Digital key authorization method

A digital key and authorized technology, applied in the field of digital key authorization, can solve problems such as information transmission security transmission, asset risk, user account asset threat, etc., so as to achieve good user experience, avoid the problem of key return, and solve risks and troubles Effect

Pending Publication Date: 2021-10-26
SHANGHAI TRUSTKERNEL INFORMATION TECH CO LTD
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this will bring risks to the assets in the account. For safety reasons, the owner will change the password after borrowing the car once, which also brings trouble to the owner.
[0004] Chinese patent CN111047740A discloses a digital key sharing method, but this method does not consider the safe transmission in the process of information transmission, and malicious users can easily exploit the security loopholes in this method to attack, posing a threat to the user's account assets

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital key authorization method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] A digital key authorization method such as figure 1 shown, including the following steps:

[0029] S1. The authorized user sets the authorization information on the user terminal, encrypts the authorization information and uploads it to the cloud platform. The authorization information includes the vehicle information and the identity information of the authorized person;

[0030] Authorization information also includes one or more of authority information, date of use, and number of times of use. Authority information is the user's authority to use the vehicle, such as ignition, trunk opening, and cockpit configuration. The date when the user has the right to use the vehicle, such as June 1, 2021 to June 17, 2021, and the number of uses is the number of legal uses of the vehicle by the user, for example, the number of uses is 10 times.

[0031] In a specific real-time method, the authorized user sets the vehicle information (device number SXXXX), the identity informat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a digital key authorization method, which comprises the steps that an authorized user encrypts authorization information and uploads the authorization information to a cloud platform, wherein the authorization information comprises vehicle information and authorized person identity information; the cloud platform decrypts the authorization information sent by the authorized user, establishes a contact between the authorizer and the authorized person, and stores the authorization information in the cloud platform; the cloud platform issues inquiry information to a user terminal of the authorized person, and if the authorized person accepts authorization, user terminal equipment information of the authorized person is encrypted and uploaded to the cloud platform; and the cloud platform decrypts the user terminal equipment information sent by the authorized person, generates a digital key and issues the digital key to the user terminal of the authorized person. Compared with the prior art, the method has the advantages that bicycle borrowing operation can be conveniently and quickly performed through digital key authorization, authority information, use dates and use times are limited, risks and troubles of bicycle borrowing are well solved, the problem of key returning is avoided, and user experience is good.

Description

technical field [0001] The invention relates to the technical field of digital keys for automobiles, in particular to a digital key authorization method. Background technique [0002] With the development of technology, cars have gradually become popular in life and have become a common means of transportation. In daily use, operations such as borrowing and returning a car are often performed. If the traditional physical key is used when borrowing a car, the traditional method of borrowing a car is to lend the key to the other party. After the other party finishes using the vehicle, return the key to the owner. It requires two meetings between the owner and the borrower. Trouble, and there is also the risk of losing the physical key during the process. [0003] At present, digital keys are gradually being used in the automotive field. The common method of borrowing a car is that the owner sends the account number and password to the borrower, and the borrower logs in to th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06H04L29/08G06Q30/06
CPCH04L9/3247H04L63/0442H04L63/08H04L67/12H04L67/10G06Q30/0645H04L2209/84
Inventor 刘佳晖李子男文鸿翔
Owner SHANGHAI TRUSTKERNEL INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products