CN109383449A - Authorization method, car key, smart machine and the vehicle of car key - Google Patents

Authorization method, car key, smart machine and the vehicle of car key Download PDF

Info

Publication number
CN109383449A
CN109383449A CN201710682021.XA CN201710682021A CN109383449A CN 109383449 A CN109383449 A CN 109383449A CN 201710682021 A CN201710682021 A CN 201710682021A CN 109383449 A CN109383449 A CN 109383449A
Authority
CN
China
Prior art keywords
vehicle
smart machine
car key
authorization message
authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710682021.XA
Other languages
Chinese (zh)
Inventor
吴爱国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Borgward Automotive China Co Ltd
Original Assignee
Borgward Automotive China Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Borgward Automotive China Co Ltd filed Critical Borgward Automotive China Co Ltd
Priority to CN201710682021.XA priority Critical patent/CN109383449A/en
Publication of CN109383449A publication Critical patent/CN109383449A/en
Pending legal-status Critical Current

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/24Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
    • B60R25/243Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user with more than one way to gain access
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R2325/00Indexing scheme relating to vehicle anti-theft devices
    • B60R2325/10Communication protocols, communication systems of vehicle anti-theft devices
    • B60R2325/101Bluetooth
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R2325/00Indexing scheme relating to vehicle anti-theft devices
    • B60R2325/10Communication protocols, communication systems of vehicle anti-theft devices
    • B60R2325/103Near field communication [NFC]
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R2325/00Indexing scheme relating to vehicle anti-theft devices
    • B60R2325/20Communication devices for vehicle anti-theft devices
    • B60R2325/202Personal digital assistant [PDA]
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R2325/00Indexing scheme relating to vehicle anti-theft devices
    • B60R2325/20Communication devices for vehicle anti-theft devices
    • B60R2325/205Mobile phones

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mechanical Engineering (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

This disclosure relates to which a kind of authorization method of car key, car key, smart machine and vehicle improve the intelligence degree of vehicle and car key for promoting the convenience for using vehicle.The authorization method of the car key includes: the communication connection by establishing between smart machine, receives the solicited message that the smart machine is sent, the solicited message is for requesting operation and the matched vehicle of the car key;According to being stored in the solicited message, the car key for operating the information and predetermined encryption algorithm of the vehicle, authorization message is generated;The authorization message is sent to the smart machine, so that the smart machine can operate the vehicle based on the authorization message.

Description

Authorization method, car key, smart machine and the vehicle of car key
Technical field
This disclosure relates to electronic technology field, and in particular, to a kind of authorization method of car key, car key, intelligence It can equipment and vehicle.
Background technique
With the continuous development of science and technology, the trip of people is also more and more convenient, various automobiles, electric vehicle etc. Have become the essential vehicles in people's life.
Currently, people need to realize the operations such as door opening, starting vehicle, in the related technology, driver by car key The car key for being integrated with intelligent chip can be carried at one's side, " no key is realized to the induction of car key by vehicle The functions such as spoon " entrance, " no key " starting.
However, when to be operated to vehicle, it is still desirable to it is at one's side by car key band, more inconvenient, especially It is for example when friend temporarily borrows vehicle, to need to complete the handover of car key in the case of some special, operates ten Divide inconvenience, and due to car key limited amount, frequently joins risk of the key there may be key loss with other people.
Summary of the invention
Purpose of this disclosure is to provide a kind of authorization method of car key, car key, smart machine and vehicles, are used for The convenience for using vehicle is promoted, the intelligence degree of vehicle and car key is improved.
According to the first aspect of the embodiments of the present disclosure, a kind of authorization method of car key is provided, car key is applied to, Include:
By the communication connection established between smart machine, the solicited message that the smart machine is sent is received, it is described Solicited message is for requesting operation and the matched vehicle of the car key;
According to the information stored in the solicited message, the car key for operating the vehicle and it is default plus Close algorithm generates authorization message;
The authorization message is sent to the smart machine, so that the smart machine can be based on the authorization message pair The vehicle is operated.
Optionally, the solicited message that the smart machine is sent is received, comprising:
The rights parameters of the solicited message and smart machine transmission are received, the rights parameters are used to indicate institute State the extent of competence that smart machine request operates the vehicle;
According to the information stored in the solicited message, the car key for operating the vehicle and it is default plus Close algorithm generates authorization message, comprising:
According to the information, described default stored in the solicited message, the car key for operating the vehicle Encryption Algorithm and the rights parameters, generate the authorization message.
Optionally, the rights parameters include that the smart machine requests the car key to authorize operation the vehicle At least one of effective time and effective degree.
Optionally, the communication connection between the car key and the smart machine is bluetooth connection or near-field communication NFC connection.
According to the second aspect of an embodiment of the present disclosure, a kind of authorization method of car key is provided, smart machine is applied to, Include:
By the communication connection established between car key, Xiang Suoshu car key sends solicited message, the request Information is for requesting operation and the matched vehicle of the car key;
Receive that the car key sends through the encrypted authorization message of the car key;
The authorization message is stored, so that the smart machine can grasp the vehicle based on the authorization message Make.
Optionally, the method also includes:
By the communication connection between another smart machine, the authorization message is sent to another intelligence and is set It is standby, so that another smart machine can operate the vehicle based on the authorization message.
Optionally, the method also includes:
When sending the solicited message to the car key, Xiang Suoshu car key sending permission parameter, so that institute It states car key and generates the authorization message for carrying rights parameters, wherein the rights parameters are used to indicate the smart machine Request operates the extent of competence of the vehicle;
The rights parameters are sent to the vehicle, so that the vehicle is to the smart machine that receives or described another The authorization message that one smart machine is sent is verified.
According to the third aspect of an embodiment of the present disclosure, a kind of authorization method of car key is provided, vehicle, packet are applied to It includes:
The rights parameters that smart machine is sent are received, the rights parameters are used to indicate the smart machine request operation institute State the extent of competence of vehicle;
Store the effective rights parameter;
When receiving the authorization message that the smart machine or another smart machine are sent, according to the permission of storage Parameter verifies whether the authorization message is effective, and the authorization message is that the car key to match with the vehicle generates For operating the information of the vehicle;
When the authorization message is effective, the authorization message is decrypted, to execute corresponding movement.
Optionally, the rights parameters include effective time, according to the rights parameters of storage, verify the authorization letter It whether effective ceases, comprising:
Authorization message duration lasting from initial time to current time is verified whether in the effective time, Wherein, the initial time be generate the authorization message at the time of or for the first time use the authorization message at the time of, described Authorization message from the initial time to the current time lasting duration in the effective time when, determine described in award It is effective to weigh information.
Optionally, the rights parameters include effective degree, according to the rights parameters of storage, verify the authorization letter It whether effective ceases, comprising:
Whether the access times for verifying the authorization message are no more than the effective degree, wherein in the authorization message Access times be no more than the effective degree when, determine that the authorization message is effective.
According to a fourth aspect of embodiments of the present disclosure, a kind of authorization method of car key is provided, car key is applied to Authoring system, the car key authoring system include car key, with the matched vehicle of the car key and intelligence set It is standby, which comprises
The smart machine passes through the communication connection between the smart machine and the car key, Xiang Suoshu vehicle key Spoon sends solicited message, and the solicited message operates the vehicle for requesting;
The car key is according to the letter for being used to operate the vehicle stored in the solicited message, the car key Breath and predetermined encryption algorithm generate authorization message;
The car key sends the authorization message to the smart machine, so that the smart machine can be based on institute Authorization message is stated to operate the vehicle.
Optionally, the method also includes:
The authorization message is sent to described by the smart machine by the communication connection between another smart machine Another smart machine, so that another smart machine can operate the vehicle based on the authorization message.
Optionally, the smart machine sends solicited message to the car key, comprising:
The smart machine sends the solicited message and rights parameters to the car key, wherein the permission Parameter is used to indicate the extent of competence that the smart machine request operates the vehicle;
The method also includes:
The smart machine sends the rights parameters to the vehicle;
Rights parameters described in the vehicle storage;
The vehicle is when receiving the authorization message that the smart machine or another smart machine are sent, root According to the rights parameters, whether effective the authorization message is verified;
The vehicle is decrypted the authorization message when the verifying authorization message is effective, corresponding to execute Movement.
Optionally, the rights parameters include effective time, and the vehicle verifies institute according to the rights parameters of storage Whether effective state authorization message, comprising:
The vehicle verifies whether authorization message duration lasting from initial time to current time has described Imitate duration in, wherein the initial time be generate the authorization message at the time of or for the first time use the authorization message when Carve, the authorization message from the initial time to the current time lasting duration in the effective time when, Determine that the authorization message is effective.
Optionally, the rights parameters include effective degree, and the vehicle verifies institute according to the rights parameters of storage Whether effective state authorization message, comprising:
Whether the access times that the vehicle verifies the authorization message are no more than the effective degree, wherein described When the access times of authorization message are no more than the effective degree, determine that the authorization message is effective.
According to a fifth aspect of the embodiments of the present disclosure, a kind of car key is provided, comprising:
Communication module is communicated to connect for establishing with smart machine;
Processor is connect with the communication module, for executing the authorization method of car key described in first aspect.
According to a sixth aspect of an embodiment of the present disclosure, a kind of smart machine is provided, comprising:
Communication module is communicated to connect for establishing with car key;
Memory, for storing data;
Processor is connected with the communication module and the memory, for executing vehicle key described in second aspect The authorization method of spoon.
According to the 7th of the embodiment of the present disclosure the aspect, a kind of vehicle is provided, comprising:
Memory, for storing data;
Processor is connect with the memory, for executing the authorization method of car key described in the third aspect.
According to the eighth aspect of the embodiment of the present disclosure, a kind of non-transitorycomputer readable storage medium is provided, it is described non- It include one or more programs in provisional computer readable storage medium, one or more of programs are wanted for perform claim Seek first aspect any method into the third aspect.
The disclosure can establish communication connection between car key and smart machine, and smart machine can pass through foundation Communication connection request car key authorization, car key, can be according in car keys after receiving the request of smart machine The information that can be used to operate vehicle of storage generates authorization message there are also predetermined encryption algorithm and issues smart machine, Jin Erke Directly to operate vehicle using smart machine.In this way, the smart machine after authorization can also grasp vehicle Make, without carrying car key, key when avoiding by means of vehicle joins, while also improving the intelligence degree of car key. And, since authorization message is generated by car key, encryption is also completed by car key again, for smart machine, only Encrypted authorization message need to be stored, even if the leaking data of smart machine, can not also crack authorization message, vehicle safety compared with It is high.
Other feature and advantage of the disclosure will the following detailed description will be given in the detailed implementation section.
Detailed description of the invention
Attached drawing is and to constitute part of specification for providing further understanding of the disclosure, with following tool Body embodiment is used to explain the disclosure together, but does not constitute the limitation to the disclosure.In the accompanying drawings:
Fig. 1 is implementation environment schematic diagram shown according to an exemplary embodiment;
Fig. 2 is a kind of flow chart of the authorization method of car key shown according to an exemplary embodiment;
Fig. 3 is a kind of flow chart of the authorization method of car key shown according to an exemplary embodiment;
Fig. 4 is a kind of flow chart of the authorization method of car key shown according to an exemplary embodiment;
Fig. 5 is a kind of flow chart of the authorization method of car key shown according to an exemplary embodiment;
Fig. 6 is a kind of another flow chart of the authorization method of car key shown according to an exemplary embodiment;
Fig. 7 is a kind of block diagram of car key shown according to an exemplary embodiment;
Fig. 8 is a kind of block diagram of smart machine shown according to an exemplary embodiment;
Fig. 9 is a kind of block diagram of vehicle shown according to an exemplary embodiment.
Specific embodiment
It is described in detail below in conjunction with specific embodiment of the attached drawing to the disclosure.It should be understood that this place is retouched The specific embodiment stated is only used for describing and explaining the disclosure, is not limited to the disclosure.
Firstly, the implementation environment to the disclosure is illustrated.Referring to Figure 1, Fig. 1 is shown according to an exemplary embodiment Implementation environment schematic diagram, which may include: car key 100, smart machine 200 and vehicle 300.Vehicle key Spoon 100 is key matched with vehicle 300.Smart machine 200 for example can be mobile phone, PAD (Personal Digital Assistant, tablet computer), etc. different smart machines, or be also possible to wearable intelligent equipment, such as intelligent hand Table, Intelligent bracelet etc., the embodiment of the present disclosure is not construed as limiting this.
It can be in communication with each other between car key 100 and smart machine 200, for car key 100 and smart machine 200 Between establish be which kind of communication connection, the embodiment of the present disclosure is not construed as limiting, as long as information can be transmitted mutually.For example, It can be the communication connection that the mode of wireless network (WIreless-FIdelity, Wi-Fi) is established, or be also possible to bluetooth The communication connection that the mode of (Bluetooth, BT) is established, or it is also possible near field communication (NFC) (Near Field Communication, NFC) the communication connection, etc. established of mode.
It can be in communication with each other between smart machine 200 and vehicle 300, for being established between smart machine 200 and vehicle 300 Be which kind of communication connection, the embodiment of the present disclosure is equally not construed as limiting, as long as information can be transmitted mutually.For example, can lead to Cross 3rd generation mobile communication technology (3rd-Generation, 3G) network, fourth generation mobile communication technology (4rd- Generation, 4G) network implementations is in communication with each other.In practical applications, in order to ensure the vehicle 300 of the communication of smart machine 200 It is the vehicle to be operated, the account and password of communication vehicle 300 can be arranged, smart machine 200 can installs use Come the application program communicated with vehicle 300, in the application use account and password login, can be realized with it is corresponding Communication between vehicle 300.
Fig. 2 is a kind of flow chart of the authorization method of car key shown according to an exemplary embodiment, such as Fig. 2 institute Show, the authorization method of the car key can be applied in car key, include the following steps.
In step s 11, by the communication connection established between smart machine, the request letter that smart machine is sent is received Breath, solicited message is for requesting operation and the matched vehicle of car key.
In step s 12, according to the information stored in solicited message, car key for operating vehicle and it is default plus Close algorithm generates authorization message.
In step s 13, authorization message is sent to smart machine, so that smart machine can be based on authorization message to vehicle It is operated.
In the embodiment of the present disclosure, car key can generate authorization message, and authorization is believed based on the request of smart machine Breath issues smart machine, and smart machine can operate vehicle using authorization message, in this way, be not necessarily to Car key is carried, the smart machine after car key authorization can also operate vehicle, improve the intelligence of car key Degree can be changed.And, since authorization message is generated by car key, encryption is also completed by car key again, and intelligence is set For standby, encrypted authorization message only need to be stored, even if the leaking data of smart machine, can not also crack authorization message, vehicle Safety is higher.
Optionally, it is close to can be bluetooth connection or NFC connection etc. for the communication connection between car key and smart machine The connection of distance communication mode.
It is sent and received information by way of short-range communication between car key and smart machine, that is to say, that gather around There is the car owner of car key to need to give smart machine authorization in the case where face to face, can preferably determine current be authorized in this way Smart machine be strictly car owner's equipment to be authorized, avoid vehicle from being illegally used, improve the safety of vehicle.
Smart machine can be the information that request carries out any operation to vehicle, example to the solicited message that car key is sent Such as requesting the solicited message for driving vehicle, the solicited message for requesting unlocking vehicle car door or for requesting to blow a whistle Solicited message, etc., the embodiment of the present disclosure is not construed as limiting this.For how to send solicited message, the embodiment of the present disclosure is same Sample is not construed as limiting, for example, can be equipped in smart machine for requesting car key authorization and operating the application journey of vehicle Sequence, then solicited message can be sent by the application program installed in smart machine, then for example, to request car key Authorization drives the operation of vehicle, corresponding option can be selected in the application interface of smart machine, and then send out to car key Send the solicited message for requesting driving vehicle.
Certainly, car key, can be by holding the vehicle of car key after the solicited message for receiving smart machine transmission It is main to carry out a confirmation operation at car key end, for example the key of the confirmation authorization in car key is pressed, then execute again Further the step of generating authorization message, it is ensured that authorization accuracy of action, the safety of support vehicles.
The algorithm that can be encrypted and decrypt between predetermined encryption algorithm, that is, the vehicle matched and car key, according to After predetermined encryption algorithm encryption, the vehicle of pairing can be decrypted, and the vehicle of non-matching can not then be decrypted.Car key is receiving It, can be according to the information for being used to operate vehicle stored in solicited message, car key after the solicited message that smart machine is sent And predetermined encryption algorithm, authorization message is generated, authorization message is then forwarded to smart machine, such smart machine just can use Authorization message operates vehicle.For example, solicited message can be the solicited message that request drives vehicle, car key can will be deposited The information that can start and drive vehicle stored up in car key is encrypted in such a way that matching vehicle can be decrypted, and is obtained To authorization message, authorization message is sent to smart machine, in this way, being not necessarily to the intervention of car key, smart machine can be straight It connects using authorization message and drives vehicle.In this way, the process of encryption is completed by car key, is sent to Smart machine is encrypted authorization message, even if smart machine is leaky, can not also crack awarding by car key encryption Information is weighed, the safety of vehicle is higher.
Optionally, the solicited message that smart machine is sent is received, comprising: receive what solicited message and smart machine were sent Rights parameters, rights parameters are used to indicate the extent of competence of smart machine request operation vehicle;According to solicited message, car key The information and predetermined encryption algorithm for being used to operate vehicle of middle storage, generate authorization message, comprising: according to solicited message, vehicle What is stored in key is used to operate the information, predetermined encryption algorithm and rights parameters of vehicle, generates authorization message.
It optionally, is which kind of parameter actually for rights parameters, the embodiment of the present disclosure is not construed as limiting, and may include that intelligence is set Standby request car key authorizes the effective time of operation vehicle, effective degree, effectively uses position range etc. parameter.
Effective time can indicate can to operate the duration of vehicle, and effective degree indicates that the number of vehicle can be operated, has Effect can operate position range of vehicle, etc. using position range expression.Smart machine is when requesting car key authorization, also Rights parameters can be set, how rights parameters are arranged for smart machine, the embodiment of the present disclosure is not construed as limiting, such as can be led to The application program that is mounted in smart machine is crossed to set.For example, smart machine drives vehicle in request car key authorization When operation, setting using vehicle effective time is 1 day, and effective degree is 3 times, then can will drive vehicle in request Solicited message and the rights parameters of setting be sent to car key together, then the authorization message that generates of car key can be with It is the information for carrying rights parameters, so that smart machine can only use authorization parameter in effective permission, it is more than power Limit (for example authorization message is expired more than effective time, the number of operation vehicle reaches effective degree or driving vehicle has exceeded Effectively using position range etc.) after, authorization parameter just fails, and can not operate vehicle again.In this way, it can be ensured that Authorization message can be used in extent of competence set by user, and vehicle safety is higher, and car key is more intelligent Change.
Optionally, the upper limit value of rights parameters can also be set in car key, if the permission that smart machine is sent Parameter is more than upper limit value, then not authorizes.
The considerations of for vehicle safety, the permission for authorizing smart machine operation vehicle should not be too large, therefore can be The upper limit value of rights parameters is set in car key.Upper limit value can be vehicle and car key sets when leaving the factory, can also With by user's according to circumstances sets itself, the embodiment of the present disclosure is not construed as limiting.For example, can set that rights parameters include has The upper limit value for imitating duration is 2 days, and the upper limit value of effective degree is 5 times, then for example, smart machine when sending solicited message, The effective time of transmission is 3 days, or the effective degree sent is 6 times, then not authorizes, i.e., do not generate authorization message, can be with It is more than the information of upper limit value to smart machine feedback authorization parameter.In this way, intelligence can effectively further be limited The permission of energy equipment operation vehicle, improves the safety of vehicle.
Fig. 3 is a kind of flow chart of the authorization method of car key shown according to an exemplary embodiment, such as Fig. 3 institute Show, the authorization method of the car key can be applied in smart machine, include the following steps.
In the step s 21, by the communication connection established between car key, solicited message is sent to car key, Solicited message is for requesting operation and the matched vehicle of car key.
In step S22, receive car key send through the encrypted authorization message of car key.
In step S23, authorization message is stored, so that smart machine can operate vehicle based on authorization message.
In the embodiment of the present disclosure, for the authorization method of the car key of smart machine side, with above-mentioned car key side There are relevant lap, the contents of relevant portion to refer to saying for above-mentioned car key side for the authorization method of car key Bright, details are not described herein.
Smart machine can store authorization message, for example pass through peace after the authorization message for receiving car key transmission In smart machine it is used to control the application program of vehicle to store, then operating vehicle in authorization message to be used When, the authorization message of storage can be sent to vehicle, vehicle can execute corresponding movement after successful decryption.
Optionally, smart machine can also encrypt again to through the encrypted authorization message of car key, then When smart machine will operate vehicle, encrypted authorization message again can be sent to vehicle.
For example, smart machine sends authorization message to vehicle by the application program of installation, then journey can applied Re-encrypted function is realized in sequence, matched vehicle can double descrambling.The safety of information is further improved in this way, Improve the safety of vehicle.
Optionally, smart machine can also be sent authorization message by the communication connection between another smart machine To another smart machine, so that another smart machine can operate vehicle based on authorization message.
Another smart machine equally can be mobile phone, PAD, smartwatch, Intelligent bracelet etc. equipment, the embodiment of the present disclosure It is which kind of equipment is equally not construed as limiting actually for another smart machine.
Smart machine can for example be built by Wi-Fi, bluetooth, 3G network, 4G network etc. mode with another smart machine Vertical communication connection, the embodiment of the present disclosure is not construed as limiting the mode of communication connection, as long as can be in communication with each other.
Smart machine the authorization message obtained from car key can be shared to another smart machine (other one or Multiple smart machines), in this way, another smart machine can also operate vehicle, user uses more convenient.
For example, driver by vehicle drive to farther away place of leaving home, car key is lost accidentally, then in this feelings Under condition, the people for holding standby key can be allowed to request standby key Authorized operation vehicle with smart machine in family, then will authorization letter Breath is transmitted to the smart machine of driver, and such driver can also drive vehicle.
Optionally, can join to car key sending permission in smart machine when sending solicited message to car key Number, so that car key generates the authorization message for carrying rights parameters, wherein rights parameters are used to indicate smart machine request Operate the extent of competence of vehicle;And to vehicle sending permission parameter, so that vehicle is to the smart machine or another intelligence received The authorization message that energy equipment is sent is verified.
In other words, smart machine, can be both to car key transmission route when requesting car key Authorized operation vehicle Parameter is limited again to vehicle sending permission parameter.In this way, the smart machine for being stored with authorization message is operated using authorization message When vehicle, vehicle can judge whether authorization message is effective based on authorization parameter, if effectively, it can further decryption and authorization Information executes corresponding movement (such as according to user's operation, starting, enabling etc.), if it is determined that authorization message has failed, then not Movement.
Optionally, the upper limit value of rights parameters can also be set in smart machine, if user sets in smart machine The rights parameters set are more than upper limit value, then do not send solicited message.
Such as can smart machine install be used to control vehicle application program in setting rights parameters upper limit value, User can not select the rights parameters greater than upper limit value.For example, the upper limit value for the effective time that rights parameters include can be set It is 2 days, the upper limit value of effective degree is 5 times, then user can not select more than on the Application Program Interface of smart machine The effective time and effective degree of limit value.In this way, smart machine operation vehicle can effectively further be limited Permission, improve the safety of vehicle.
Fig. 4 is a kind of flow chart of the authorization method of car key shown according to an exemplary embodiment, such as Fig. 4 institute Show, the authorization method of the car key can be applied in vehicle, include the following steps.
In step S31, the rights parameters that smart machine is sent are received, rights parameters are used to indicate smart machine request behaviour Make the extent of competence of vehicle.
In step s 32, effective rights parameters are stored.
In step S33, when receiving the authorization message that smart machine or another smart machine are sent, according to storage Rights parameters, whether verifying authorization message is effective, and authorization message is the car key generation to match with vehicle for operating The information of vehicle.
In step S34, when authorization message is effective, authorization message is decrypted, to execute corresponding movement.
In the embodiment of the present disclosure, for the authorization method of the car key of vehicle side, with above-mentioned car key side and intelligence There are relevant lap, the contents of relevant portion to refer to above-mentioned car key for the authorization method of the car key of equipment side The explanation of side and smart machine side, details are not described herein.
It is hair that smart machine or another smart machine are verified according to the rights parameters of storage in operation vehicle for vehicle The whether effective mode of the authorization parameter sent, is below illustrated several possible modes.
Optionally, rights parameters may include effective time, then authorization message can be verified from initial time to current Whether moment lasting duration is in effective time, wherein initial time is at the time of generating authorization message or first to use At the time of authorization message, when authorization message duration lasting from initial time to current time is in effective time, determine Authorization message is effective.
At the time of the initial time that effective time starts to calculate can be generation authorization message.In this case, intelligence Equipment can mark timestamp when generating authorization message in transmission solicited message either car key, then can be by the time At the time of generation at the time of stamp is recorded as authorization message, vehicle usually has clock, then can be sent by smart machine Authorization message entrained by timestamp and the effective time of vehicle itself storage determine whether authorization message effective.For example, The effective time of storage is 1 day, when clock display current time of vehicle is 2 days 10 January in 2017, authorization message carry when Between stamp show at the time of authorization message generates when being 1 day 12 January in 2017, then can determine that authorization message is effective;Or Person is for example, the effective time of storage is 1 day, when clock display current time of vehicle is 2 days 13 January in 2017, authorization message The timestamp of carrying shows at the time of authorization message generates when being 1 day 12 January in 2017, then can determine that authorization message is nothing Effect, etc..
Alternatively, at the time of the initial time that effective time starts to calculate can be for the first time using authorization message.So vehicle When receiving the authorization message of smart machine transmission for the first time to operate vehicle, start timing, timing is recognized more than after effective time For authorization message failure.For example, the effective time of storage is 1 day, it is January 1 in 2017 at the time of authorization message is used for the first time When day 12, then authorization message failed from 2 days 12 January in 2017.
In the above manner, vehicle only responds the authorization message in effective time, vehicle safety is preferable.
Optionally, rights parameters include effective degree, then whether the access times that authorization message can be verified are no more than Effective degree, wherein when the access times of authorization message are no more than effective degree, determine that authorization message is effective.
Counter, initial value 0 can be set in the car, and every receiving once is used to operate the authorization message of vehicle, meter Number device adds 1, is requesting the effective degree of the storage sent when car key authorization in the car until reaching smart machine, again Authorization message is received then to be not responding to.In this way, vehicle only responds the authorization message that access times are in effective degree, vehicle peace Full property is preferable.
Certainly, in practical applications, rights parameters may include more than one parameter, for example the rights parameters being arranged are wrapped Include effective time, and including effective degree, then vehicle verify authorization message it is whether effective when, it is believed that if wherein one A claim parameter is more than setting value, can think that authorization message is invalid.For example, the claim parameter of setting includes 1 day effective Duration and 3 effective degrees, then such as vehicle authenticates to authorization message from the timestamp of authorization message is generated to current Moment when it is 2 days a length of, but the number that authorization message is used only has 1 time, can equally determine that authorization message fails;Or vehicle Authenticate to authorization message from generate the timestamp of authorization message to current time when it is 0.5 day a length of, currently used authorization is believed Breath is the 4th time, can also determine that authorization message fails.
Optionally, the upper limit value of rights parameters can also be set in the car, if the power that smart machine is sent to vehicle Limiting parameter is more than upper limit value, then the information of storage rights parameters failure can be sent to smart machine or car key, in turn So that car key does not generate authorization message or smart machine does not store authorization message.It in this way, can be into one Step effectively limits the permission of smart machine operation vehicle, improves the safety of vehicle.
Fig. 5 is a kind of flow chart of the authorization method of car key shown according to an exemplary embodiment, such as Fig. 5 institute Show, the authorization method of the car key can be applied in car key authoring system, and car key authoring system includes vehicle Key and the matched vehicle of the car key and smart machine, this approach includes the following steps.
In step S41, smart machine is sent out by the communication connection between smart machine and car key to car key Solicited message is sent, solicited message is for requesting operation vehicle.
In step S42, car key according to the information stored in solicited message, car key for operating vehicle, And predetermined encryption algorithm, generate authorization message.
In step S43, car key sends authorization message to smart machine, so that smart machine can be based on authorization letter Breath operates vehicle.
Optionally, authorization message is sent to another by smart machine by the communication connection between another smart machine Smart machine, so that another smart machine can operate vehicle based on authorization message.
Optionally, Fig. 6 is referred to, step S41 can be smart machine and send solicited message and permission to car key Parameter, wherein rights parameters are used to indicate the extent of competence of smart machine request operation vehicle;Can also include: step S44: Smart machine is to vehicle sending permission parameter;Step S45: vehicle storage rights parameters;Step S46: vehicle is receiving intelligence When the authorization message that equipment or another smart machine are sent, according to rights parameters, whether effective authorization message is verified;Step S47: Vehicle is decrypted authorization message when verifying authorization message is effective, to execute corresponding movement.
Optionally, rights parameters include effective time, and vehicle can verify authorization message from initial time to current time Lasting duration whether in effective time, wherein initial time is at the time of generating authorization message or first using authorization At the time of information, when authorization message duration lasting from initial time to current time is in effective time, authorization is determined Information is effective.
Optionally, rights parameters include effective degree, and whether the access times that vehicle can verify authorization message are no more than Effective degree, wherein when the access times of authorization message are no more than effective degree, determine that authorization message is effective.
In the embodiment of the present disclosure, for the authorized party of car key performed by each equipment in car key authoring system Method, there are relevant overlapping portions to the authorization method of the car key of above-mentioned car key side, smart machine side and vehicle side Point, the content of relevant portion refers to the explanation of above-mentioned car key side, smart machine side and vehicle side, and details are not described herein.
Fig. 7 is referred to, based on the same inventive concept, the embodiment of the present disclosure provides a kind of car key 700, comprising:
Communication module 701 is communicated to connect for establishing with smart machine;
Processor 702 connect 701 with communication module, the authorization method of the car key for executing Fig. 2.
Fig. 8 is referred to, based on the same inventive concept, the embodiment of the present disclosure provides a kind of smart machine 800, comprising:
Communication module 801 is communicated to connect for establishing with car key;
Memory 802, for storing data;
Processor 803 is connected with communication module 801 and memory 802, the authorization of the car key for executing Fig. 3 Method.
Fig. 9 is referred to, based on the same inventive concept, the embodiment of the present disclosure provides a kind of vehicle 900, comprising:
Memory 901, for storing data;
Processor 902 is connect with memory 901, for executing the authorization method of car key described in Fig. 4.
If method or apparatus described in the disclosure is realized in the form of software and sells or make as independent product Used time can store in a non-transitory computer-readable storage medium.Based on this understanding, the technology of the disclosure Substantially all or part of the part that contributes to existing technology or the technical solution can be with software in other words for scheme The form of product embodies, which is stored in a storage medium, including some instructions use so that One computer equipment (it can be car key, smart machine, vehicle, etc.) execute each embodiment the method for the disclosure All or part of the steps.And storage medium above-mentioned include: USB flash disk, mobile hard disk, ROM (Read-Only Memory, it is read-only to deposit Reservoir), RAM (Random Access Memory, random access memory), magnetic or disk etc. is various can store program The medium of code.
The preferred embodiment of the disclosure is described in detail in conjunction with attached drawing above, still, the disclosure is not limited to above-mentioned reality The detail in mode is applied, in the range of the technology design of the disclosure, a variety of letters can be carried out to the technical solution of the disclosure Monotropic type, these simple variants belong to the protection scope of the disclosure.
It is further to note that specific technical features described in the above specific embodiments, in not lance In the case where shield, can be combined in any appropriate way, in order to avoid unnecessary repetition, the disclosure to it is various can No further explanation will be given for the combination of energy.
In addition, any combination can also be carried out between a variety of different embodiments of the disclosure, as long as it is without prejudice to originally Disclosed thought equally should be considered as disclosure disclosure of that.

Claims (19)

1. a kind of authorization method of car key is applied to car key characterized by comprising
By the communication connection established between smart machine, the solicited message that the smart machine is sent, the request are received Information is for requesting operation and the matched vehicle of the car key;
According to the information and predetermined encryption calculation for operating the vehicle stored in the solicited message, the car key Method generates authorization message;
The authorization message is sent to the smart machine, so that the smart machine can be based on the authorization message to described Vehicle is operated.
2. the method according to claim 1, wherein receiving the solicited message that the smart machine is sent, comprising:
The rights parameters of the solicited message and smart machine transmission are received, the rights parameters are used to indicate the intelligence Energy device request operates the extent of competence of the vehicle;
According to the information and predetermined encryption calculation for operating the vehicle stored in the solicited message, the car key Method generates authorization message, comprising:
According to store in the solicited message, the car key for operating the vehicle information, the predetermined encryption Algorithm and the rights parameters, generate the authorization message.
3. according to the method described in claim 2, it is characterized in that, the rights parameters include described in the smart machine request Car key authorizes at least one of the effective time for operating the vehicle and effective degree.
4. the method according to claim 1, wherein the communication between the car key and the smart machine It is connected as bluetooth connection or near-field communication NFC connection.
5. a kind of authorization method of car key is applied to smart machine characterized by comprising
By the communication connection established between car key, Xiang Suoshu car key sends solicited message, the solicited message For requesting operation and the matched vehicle of the car key;
Receive that the car key sends through the encrypted authorization message of the car key;
The authorization message is stored, so that the smart machine can operate the vehicle based on the authorization message.
6. according to the method described in claim 5, it is characterized in that, the method also includes:
By the communication connection between another smart machine, the authorization message is sent to another smart machine, with Enable another smart machine to be based on the authorization message to operate the vehicle.
7. method according to claim 5 or 6, which is characterized in that the method also includes:
When sending the solicited message to the car key, Xiang Suoshu car key sending permission parameter, so that the vehicle Key generates the authorization message for carrying rights parameters, wherein the rights parameters are used to indicate the smart machine request Operate the extent of competence of the vehicle;
The rights parameters are sent to the vehicle, so that the vehicle is to the smart machine or another intelligence received The authorization message that energy equipment is sent is verified.
8. a kind of authorization method of car key is applied to vehicle characterized by comprising
The rights parameters that smart machine is sent are received, the rights parameters are used to indicate the smart machine request and operate the vehicle Extent of competence;
Store the effective rights parameter;
When receiving the authorization message that the smart machine or another smart machine are sent, joined according to the permission of storage Number, verifies whether the authorization message is effective, and the authorization message is the use that the car key to match with the vehicle generates In the information for operating the vehicle;
When the authorization message is effective, the authorization message is decrypted, to execute corresponding movement.
9. according to the method described in claim 8, it is characterized in that, the rights parameters include effective time, according to storage Whether effective the rights parameters verify the authorization message, comprising:
Authorization message duration lasting from initial time to current time is verified whether in the effective time, In, the initial time be generate the authorization message at the time of or for the first time use the authorization message at the time of, awarded described Weigh information from the initial time to the current time lasting duration in the effective time when, determine the authorization Information is effective.
10. according to the method described in claim 8, it is characterized in that, the rights parameters include effective degree, according to storage Whether effective the rights parameters verify the authorization message, comprising:
Whether the access times for verifying the authorization message are no more than the effective degree, wherein in making for the authorization message When being no more than the effective degree with number, determine that the authorization message is effective.
11. a kind of authorization method of car key, is applied to car key authoring system, the car key authoring system includes Car key and the matched vehicle of the car key and smart machine, which is characterized in that the described method includes:
The smart machine passes through the communication connection between the smart machine and the car key, Xiang Suoshu car key hair Solicited message is sent, the solicited message operates the vehicle for requesting;
The car key according to the information stored in the solicited message, the car key for operating the vehicle, And predetermined encryption algorithm, generate authorization message;
The car key sends the authorization message to the smart machine, so that the smart machine can be awarded based on described Power information operates the vehicle.
12. according to the method for claim 11, which is characterized in that the method also includes:
The authorization message is sent to described another by the smart machine by the communication connection between another smart machine Smart machine, so that another smart machine can operate the vehicle based on the authorization message.
13. method according to claim 11 or 12, which is characterized in that the smart machine is sent to the car key Solicited message, comprising:
The smart machine sends the solicited message and rights parameters to the car key, wherein the rights parameters It is used to indicate the extent of competence that the smart machine request operates the vehicle;
The method also includes:
The smart machine sends the rights parameters to the vehicle;
Rights parameters described in the vehicle storage;
The vehicle is when receiving the authorization message that the smart machine or another smart machine are sent, according to institute Rights parameters are stated, whether effective verify the authorization message;
The vehicle is decrypted the authorization message when the verifying authorization message is effective, to execute corresponding movement.
14. according to the method for claim 13, which is characterized in that the rights parameters include effective time, the vehicle It is whether effective that the authorization message is verified according to the rights parameters of storage, comprising:
The vehicle verifies authorization message duration lasting from initial time to current time whether when described effective In length, wherein the initial time be generate the authorization message at the time of or for the first time use the authorization message at the time of, The authorization message from the initial time to the current time lasting duration in the effective time when, determine institute It is effective to state authorization message.
15. according to the method for claim 13, which is characterized in that the rights parameters include effective degree, the vehicle It is whether effective that the authorization message is verified according to the rights parameters of storage, comprising:
Whether the access times that the vehicle verifies the authorization message are no more than the effective degree, wherein in the authorization When the access times of information are no more than the effective degree, determine that the authorization message is effective.
16. a kind of car key characterized by comprising
Communication module is communicated to connect for establishing with smart machine;
Processor is connect with the communication module, and the authorized party of any car key of 1-4 is required for perform claim Method.
17. a kind of smart machine characterized by comprising
Communication module is communicated to connect for establishing with car key;
Memory, for storing data;
Processor is connected with the communication module and the memory, requires any vehicle of 5-7 for perform claim The authorization method of key.
18. a kind of vehicle characterized by comprising
Memory, for storing data;
Processor is connect with the memory, and the authorization method of any car key of 8-10 is required for perform claim.
19. a kind of non-transitorycomputer readable storage medium, which is characterized in that the non-transitory computer-readable storage medium It include one or more programs in matter, one or more of programs require described in any one of 1 to 15 for perform claim Method.
CN201710682021.XA 2017-08-10 2017-08-10 Authorization method, car key, smart machine and the vehicle of car key Pending CN109383449A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710682021.XA CN109383449A (en) 2017-08-10 2017-08-10 Authorization method, car key, smart machine and the vehicle of car key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710682021.XA CN109383449A (en) 2017-08-10 2017-08-10 Authorization method, car key, smart machine and the vehicle of car key

Publications (1)

Publication Number Publication Date
CN109383449A true CN109383449A (en) 2019-02-26

Family

ID=65415233

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710682021.XA Pending CN109383449A (en) 2017-08-10 2017-08-10 Authorization method, car key, smart machine and the vehicle of car key

Country Status (1)

Country Link
CN (1) CN109383449A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110103889A (en) * 2019-04-29 2019-08-09 江苏大学 Automobile based on recognition of face is using authorization, burglary-resisting system and borrows vehicle method
CN110149325A (en) * 2019-05-16 2019-08-20 东风小康汽车有限公司重庆分公司 A kind of Intelligent key sharing method, device and equipment
CN110562197A (en) * 2019-09-11 2019-12-13 东软睿驰汽车技术(沈阳)有限公司 Vehicle authorization method and vehicle authorization system
CN111080857A (en) * 2019-12-30 2020-04-28 华人运通(上海)云计算科技有限公司 Vehicle digital key management and use method and device, mobile terminal and storage medium
CN112389370A (en) * 2019-08-15 2021-02-23 大众汽车股份公司 Method for operating a door or a compartment door in a vehicle, authentication element and vehicle
CN113345131A (en) * 2020-03-03 2021-09-03 上海擎感智能科技有限公司 Management method of key device and key device
CN113766448A (en) * 2020-06-01 2021-12-07 富顶精密组件(深圳)有限公司 Vehicle control method, intelligent vehicle key and mobile terminal

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103886657A (en) * 2012-12-20 2014-06-25 李尔公司 Remote function smart key to start communication between vehicle and device and method thereof
CN105083214A (en) * 2014-04-28 2015-11-25 比亚迪股份有限公司 Authorization method, authorization system and authorization mobile terminal for vehicle and authorized mobile terminal
CN105788037A (en) * 2014-12-26 2016-07-20 比亚迪股份有限公司 Vehicle intelligent key authorization system and method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103886657A (en) * 2012-12-20 2014-06-25 李尔公司 Remote function smart key to start communication between vehicle and device and method thereof
CN105083214A (en) * 2014-04-28 2015-11-25 比亚迪股份有限公司 Authorization method, authorization system and authorization mobile terminal for vehicle and authorized mobile terminal
CN105788037A (en) * 2014-12-26 2016-07-20 比亚迪股份有限公司 Vehicle intelligent key authorization system and method

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110103889A (en) * 2019-04-29 2019-08-09 江苏大学 Automobile based on recognition of face is using authorization, burglary-resisting system and borrows vehicle method
CN110149325A (en) * 2019-05-16 2019-08-20 东风小康汽车有限公司重庆分公司 A kind of Intelligent key sharing method, device and equipment
CN112389370A (en) * 2019-08-15 2021-02-23 大众汽车股份公司 Method for operating a door or a compartment door in a vehicle, authentication element and vehicle
CN112389370B (en) * 2019-08-15 2023-01-13 大众汽车股份公司 Method for operating a vehicle door or compartment door in a vehicle, authentication element and vehicle
US11897420B2 (en) 2019-08-15 2024-02-13 Volkswagen Aktiengesellschaft Method for door or tailgate operation in a vehicle, authentication element and vehicle
CN110562197A (en) * 2019-09-11 2019-12-13 东软睿驰汽车技术(沈阳)有限公司 Vehicle authorization method and vehicle authorization system
CN111080857A (en) * 2019-12-30 2020-04-28 华人运通(上海)云计算科技有限公司 Vehicle digital key management and use method and device, mobile terminal and storage medium
CN111080857B (en) * 2019-12-30 2022-05-03 华人运通(上海)云计算科技有限公司 Vehicle digital key management and use method and device, mobile terminal and storage medium
CN113345131A (en) * 2020-03-03 2021-09-03 上海擎感智能科技有限公司 Management method of key device and key device
CN113766448A (en) * 2020-06-01 2021-12-07 富顶精密组件(深圳)有限公司 Vehicle control method, intelligent vehicle key and mobile terminal
US11962581B2 (en) 2020-06-01 2024-04-16 Fuding Precision Components (Shenzhen) Co., Ltd. Vehicle control method and smart car key

Similar Documents

Publication Publication Date Title
CN109383449A (en) Authorization method, car key, smart machine and the vehicle of car key
CN106656481B (en) Identity identifying method, device and system
CN108476205B (en) Registrar device, configurator device and method thereof
CN106130982B (en) Intelligent household appliance remote control method based on PKI system
CN105978917B (en) A kind of system and method for trusted application safety certification
CN101005359B (en) Method and device for realizing safety communication between terminal devices
JP5818563B2 (en) Charging system for electric mobile object, charging device for electric mobile object, portable communication terminal and server device included therein, and charging method for electric mobile object
CN105654580B (en) Access control method and system, electronic lock, management and visitor's terminal
CN107358441B (en) Payment verification method and system, mobile device and security authentication device
CN110177354A (en) A kind of wireless control method and system of vehicle
CN105530241B (en) The authentication method of mobile intelligent terminal and POS terminal
JP2010226336A (en) Authentication method and authentication apparatus
CN102945526B (en) A kind of device and method for improving mobile equipment on-line safety of payment
CN103647645B (en) The dynamic password authentication method of many certificate servers, system and device
JPWO2005101727A1 (en) Communication apparatus, communication system, and authentication method
CN105871920A (en) Communication system and method of terminal and cloud server as well as terminal and cloud server
CN106162537B (en) A kind of method, wireless telecom equipment and the terminal of safety certification connection
CN105827656B (en) Identity identifying method and device based on NFC payment
CN105612728B (en) The safe data channel authentication of implicit shared key
CN110288729A (en) A kind of vehicle starting method and system based on wireless near field communication
CN109949461A (en) Method for unlocking and device
CN107277033A (en) Electric charging equipment and the method for authenticating and system for treating charging and conversion electric object
CN107223328A (en) A kind of method and system of Root authority management and control
CN107454035A (en) A kind of identity authentication method and device
CN109041263A (en) A kind of TBox Bluetooth connecting method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190226