Virtual key sharing method, device and system, equipment and storage medium

A virtual key and device sharing technology, applied in the field of smart devices, can solve problems such as limited number of people, poor security, and inconvenient use

Inactive Publication Date: 2020-05-19
BAYERISCHE MOTOREN WERKE AG
7 Cites 3 Cited by

AI-Extracted Technical Summary

Problems solved by technology

However, this method of using a physical key to control the vehicle has the problems of inconvenient use and poor security. For example, the physical key is easy to lose, and the user needs to find the physical key from the pocke...
View more

Method used

[0119] In the technical solution of this embodiment, the first user terminal generates a virtual key sharing request message according to user operations, and the sharing request message includes the identification information of the vehicle, the identification information of the second user terminal and the use restriction information of the vehicle, according to The sharing request message determines the virtual key pair for the second client, and sends the user's virtual key and vehicle use restriction information in the virtual key ...
View more

Abstract

The embodiment of the invention discloses a virtual key sharing method, device and system, equipment and a storage medium. The method comprises the steps of receiving a sharing request message of a virtual key initiated by a first user side, and determining a virtual key pair for a second user side, wherein the sharing request message includes identification information of a vehicle, identification information of the second user side and use limitation information of a vehicle; according to the identification information of the second user side, sending the user virtual key in the virtual keypair to the second user side; and according to the identification information of the vehicle, sending the vehicle virtual key in the virtual key pair and the use limitation information to the vehicle,wherein the user virtual key is matched with the vehicle virtual key. According to the embodiment of the invention, the virtual key is used for controlling the vehicle without limitation of the number and carrying of entity keys so that safety, flexibility and convenience of vehicle control are improved.

Application Domain

Individual entry/exit registers

Technology Topic

EngineeringComputer network +4

Image

  • Virtual key sharing method, device and system, equipment and storage medium
  • Virtual key sharing method, device and system, equipment and storage medium
  • Virtual key sharing method, device and system, equipment and storage medium

Examples

  • Experimental program(14)

Example Embodiment

[0058] Example one
[0059] Figure 1a This is a flowchart of a virtual key sharing method provided in the first embodiment of the present invention. This embodiment is applicable to a situation where a virtual key is used to control a vehicle. The method can be executed by a virtual key sharing device, which can use software and/ Or realized by hardware, the device can be configured in a server, such as a computer typically. Such as Figure 1a As shown, the method specifically includes the following steps:
[0060] Step 110: Receive a virtual key sharing request message initiated by the first user end, and determine a virtual key pair for the second user end, where the sharing request message includes the identification information of the vehicle, the identification information of the second user end, and the use restriction of the vehicle information.
[0061] Step 120: Send the user virtual key of the virtual key pair to the second user terminal according to the identification information of the second user terminal; and send the vehicle virtual key of the virtual key pair and usage restriction information to the vehicle according to the identification information of the vehicle. Among them, the user virtual key matches the vehicle virtual key.
[0062] In the embodiment of the present invention, the following scenarios may exist in real life: Scenario 1: A friend of the first user, which can be called the second user, now needs to borrow the vehicle of the first user, and the first user needs to transfer the physical key In the hands of the second user, but for some reason, the first user is currently unable to hand over the physical key to the second user. In this scenario, what method should be adopted to meet the second user's car borrowing needs; Scenario 2: For a certain vehicle, there are only two physical keys. The physical keys are held by the parents. A child in the current family needs to use the vehicle, but the parents cannot give the physical keys to the child immediately. The above can be understood by the parents It is the first user and the child is understood as the second user. In this scenario, what method should be used to meet the second user’s car needs; Scenario 3: The first user allows the second user to use a certain vehicle in order to reduce For the emergence of unsafe problems caused by unfamiliar vehicles or limited driving skills of the second user, the first user needs to control the second user’s use of the vehicle. In this scenario, which method should be adopted to meet the first A user’s control needs. The three scenarios listed above reflect the problems of using physical keys to use or control vehicles from different aspects. In order to solve the above problems, a virtual key sharing method can be considered, that is, the corresponding relationship between the second user and the vehicle is established through the virtual key, so that the second user can use the vehicle without using the physical key, where the virtual key is not a physical key. Substance, its essence is key information. specific:
[0063] According to the foregoing knowledge, involving the information interaction between the first user terminal, the second user terminal, and the vehicle, the server can be used to process the virtual key sharing request message initiated by the first user terminal. More specifically: the server may receive a virtual key sharing request message initiated by the first user end to determine a virtual key pair for the second user end, where the sharing request message may specifically include the identification information of the vehicle and the identification of the second user end Information and vehicle usage restriction information. The virtual key pair may specifically include a user virtual key and a vehicle virtual key, and the user virtual key is matched with the vehicle virtual key, so that the user can use the corresponding vehicle according to the matching relationship between the user virtual key and the vehicle virtual key. The identification information of the vehicle can be used to determine which vehicle to send the virtual key of the vehicle in the virtual key pair. Specifically, it can refer to information that uniquely identifies the vehicle, such as a license plate number or VIN (Vehicle Identification Number), where , VIN is a set of 17 alphanumeric numbers, a set of specific numbers used on cars, which can identify the car's manufacturer, engine, chassis number and other performance information. The identification information of the second user end can be used to determine which second user end the user virtual key in the virtual key pair is sent to. Specifically, it can refer to the account information of the second user end, such as the account name and account number of the second user end. password. The use restriction information of the vehicle may be used to restrict the time and function of the second user terminal using the vehicle, and may specifically include time restriction information and/or function restriction information. Exemplarily, if the second user is a user with immature driving skills, in order to ensure the safety of the driving process, function restriction information can be set, for example, the driving speed cannot exceed 60 km/h.
[0064] Based on the above, the server can send the virtual key of the user in the virtual key pair to the corresponding second user according to the identification information of the second user end, and the server can send the virtual key of the vehicle in the virtual key pair according to the identification information of the vehicle To the corresponding vehicle, the usage restriction information in the sharing request message is also sent to the vehicle. Therefore, the server interacts with the information of the first user terminal and the vehicle to establish the corresponding relationship between the second user terminal and the vehicle, so that the second user can use the vehicle. At the same time, the vehicle receives the usage restriction information sent by the server. Correspondingly, corresponding usage settings are performed on the vehicle, that is, the second user needs to use the vehicle under the set usage restriction conditions.
[0065] It should be noted that the first client and the second client can be mobile terminals such as mobile phones, tablets, or smart watches. In order to better realize the information interaction between the first client and the server, and the server and the second client respectively For information interaction with the vehicle, special applications can be installed on the first user end and the second user end. At this time, the first user end refers to the mobile terminal where the application is located when the first user logs in, and the second user The terminal refers to the mobile terminal where the application program is located when the second user logs in the application program.
[0066] Exemplarily, such as the existing first user A, second user B and server C, the first user A owns the vehicle D, the first user terminal and the second user terminal are both installed with the application E, and the current second user B needs Using vehicle D, the first user terminal can initiate a virtual key sharing request message to server C. The sharing request message may specifically include identification information of vehicle D, identification information of the second user terminal, and usage restriction information of vehicle D. The server C may determine the corresponding virtual key pair for the second client according to the received sharing request message sent by the first client, where the virtual key pair may specifically include the user virtual key and the vehicle virtual key, and according to the second user The identification information of the terminal sends the user virtual key in the virtual key pair to the second user terminal, and according to the identification information of the vehicle D, the vehicle virtual key in the virtual key pair is sent to the vehicle D, and the use restriction information of the vehicle D is also sent Send to vehicle D. Thus, it is realized that the second user B can use the vehicle D under the use restriction conditions set on the vehicle D.
[0067] In the technical solution of this embodiment, the server receives the virtual key sharing request message initiated by the first client to determine the virtual key pair for the second client. The sharing request message contains the identification information of the vehicle, the identification information of the second client, and The use restriction information of the vehicle, the user virtual key in the virtual key pair is sent to the second user end according to the identification information of the second user end, and the vehicle virtual key and the use restriction information in the virtual key pair are sent according to the identification information of the vehicle For the vehicle, the user's virtual key is matched with the vehicle's virtual key, which realizes the use of the virtual key to control the vehicle without being limited by the number and carrying of the physical key, thereby improving the safety, flexibility and convenience of vehicle control.
[0068] Optionally, on the basis of the foregoing technical solution, the use restriction information may specifically include: use time restriction information and/or function use restriction information.
[0069] In the embodiment of the present invention, the use time restriction information can be used to limit the time the user uses the vehicle, and the specific expression can be a time period. Accordingly, if it is not within the time period, the user cannot use the vehicle. Exemplarily, if the use time limit information can be 2018.06.25-2018.06.27, it can also be 08:00-18:00 2018.06.25, that is, the time period can refer to a certain number of days, or it can refer to a certain day of the day. a couple of hours. Of course, it can be understood that the specific representation form of the use time limit information can be set according to the actual situation, which is not specifically limited here.
[0070] The function usage restriction information can be used to correspondingly restrict the user's use of the relevant functions of the vehicle. Exemplarily, such as setting travel speed-related restriction information, for example, the travel speed of the vehicle when the second user uses the vehicle cannot exceed 60 km/h. Another example is setting the restriction information related to the performance of the vehicle power system. Of course, it can also be understood that the specific content included in the function usage restriction information can be set according to actual conditions, and no specific limitation is made here.
[0071] The advantage of the above configuration is that because the use restriction information of the vehicle is associated with the second user terminal, the second user can use the vehicle at the will of the first user, which improves the second user’s use of the vehicle to a certain extent. Security.
[0072] Optionally, on the basis of the above technical solution, the function usage restriction information may specifically include: driving speed-related restriction information, dynamic stability control (Dynamic Stability Control, DSC) function-related restriction information, and power system performance-related restriction information. at least one.
[0073] In the embodiment of the present invention, the travel speed-related restriction information may be used to correspondingly restrict the travel speed of the vehicle. For example, when the second user uses the vehicle, the travel speed of the vehicle cannot exceed 60 km/h. DSC is similar to the commonly described ESP (Electronic Stability Program). It is a further extension of the acceleration anti-skid control or tracking control system, which can ensure that the vehicle still has the best tracking performance when turning. Ensure driving stability. The DSC system is equipped with more advanced detection and control equipment in order to make the vehicle have good tracking when turning. In addition to detecting the wheel speed, it can also detect the amplitude of the steering wheel rotation and the lateral acceleration of the vehicle. Etc., based on the above detected information, judge whether the wheels are in danger of slipping during turning. If there is a danger of slipping or have slipped, the terminal immediately controls the brake hydraulic system to properly brake the slipped wheels , Or reduce the amount of fuel injection and delay the ignition to reduce the output of the engine's power, so that the tires will not slip under various driving conditions, so that the vehicle will accelerate, re-accelerate, or turn, etc. Both can achieve good tracking. The power system can include a power transmission device between the car engine and the driving wheels, which ensures that the vehicle has the necessary traction and vehicle speed under various driving conditions, as well as the coordinated changes between traction and vehicle speed, so that the vehicle has Good power and fuel economy. In addition, it also ensures that the vehicle has reversing and the left and right drive wheels can adapt to the requirements of differential speeds, and enables the power transmission to be smoothly combined or completely and quickly separated as required. The power system may specifically include a clutch, a transmission, a transmission shaft, a final drive, a differential, and a half shaft. Correspondingly, the function usage restriction information may specifically include at least one of travel speed-related restriction information, DSC function-related restriction information, and power system performance-related restriction information.
[0074] Optionally, based on the above technical solution, the method may specifically further include: when sending the user virtual key in the virtual key pair to the second user terminal, sending the usage restriction information to the second user terminal.
[0075] In the embodiment of the present invention, in order to further improve the safety of the second user driving the vehicle, when the server sends the user virtual key in the virtual key pair to the second user terminal, it also sends the usage restriction information to the second user terminal. , So that the second user also knows the permission to use the vehicle when using the vehicle.
[0076] Optionally, on the basis of the above technical solution, the method may specifically further include: obtaining the vehicle configuration information of the vehicle corresponding to the second user terminal based on the identification information of the second user terminal (that is, the vehicle configuration information set by the second user terminal for the vehicle). Configuration information). When the vehicle virtual key and usage restriction in the virtual key pair are newly sent to the vehicle according to the identification information of the vehicle, the vehicle configuration information is sent to the vehicle.
[0077] In the embodiment of the present invention, the identification information of the second user terminal can be used to determine which second user terminal to give the user virtual key in the virtual key pair to, and the identification information of the second user terminal can also be used to determine the second user terminal. The vehicle configuration information of the vehicle corresponding to the user terminal, so that when the vehicle virtual key and usage restriction information in the virtual key pair are sent to the vehicle according to the vehicle's identification information, the vehicle configuration information can also be sent to the vehicle. Among them, the vehicle configuration information can be used to provide the second user with a vehicle configuration that meets his personal usage habits and personal physical conditions when using the vehicle. Exemplarily, the vehicle configuration information may specifically include seat configuration information and music configuration information, etc. The seat configuration information may specifically refer to seat position height information, and the music configuration information may specifically refer to setting a music playlist on the vehicle system. It should be noted that the aforementioned vehicle configuration information is associated with the second user.
[0078] The advantage of the above setting is that the vehicle configuration information of the vehicle corresponding to the second user end is determined according to the identification information of the second user end, and then the vehicle virtual key and usage restriction information in the virtual key pair are sent to the vehicle according to the identification information of the vehicle. At the same time, the vehicle configuration information is also sent to the vehicle. Since the vehicle configuration information is associated with the second user’s personal use habits and personal physical conditions, when the second user is using the vehicle, it can be The user provides convenience, thereby improving the user experience.
[0079] Optionally, based on the foregoing technical solution, the vehicle configuration information may specifically include at least one of seat configuration information, music configuration information, and lighting configuration information.
[0080] In the embodiment of the present invention, the vehicle configuration information may specifically include at least one of seat configuration information, music configuration information, and lighting configuration information. The seat configuration information may be generated based on the physical condition of the second user, and the music configuration information Both the light and lighting configuration information can be generated based on the personal usage habits of the second user. In other words, the seat configuration information can be determined according to the height of the second user, and the music configuration information and lighting configuration information can be determined according to the personal usage habits of the second user. Exemplarily, if a second user is 170cm tall and likes to listen to Korean songs and soft lighting, correspondingly, the seat configuration information can set the height of the seat matching the height of 170cm, and the music configuration information can be a list of Korean songs and lighting. The configuration information can be soft lighting.
[0081] Figure 1b It is a flowchart of another virtual key sharing method provided by Embodiment 1 of the present invention. Such as Figure 1b As shown, the method specifically includes the following steps:
[0082] Step 130: Receive a virtual key sharing request message initiated by the first user end, and determine a virtual key pair for the second user end, where the sharing request message includes the identification information of the vehicle, the identification information of the second user end, and the use restriction of the vehicle information.
[0083] Step 140: Obtain the vehicle configuration information of the vehicle of the second user terminal based on the identification information of the second user terminal.
[0084] Step 150: Send the user virtual key and usage restriction information in the virtual key pair to the second user terminal according to the identification information of the second user terminal.
[0085] Step 160: Send the vehicle virtual key, usage restriction information and vehicle configuration information in the virtual key pair to the vehicle according to the identification information of the vehicle.
[0086] In the embodiment of the present invention, it should be noted that step 130 needs to be executed first and step 140 needs to be executed before step 160. The execution timing of other steps is not necessarily limited, that is, step 130-step 160 can be executed in sequence. The way. It is also possible to perform step 130 first, and then perform step 140, step 160, and step 150 simultaneously. Among them, step 140 is performed first, and then step 160 is performed in step 140 and step 160. It is also possible to perform step 130 first, then step 140 and step 160 in sequence, and then step 150. It is also possible to perform step 130 first, then step 150, and then step 140 and step 160 in sequence. The above can be set according to the actual situation, which is not specifically limited here.
[0087] In the technical solution of this embodiment, the server receives the virtual key sharing request message initiated by the first client to determine the virtual key pair for the second client. The sharing request message contains the identification information of the vehicle, the identification information of the second client, and The use restriction information of the vehicle, based on the identification information of the second user end, obtain the vehicle configuration information of the vehicle of the second user end, and send the user virtual key and use restriction information in the virtual key pair to the second user according to the identification information of the second user end At the end, and according to the vehicle’s identification information, the vehicle virtual key, use restriction information and vehicle configuration information in the virtual key pair are sent to the vehicle. The user’s virtual key matches the vehicle’s virtual key to realize the use of the virtual key to control the vehicle. It is not restricted by the number and carrying of physical keys, thereby improving the safety, flexibility and convenience of vehicle control.

Example Embodiment

[0088] Example two
[0089] Figure 2a This is a schematic diagram of an application scenario of a virtual key sharing method provided in the second embodiment of the present invention. The server 2 is connected to the first user terminal 1, the second user terminal 3, and the vehicle 4 (that is, Figure 2b The vehicle control end in the) communicates via the Internet. The first client 1 sends a virtual key sharing request message to the server 2, and the server 2 processes the received sharing request message to establish a correspondence between the second client 3 and the vehicle 4.
[0090] Figure 2b This is a signaling diagram of a virtual key sharing method provided in the second embodiment of the present invention, which can be combined with the signaling diagram Figure 2a The application scenarios shown are understood.
[0091] In the virtual key sharing method provided by the embodiment of the present invention, the first user terminal sends a virtual key sharing request message to the server, and the sharing request message contains the identification information of the vehicle, the identification information of the second user and the use restriction information of the vehicle, and the server is based on The sharing request message is for the second user terminal to determine the virtual key pair and obtain the vehicle configuration information of the vehicle corresponding to the second user terminal based on the identification information of the second user terminal. According to the identification information of the second user, the user virtual key in the virtual key pair is selected And the use restriction information is sent to the second user terminal, and the vehicle virtual key in the virtual key pair, the use restriction information and the vehicle configuration information are sent to the vehicle according to the identification information of the vehicle.
[0092] The above process not only realizes that the second user terminal can use the matching vehicle through the virtual key without being restricted by the number and carrying of physical keys, but also realizes the restriction on the use of the vehicle by the second user terminal. Thus, the safety, flexibility and convenience of vehicle control are improved.

Example Embodiment

[0093] Example three
[0094] Figure 3a This is a flowchart of a virtual key sharing method provided in the third embodiment of the present invention. This embodiment is applicable to a situation where a virtual key is used to control a vehicle. The method can be executed by a virtual key sharing device, which can use software and/ Or implemented by hardware, the device can be configured in the first user terminal, such as a mobile phone and/or a tablet computer. Such as Figure 3a As shown, the method specifically includes the following steps:
[0095] Step 310: Generate a sharing request message of the virtual key according to the user's operation. The sharing request message includes identification information of the vehicle, identification information of the second user terminal, and use restriction information of the vehicle.
[0096] Step 320: Determine the virtual key pair for the second user terminal according to the sharing request message, and send the user virtual key in the virtual key pair to the second user terminal according to the identification information of the second user terminal, and send the virtual key pair according to the identification information of the vehicle. The vehicle virtual key in the key pair and the vehicle use restriction information are sent to the vehicle, where the user virtual key matches the vehicle virtual key.
[0097] In the embodiment of the present invention, different from the foregoing embodiment, in this embodiment, it is considered that the first user terminal directly processes the sharing request message of the virtual key without a server. Specifically, the sharing request message of the virtual key may be generated by the user performing a related user operation on the first user terminal. Exemplarily, for example, the related user operation may be: after the first user logs in to the setting application, the first user selects or inputs the identification information of the vehicle on the interface of the setting application, and the first user sets the application The account information of the second user selected or entered on the program interface to log in to the setting application is used as the identification information of the second user terminal. In addition, the first user targets the selected vehicle on the setting application interface Set the corresponding usage restriction information.
[0098] The first user end generates a virtual key sharing request message according to the received user operation, that is, the first user end generates the corresponding virtual key information according to the received vehicle identification information, the second user end identification information, and the vehicle usage restriction information. Sharing request message. The first user terminal determines the virtual key pair corresponding to the second user terminal according to the sharing request message. The virtual key pair may specifically include a user virtual key and a vehicle virtual key, and the user virtual key matches the vehicle virtual key. The user virtual key in the virtual key pair can be sent to the corresponding second user terminal according to the identification information of the second user in the sharing request message, and the vehicle in the virtual key pair can also be matched according to the identification information of the vehicle in the sharing request message. The virtual key is sent to the corresponding vehicle, and can also be sent to the corresponding vehicle according to the usage restriction information in the sharing request message. Therefore, the information interaction between the first user terminal and the second user terminal and the vehicle establishes the corresponding relationship between the second user terminal and the vehicle, so that the second user can use the vehicle, and at the same time, the vehicle receives the first user terminal. According to the sent usage restriction information, corresponding usage settings are performed on the vehicle, that is, the second user needs to use the vehicle under the set usage restriction conditions.
[0099] It should be noted that the first client and the second client can be mobile terminals such as mobile phones, tablets or smart watches. In order to better realize the information interaction between the first client and the second client and the vehicle, A user terminal and a second user terminal install special applications. At this time, the first user terminal refers to the mobile terminal where the application is located when the first user logs in, and the second user terminal refers to the second user logs in to the application When the mobile terminal where the application is located.
[0100] Exemplarily, if there are first user A and second user B, first user A owns vehicle C, both the first user terminal and the second user terminal are installed with application D, and the current second user B needs to use the vehicle C. Therefore, the first user terminal may generate a virtual key sharing request message according to the operation of the first user A, and the sharing request message may specifically include the identification information of the vehicle C, the identification information of the second user terminal, and the use restriction of the vehicle C information. The first user end may determine the corresponding virtual key pair for the second user end according to the generated sharing request message, where the virtual key pair may specifically include a user virtual key and a vehicle virtual key, and the virtual key pair may be virtualized according to the identification information of the second user end. The user virtual key in the key pair is sent to the second user terminal, and the vehicle virtual key in the virtual key pair is sent to the vehicle C according to the identification information of the vehicle C, and the usage restriction information of the vehicle C is also sent to the vehicle C. Thus, it is realized that the second user B can use the vehicle C under the use restriction conditions set on the vehicle C.
[0101] In the technical solution of this embodiment, the sharing request message of the virtual key is generated by the first user terminal according to the user operation, and the sharing request message contains the identification information of the vehicle, the identification information of the second user terminal and the usage restriction information of the vehicle, according to the sharing request message Determine the virtual key pair for the second user terminal, and send the user virtual key in the virtual key pair to the second user terminal according to the identification information of the second user terminal, and send the vehicle virtual key in the virtual key pair according to the vehicle identification information The user’s virtual key is matched with the vehicle’s virtual key and the virtual key is used to control the vehicle without being restricted by the number and carrying of the physical key, thus improving the security of vehicle control. Flexibility and convenience.
[0102] Optionally, on the basis of the foregoing technical solution, the virtual key pair is determined for the second user terminal according to the sharing request message, and the user virtual key in the virtual key pair is sent to the second user terminal according to the identification information of the second user terminal, And, sending the vehicle virtual key in the virtual key pair and the use restriction information of the vehicle to the vehicle according to the identification information of the vehicle may specifically include: locally generating or selecting the virtual key pair for the second user terminal according to the sharing request message. . Based on the wireless communication channel of the first user end and the second user end or forwarded by the server, the user virtual key in the virtual key pair is sent to the second user end according to the identification information of the second user end, and the virtual key is sent to the second user end according to the identification information of the vehicle. The vehicle virtual key in the key pair and the vehicle usage restriction information are sent to the vehicle.
[0103] In the embodiment of the present invention, the first user terminal can generate or select a virtual key pair for the second user terminal locally according to the sharing request message. The generation of a virtual key pair described here can be understood as using a key The generation algorithm generates a virtual key pair, and selecting a virtual key pair can be understood as at least two options of the virtual key pair displayed locally on the first user terminal, and the user performs a selection operation from the at least two options to complete. Now the first user terminal needs to send the user virtual key in the virtual key pair to the second user terminal according to the identification information of the second user, and needs to send the vehicle identification in the virtual key pair to the vehicle according to the identification information of the vehicle. It is also necessary to send the usage restriction information of the vehicle to the vehicle according to the identification information of the vehicle. Specifically, it can be implemented in the following two ways: Method one, based on the wireless communication channel between the first user end and the second user end, the first user end sends the user virtual key in the virtual key pair to the second user according to the identification information of the second user. The second user end, that is, the first user end and the second user end establish a wireless communication connection, so that the first user end can directly send the user virtual key in the virtual key pair to the second user end according to the identification information of the second user , Without third-party forwarding, such as server forwarding. Through the server's forwarding, the first user terminal sends the vehicle virtual key in the virtual key pair and the vehicle usage restriction information to the corresponding vehicle according to the vehicle identification information, that is, the first user terminal does not directly establish a communication connection with the vehicle, but Through third-party forwarding, such as server forwarding, that is, the server establishes a wireless communication connection with the first user terminal and the vehicle respectively, so that the first user terminal will pair the virtual key of the vehicle and the use restriction information of the vehicle according to the identification information of the vehicle. Send to the corresponding vehicle. More specifically, the first user terminal sends the identification information of the vehicle, the vehicle virtual key in the virtual key pair, and the use restriction information of the vehicle to the server, and the server then sends the vehicle virtual key and the use restriction information of the vehicle according to the identification information of the vehicle Send to the corresponding vehicle. In the second method, all are forwarded by the server. The first user terminal sends the user virtual key in the virtual key pair to the second user terminal according to the identification information of the second user terminal, and matches the vehicle in the virtual key pair according to the vehicle identification information The virtual key and the vehicle’s use restriction information are sent to the corresponding vehicle, that is, the first user terminal and the second user terminal do not directly establish a communication connection with the vehicle, but are forwarded by a third party, such as server forwarding, that is, the server and the first The user terminal, the second user terminal and the vehicle establish a wireless communication connection, so that the first user terminal sends the user virtual key in the virtual key pair to the second user terminal according to the identification information of the second user terminal, and, according to the identification information of the vehicle The vehicle virtual key in the virtual key pair and the vehicle usage restriction information are sent to the corresponding vehicle. More specifically, the first user terminal sends the identification information of the second user and the user virtual key in the virtual key pair to the server, and sends the identification information of the vehicle, the vehicle virtual key in the virtual key pair, and the vehicle usage restriction The information is sent to the server, and the server sends the user virtual key to the second user terminal according to the identification information of the second user, and sends the vehicle virtual key and the use restriction information of the vehicle to the corresponding vehicle according to the identification information of the vehicle.
[0104] Of course, it can be understood that in addition to the above two implementations, there are also the following two implementations: Method three, through the server forwarding, the first user end sends the user virtual key in the virtual key pair to the second user end according to the identification information of the second user end The second user end, that is, the first user end and the second user end do not directly establish a communication connection, but are forwarded by a third party, such as server forwarding, that is, the server establishes a wireless communication connection with the first user end and the second user end respectively, To realize that the first user terminal sends the user virtual key in the virtual key pair to the second user terminal according to the identification information of the second user terminal. More specifically, the first user terminal sends the identification information of the second user and the user virtual key in the virtual key pair to the server, and the server sends the user virtual key to the second user terminal according to the identification information of the second user. Based on the wireless communication channel between the first user terminal and the vehicle, the first user terminal sends the vehicle virtual key in the virtual key pair and the vehicle usage restriction information to the corresponding vehicle according to the vehicle identification information, that is, the first user terminal and the vehicle establish Through the wireless communication connection, the first user terminal can directly send the vehicle virtual key and vehicle use restriction information in the virtual key pair to the corresponding vehicle according to the vehicle’s identification information, without the need for third-party forwarding, such as server forwarding. . Method 4: Based on the wireless communication channel between the first user terminal and the second user terminal and the vehicle, the first user terminal sends the user virtual key in the virtual key pair to the second user terminal according to the identification information of the second user terminal, and, According to the identification information of the vehicle, the vehicle virtual key in the virtual key pair and the use restriction information of the vehicle are sent to the corresponding vehicle, that is, the first user terminal establishes a wireless communication connection with the second user terminal and the vehicle respectively, so that the first user The terminal may directly send the user virtual key in the virtual key pair to the second user terminal according to the identification information of the second user terminal, and send the vehicle virtual key in the virtual key pair and the use restriction information of the vehicle to the second user terminal according to the identification information of the vehicle. The corresponding vehicle does not need to be forwarded by a third party, such as server forwarding.
[0105] It should be noted that the foregoing specific implementation forms can be set according to actual conditions, and are not specifically limited here. In addition, the wireless communication channels of the first user end and the second user end, the wireless communication channels of the first user end and the vehicle, and the wireless communication channels of the server with the first user end, the second user end and the vehicle, respectively, can be based on actual conditions ( For example, the data transmission distance is selected through a wireless communication connection established based on a mobile network, Bluetooth or Wi-Fi (Wireless-Fidelity, wireless fidelity).
[0106] Optionally, on the basis of the above technical solution, generating a virtual key sharing request message according to user operations may specifically include: after the first user logs in to the setting application, acquiring the first user’s interface selection in the setting application Or the identification information of the entered vehicle. Acquire the account information of the second user logging in to the setting application selected or input by the first user on the interface of the setting application as the identification information of the second user terminal. Obtain the usage restriction information set by the first user for the vehicle on the interface of the setting application. Based on the identification information of the vehicle, the identification information of the second user end, and the usage restriction information of the vehicle, a virtual key sharing request message is generated.
[0107] In the embodiment of the present invention, after the first user logs in to the setting application, the identification information of the vehicle selected or input by the first user in the setting application is obtained, and the interface of the first user in the setting application is obtained The selected or entered account information of the second user who logs in to the setting application can use the account information as the identification information of the second user terminal. In addition, the first user can obtain the use restriction set for the vehicle on the setting application interface information. The first user end may generate a virtual key sharing request message according to the obtained identification information of the vehicle, the identification information of the second user end, and the use restriction information of the vehicle.
[0108] The advantage of the above setting is that the first user can perform related operations locally on the first user terminal according to actual conditions to generate a sharing request message of the virtual key, thereby improving the flexibility and convenience of generating the sharing request message.
[0109] Optionally, on the basis of the above technical solution, the method may specifically further include: when sending the user virtual key in the virtual key pair to the second user terminal according to the identification information of the second user terminal, sending the use restriction information of the vehicle Sent to the second client.
[0110] In the embodiment of the present invention, in order to further improve the safety of the second user driving the vehicle, when the first user terminal sends the user virtual key in the virtual key pair to the second user terminal, it also sends the vehicle usage restriction information To the second user terminal, so that the second user also understands the use authority of the vehicle when using the vehicle.
[0111] It should be noted that the meanings and functions of the identification information of the vehicle, the identification information of the second user terminal, and the use restriction information of the vehicle in this embodiment are the same as those in the first embodiment, and will not be described in detail here.
[0112] Figure 3b This is a flowchart of another virtual key sharing method provided in the third embodiment of the present invention. Such as Figure 3b As shown, the method specifically includes the following steps:
[0113] Step 330: After the first user logs in to the setting application, obtain the identification information of the vehicle selected or input by the first user on the interface of the setting application.
[0114] Step 340: Obtain the account information of the second user logging in to the setting application selected or input by the first user on the interface of the setting application as the identification information of the second user terminal.
[0115] Step 350: Obtain the usage restriction information set by the first user for the vehicle on the interface of the setting application.
[0116] Step 360: Generate a virtual key sharing request message based on the identification information of the vehicle, the identification information of the second user terminal, and the use restriction information of the vehicle.
[0117] Step 370: Generate or select a virtual key pair locally for the second user terminal at the first user terminal according to the sharing request message.
[0118] Step 380: Based on the wireless communication channel of the first client and the second client or forwarded by the server, send the user virtual key and usage restriction information in the virtual key pair to the second client according to the identification information of the second client; and, The vehicle virtual key and usage restriction information in the virtual key pair are sent to the vehicle according to the identification information of the vehicle.
[0119] In the technical solution of this embodiment, the sharing request message of the virtual key is generated by the first user terminal according to the user operation, and the sharing request message contains the identification information of the vehicle, the identification information of the second user terminal and the usage restriction information of the vehicle, according to the sharing request message Determine the virtual key pair for the second user terminal, and send the user virtual key in the virtual key pair and the vehicle usage restriction information to the second user terminal according to the identification information of the second user terminal, and send the virtual key according to the vehicle identification information The vehicle’s virtual key and the vehicle’s use restriction information are sent to the vehicle. The user’s virtual key is matched with the vehicle’s virtual key, which realizes the use of the virtual key to control the vehicle without being restricted by the number and carrying of physical keys, thereby increasing The safety, flexibility and convenience of vehicle control.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products