Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Activation method, mobile terminal and server for virtual key configuration information

A technology of virtual keys and configuration information, applied in the field of vehicles, can solve problems such as illegal calls, reduce the security of unlocking operations, and reduce the reliability of tokens, and achieve the effect of improving security.

Active Publication Date: 2022-02-11
GUANGZHOU XIAOPENG MOTORS TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in practice, it has been found that multiple tokens stored in the mobile terminal may be illegally invoked by malicious processes, thereby reducing the reliability of the tokens and further reducing the security of unlocking the vehicle through the virtual key sex

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Activation method, mobile terminal and server for virtual key configuration information
  • Activation method, mobile terminal and server for virtual key configuration information
  • Activation method, mobile terminal and server for virtual key configuration information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] see figure 1 , figure 1 It is a schematic flowchart of a method for activating virtual key configuration information disclosed in an embodiment of the present invention. Such as figure 1 As shown, the activation method of the virtual key configuration information may include the following steps:

[0061] 101. The mobile terminal controls the identity authentication module to generate a registration request including device characteristic information of the mobile terminal.

[0062] In the embodiment of the present invention, the terminal device may be a smart phone, a smart bracelet or other devices. The identity authentication module may be a module in the trusted zone (Trusted Zone) of the operating system of the mobile terminal, such as the Internet Finance Authentication Alliance (Internet Finance Authentication Alliance, IFAA) mobile terminal trusted application (TrustedApplication, TA). The mobile terminal can control the virtual key application module to call...

Embodiment 2

[0072] see figure 2 , figure 2 It is a schematic flowchart of another method for activating virtual key configuration information disclosed in the embodiment of the present invention. Compared with Embodiment 1, this embodiment of the present invention explains in more detail how registration requests and registration information are generated, and adds a process in which the mobile terminal controls the unlocking of the vehicle, which can ensure the accuracy of the configuration information for activating the virtual key, and can also Improving the accuracy of verification of registration information can in turn improve the safety of operations performed on vehicles. Such as figure 2 As shown, the activation method of the virtual key configuration information may include the following steps:

[0073] 201. The mobile terminal controls the identity authentication module to use the device private key to sign the virtual key code, the device fingerprint of the mobile termin...

Embodiment 3

[0089] see image 3 , image 3 It is a schematic flowchart of another method for activating virtual key configuration information disclosed in the embodiment of the present invention. Such as image 3 As shown, the activation method of the virtual key configuration information may include the following steps:

[0090] 301. When receiving the registration information sent by the mobile terminal, the server sends the registration information to the identity authentication center, and the registration information is used for the identity authentication center to verify the registration information.

[0091] In the embodiment of the present invention, the server may be a Bluetooth authentication server, etc., and the registration information sent by the mobile terminal may include the device feature information of the mobile terminal, the first signature generated according to the device feature information (ie, the registration request), and the target public key. , the device...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of vehicles, and discloses a method for activating virtual key configuration information, a mobile terminal and a server, including: controlling an identity authentication module to generate a registration request including device characteristic information of a mobile terminal; Sign to get the registration information; send the registration information to the server; the registration information is used for the server to verify the registration information through the identity authentication center, and after the registration information verification is passed, the server activates the device corresponding to the device feature information in the registration information. The virtual key configuration information is sent to the vehicle electronic device. The implementation of the embodiment of the present invention improves the safety of the virtual key for unlocking and unlocking the vehicle.

Description

technical field [0001] The invention relates to the technical field of vehicles, in particular to a method for activating virtual key configuration information, a mobile terminal and a server. Background technique [0002] With the development and popularization of the Internet of Things, some automobile manufacturers choose to replace traditional physical keys with virtual keys on mobile terminals in order to improve user experience. Before unlocking the vehicle through the virtual key on the mobile terminal, it is usually necessary to verify the virtual key. The verification method is usually: the mobile terminal uploads the configuration information of the signed virtual key to the server, so that the server can pass the identification The authentication center verifies the configuration information, and feeds back the token generated by the identity authentication center to the mobile terminal after the verification is passed. After the mobile terminal receives the token...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/00H04W12/06H04L9/32H04L9/08H04W12/10
CPCG07C9/00571H04W12/06H04L9/3213H04L9/3249H04L9/0825G07C2009/00412
Inventor 程紫尧
Owner GUANGZHOU XIAOPENG MOTORS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products