CN111063070A - Digital key sharing method, digital key verification method and digital key verification equipment - Google Patents

Digital key sharing method, digital key verification method and digital key verification equipment Download PDF

Info

Publication number
CN111063070A
CN111063070A CN201911365909.6A CN201911365909A CN111063070A CN 111063070 A CN111063070 A CN 111063070A CN 201911365909 A CN201911365909 A CN 201911365909A CN 111063070 A CN111063070 A CN 111063070A
Authority
CN
China
Prior art keywords
electronic device
user
digital key
information
unlocking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911365909.6A
Other languages
Chinese (zh)
Other versions
CN111063070B (en
Inventor
贺洪恩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Giesecke and Devrient GmbH
Original Assignee
Giesecke and Devrient GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Giesecke and Devrient GmbH filed Critical Giesecke and Devrient GmbH
Priority to CN201911365909.6A priority Critical patent/CN111063070B/en
Publication of CN111063070A publication Critical patent/CN111063070A/en
Application granted granted Critical
Publication of CN111063070B publication Critical patent/CN111063070B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00412Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention provides a sharing method, a verification method and equipment of a digital key. Compared with the existing method for retrieving the digital key from the appointed place, the method does not need to take the digital key from the appointed place, the digital key is sent to the first electronic device only after the second electronic device determines the user identity, the first electronic device transmits the digital key to the third electronic device, and the first user can use the third electronic device to unlock the intelligent lock.

Description

Digital key sharing method, digital key verification method and digital key verification equipment
Technical Field
The invention relates to the technical field of data transmission, in particular to a sharing method, a verification method and equipment of a digital key.
Background
The intelligent lock is an electronic device opened by using a digital key, the digital key is different from a traditional mechanical key, and the common forms are as follows: near Field Communication (NFC) chip. When the user uses the digital key, the user needs to take the digital key first.
However, the existing sharing method is: if user A wants to take the digital key from user B, user A and user B agree to the place L1 for taking the digital key first, and user A or other person goes to the place L1 to retrieve the digital key. However, when the appointment place L1 is located relatively far from the place L2 where the digital key is located, or the appointment place L1 is located relatively far from the place L3 where the user a is located, the user a cannot quickly take the digital key.
The existing sharing method is that a user or other personnel go to a contract place to retrieve the digital key, so that the user cannot quickly take the digital key.
Disclosure of Invention
The invention provides a sharing method, a verification method and equipment of a digital key, and aims to solve the technical problem that a user cannot quickly obtain the digital key because the user or other personnel appoint a place to retrieve the digital key in the conventional sharing method.
In a first aspect, the present invention provides a method for sharing a digital key, applied to a first electronic device, the method including: sending an unlocking request to second electronic equipment, wherein the unlocking request comprises first biological information of a first user needing to unlock the intelligent lock; receiving an authorization result returned by the second electronic device, wherein the authorization result comprises a digital key for unlocking the intelligent lock; the digital key is transmitted to a third electronic device.
Optionally, before receiving the authorization result generated by the second electronic device, the method further includes: receiving a first acquisition request sent by second electronic equipment; acquiring second biological information of the first user according to the first acquisition request; sending the second biological information to the second electronic equipment; wherein the second biological information is used for the second electronic device to generate the digital key.
Optionally, before receiving the first obtaining request sent by the second electronic device, the method further includes: receiving an identity verification result sent by the second electronic equipment; the authentication result is used for indicating whether the first user is allowed to open the intelligent lock.
Optionally, the first biological information of the first user includes: the first voice, before sending the unlocking request to the second electronic device, further includes: acquiring a first voice of a first user when the first user uses a first electronic device to communicate with a second user at the current moment; wherein the first voice is used for generating an unlocking request.
Optionally, the first biological information of the first user includes: after acquiring the first voice of the first user during the conversation with the second user using the first electronic device at the current time, encrypting the voice further includes: sending the first voice to the third electronic equipment; the third electronic equipment encrypts the first voice by using a locally stored symmetric public key to generate encrypted voice; receiving encrypted voice returned by the third electronic equipment; wherein the encrypted voice is used to generate an unlocking request.
Optionally, before receiving the encrypted voice returned by the third electronic device, the method further includes: receiving a second acquisition request sent by second electronic equipment; acquiring first reservation information of a first user according to the second acquisition request; sending first reservation information to the second electronic device; the second electronic device sends the first reservation information to the fourth electronic device, and the fourth electronic device generates a symmetric public key by using the first reservation information.
Optionally, before receiving the encrypted voice returned by the third electronic device, the method further includes: sending a third acquisition request to the second electronic equipment; the third obtaining request is used for obtaining second reservation information of a second user; receiving second reservation information sent by second electronic equipment; transmitting the second reservation information and the first reservation information to the third electronic device; and the first reservation information and the second reservation information are used for generating a symmetric public key.
Optionally, the first electronic device comprises: the first NFC chip, before sending the unlocking request to the second electronic device, further includes: acquiring a first encryption identifier returned from the third electronic equipment through the first NFC chip; sending the first encrypted identifier to the second electronic device; the first encrypted identifier is used for generating an unlocking request.
Optionally, the digital key further comprises: an expiration date.
In a second aspect, the present invention provides a method for sharing a digital key, applied to a second electronic device, the method including: receiving an unlocking request sent by first electronic equipment, wherein the unlocking request comprises first biological information of a first user needing to unlock the intelligent lock; verifying the identity of the first user according to the first biological information; and if the first user is allowed to open the intelligent lock, sending an authorization result to the first electronic device, wherein the authorization result comprises a digital key for opening the intelligent lock.
Optionally, before sending the authorization result to the first electronic device, the method further includes: sending a first acquisition request to the first electronic equipment, wherein the first acquisition request is used for acquiring second biological information of the first user; receiving second biological information sent by the first electronic equipment; and generating a digital key according to the second biological information and locally stored unlocking information for unlocking the intelligent lock.
Optionally, before sending the first obtaining request to the first electronic device, the method further includes: and sending an authentication result to the first electronic device, wherein the authentication result is used for indicating whether the first user is allowed to open the intelligent lock.
Optionally, the first biological information includes: a first voice of a first user; verifying the identity of the first user according to the first biological information, specifically comprising: acquiring a second voice of a second user when the second user uses a second electronic device to communicate with a first user currently; and matching the second voice with the first voice.
Optionally, the first biological information includes: encrypted speech of the first user; before determining whether the second voice matches the first voice, the method further comprises: sending the encrypted voice to fourth electronic equipment, wherein the fourth electronic equipment decrypts the encrypted voice by using the symmetric public key to generate first voice; and receiving the first voice returned by the fourth electronic equipment.
Optionally, before receiving the first voice returned by the fourth electronic device, the method further includes: receiving a third acquisition request sent by the first electronic equipment; acquiring second reservation information of a second user according to the third acquisition request; sending second reservation information to the first electronic device; and the second reserved information is used for the first electronic equipment to generate a symmetric public key.
Optionally, before decrypting the encrypted voice by using the symmetric public key to obtain the first voice, the method further includes: sending a second acquisition request to the first electronic equipment; the second obtaining request is used for obtaining first reservation information of the first user; receiving first reservation information sent by first electronic equipment; sending second reservation information and first reservation information to fourth electronic equipment; and the first reservation information and the second reservation information are used for generating a symmetric public key.
Optionally, the unlocking request further comprises: a first encrypted identifier; before the step of sending the authorization result to the first electronic device if the first user is allowed to unlock the smart lock, the method further includes: receiving a first encrypted identifier returned by the first electronic equipment; the first encrypted identification is sent to fourth electronic equipment, wherein the fourth electronic equipment decrypts the first encrypted identification by using a locally stored first private key to generate a third identification, and encrypts the third identification according to a locally stored second public key to generate a second encrypted identification; receiving a second encrypted identifier returned by the fourth electronic equipment; sending the second encrypted identifier to the server; and receiving an equipment verification result returned by the server, and if the equipment verification result is that the third electronic equipment is allowed to open the intelligent lock.
Optionally, after generating the digital key according to the second biological information and the locally stored unlocking information for unlocking the smart lock, the method further includes: an expiration date is added to the digital key.
In a third aspect, the present invention provides a method for sharing a digital key, applied to a third electronic device, where the third electronic device includes: a first secure chip and a third Near Field Communication (NFC) chip; the method comprises the following steps: receiving a digital key sent by the first electronic device through a third NFC chip, wherein the digital key comprises unlocking information used for unlocking the intelligent lock; the digital key is stored to the security chip.
Optionally, before receiving, by the third NFC chip, the digital key sent by the first electronic device, the method further includes: the third electronic equipment receives the first reservation information and the second reservation information returned by the first electronic equipment; and the third electronic equipment generates a symmetric public key according to the first reservation information and the second reservation information.
Optionally, before receiving, by the third NFC chip, the digital key sent by the first electronic device, the method further includes: the third electronic equipment receives the first voice sent by the first electronic equipment; encrypting the first voice by using the symmetric public key to generate encrypted voice; and sending the encrypted voice to the first electronic equipment.
Optionally, before receiving, by the third NFC chip, the digital key sent by the first electronic device, the method further includes: the third electronic equipment acquires a third identifier of the third electronic equipment; encrypting the third identifier by using the first public key to generate a first encrypted identifier; and sending the first encryption identification to the first electronic equipment.
In a fourth aspect, the present invention provides a method for verifying a digital key, which is applied to an intelligent lock, and the method includes: receiving a digital key input by first electronic equipment, wherein the digital key comprises unlocking information for unlocking the intelligent lock and second biological information of a first user; acquiring second biological information of a first user needing to unlock the intelligent lock currently through a sensor; and if the first and second biological information in the digital key are matched with the second biological information acquired through the sensor, controlling to unlock the intelligent lock according to the unlocking information.
Optionally, the intelligent lock is opened in information control of unblanking, specifically includes:
and if the unlocking information is matched with the reserved unlocking information stored locally, the intelligent lock is unlocked.
Optionally, the reserving unlocking information includes: at least one user, fingerprint data of the user, and a key identification of the user.
Optionally, the digital key further comprises: the validity period, before opening the intelligent lock according to the information control of unblanking, still include: and judging whether the service life of the digital key reaches the valid period or not, if not, judging whether the service life of the digital key reaches the valid period or not.
Optionally, before controlling to unlock the smart lock according to the unlocking information if the first and second pieces of biological information in the digital key match the second piece of biological information acquired by the sensor, the method further includes:
acquiring a third identifier of a third electronic device;
determining the number of times of use of the third electronic equipment according to the third identifier and the recorded data in the intelligent lock;
if the number of times of use is less than the preset number.
In a fifth aspect, the present invention provides an electronic device, comprising: the first wireless network communication chip, the first Near Field Communication (NFC) chip, the first sensor and the first processor are used for executing the sharing method according to the first aspect and the optional scheme.
In a sixth aspect, the present invention provides an electronic device, comprising: a second wireless network communication chip, a second Near Field Communication (NFC) chip, a second sensor and a second processor, wherein the second processor is used for executing the sharing method according to the second aspect and the alternative scheme.
In a seventh aspect, the present invention provides an electronic device, comprising: a third NFC chip, a first secure chip, and a third processor, where the third processor is configured to execute the sharing method according to the third aspect and the alternative.
In an eighth aspect, the present invention provides an electronic device, comprising: a third sensor for acquiring biological information of the user; a memory for storing a program; a fourth processor for executing the program stored in the memory, the fourth processor being adapted to perform the authentication method according to the fourth aspect and the alternative when the program is executed.
The invention provides a sharing method and a verification method of a digital key and equipment. Compared with the existing method for retrieving the digital key from the appointed place, the method does not need to retrieve the digital key from the appointed place, and can realize faster sharing of the digital key by only sending the digital key to the first electronic equipment after the second electronic equipment determines the user identity.
Drawings
FIG. 1 is a schematic structural diagram of a digital key sharing system according to the present invention;
FIG. 2 is a flow chart illustrating a method of sharing a digital key according to an exemplary embodiment of the present invention;
FIG. 3 is a flow chart illustrating a method of sharing a digital key according to another exemplary embodiment of the present invention;
FIG. 4 is a flowchart illustrating initialization in a sharing method according to yet another exemplary embodiment of the present invention;
FIG. 5 is a flowchart illustrating a verification process in a sharing method according to yet another exemplary embodiment of the present invention;
FIG. 6 is a schematic flow chart diagram illustrating a verification method in accordance with yet another exemplary embodiment of the present invention;
FIG. 7 is a schematic flow chart diagram illustrating a verification method in accordance with yet another exemplary embodiment of the present invention;
FIG. 8 is a schematic mechanical diagram of a sharing device according to yet another exemplary embodiment of the present invention;
FIG. 9 is a schematic mechanical diagram of a sharing device according to yet another exemplary embodiment of the present invention;
FIG. 10 is a schematic mechanical diagram of a sharing device according to yet another exemplary embodiment of the present invention;
fig. 11 is a mechanism diagram of an authentication device according to still another exemplary embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The existing digital key sharing method is realized by taking the digital key back from the appointed place by users or other personnel through the appointed place of both parties, and the existing digital key sharing method cannot take the digital key quickly because the digital key needs to be taken back from the appointed place.
The invention has the following inventive concept: the first user requests the second user to open the digital key of the intelligent lock, firstly, the identity of the first user is verified, and if the first user is allowed to open the intelligent lock, the digital key is sent to the first user. When the first user is authenticated, the voice of the two electronic devices in the conversation process is used as authentication content, the reserved information of the first user and the second user is used for generating a symmetric public key, and the voice is encrypted, so that the security of the authentication process is improved. In the process of generating the digital key, the biological information of the first user is acquired, and the digital key is generated together with the unlocking information of the intelligent lock, so that the safety of the digital key is improved. The method and the device can enable the user to quickly take the digital key and can also ensure the security of key sharing.
The invention can be applied to intelligent lock-using scenes such as intelligent automobiles, houses and the like. In the application scene of the intelligent automobile, if a friend of the owner needs to use the automobile or authorizes the designated driving for use, the owner can share the digital key at any position through the method.
Fig. 1 is a schematic structural diagram of a digital key sharing system provided by the present invention. As shown in fig. 1, the sharing system 100 provided by the present invention includes: a first electronic device 110, a second electronic device 120, a third electronic device 130, and a fourth electronic device 140. The first user communicates with the second user using the first electronic device 110 to communicate with the second electronic device 120. The second user may directly unlock the smart lock using the fourth electronic device 140.
The first electronic device 110 includes a first NFC chip, a first sensor, and a first wireless network communication chip. The second electronic device 120 includes a second NFC chip, a second sensor, and a second wireless network communication chip. The third electronic device 130 includes a third NFC chip and a first secure chip. The fourth electronic device 140 includes a fourth NFC chip and a second secure chip.
The first electronic device 110 and the second electronic device 120 communicate with each other through the first wireless network communication chip and the second wireless network communication chip, the first electronic device 110 and the third electronic device 130 communicate with each other through the first NFC chip and the third NFC chip, and the second electronic device 120 and the fourth electronic device 140 communicate with each other through the second NFC chip and the fourth NFC chip.
In this embodiment, the first electronic device and the third electronic device are divided into a terminal device and a key card held by the first user, and the second electronic device and the fourth electronic device are a terminal device and a key card held by the second user, respectively.
In order to enable the first user to unlock the intelligent lock by using the third electronic device held by the first user, the first electronic device 110 held by the first user sends an unlocking request to the second electronic device 120 held by the second user, wherein the unlocking request comprises first biological information of the first user and a third identifier of the third electronic device 130, the second electronic device 120 sends the first biological information and the third identifier of the unlocking request to the fourth electronic device 140 held by the second user through the second NFC chip, the second biological information and the third identifier are decrypted by the second security chip in the fourth electronic device 140, the fourth electronic device 140 sends the decrypted first biological information and the decrypted third identifier to the second electronic device 120 through the fourth NFC chip, the second electronic device 120 determines whether to authorize the first user to unlock the intelligent lock according to the first biological information and determines whether to allow the third electronic device 130 to unlock the intelligent lock according to the third identifier, if the first user is allowed to unlock the smart lock by using the third electronic device 130, the digital key is sent to the first electronic device 110, and the first electronic device 110 stores the digital key in the first security chip of the third electronic device 130 through the first NFC chip.
Fig. 2 is a flowchart illustrating a method for sharing a digital key according to an exemplary embodiment of the present invention. As shown in fig. 2, the method for sharing a digital key provided by the present invention includes the following steps:
s201, the first electronic device sends an unlocking request to the second electronic device.
More specifically, the first electronic device is a terminal device held by a first user, and the second electronic device is a terminal device held by a second user. The terminal device held by the first user sends an unlocking request to the terminal device held by the second user, wherein the unlocking request comprises first biological information of the first user, and the first biological information of the first user is information capable of identifying the identity of the first user and is used for identifying the identity of the first user. The first biological information may be: iris, fingerprint, voice, etc.
S202, the second electronic device verifies the identity of the user according to the first biological information.
More specifically, the terminal device held by the second user compares the locally stored biological information with the received first biological information, and if the two biological information are the same, the first user is allowed to open the smart lock, and if the two biological information are not the same, the first user is not allowed to open the smart lock.
S203, if the authentication result is that the first user is allowed to open the intelligent lock, the second electronic device sends an authorization result to the first electronic device.
More specifically, it is determined that the first user is allowed to unlock the smart lock, and the terminal device held by the second user sends an authorization result to the terminal device held by the first user, wherein the authorization result includes a digital key, and the digital key is used for unlocking the smart lock.
And S204, the first electronic equipment sends the digital key to the third electronic equipment.
More specifically, the third electronic device is a key card held by the first user, the terminal device held by the first user extracts the digital key from the authorization result, the digital key is transmitted to the key card held by the first user through NFC transmission, and the first user uses the key card to unlock the smart lock.
In this embodiment, the first electronic device and the second electronic device are not limited to terminal devices, and the third electronic device is not limited to a key card and may be another device.
In this embodiment, a first user requests a second user to unlock a digital key of the smart lock, the second electronic device first verifies the identity of the first user, and if the first user is allowed to unlock the smart lock, the digital key is sent to the first electronic device. Compared with the existing method, the scheme can quickly obtain the digital key without retrieving the digital key to a convention place.
Fig. 3 is a flowchart illustrating a method for sharing a digital key according to another exemplary embodiment of the present invention. As shown in fig. 3, the sharing method provided by the present invention includes the following steps:
s301, the first electronic device sends an unlocking request to the second electronic device.
More specifically, the first electronic device is a terminal device held by a first user, and the second electronic device is a terminal device held by a second user. The terminal device held by the first user sends an unlocking request to the terminal device held by the second user.
S302, the second electronic device verifies the identity of the user according to the first biological information to generate an identity verification result.
S303, the second electronic device sends the authentication result to the first electronic device.
S304, if the authentication result allows the first user to open the intelligent lock, the second electronic device sends a first obtaining request to the first electronic device.
More specifically, the first acquisition request is used for acquiring second biological information of the first user, the second biological information is used for generating a digital key, the second biological information is added into the digital key, an unauthorized user can be prevented from using the digital key to unlock the smart lock, and the reliability of digital key sharing is improved. The second biological information is used for identifying the identity of the first user, and the second biological information may be: iris, voice, fingerprint, etc.
S305, the first electronic equipment obtains second biological information according to the first obtaining request.
More specifically, after receiving the first acquisition request, second biometric information of the first user is acquired using a second sensor provided in the second electronic device.
S306, the first electronic device sends the second biological information to the second electronic device.
And S307, the second electronic device generates a digital key according to the second biological information and locally stored unlocking information for unlocking the intelligent lock.
More specifically, the unlocking information is information for unlocking the smart lock, and the second user can unlock the smart lock by using a fourth electronic device held by the second user, and therefore, the unlocking information includes: an identification of the fourth electronic device 6 and second biometric information of the second user. The second electronic device acquires the identifier of the fourth electronic device through NFC transmission, acquires second biological information of the second user through the second sensor, and stores the identifier and the second biological information locally. And the second electronic equipment processes the second biological information and the unlocking information to generate a digital key.
In this embodiment, the second biometric information and the unlock information are hashed to generate a digital key. Other algorithms may be used to obtain the digital key, and are not limited herein.
S308, the second electronic device acquires the valid period of the digital key.
More specifically, the second electronic device acquires a valid period input by the second user, wherein the valid period is the valid period of the digital key and is used for limiting the service life of the digital key. For example: the valid period is 24 hours, the time when the first electronic device receives the authorization result is used as the initial timing, and the digital key is invalid after the timing time reaches 24 hours.
And S309, the second electronic equipment generates an authorization result according to the valid period and the digital key.
And S310, the second electronic equipment sends an authorization result to the first electronic equipment.
And S311, the first electronic device sends the digital key to the third electronic device.
More specifically, the third electronic device is a key card held by the first user, and the first electronic device held by the first user is attached to the third electronic device, so that the first electronic device sends the digital key to the third electronic device through NFC transmission.
And S312, the third electronic device stores the digital key in the first security chip.
More specifically, the first security chip can prevent data from being stolen, and the digital key is stored in the first security chip, so that the reliability of the digital key can be improved.
In this embodiment, the digital key is generated by the second biological information of the first user and the unlocking information, so that the digital key can be prevented from being taken by an unauthorized user and then used for unlocking the smart lock, the service life of the digital key is set, and the reliability of key sharing is improved.
The sharing method shown in the present invention according to still another exemplary embodiment includes an initialization process and a verification process. Fig. 4 is a flowchart illustrating initialization in a sharing method according to yet another exemplary embodiment of the present invention. As shown in fig. 4, the initialization specifically includes the following steps:
s401, the second electronic device sends a second acquisition request to the first electronic device.
More specifically, the first electronic device is a terminal device held by a first user, and the second electronic device is a terminal device held by a second user. And the terminal equipment held by the second user sends a second acquisition request to the terminal equipment held by the first user. The second acquisition request is used for acquiring the first reservation information of the first user. Wherein the first reservation information is stored in the first electronic device. The first reservation information is used to generate a symmetric public key.
In this embodiment, the first reservation information includes the biometric information of the first user and the time at which the biometric information was acquired. Wherein the biological information includes: iris, fingerprint, voice, etc. The reservation information may also be other information, and is not limited herein.
S402, the first electronic equipment acquires the first reservation information according to the second acquisition request.
More specifically, the first reservation information is the biometric information of the first user and the time at which the biometric information was acquired. The first electronic device collects biological information of the first user by using the first sensor and records the moment of collecting the biological information.
S403, the first electronic device sends the first reservation information to the second electronic device and the third electronic device, respectively.
More specifically, the third electronic device is a key card held by the first user, and the first electronic device transmits the first reservation information to the second electronic device through wireless network communication. Attaching the first electronic device to the third electronic device, so that the first electronic device sends the first reservation information to the third electronic device through NFC transmission.
S404, the second electronic device sends the first reservation information to the fourth electronic device.
More specifically, the fourth electronic device is a key card held by the second user, and the second electronic device is attached to the fourth electronic device, so that the second electronic device sends the first reservation information to the fourth electronic device through NFC transmission.
S405, the first electronic device sends a third acquisition request to the second electronic device.
More specifically, the third acquisition request is used to acquire the second reservation information of the second user. Wherein the second reservation information is stored in the second electronic device. The second reservation information is used to generate a symmetric public key. In this embodiment, the second reservation information includes the biometric information of the second user and the time at which the biometric information was acquired. Wherein the biological information includes: iris, fingerprint, voice, etc.
And S406, the second electronic device acquires the second reservation information according to the third acquisition request.
More specifically, the second reservation information is the biometric information of the second user and the time at which the biometric information was acquired. The second electronic device collects the biological information of the second user using the second sensor, and records the time when the biological information is collected.
And S407, the second electronic device sends second reservation information to the first electronic device and the fourth electronic device.
More specifically, the second electronic device transmits the second reservation information to the first electronic device through wireless network communication. And attaching the second electronic equipment to the fourth electronic equipment, so that the second electronic equipment sends second reservation information to the fourth electronic equipment through NFC transmission.
S408, the first electronic device sends second reservation information to the third electronic device.
More specifically, the first electronic device is attached to the third electronic device, so that the first electronic device sends the second reservation information to the third electronic device through NFC transmission.
S409, the third electronic device processes the first reservation information and the second reservation information by using a preset algorithm to generate a symmetric public key.
More specifically, the same algorithm for generating a symmetric public key is stored in advance in the third electronic device and the fourth electronic device. In this embodiment, the specific operation process of the algorithm for generating the symmetric public key is as follows: and carrying out HASH (HASH) operation on the first reserved information to generate a first HASH value. And carrying out hash operation on the second reserved information to generate a second hash value. And operating the first hash value and the second hash value to generate a symmetric key.
For example: the first reserved information is fingerprint information of Zhang III and a timestamp for acquiring the fingerprint information, and Hash operation is performed on the fingerprint information and the timestamp to obtain a first Hash value. The second reserved information is fingerprint information of lie four and a timestamp for acquiring the fingerprint, and the fingerprint information and the timestamp are subjected to hash operation to obtain a second hash value. And obtaining the symmetric key by adopting any one of the following modes for the first hash value and the second hash value. The method specifically comprises the following steps: and respectively selecting a section of data from the first hash value and the second hash value, and combining the two sections of data to be used as a symmetric key. And carrying out hash operation on the first hash value and the second hash value to generate a symmetric key. And adding the first hash value and the second hash value to generate a symmetric key. And subtracting the first hash value and the second hash value to generate a symmetric key. And taking half of the second hash value or half of the first hash value as a symmetric key.
S410, the fourth electronic device processes the first reservation information and the second reservation information by using a preset algorithm to generate a symmetric public key.
More specifically, the fourth electronic device processes the first reservation information and the second reservation information using the same algorithm to generate a symmetric public key, so that the fourth electronic device can decrypt encrypted data sent by the third electronic device using the symmetric public key.
In this embodiment, the first asymmetric key includes a first private key and a first public key, where the first private key is stored in the fourth electronic device, and the first public key is stored in the third electronic device. The initialization of the asymmetric public key between the first electronic device and the third electronic device is not described in detail.
The second asymmetric key includes a second public key and a second private key. The fourth electronic device stores a second public key, and the server stores a second private key. The initialization of the asymmetric public key between the fourth electronic device and the server is not described in detail.
Fig. 5 is a flowchart illustrating a verification process in a sharing method according to yet another exemplary embodiment of the present invention. As shown in fig. 5, the verification process provided by the present invention is as follows:
s501, the third electronic device encrypts the third identifier by using the first public key to generate a first encrypted identifier.
More specifically, the third electronic device is a key card held by the first user, the third identifier is an identifier of the third electronic device, and the third electronic device obtains its own identifier and encrypts the third identifier using the first public key to generate the first encrypted identifier.
S502, the third electronic device receives the first voice sent by the first electronic device.
More specifically, the first electronic device is a terminal device held by the second user, the third electronic device is attached to the first electronic device, so that NFC transmission is performed between the third electronic device and the first electronic device, the first voice is a voice of the first user during a conversation process between the first electronic device and the second user at the current moment, the voice content may be any content, and the first electronic device sends the conversation voice to the third electronic device through NFC transmission.
S503, the third electronic device encrypts the first voice by using the symmetric public key to generate encrypted voice.
S504, the third electronic device sends the first encryption identification and the encryption voice to the first electronic device.
More specifically, the third electronic device is attached to the first electronic device, and the third electronic device transmits the first encrypted identifier and the encrypted voice to the first electronic device through the NFC.
And S505, the first electronic equipment generates an unlocking request according to the first encryption identifier and the encryption voice.
S506, the first electronic device sends an unlocking request to the second electronic device.
More specifically, the second electronic device is a terminal device held by the second user.
S507, the second electronic equipment extracts the encrypted voice and the first encrypted identification from the unlocking request.
And S508, the second electronic equipment sends the encrypted voice and the first encrypted identifier to the fourth electronic equipment.
More specifically, the fourth electronic device is a key card held by the second user, and the second electronic device is attached to the fourth electronic device, so that the second electronic device sends the encrypted voice and the first encrypted identifier to the fourth electronic device through NFC transmission.
S509, the fourth electronic device decrypts the encrypted voice using the symmetric key.
And S510, the fourth electronic device decrypts the first encrypted identifier by using the first private key and encrypts the third identifier by using the second public key.
More specifically, the first private key and the first public key are a pair of asymmetric keys, the first public key is stored in the third electronic device, the first private key is stored in the fourth electronic device, and the third electronic device encrypts a third identifier of the third electronic device by using the first public key to generate a first encrypted identifier. And after receiving the first encrypted identifier, the fourth electronic device decrypts the first encrypted identifier by using the first private key to generate a third identifier. The second public key and the second private key are a pair of asymmetric secret keys, the second public key is stored in the fourth electronic device, the second private key is stored in the server, the server is owned by a manufacturer producing the third electronic device, the identifier of the electronic device produced by the server is stored in the server, the third identifier is encrypted by using the second public key to generate a second encrypted identifier, the second encrypted identifier is transmitted to the second electronic device through NFC, and the second electronic device is further transmitted to the server through a wireless network so as to verify the validity of the third electronic device.
S511, the fourth electronic device sends the first voice and the second encrypted identifier to the second electronic device.
More specifically, the second electronic device is attached to the fourth electronic device, so that the fourth electronic device sends the first voice and the second encrypted identifier to the second electronic device through NFC transmission.
S512, the second electronic device sends the second encrypted identifier to the server and receives a device verification result returned by the server.
More specifically, the second electronic device sends the second encrypted identifier to the server through the wireless network, and the server decrypts the second encrypted identifier by using the second private key to generate a third identifier, and compares the third identifier with the locally stored identifier information to generate a device verification result. If the identifier of the third electronic device is stored in the server, the device verification result is that the third electronic device is authorized to open the intelligent lock, and if the identifier of the third electronic device does not exist in the server, the device verification result is that the third electronic device is not authorized to open the intelligent lock, so that the validity of the third electronic device is verified finally.
And S513, the second electronic device acquires the second voice.
More specifically, the second voice is a voice of the second user when the second user uses the second electronic device to talk with the first user at the current moment. When the first user uses the first electronic device to communicate with the second user, both the first electronic device and the second electronic device can obtain the communication voice, and the identity of the first user can be verified by using the communication voice.
And S514, the second electronic equipment compares the second voice with the first voice to generate an identity verification result.
More specifically, the second electronic device obtains a second voice in a conversation process with the first electronic device, compares the second voice with a first voice sent by the first electronic device, and generates an identity verification result, if the first voice is the same as the second voice, the device verification result is that the first user is authorized to open the intelligent lock, and if the first voice is different from the second voice, the device verification result is that the first user is not authorized to open the intelligent lock.
And S515, the second electronic device determines a verification result according to the device verification result and the identity verification result.
More specifically, if the device verification result is that the third electronic device is authorized to unlock the smart lock, and the authentication result is that the first user is authorized to unlock the smart lock, the verification result is that the first user is allowed to use the third electronic device to unlock the smart lock, and the authorization result is returned to the first electronic device, where the authorization result includes the digital key and the validity period. And if any one of the equipment verification result and the identity verification result is unauthorized, not returning an authorization result to the first electronic equipment.
In this embodiment, the third electronic device and the second user are subjected to double authentication, so that the reliability of digital key sharing can be improved.
Fig. 6 is a flowchart illustrating a verification method according to yet another exemplary embodiment of the present invention. As shown in fig. 6, the verification method of the digital key provided by the present invention is applied to an intelligent lock, and the method includes:
s601, receiving a digital key input by a third electronic device.
More specifically, the digital key includes unlocking information and second biometric information of the first user. Wherein, the information of unblanking is used for opening the intelligent lock.
S602, acquiring third biological information of a first user needing to unlock the intelligent lock currently through a sensor.
More specifically, third biological information of the first user is collected by a sensor in the intelligent lock, and the third biological information is used for being compared with the second biological information in the digital key to verify the identity of the first user.
S603, determining whether the second biological information is matched with the third biological information, if so, entering S604, otherwise, entering S605.
And S604, controlling to unlock the intelligent lock according to the unlocking information.
More specifically, if the second biological information and the third biological information match, the identity of the first user is legal, that is, the first user is allowed to unlock the smart lock. The second user can open the intelligent lock by using the fourth electronic device, the biological information of the second user and the identification information of the fourth electronic device are stored in the intelligent lock, the unlocking information is matched with the reserved unlocking information stored locally, and if the unlocking information is matched with the reserved unlocking information, the intelligent lock is opened.
The intelligent lock can store biological information of a plurality of users and identification information of the electronic device, so that the plurality of users can authorize other users to open the intelligent lock. When the intelligent lock is initially used, only the biological information of the owner of the intelligent lock and the identification of the electronic device are stored in the intelligent lock, and the owner can open the intelligent lock by using the electronic device. The host can add the identifications of other users and corresponding electronic devices to the intelligent lock, and a plurality of users can authorize the other users to open the intelligent lock.
And S605, returning the prompt information.
More particularly, the prompt message is used for prompting the user that the unlocking fails.
In the verification method provided by this embodiment, it is determined whether the first user can open the smart lock by verifying the biological information of the first user, and it is verified whether the unlocking information of the digital key matches with the locally stored unlocking information, so that the smart lock can be controlled, and the reliability of the verification result can be improved by double verification.
Fig. 7 is a flowchart illustrating a verification method according to yet another exemplary embodiment of the present invention. As shown in fig. 7, the method for verifying the digital key provided by the present invention is applied to an intelligent lock, and the method includes:
and S701, receiving a digital key input by the third electronic device and the identification of the third electronic device.
S702, determining the unlocking times of the third electronic equipment according to the identification of the third electronic equipment and the recorded data in the intelligent lock.
More specifically, when the third electronic device opens the intelligent lock once, the intelligent lock records the opening times of the third electronic device, and when the third electronic device opens the intelligent lock again, the opening times of the third electronic device can be determined through the recorded data.
And S703, if the unlocking times of the third electronic device reach the preset number, entering S708, and otherwise, entering S704.
More specifically, the preset number may be set to 1, and the third electronic device is allowed to unlock the smart lock only once. The preset number may be set to be multiple times, that is, the third electronic device is allowed to unlock the smart lock multiple times.
S704, acquiring third biological information of the first user needing to unlock the intelligent lock currently through the sensor.
S705, whether the second biological information and the third biological information are matched or not is determined, if yes, the step S706 is carried out, and if not, the step S708 is carried out.
And S706, judging whether the service time of the digital key meets the valid period, if so, entering S707, otherwise, entering S708.
More specifically, if the use time of the digital key is within the valid period, the unlocking information can be used to unlock the smart lock.
And S707, controlling to unlock the intelligent lock according to the unlocking information.
And S708, returning the prompt information.
More particularly, the prompt message is used for prompting the user that the unlocking fails.
In the verification method provided by the embodiment, the number of times that the intelligent lock is unlocked by the digital key can be controlled by judging the number of times that the digital key is used, so that the reliability of the verification method is improved.
Fig. 8 is a mechanism diagram illustrating a sharing device according to still another exemplary embodiment of the present invention. As shown in fig. 8, the sharing apparatus provided by the present invention is applied to a first electronic device, and the apparatus 800 includes: a sending module 801, configured to send an unlocking request to a second electronic device, where the unlocking request includes first biological information of a first user who needs to unlock an intelligent lock; a receiving module 802, configured to receive an authorization result returned by the second electronic device, where the authorization result includes a digital key used for unlocking the smart lock; the transmitting module 801 is further configured to transmit the digital key to a third electronic device.
Optionally, the apparatus further comprises: an acquisition module 803; the receiving module 802 is further configured to receive a first obtaining request sent by a second electronic device; an obtaining module 803, configured to obtain second biological information of the first user according to the first obtaining request; the sending module 801 is further configured to send second biological information to a second electronic device; wherein the second biological information is used for the second electronic device to generate the digital key.
Optionally, the receiving module 802 is further configured to receive an authentication result sent by the second electronic device; the authentication result is used for indicating whether the first user is allowed to open the intelligent lock.
Optionally, the first biological information of the first user includes: the obtaining module 803 is further configured to obtain a first voice when the first user uses the first electronic device to communicate with the second user at the current time; wherein the first voice is used for generating an unlocking request.
Optionally, the first biological information of the first user includes: encrypting the voice, wherein the sending module 801 is further configured to send the first voice to the third electronic device; the third electronic equipment encrypts the first voice by using a locally stored symmetric public key to generate encrypted voice; the receiving module 802 is further configured to receive an encrypted voice returned by the third electronic device; wherein the encrypted voice is used to generate an unlocking request.
Optionally, the receiving module 802 is further configured to receive a second obtaining request sent by a second electronic device; the obtaining module 803 is further configured to obtain first reservation information of the first user according to the second obtaining request; the sending module 801 is further configured to send the first reservation information to the second electronic device; the second electronic device sends the first reservation information to the fourth electronic device, and the fourth electronic device generates a symmetric public key by using the first reservation information.
Optionally, the sending module 801 is further configured to send a third obtaining request to the second electronic device; the third obtaining request is used for obtaining second reservation information of a second user; the receiving module 802 is further configured to receive second reservation information sent by a second electronic device; the sending module 801 is further configured to send the second reservation information and the first reservation information to the third electronic device; and the first reservation information and the second reservation information are used for generating a symmetric public key.
Optionally, the first electronic device comprises: the obtaining module 803 is further configured to obtain, through the first NFC chip, a first encrypted identifier returned from the third electronic device; the sending module 801 is further configured to send the first encrypted identifier to the second electronic device; the first encrypted identifier is used for generating an unlocking request.
Optionally, the digital key further comprises: an expiration date.
Fig. 9 is a mechanism diagram illustrating a sharing device according to still another exemplary embodiment of the present invention. As shown in fig. 9, the sharing apparatus provided by the present invention is applied to a second electronic device, and the apparatus 900 includes: the receiving module 901 is configured to receive an unlocking request sent by a first electronic device, where the unlocking request includes first biological information of a first user who needs to unlock an intelligent lock; the verification module 902 is configured to verify an identity of the first user according to the first biological information; a sending module 903, configured to send an authorization result to the first electronic device if the first user is allowed to open the smart lock, where the authorization result includes a digital key used for opening the smart lock.
Optionally, the sending module 903 is further configured to send a first obtaining request to the first electronic device, where the first obtaining request is used to obtain the second biological information of the first user; the receiving module 901 is further configured to receive second biological information sent by the first electronic device; and a generating module 904, configured to generate a digital key according to the second biological information and the locally stored unlocking information for unlocking the smart lock.
Optionally, the sending module 903 is further configured to send an authentication result to the first electronic device, where the authentication result is used to indicate whether the first user is allowed to open the smart lock.
Optionally, the first biological information includes: a first voice of a first user; the verification module 902 is specifically configured to: acquiring a second voice of a second user when the second user uses a second electronic device to communicate with a first user currently; and matching the second voice with the first voice.
Optionally, the first biological information includes: encrypted speech of the first user; the sending module 903 is further configured to send the encrypted voice to a fourth electronic device, where the fourth electronic device decrypts the encrypted voice by using the symmetric public key to generate a first voice; the receiving module 901 is further configured to receive a first voice returned by the fourth electronic device.
Optionally, the apparatus further comprises an obtaining module 905; the receiving module 901 is further configured to receive a third obtaining request sent by the first electronic device; the obtaining module 905 is configured to obtain second reservation information of the second user according to the third obtaining request; the sending module 903 is further configured to send second reservation information to the first electronic device; and the second reserved information is used for the first electronic equipment to generate a symmetric public key.
Optionally, the sending module 903 is further configured to send a second obtaining request to the first electronic device; the second obtaining request is used for obtaining first reservation information of the first user; the receiving module 901 is further configured to receive first reservation information sent by the first electronic device; the sending module 903 is further configured to send the second reservation information and the first reservation information to the fourth electronic device; and the first reservation information and the second reservation information are used for generating a symmetric public key.
Optionally, the unlocking request further comprises: a first encrypted identifier; the receiving module 901 is further configured to receive a first encrypted identifier returned by the first electronic device; the sending module 903 is further configured to send the first encrypted identifier to a fourth electronic device, where the fourth electronic device decrypts the first encrypted identifier using a locally stored first private key to generate a third identifier, and encrypts the third identifier according to a locally stored second public key to generate a second encrypted identifier; the receiving module 901 is further configured to receive a second encrypted identifier returned by the fourth electronic device; the sending module 903 is further configured to send a second encrypted identifier to the server; the receiving module 901 is further configured to receive a device verification result returned by the server, and if the device verification result is that the third electronic device is allowed to unlock the smart lock.
Optionally, the generating module 904 is further configured to add an expiration date to the digital key.
Fig. 10 is a mechanism diagram illustrating a sharing device according to still another exemplary embodiment of the present invention. As shown in fig. 10, the present invention provides a sharing apparatus for a digital key, which is applied to a third electronic device, the third electronic device comprising: a first secure chip and a third Near Field Communication (NFC) chip; the device comprises: the receiving module 1001 is configured to receive a digital key sent by the first electronic device through the third NFC chip, where the digital key includes unlocking information for unlocking the smart lock; the storage module 1002 is configured to store the digital key to the security chip.
Optionally, the apparatus further comprises a generating module; the receiving module 1001 is further configured to receive, by the third electronic device, the first reservation information and the second reservation information returned by the first electronic device; the generating module 1003 generates a symmetric public key according to the first reservation information and the second reservation information by the third electronic device.
Optionally, the method further comprises: an encryption module 1004 and a transmission module 1005; the receiving module 1001 is further configured to receive, by the third electronic device, the first voice sent by the first electronic device; the encryption module 1004 is configured to encrypt the first voice by using the symmetric public key to generate an encrypted voice; the sending module 1005 is further configured to send the encrypted voice to the first electronic device.
Optionally, the system further includes an obtaining module 1006, where the obtaining module 1006 is configured to obtain, by the third electronic device, a third identifier of the third electronic device; the encryption module 1004 is further configured to encrypt the third identifier with the first public key to generate a first encrypted identifier; the sending module 1006 sends the first encrypted identification to the first electronic device.
Fig. 11 is a mechanism diagram of an authentication device according to still another exemplary embodiment of the present invention. As shown in fig. 11, the present invention provides a digital key verification device, which is applied to an intelligent lock, and the device 1100 includes: the receiving module 1101 is configured to receive a digital key input by a first electronic device, where the digital key includes unlocking information for unlocking the smart lock and second biological information of a first user; the obtaining module 1102 is used for obtaining second biological information of a first user needing to unlock the intelligent lock currently through a sensor; the control module 1103 is configured to, if the first and second pieces of biological information in the digital key are matched with the second piece of biological information acquired through the sensor, control to unlock the smart lock according to the unlocking information.
Optionally, the control module 1103 is specifically configured to:
and if the unlocking information is matched with the reserved unlocking information stored locally, the intelligent lock is unlocked.
Optionally, the reserving unlocking information includes: at least one user, fingerprint data of the user, and a key identification of the user.
Optionally, the digital key further comprises: the validity period, before opening the intelligent lock according to the information control of unblanking, still include: and judging whether the service life of the digital key reaches the valid period or not, if not, judging whether the service life of the digital key reaches the valid period or not.
Optionally, the obtaining module 1102 is further configured to:
acquiring a third identifier of a third electronic device;
determining the number of times of use of the third electronic equipment according to the third identifier and the recorded data in the intelligent lock;
if the number of times of use is less than the preset number.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (14)

1. A method for sharing a digital key, applied to a first electronic device, the method comprising:
sending an unlocking request to second electronic equipment, wherein the unlocking request comprises first biological information of a first user needing to unlock the intelligent lock;
receiving an authorization result returned by the second electronic device, wherein the authorization result comprises a digital key for unlocking the intelligent lock;
and sending the digital key to a third electronic device, wherein the third electronic device is used for unlocking the intelligent lock.
2. The method of claim 1, prior to said receiving an authorization result generated by the second electronic device, further comprising:
receiving a first acquisition request sent by the second electronic equipment;
acquiring second biological information of the first user according to the first acquisition request;
sending the second biological information to the second electronic device;
wherein the second biometric information is used by the second electronic device to generate the digital key.
3. The method of claim 2, wherein prior to receiving the first acquisition request sent by the second electronic device, the method further comprises:
receiving an identity verification result sent by the second electronic equipment; the identity verification result is used for indicating whether the first user is allowed to open the intelligent lock.
4. The method of any of claims 1-3, further comprising, prior to said sending an unlock request to the second electronic device:
acquiring a first voice of the first user when the first user uses the first electronic equipment to communicate with a second user at the current moment; wherein the first voice is used for generating the unlocking request.
5. The method of claim 4, wherein the first biometric information of the first user comprises: encrypting voice, after the obtaining of the first voice when the first user uses the first electronic device to communicate with the second user at the current time, further comprising:
sending the first voice to a third electronic device; the third electronic equipment encrypts the first voice by using a locally stored symmetric public key to generate encrypted voice;
receiving the encrypted voice returned by the third electronic equipment; wherein the encrypted voice is used for generating the unlocking request.
6. The method of claim 5, further comprising, prior to the receiving the encrypted speech returned by the third electronic device:
receiving a second acquisition request sent by the second electronic equipment;
acquiring first reservation information of the first user according to the second acquisition request;
sending the first reservation information to the second electronic device;
and the second electronic equipment sends the first reservation information to fourth electronic equipment, and the fourth electronic equipment generates the symmetric public key by using the first reservation information.
7. The method of claim 6, further comprising, prior to the receiving the encrypted speech returned by the third electronic device:
sending a third acquisition request to the second electronic equipment; the third obtaining request is used for obtaining second reservation information of a second user;
receiving the second reservation information sent by the second electronic device;
transmitting the first reservation information and the second reservation information to the third electronic device;
wherein the first reservation information and the second reservation information are used to generate the symmetric public key.
8. A method for sharing a digital key, applied to a second electronic device, the method comprising:
receiving an unlocking request sent by first electronic equipment, wherein the unlocking request comprises first biological information of a first user needing to unlock the intelligent lock;
verifying the identity of the first user according to the first biological information;
and if the first user is allowed to open the intelligent lock, sending an authorization result to the first electronic device, wherein the authorization result comprises a digital key for opening the intelligent lock.
9. A method for sharing a digital key is applied to a third electronic device, and the third electronic device comprises: a secure chip and a third Near Field Communication (NFC) chip; the method comprises the following steps:
receiving a digital key sent by first electronic equipment through the third NFC chip, wherein the digital key comprises unlocking information used for unlocking the intelligent lock;
storing the digital key to the security chip.
10. A verification method of a digital key is applied to an intelligent lock, and comprises the following steps:
receiving a digital key input by a third electronic device, wherein the digital key comprises unlocking information for unlocking the intelligent lock and second biological information of a first user;
acquiring second biological information of a first user needing to unlock the intelligent lock currently through a sensor;
and if the second biological information in the digital key is matched with the second biological information acquired through the sensor, controlling to unlock the intelligent lock according to the unlocking information.
11. An electronic device, comprising: a first wireless network communication chip, a first near field communication, NFC, chip, a first sensor, and a first processor, the first processor being configured to perform the sharing method of any of claims 1 to 7.
12. An electronic device, comprising: a second wireless network communication chip, a second near field communication, NFC, chip, a second sensor, and a second processor, the second processor to perform the sharing method of claim 8.
13. An electronic device, comprising: a third near field communication, NFC, chip, a first secure chip and a third processor for performing the sharing method of claim 9.
14. An electronic device, comprising:
a third sensor for acquiring biological information of the user;
a memory for storing a program;
a fourth processor for executing the program stored in the memory, the fourth processor being configured to perform the authentication method recited in claim 10 when the program is executed.
CN201911365909.6A 2019-12-26 2019-12-26 Digital key sharing method, digital key verification method and digital key verification equipment Active CN111063070B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911365909.6A CN111063070B (en) 2019-12-26 2019-12-26 Digital key sharing method, digital key verification method and digital key verification equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911365909.6A CN111063070B (en) 2019-12-26 2019-12-26 Digital key sharing method, digital key verification method and digital key verification equipment

Publications (2)

Publication Number Publication Date
CN111063070A true CN111063070A (en) 2020-04-24
CN111063070B CN111063070B (en) 2021-07-09

Family

ID=70303891

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911365909.6A Active CN111063070B (en) 2019-12-26 2019-12-26 Digital key sharing method, digital key verification method and digital key verification equipment

Country Status (1)

Country Link
CN (1) CN111063070B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111935302A (en) * 2020-08-20 2020-11-13 捷德(中国)科技有限公司 Key management device, method and equipment
CN112396738A (en) * 2020-12-01 2021-02-23 深圳市汇顶科技股份有限公司 Unlocking method of shared device and related device

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103035054A (en) * 2012-12-29 2013-04-10 江苏中科天安智联科技有限公司 NFC intelligent automobile key system with permission and authorization functions
EP2716510A1 (en) * 2013-02-11 2014-04-09 Volvo Car Corporation Authentication system and method for a pool of vehicles
CN204155327U (en) * 2014-09-01 2015-02-11 上海智达商投资管理合伙企业(有限合伙) A kind of visiting personnel based on recognition of face register checking device
CN104899943A (en) * 2014-03-03 2015-09-09 周军现 Method for rapidly hiring automobile by using automobile intelligent door lock, intelligent key and button start device
CN105074761A (en) * 2013-02-15 2015-11-18 钥匙咖啡馆公司 Methods and systems for management of key exchanges
CN105069864A (en) * 2015-07-10 2015-11-18 西安电子科技大学 Door lock control secure communication scheme based on NFC (near field communication) function of smart phone
CN105989643A (en) * 2015-02-03 2016-10-05 吉林省施泰信息技术股份有限公司 Communication encryption method used for electronic lock, electronic lock apparatus and system thereof
CN106056711A (en) * 2016-06-07 2016-10-26 小笋科技(深圳)有限公司 Vacant parking space sharing method and system
CN107313660A (en) * 2017-07-07 2017-11-03 安徽德诺科技股份公司 The method for unlocking of intelligent lock system and smart lock
CN107610351A (en) * 2017-09-27 2018-01-19 刘祉锖 A kind of equipment, cloud platform and system for realizing Car sharing
CN108573550A (en) * 2017-03-09 2018-09-25 丰田自动车株式会社 It locks and system for unlocking and key unit
CN108573551A (en) * 2017-03-09 2018-09-25 丰田自动车株式会社 It locks and system for unlocking, key unit and server
CN109895734A (en) * 2019-01-29 2019-06-18 上海博泰悦臻网络技术服务有限公司 Authorized bluetooth key Activiation method and system, storage medium and T-BOX
CN110136310A (en) * 2019-05-18 2019-08-16 深圳智云镖科技有限公司 A kind of intelligent unlocking method and system of cell
CN110293919A (en) * 2018-03-22 2019-10-01 本田技研工业株式会社 Controller of vehicle and storage medium
CN110460581A (en) * 2019-07-12 2019-11-15 捷德(中国)信息科技有限公司 Sharing files method, equipment, SE device, is shared end and medium at system
CN110611905A (en) * 2019-08-09 2019-12-24 华为技术有限公司 Information sharing method, terminal device, storage medium, and computer program product

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103035054A (en) * 2012-12-29 2013-04-10 江苏中科天安智联科技有限公司 NFC intelligent automobile key system with permission and authorization functions
EP2716510A1 (en) * 2013-02-11 2014-04-09 Volvo Car Corporation Authentication system and method for a pool of vehicles
CN105074761A (en) * 2013-02-15 2015-11-18 钥匙咖啡馆公司 Methods and systems for management of key exchanges
CN104899943A (en) * 2014-03-03 2015-09-09 周军现 Method for rapidly hiring automobile by using automobile intelligent door lock, intelligent key and button start device
CN204155327U (en) * 2014-09-01 2015-02-11 上海智达商投资管理合伙企业(有限合伙) A kind of visiting personnel based on recognition of face register checking device
CN105989643A (en) * 2015-02-03 2016-10-05 吉林省施泰信息技术股份有限公司 Communication encryption method used for electronic lock, electronic lock apparatus and system thereof
CN105069864A (en) * 2015-07-10 2015-11-18 西安电子科技大学 Door lock control secure communication scheme based on NFC (near field communication) function of smart phone
CN106056711A (en) * 2016-06-07 2016-10-26 小笋科技(深圳)有限公司 Vacant parking space sharing method and system
CN108573550A (en) * 2017-03-09 2018-09-25 丰田自动车株式会社 It locks and system for unlocking and key unit
CN108573551A (en) * 2017-03-09 2018-09-25 丰田自动车株式会社 It locks and system for unlocking, key unit and server
CN107313660A (en) * 2017-07-07 2017-11-03 安徽德诺科技股份公司 The method for unlocking of intelligent lock system and smart lock
CN107610351A (en) * 2017-09-27 2018-01-19 刘祉锖 A kind of equipment, cloud platform and system for realizing Car sharing
CN110293919A (en) * 2018-03-22 2019-10-01 本田技研工业株式会社 Controller of vehicle and storage medium
CN109895734A (en) * 2019-01-29 2019-06-18 上海博泰悦臻网络技术服务有限公司 Authorized bluetooth key Activiation method and system, storage medium and T-BOX
CN110136310A (en) * 2019-05-18 2019-08-16 深圳智云镖科技有限公司 A kind of intelligent unlocking method and system of cell
CN110460581A (en) * 2019-07-12 2019-11-15 捷德(中国)信息科技有限公司 Sharing files method, equipment, SE device, is shared end and medium at system
CN110611905A (en) * 2019-08-09 2019-12-24 华为技术有限公司 Information sharing method, terminal device, storage medium, and computer program product

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
信瑛南: "手机数字钥匙远程控制车辆系统的设计", 《汽车工程师》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111935302A (en) * 2020-08-20 2020-11-13 捷德(中国)科技有限公司 Key management device, method and equipment
CN112396738A (en) * 2020-12-01 2021-02-23 深圳市汇顶科技股份有限公司 Unlocking method of shared device and related device

Also Published As

Publication number Publication date
CN111063070B (en) 2021-07-09

Similar Documents

Publication Publication Date Title
US9466162B2 (en) Electronic key system, and lock-side terminal and portable terminal employed in same
CN109410406B (en) Authorization method, device and system
US11167723B2 (en) Method for access management of a vehicle
US8589696B2 (en) Biometric identification method
JP7157107B2 (en) One-way key fob and vehicle pairing authentication, retention and deactivation
US20210070252A1 (en) Method and device for authenticating a user to a transportation vehicle
KR101757214B1 (en) Vehicle control method and system using user terminal in trusted execution environment
TW201216108A (en) Biometric key
MXPA04005460A (en) Portable device and method for accessing data key actuated devices.
CN103580853A (en) Mobile electronic device
JP2014145200A (en) Locking/unlocking right granting system, authentication device, mobile terminal, and program
CN111083696B (en) Communication verification method and system, mobile terminal and vehicle machine side
JP5603763B2 (en) Location history authentication system, server device, and program
CN110322600B (en) Control method of electronic lock and electronic lock
CN111063070B (en) Digital key sharing method, digital key verification method and digital key verification equipment
JP2011012511A (en) Electric lock control system
US7587051B2 (en) System and method for securing information, including a system and method for setting up a correspondent pairing
JP5178249B2 (en) Key authentication system
KR102521936B1 (en) Method of secured sharing of vehicle key
CN110738764A (en) Security control system and method based on intelligent lock
JP6723422B1 (en) Authentication system
US10387634B1 (en) System and method for authenticating a person using biometric data
CN106559378A (en) Automobile door lock tripper, system and method and intelligent terminal
JP2010140324A (en) Vehicle sharing system
JP5985845B2 (en) Electronic key registration method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 330029 torch street, high tech Development Zone, Nanchang City, Jiangxi Province

Applicant after: Jiede (China) Technology Co.,Ltd.

Address before: 330096 torch street, high tech Development Zone, Nanchang City, Jiangxi Province

Applicant before: Jiede (China) Information Technology Co.,Ltd.

GR01 Patent grant
GR01 Patent grant