Permission transfer method and system for digital key offline condition of trusted execution environment
A digital key and execution environment technology, applied in digital transmission systems, services based on specific environments, transmission systems, etc., to ensure privacy and security, and resist man-in-the-middle attacks and replay attacks.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0063] Example 1
[0064] The permissions transfer method of the digital key offline case provided in accordance with the present invention, including:
[0065] Step S1: Import the cloud root key and the vehicle identification code in the car production line, and bind the vehicle identification code to the SE ID, and to the SE into the root certificate, generate the root key;
[0066] Step S2: Generate a terminal digital key key based on the root key and export the number key key of the vehicle;
[0067] Step S3: Generate a mobile phone digital key key, authenticate the generated mobile phone terminal digital key key with the number key key;
[0068] Step S4: Transfers the transfer of the digital key based on the generated terminal key and the vehicle-end digital key, and the vehicle-end digital key.
[0069] Specifically, the step S1 is adopted:
[0070] Step S1.1: In the train production line, the Vehicle ID is initialized by implantation of the KSS certificate, the SE ID is ob...
Example Embodiment
[0090] Example 2
[0091] Example 2 is an example of the preferred embodiment of Example 1
[0092] The technical problems to be solved by the present invention include: Designing Digital Key Permissions Under Digital Key Permissions Transfer Protocols under Offline Sports To ensure privacy, integrity, integrity, and design trusted clock under offline scenes to ensure that permission is retracted within a specified time.
[0093] People tend to pass through the roads in driving, double offline requires the required functions (open, lock, key shared recovery, etc.) without networking. For the opening, closing, the digital key has been authorized to authenticate, only need to be opened after the Bluetooth connection or NFC is connected, and the lock operation is required. However, if you want to hand over the digital key to a third party and continuous control it, you can't pass the client public key and certificate list, verify the sharing request, etc., which is difficult to lack...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap