Authorization method of virtual key, server and authorization system

A virtual key and server technology, applied in the field of virtual key authorization method, server and authorization system, can solve the problems of inability to meet the needs of different users, lack of authorization functions, lack of diversity, etc., to improve controllability and flexibility , with a variety of effects to meet the needs of use

Active Publication Date: 2017-02-15
GREAT WALL MOTOR CO LTD
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in related technologies, information needs to be encrypted multiple times, which makes the process cumbersome, and lacks a single authorization function, lacks diversity, cannot meet the needs of different users, and needs to be improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization method of virtual key, server and authorization system
  • Authorization method of virtual key, server and authorization system
  • Authorization method of virtual key, server and authorization system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] It should be noted that, in the case of no conflict, the embodiments of the present invention and the features in the embodiments can be combined with each other.

[0035] The present invention will be described in detail below with reference to the accompanying drawings and examples.

[0036] figure 1 is a flow chart of a virtual key authorization method according to an embodiment of the present invention.

[0037] Such as figure 1 As shown, the virtual key authorization method according to the embodiment of the present invention includes the following steps:

[0038] In step S101, the server receives an authorization command sent by the first mobile terminal, wherein the authorization command includes the identity information of the first mobile terminal and a plurality of authorized function codes, and the plurality of authorized function codes correspond to a plurality of functions of the vehicle.

[0039] Further, the identity information of the first mobile ter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an authorization method of a virtual key, a server and an authorization system. The method comprises the steps that an authorization command sent by a first mobile terminal is received; authorization function codes are integrated to form a code set, and the code set is sent to a second mobile terminal of a guarantee through the first mobile terminal; the identity information and the code set sent by the second mobile terminal are received; and virtual keys, corresponding to the plurality of authorization function codes, of a plurality of functions of vehicles are generated, and the virtual keys are sent to the second mobile terminal. According to the authorization method, the virtual keys, corresponding to the plurality of authorization function codes, of the plurality of functions of the vehicles can be generated, the controllability and flexibility of the virtual keys are improved, targeted key function authorization is achieved, and the utilization requirement of customers can be better met.

Description

technical field [0001] The invention relates to the technical field of automobiles, in particular to a virtual key authorization method, server and authorization system. Background technique [0002] At present, after the car key is virtualized, the information code representing the key can be told to a third party orally or by text message, and the third party can unlock the car door, start the engine and Open the trunk and other functions. [0003] In related technologies, for example, a temporary authorization method for mobile communication equipment, after the authorizing party and the authorized party have confirmed the authorization information, the authorizing party automatically sends the authorization information to the management party, and the management party records and grants the authorization information to the authorized party. For example, an authorization method for a smart key in a wireless terminal, the server sends the authorization certificate to the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): B60R25/20H04L9/32
CPCB60R25/2018H04L9/3247B60R25/20B60R2325/205B60R25/24
Inventor 刘静李琦郭岩松李纪玄
Owner GREAT WALL MOTOR CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products