN114084023A (en)Control method and device and charging pile
CN118038585A (en)Bluetooth digital key creation method, device and storage medium
CN108116367B (en)Keyless system matching method and keyless matching system
EP4416953A1 (en)Activation of mobile device for vehicle
JP2018178461A (en) User authentication system and user authentication method
CN112440935A (en)Vehicle Bluetooth key authorization method, device, system and storage medium
CN115866570B (en) Offline binding method, device, vehicle and medium for vehicle-mounted NFC card key
US20230071702A1 (en)Managing communications between a vehicle and a user device

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp