Authorization method and system of virtual key and server

A virtual key and server technology, applied in the field of system and server, virtual key authorization methods, can solve problems such as low security and insufficient guarantee of authorization process security, user information privacy, etc., to achieve convenient operation and improve user experience sense, improve the effect of safety

Inactive Publication Date: 2017-02-15
GREAT WALL MOTOR CO LTD
View PDF4 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is that the authorized mobile terminal establishes a connection with the authorized mobile terminal. If the connection is intercepted by an intermediary, the intermediary can use the user information of the authori

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization method and system of virtual key and server
  • Authorization method and system of virtual key and server
  • Authorization method and system of virtual key and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] It should be noted that, in the case of no conflict, the embodiments of the present invention and the features in the embodiments can be combined with each other.

[0040] The present invention will be described in detail below with reference to the accompanying drawings and examples.

[0041] figure 1is a flow chart of a virtual key authorization method according to an embodiment of the present invention. figure 2 It is a schematic block diagram of a virtual key authorization method according to an embodiment of the present invention.

[0042] Such as figure 1 shown, combined with figure 2 , the authorization method of the virtual key in the embodiment of the present invention comprises the following steps:

[0043] Step S1: The server receives the authorization confirmation instruction sent by the first mobile terminal, wherein the authorization authorization instruction is generated by the first mobile terminal after receiving the authorization request sent by ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an authorization method and system of a virtual key and a server. The method comprises the steps that the server receives an authorization confirmation instruction sent by a first mobile terminal, wherein the authorization confirmation instruction is generated after the first mobile terminal receives an authorization request sent by a second mobile terminal of a guarantee; the authorization confirmation instruction is verified, and an authorization code is generated after verification; the authorization code is sent to the second mobile terminal through the first mobile terminal; a virtual key acquisition request sent by the second mobile terminal is received, wherein the virtual key acquisition request is generated according to the authorization code; and the identity of the second mobile terminal and the authorization code are verified, the virtual key is generated after verification, the virtual key is sent to the second mobile terminal, and the second mobile terminal accesses a target vehicle through the virtual key. According to the authorization method, the safety of the authentication and authorization processes of an intelligent key can be improved, the operation is convenient, and the user experience is greatly improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a virtual key authorization method, system and server. Background technique [0002] At present, with the rapid development and popularization of cloud service technology, many conveniences are provided for enterprise users and individual users. More and more enterprises hand over data and services to cloud servers for management. However, the privacy and security issues of cloud servers that transmit information through the Internet are more prominent. Customer data as well as service processes are at risk of interception and malicious manipulation. For example, with the emergence of car virtual keys, the key sharing mechanism has gradually matured. The sharing of virtual keys breaks through the time and space limitations of traditional mechanical keys and smart remote control key sharing authorizations. It also refines the content of key sharing authorizations a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): B60R25/20H04L9/32
CPCB60R25/2018H04L9/3247
Inventor 牛域辉应世明郭岩松
Owner GREAT WALL MOTOR CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products