CN107743065A - Battery uses verification method, battery system and automobile - Google Patents

Battery uses verification method, battery system and automobile Download PDF

Info

Publication number
CN107743065A
CN107743065A CN201710984461.0A CN201710984461A CN107743065A CN 107743065 A CN107743065 A CN 107743065A CN 201710984461 A CN201710984461 A CN 201710984461A CN 107743065 A CN107743065 A CN 107743065A
Authority
CN
China
Prior art keywords
battery
key value
key
request
checking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710984461.0A
Other languages
Chinese (zh)
Inventor
杜国栋
沈海寅
朴昌浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Smart Car Technology (shanghai) Co Ltd
Original Assignee
Smart Car Technology (shanghai) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Smart Car Technology (shanghai) Co Ltd filed Critical Smart Car Technology (shanghai) Co Ltd
Priority to CN201710984461.0A priority Critical patent/CN107743065A/en
Publication of CN107743065A publication Critical patent/CN107743065A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD

Abstract

The embodiment of the invention discloses a kind of battery to use verification method, battery system and automobile, and method therein includes:Obtain the first key value corresponding with battery;The identification information of battery is obtained, calculating is encrypted to identification information using default AES, obtains the second key value;First key value is compared with the second key value, whether the use request for determining battery based on comparison result passes through checking;If by checking, operation is performed.Method, battery system and the automobile of the present invention, use for battery is provided with secret key calibration link, just can be with normal use battery after verifying successfully, the data such as secret key are stored using block chain technology, ensure that secret key will not be changed and stolen, reliable guarantee is provided for the identification of battery uniqueness, prevents battery to be disassembled, potential safety hazard caused by battery modules and battery manager are used separately etc..

Description

Battery uses verification method, battery system and automobile
Technical field
The present invention relates to cell art, more particularly to a kind of battery to use verification method, battery system and automobile.
Background technology
In New-energy electric vehicle industry and new energy storing technology, battery plays the effect of key.At present, people couple The demand of battery is also increasing, reasonably using battery, the security being related to during electric car use, and battery system The service life of system.The use for battery (such as charging, electric discharge, obtain battery status etc.) mostly of battery system in vehicle It is not provided with encrypted authentication function so that battery system can be dismantled arbitrarily, and confusion uses;Also, the battery in some vehicles Although system is provided with encrypted authentication function, do not have battery product uniqueness identification function, password or ID can be obtained by the external world Take and change, it is poor to the integrality recognition effect of battery, battery modules easily occur with battery manager by artificially dismounting etc. Problem, cause battery problem safe to use and battery bag manufacturer to be lost in, while be also unfavorable for battery bag secondary recovery and echelon profit With.
The content of the invention
In view of this, the embodiment of the present invention provides a kind of battery and uses verification method, battery system and automobile, can be right The use of battery carries out safety verification.
One side according to embodiments of the present invention, there is provided a kind of battery uses verification method, including:Receive for electricity The use request in pond, obtains the first key value corresponding with the battery;The identification information of the battery is obtained, using default AES the identification information is encrypted calculating, obtain the second key value;By the first key value and described the Two key values are compared, and determine described use asks whether pass through checking based on comparison result;If it is determined that described use please Ask by checking, then battery is performed and the operation corresponding using request.
Alternatively, if it is determined that described pass through checking using request, then second key is stored in block chain node Value;Wherein, when being verified next time to the use request, using second key value as the first key value.
Alternatively, the acquisition first key value corresponding with the battery includes:Obtained in the block chain node It relative to current point in time is newest key value as the first key value to take storage time.
Alternatively, if the battery uses to be first, the first key value obtained is in the block chain link Default key value in point.
Alternatively, the identification information for obtaining the battery:Obtain battery modules ID and battery manager ID;It is based on The battery modules ID and battery manager ID generation battery IDs.
Alternatively, the battery modules ID that battery modules generate according to the data related to the battery is obtained;Wherein, The data related to the battery include:Battery manufacture manufacturer, device name, sequence number, build date.
Alternatively, the battery modules ID and battery manager ID is combined, generates the battery ID;Using default AES the battery ID is encrypted calculating, obtain second key value;Wherein, the default AES Including:MD5 algorithms.
Alternatively, calculating is encrypted to the battery ID using MD5 algorithms, using the MD5 values of acquisition as described second Key value;Wherein, the computations include:Enter row information filling to the battery ID, to filling result interpolation data, being based on The magic number of standard is handled addition result, carries out loop computation to result.
Alternatively, second key value includes:Binary numeral that regular length is 128, regular length are 32 16 binary values.
Alternatively, the first key value and the second key value step-by-step are contrasted one by one, if described first Each is all identical corresponding for key value and second key value, it is determined that described to pass through checking using request.
According to another aspect of the present invention, there is provided a kind of battery system, including:Battery manager, battery manager include: Data reception module, for receiving the use request for battery;Key Acquisition Module is relative with the battery for obtaining The first key value answered;Cipher key calculation module, for obtaining the identification information of the battery, using default AES to institute State identification information and calculating is encrypted, obtain the second key value;Key verification module, for by the first key value with it is described Second key value is compared, and determines described use asks whether pass through checking based on comparison result;Battery control module, it is used for If it is determined that described pass through checking using request, then to battery execution and the operation corresponding using request.
Alternatively, data memory module, for if it is determined that described pass through checking using request, then in block chain node Store second key value;Wherein, next time to it is described using request verify when, using second key value as The first key value.
Alternatively, the Key Acquisition Module, for obtaining storage time in the block chain node relative to current Time point is newest key value as the first key value.
Alternatively, if the battery uses to be first, the first key value that the Key Acquisition Module obtains For the default key value in the block chain node.
Alternatively, the cipher key calculation module, for obtaining battery modules ID and battery manager ID from battery modules, Based on the battery modules ID and battery manager ID generation battery IDs.
Alternatively, the cipher key calculation module, generated for obtaining battery modules according to the data related to the battery The battery modules ID;Wherein, the data related to the battery include:Battery manufacture manufacturer, device name, sequence Number, build date.
Alternatively, the cipher key calculation module, it is raw for the battery modules ID and battery manager ID to be combined Into the battery ID;Calculating is encrypted to the battery ID using default AES, obtains second key value;Its In, the default AES includes:MD5 algorithms.
Alternatively, the cipher key calculation module, for calculating to be encrypted to the battery ID using MD5 algorithms, will obtain The MD5 values obtained are used as second key value;Wherein, the computations include:Enter row information to the battery ID fill, be right Filling result interpolation data, measured magic number are handled addition result, carry out loop computation to result.
Alternatively, second key value includes:Binary numeral that regular length is 128, regular length are 32 16 binary values.
Alternatively, the key verification module, for by the first key value and the second key value step-by-step one by one Contrasted, if each is all identical corresponding for the first key value and second key value, it is determined that described to make Pass through checking with request.
Alternatively, vehicle-mounted Tbox modules;The battery manager is communicated by the vehicle-mounted Tbox with other parts, Wherein, other parts include:On-vehicle parts, APP applications.
According to another aspect of the invention, there is provided a kind of automobile, including battery system as described above.
The battery of the present invention uses verification method, battery system and automobile, using default AES to battery Calculating is encrypted in identification information, obtains the second key value, and request is used to battery using first key value and the second key value Carry out than checking, if by checking, corresponding operate is performed to battery;Use for battery is provided with secret key verification ring Section, it can just be provided reliable guarantee with normal use battery for the identification of battery uniqueness, prevent making after verifying successfully Potential safety hazard caused by battery is disassembled during, battery modules and battery manager are used separately etc.;Using block chain Technology stores to data such as secret keys, ensures that secret key will not be changed and stolen, and is advantageous to exclude cell safety hidden danger, realizes Protection to battery user's personal safety as well as the property safety, and it is beneficial to management of the battery bag manager to battery, it is remarkably improved production The security performance of product.
The additional aspect of the embodiment of the present invention and advantage will be set forth in part in the description, and these will be retouched from following Become obvious in stating, or recognized by the practice of the present invention.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only Some embodiments of the present invention, for those of ordinary skill in the art, without having to pay creative labor, also Other accompanying drawings can be obtained according to these accompanying drawings:
Fig. 1 is the flow chart of one embodiment that verification method is used according to the battery of the present invention;
Fig. 2 is the module diagram according to one embodiment of the battery system of the present invention;
Fig. 3 is the module diagram of the battery manager in one embodiment according to the battery system of the present invention.
Embodiment
The various exemplary embodiments of the present invention are described in detail now with reference to accompanying drawing.It should be noted that:Unless have in addition Body illustrates that the unlimited system of part and the positioned opposite of step, numerical expression and the numerical value otherwise illustrated in these embodiments is originally The scope of invention.
Simultaneously, it should be appreciated that for the ease of description, the size of the various pieces shown in accompanying drawing is not according to reality Proportionate relationship draw.
The description only actually at least one exemplary embodiment is illustrative to be never used as to the present invention below And its application or any restrictions that use.
It may be not discussed in detail for technology, method and apparatus known to person of ordinary skill in the relevant, but suitable In the case of, the technology, method and apparatus should be considered as part for specification.
It should be noted that:Similar label and letter represents similar terms in following accompanying drawing, therefore, once a certain Xiang Yi It is defined, then it need not be further discussed in subsequent accompanying drawing in individual accompanying drawing.
The embodiment of the present invention can apply to computer system/server, and it can be with numerous other universal or special calculating System environments or configuration operate together.Suitable for be used together with computer system/server well-known computing system, ring The example of border and/or configuration includes but is not limited to:Personal computer system, server computer system, thin client, thick client Machine, hand-held or laptop devices, the system based on microprocessor, set top box, programmable consumer electronics, NetPC Network PC, Minicomputer system, large computer system and distributed cloud computing technology environment including any of the above described system, etc..
Computer system/server can be in computer system executable instruction (such as journey performed by computer system Sequence module) general linguistic context under describe.Generally, program module can include routine, program, target program, component, logic, number According to structure etc., they perform specific task or realize specific abstract data type.Computer system/server can be with Implement in distributed cloud computing environment, in distributed cloud computing environment, task is by by the long-range of communication network links Manage what equipment performed.In distributed cloud computing environment, program module can be located at the Local or Remote meter for including storage device In calculation system storage medium.
" first ", " second " hereinafter is only used for distinguishing in description, not other special implications.
Fig. 1 is the flow chart of one embodiment that verification method is used according to the battery of the present invention, as shown in Figure 1:
Step 101, the use request for battery is received.It can also be asked using request for the use for battery bag Ask, will hereafter be illustrated by taking battery as an example.
The first key value corresponding with battery is obtained, and caches first key value.
Use request for battery includes:Charge, discharge, reading battery data, checking that battery status etc. is asked.Use Request can be that part, other parts of automobile in battery system are sent, and other parts of automobile include:ECU (Electronic Control Unit, electronic control unit) etc., it can also be answered using request for the APP in mobile phone With transmission.
Step 102, the identification information of battery is obtained, identification information is encrypted calculating using default AES, The second key value is obtained, and caches first key value.The identification information of battery can have a variety of, and default AES can also Have a variety of, can be set according to specific design requirement.
Step 103, first key value is compared with the second key value, determines whether use request based on comparison result Pass through checking.
Step 104, if it is determined that request is used by verifying, then the operation corresponding with using request is performed to battery, Control battery fills point, electric discharge, reads battery data, checks battery status operation etc., can be completed by sending control instruction Operation.If it is determined that using request not over checking, then battery can not be used.
Battery in above-described embodiment uses verification method, it is determined that to the secret key of storage and the secret key verification that newly calculates into In the case of work(, battery could be used, it is achieved thereby that the cryptographic operation to battery system, it is ensured that battery it is unique Property, reduce battery system is dismantled and the chaotic hidden danger used wantonly, while can also safeguard battery management person and cell tube The interests of reason company.
In one embodiment, first key value, second key value etc. can be stored by block chain node, can utilized Block chain node itself has the characteristics of encryption, ensures that secret key will not be changed and stolen.Block chain be Distributed Storage, Point-to-point transmission, common recognition mechanism, the new application pattern of the computer technology such as AES, it have decentralization, opening, The features such as autonomy, information can not distort.First, second key value etc. is stored by block chain technology, the number of storage According to immutable and other people can not steal battery secret key data, effectively record and store key value, there is very strong practicality.
If it is determined that the second key value is then stored in block chain node by checking using request.Next time to making When being verified with request, using the second key value as first key value, mark of the default AES to battery is reused Know information and calculating is encrypted, obtain the second new key value, and carry out comparison.When being verified, in block chain link It is newest key value as first key value that storage time is obtained in point relative to current point in time.If battery is to make for the first time With the first key value then obtained is the default key value in block chain node.For example, to one piece of new battery, first key Value carries out storage operation of dispatching from the factory by producer, is stored in block chain node.
In one embodiment, battery modules ID and battery manager ID is obtained, based on battery modules ID and cell tube Manage device ID generation battery IDs.Battery modules ID can have a variety of generation methods, for example, generated according to the data related to battery Battery modules ID, the data related to battery include:Battery manufacture manufacturer, device name, sequence number, build date etc..Will be with The related data of battery carry out sequential combination, generation battery modules ID.
Battery ID has a variety of generation methods.For example, battery modules ID and battery manager ID is combined, battery ID is generated. Battery modules ID and battery manager ID sequential combinations can be formed battery ID.Using default AES to battery ID Calculating is encrypted, obtains the second key value.AES can have a variety of, for example, MD5 algorithms.
MD5 is the algorithms of Message Digest Algorithm 5, is Message Digest Algorithm 5, is widely used A kind of hash function, to provide the integrity protection of message.When AES uses MD5 algorithms, using MD5 algorithms to electricity Calculating is encrypted in pond ID, using the MD5 values of acquisition as the second key value.Second key value includes:Regular length is 128 Binary numeral, 16 binary values that regular length is 32 etc..
Md5 encryption algorithm for encryption, which calculates, to be included:Enter row information filling to battery ID, to filling result interpolation data, being based on The magic number of standard is handled addition result, carries out the steps such as loop computation to result.Battery ID data are passed through into MD5 16 binary values that regular length after AES encryption is the binary numeral of 128 or regular length is 32, often The secondary MD5 values used are the values after being encrypted by same MD5 algorithms.
First key value (MD5 values) and the second key value (MD5 values) step-by-step are contrasted one by one, if first key value Each is all identical corresponding for (MD5 values) and the second key value (MD5 values), then first key value (MD5 values) and the second key Value (MD5 values) is identical, illustrates that battery is complete, it is determined that using request by verifying, battery may be used, otherwise battery It can not be used.
For example, the primary ID of battery modules is 123456, the primary ID of battery manager is 654321, then corresponding battery ID is 123456654321, and battery ID is entered into encryption by MD5 algorithms for 123456654321.
The first step, battery ID is filled, filling one 1 and n 0 below so that the message length of filling is to 512 complementations As a result it is equal to 448.Second step, behind the data for having carried out first step processing plus 64 are stored, and length is 512 multiple Number.3rd step, the result of second step is encased in standard magic number:The magic number (physical sequential) of standard is (A= (01234567) 16, B=(89ABCDEF) 16, C=(FEDCBA98) 16, D=(76543210) 16).
4th step, the result data Jing Guo three step process is divided into 16 groups, then carries out four-wheel loop computation, set Four nonlinear functions:F (X, Y, Z)=(X&Y) | ((~X) &Z), G (X, Y, Z)=(X&Z) | (Y& (~Z)), H (X, Y, Z)= X ∧ Y ∧ Z, I (X, Y, Z)=Y ∧ (X | (~Z)), then by A, B, C, 3 in D copy a, b, c, d are through F, G, H, I computings Result afterwards is added with the 4th, along with 32 words and the additive constant of 32 word, and by the value ring shift left of gained Some positions, acquired results are finally added into one of a, b, c, d, and be recycled to A, B, C, D, thus complete one cycle, wherein adding Method constant T [i] (i is the value among the 64 of 1) is equal to the 4294967296 integer part (i for being multiplied by abs (sin (i)) acquired results Represented with radian).For example, the MD5 values of battery ID generation are cd6bfc8505b54cee, it is close as the uniqueness of battery Spoon, when there is battery artificially to be dismantled, not for it is original-pack when, the result after encryption differs with original secret key.
When battery system is sent using order, data newest in block chain are read, decrypt the first secret key therein It is worth (the first MD5 values), such as the first MD5 values are cd6bfc8505b54cee, storage is in a register.Block chain itself is to storage Data there is very powerful encryption function, it is ensured that battery system secret key is not modified and is unique, and the first MD5 is suitable In battery fingerprint.
Current battery modules ID and battery manager ID are read, generates battery ID, and added by md5 encryption algorithm It is close.For example, the 2nd MD5 values after encryption are cd6bfc8505b54cee, by the first MD5 values cd6bfc8505b54cee and second MD5 values cd6bfc8505b54cee is contrasted by turn, if identical, for galvanic cell system, battery can enter to exercise With otherwise, battery can not be used.The MD5 values (SK2) that battery bag ID is encrypted are stored and arrive block chain by contrast verification after passing through In.
Battery in above-described embodiment uses verification method, and the use for battery is provided with secret key calibration link, works as school It can just be provided reliable guarantee with normal use battery for the identification of battery uniqueness, prevent using process after testing successfully Potential safety hazard caused by middle battery is disassembled, battery modules and battery manager are used separately etc.;Using block chain technology pair The data such as secret key are stored, and cause the secret key related to battery equivalent to fingerprint, to ensure secret key not using the characteristic of block chain It can be changed and be stolen, be advantageous to exclude cell safety hidden danger, realize the protection to battery user's personal safety as well as the property safety, and Beneficial to management of the battery bag manager to battery, the security performance of product is remarkably improved, and can be applied to various vehicles.
As shown in Fig. 2 the present invention provides a kind of battery system 20, including battery manager 21, battery modules 22 and Tbox Module 23.Battery modules 22 are used to produce battery modules ID.Block chain 24 stores to the secret key of battery system, can be electricity A node of the data memory module of pool manager 22 as block chain.Battery modules 22 can be one with battery manager 21 One is correspondingly arranged.Vehicle-mounted Tbox (Telematics BOX) module 23 is the part in car networking system, is mainly used in after Platform system/cell phone application communication.Battery manager 21 is communicated by vehicle-mounted Tbox modules 23 with other parts, other portions Part includes:On-vehicle parts, APP applications etc..
As shown in figure 3, battery manager 21 includes:Data reception module 211, Key Acquisition Module 212, cipher key calculation mould Block 213, cipher key calculation module 214, key verification module 215 and data memory module 216.The reception pair of data reception module 211 Asked in the use of battery.Key Acquisition Module 212 obtains the first key value corresponding with battery.Cipher key calculation module 213 The identification information of battery is obtained, calculating is encrypted to identification information using default AES, obtains the second key value.It is close First key value is compared key authentication module 214 with the second key value, determines whether lead to using request based on comparison result Cross checking.If it is determined that using request by checking, then Battery control module 215 is corresponding with using request to battery execution Operation.
If it is determined that using request by checking, then it is close to store second in block chain node 24 for data memory module 216 Key value, when next time to being verified using request, using the second key value as first key value.Key Acquisition Module 212 It is newest key value as first key value that storage time is obtained in block chain node 24 relative to current point in time.If Battery uses to be first, then the first key value that Key Acquisition Module 212 obtains is the default key value in block chain node. Key verification module 215 is contrasted first key value and the second key value step-by-step one by one, if first key value and second Each is all identical corresponding for key value, it is determined that passes through checking using request.
Cipher key calculation module 213 obtains battery modules ID and battery manager ID from battery modules, based on battery modules ID and battery manager ID generation battery IDs.Cipher key calculation module 213 obtains battery modules 22 according to the data related to battery The battery modules ID of generation, the data related to battery include:Battery manufacture manufacturer, device name, sequence number, build date Deng.Cipher key calculation module 213 combines battery modules ID and battery manager ID, generates battery ID, is calculated using default encryption Method battery ID is encrypted calculating, obtains the second key value.Default AES includes:MD5 algorithms etc..
Cipher key calculation module 213 battery ID is encrypted calculating using MD5 algorithms, using the MD5 values of acquisition as second Key value, computations include:Enter row information filling to battery ID, to filling result interpolation data, measured magic number pair Addition result is handled, carries out loop computation to result.Second key value includes:Regular length is 128 and two entered Numerical value processed, 16 binary values that regular length is 32 etc..
In one embodiment, the present invention provides a kind of automobile, including the as above battery system of any one embodiment.
Battery in above-described embodiment uses verification method, battery system and automobile, obtains the corresponding with battery of storage First key value, be encrypted calculating to the identification information of battery using default AES, obtain the second key value, make Battery is carried out than checking using request with first key value and the second key value, if by checking, to battery execution pair The operation answered;Use for battery is provided with secret key calibration link, can be with normal use battery just after verifying successfully The identification of battery uniqueness provides reliable guarantee, prevents that battery is disassembled in use, battery modules and battery management Potential safety hazard caused by device is used separately etc.;The data such as secret key are stored using block chain technology, utilize block chain Characteristic causes the secret key related to battery equivalent to fingerprint, to ensure that secret key will not be changed and stolen, be advantageous to exclude battery peace Full hidden danger, the protection to battery user's personal safety as well as the property safety is realized, and be beneficial to management of the battery bag manager to battery, can The security performance of product is significantly improved, and can be applied to various vehicles.
Methods and apparatus of the present invention, equipment may be achieved in many ways.For example, software, hardware, firmware can be passed through Or any combinations of software, hardware, firmware realize methods and apparatus of the present invention, equipment.The step of for method Order is stated merely to illustrate, order described in detail above is not limited to the step of method of the invention, unless with other Mode illustrates.In addition, in certain embodiments, the present invention can be also embodied as recording program in the recording medium, this A little programs include being used for the machine readable instructions for realizing the method according to the invention.Thus, the present invention also covering storage is used to hold The recording medium of the program of row the method according to the invention.
Description of the invention provides for the sake of example and description, and is not exhaustively or by the present invention It is limited to disclosed form.Many modifications and variations are obvious for the ordinary skill in the art.Select and retouch State embodiment and be to more preferably illustrate the principle and practical application of the present invention, and one of ordinary skill in the art is managed The present invention is solved so as to design the various embodiments with various modifications suitable for special-purpose.
The embodiment provides A1, a kind of battery to use verification method, wherein, including:Receive for battery Use request, obtain the first key value corresponding with the battery;The identification information of the battery is obtained, use is default AES the identification information is encrypted calculating, obtains the second key value;By the first key value and described second Key value is compared, and determines described use asks whether pass through checking based on comparison result;If it is determined that described use request By checking, then battery is performed and the operation corresponding using request.
A2, the method as described in A1, wherein, in addition to:If it is determined that described pass through checking using request, then in block chain Second key value is stored in node;Wherein, when being verified next time to the use request, by second key Value is used as the first key value.
A3, the method as described in A2, wherein, the acquisition first key value corresponding with the battery includes:Institute It is newest key value as the first key value to state and storage time is obtained in block chain node relative to current point in time.
A4, the method as described in A3, wherein, if the battery uses to be first, the first key value obtained For the default key value in the block chain node.
A5, the method as described in A1, wherein, the identification information for obtaining the battery:Obtain battery modules ID and Battery manager ID;Based on the battery modules ID and battery manager ID generation battery IDs.
A6, the method as described in A5, wherein, battery modules are obtained according to the data generation related to the battery Battery modules ID;Wherein, the data related to the battery include:Battery manufacture manufacturer, device name, sequence number, system Make the date.
A7, the method as described in A5, wherein, in addition to:The battery modules ID and battery manager ID is combined, Generate the battery ID;Calculating is encrypted to the battery ID using default AES, obtains second key value; Wherein, the default AES includes:MD5 algorithms.
A8, the method as described in A7, wherein, in addition to:Calculating is encrypted to the battery ID using MD5 algorithms, will The MD5 values of acquisition are used as second key value;Wherein, the computations include:The battery ID is entered row information filling, Filling result interpolation data, measured magic number are handled addition result, to result progress loop computation.
A9, the method as described in A7, wherein, second key value includes:Regular length is the binary number of 128 Value, 16 binary values that regular length is 32.
A10, the method as described in A1, wherein, in addition to:By the first key value and the second key value step-by-step by One is contrasted, if each is all identical corresponding for the first key value and second key value, it is determined that described Pass through checking using request.
B11, a kind of battery system, wherein also including:Battery manager, including:Data reception module, for receiving pair Asked in the use of battery;Key Acquisition Module, for obtaining the first key value corresponding with the battery;Cipher key calculation mould Block, for obtaining the identification information of the battery, calculating is encrypted to the identification information using default AES, obtained Obtain the second key value;Key verification module, for the first key value to be compared with second key value, based on than Determine described use asks whether pass through checking to result;Battery control module, for if it is determined that described passed through using request Checking, then battery is performed and the operation corresponding using request.
B12, the system as described in B11, wherein, in addition to:Data memory module, for if it is determined that described use request By checking, then second key value is stored in block chain node;Wherein, tested next time using request described During card, using second key value as the first key value.
B13, the system as described in B12, wherein, the Key Acquisition Module, for being obtained in the block chain node Storage time is newest key value as the first key value relative to current point in time.
B14, the system as described in B13, wherein, if the battery uses to be first, the Key Acquisition Module obtains The first key value taken is the default key value in the block chain node.
B15, the system as described in B11, wherein, the cipher key calculation module, for obtaining battery modules from battery modules ID and battery manager ID, based on the battery modules ID and battery manager ID generation battery IDs.
B16, the system as described in B15, wherein, the cipher key calculation module, for obtain battery modules according to it is described The battery modules ID of the related data generation of battery;Wherein, the data related to the battery include:Battery manufacture Manufacturer, device name, sequence number, build date.
B17, the system as described in B15, wherein, the cipher key calculation module, for by the battery modules ID and described Battery manager ID is combined, and generates the battery ID;Calculating is encrypted to the battery ID using default AES, obtained Obtain second key value;Wherein, the default AES includes:MD5 algorithms.
B18, the system as described in B17, wherein, in addition to:The cipher key calculation module, for using MD5 algorithms to institute State battery ID and calculating is encrypted, using the MD5 values of acquisition as second key value;Wherein, the computations include:It is right The battery ID enter row information filling, to filling result interpolation data, measured magic number to addition result handled, it is right Result carries out loop computation.
B19, the system as described in B17, wherein, second key value includes:Regular length is the binary number of 128 Value, 16 binary values that regular length is 32.
B20, the system as described in B11, wherein, the key verification module, for by the first key value with it is described Second key value step-by-step is contrasted one by one, if the first key value and second key value it is corresponding each all It is identical, it is determined that described to pass through checking using request.
B21, the system as described in B11, wherein, in addition to:Vehicle-mounted Tbox modules;The battery manager passes through the car Tbox is carried to be communicated with other parts, wherein, other parts include:On-vehicle parts, APP applications.
C22, a kind of automobile, wherein, including the battery system as described in B11 to any one of B21.

Claims (10)

1. a kind of battery uses verification method, it is characterised in that including:
The use request for battery is received, obtains the first key value corresponding with the battery;
The identification information of the battery is obtained, calculating is encrypted to the identification information using default AES, is obtained Second key value;
The first key value is compared with second key value, whether the use request is determined based on comparison result Pass through checking;
If it is determined that described pass through checking using request, then to battery execution and the operation corresponding using request.
2. the method as described in claim 1, it is characterised in that also include:
If it is determined that described pass through checking using request, then second key value is stored in block chain node;Wherein, under When once being verified to the use request, using second key value as the first key value.
3. method as claimed in claim 2, it is characterised in that described to obtain the first key value bag corresponding with the battery Include:
It is newest key value as described first that storage time is obtained in the block chain node relative to current point in time Key value.
4. method as claimed in claim 3, it is characterised in that
If the battery uses to be first, the first key value obtained is default close in the block chain node Key value.
5. the method as described in claim 1, it is characterised in that the identification information for obtaining the battery:
Obtain battery modules ID and battery manager ID;
Based on the battery modules ID and battery manager ID generation battery IDs.
6. a kind of battery system, it is characterised in that also include:
Battery manager, including:
Data reception module, for receiving the use request for battery;
Key Acquisition Module, for obtaining the first key value corresponding with the battery;
Cipher key calculation module, for obtaining the identification information of the battery, using default AES to the identification information Calculating is encrypted, obtains the second key value;
Key verification module, it is true based on comparison result for the first key value to be compared with second key value Fixed described use asks whether pass through checking;
Battery control module, for if it is determined that described use asks by checking, then to perform battery and described use is asked Corresponding operation.
7. system as claimed in claim 6, it is characterised in that also include:
Data memory module, for if it is determined that it is described using request by checking, then described the is stored in block chain node Two key values;Wherein, it is when being verified next time to the use request, second key value is close as described first Key value.
8. system as claimed in claim 7, it is characterised in that
The Key Acquisition Module, it is newest for obtaining storage time in the block chain node relative to current point in time Key value as the first key value.
9. system as claimed in claim 8, it is characterised in that
If the battery uses to be first, the first key value that the Key Acquisition Module obtains is in the block Default key value in chain node.
A kind of 10. automobile, it is characterised in that
Including the battery system as described in any one of claim 6 to 9.
CN201710984461.0A 2017-10-20 2017-10-20 Battery uses verification method, battery system and automobile Pending CN107743065A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710984461.0A CN107743065A (en) 2017-10-20 2017-10-20 Battery uses verification method, battery system and automobile

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710984461.0A CN107743065A (en) 2017-10-20 2017-10-20 Battery uses verification method, battery system and automobile

Publications (1)

Publication Number Publication Date
CN107743065A true CN107743065A (en) 2018-02-27

Family

ID=61237890

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710984461.0A Pending CN107743065A (en) 2017-10-20 2017-10-20 Battery uses verification method, battery system and automobile

Country Status (1)

Country Link
CN (1) CN107743065A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108537545A (en) * 2018-04-04 2018-09-14 江西迪比科股份有限公司 A kind of method and system that the automobile batteries group based on block chain is verified, charged
CN109543788A (en) * 2018-11-08 2019-03-29 深圳市云雄能源管理有限公司 A kind of battery information management method, device, storage medium and system
CN109788353A (en) * 2018-12-05 2019-05-21 安徽站乾科技有限公司 A kind of set-top box encryption copy prevention method
CN110346745A (en) * 2019-07-30 2019-10-18 福建星云电子股份有限公司 A kind of battery modules detection instrument checking tool
CN114465731A (en) * 2022-03-01 2022-05-10 上海万向区块链股份公司 Battery credible encryption management system and method based on block chain
CN115458822A (en) * 2022-10-09 2022-12-09 四川长虹网络科技有限责任公司 Battery control system and method
WO2023230768A1 (en) * 2022-05-30 2023-12-07 北京小米移动软件有限公司 Battery encryption circuit, battery check method and apparatus, device and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060178170A1 (en) * 2005-02-08 2006-08-10 Samsung Electronics Co., Ltd. Wireless communication device having battery authentication, and associated method
CN102035009A (en) * 2009-09-16 2011-04-27 寰群科技股份有限公司 Secondary battery device with anti-theft function, power supply control device and anti-theft method of secondary battery
CN102386652A (en) * 2010-08-27 2012-03-21 株式会社电装 Battery management apparatus
CN105597317A (en) * 2015-12-24 2016-05-25 腾讯科技(深圳)有限公司 Virtual object display method, device and system
CN106026219A (en) * 2015-03-31 2016-10-12 瑞萨电子株式会社 Battery control ic, battery pack, and authentication method thereof
CN106329585A (en) * 2015-06-19 2017-01-11 中兴新能源汽车有限责任公司 Wireless charging authentication method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060178170A1 (en) * 2005-02-08 2006-08-10 Samsung Electronics Co., Ltd. Wireless communication device having battery authentication, and associated method
CN102035009A (en) * 2009-09-16 2011-04-27 寰群科技股份有限公司 Secondary battery device with anti-theft function, power supply control device and anti-theft method of secondary battery
CN102386652A (en) * 2010-08-27 2012-03-21 株式会社电装 Battery management apparatus
CN106026219A (en) * 2015-03-31 2016-10-12 瑞萨电子株式会社 Battery control ic, battery pack, and authentication method thereof
CN106329585A (en) * 2015-06-19 2017-01-11 中兴新能源汽车有限责任公司 Wireless charging authentication method and device
CN105597317A (en) * 2015-12-24 2016-05-25 腾讯科技(深圳)有限公司 Virtual object display method, device and system

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108537545A (en) * 2018-04-04 2018-09-14 江西迪比科股份有限公司 A kind of method and system that the automobile batteries group based on block chain is verified, charged
CN109543788A (en) * 2018-11-08 2019-03-29 深圳市云雄能源管理有限公司 A kind of battery information management method, device, storage medium and system
CN109788353A (en) * 2018-12-05 2019-05-21 安徽站乾科技有限公司 A kind of set-top box encryption copy prevention method
CN110346745A (en) * 2019-07-30 2019-10-18 福建星云电子股份有限公司 A kind of battery modules detection instrument checking tool
CN110346745B (en) * 2019-07-30 2023-12-05 福建星云电子股份有限公司 Battery module detects check-up frock for instrument
CN114465731A (en) * 2022-03-01 2022-05-10 上海万向区块链股份公司 Battery credible encryption management system and method based on block chain
CN114465731B (en) * 2022-03-01 2023-12-29 上海万向区块链股份公司 Battery trusted encryption management system and method based on blockchain
WO2023230768A1 (en) * 2022-05-30 2023-12-07 北京小米移动软件有限公司 Battery encryption circuit, battery check method and apparatus, device and storage medium
CN115458822A (en) * 2022-10-09 2022-12-09 四川长虹网络科技有限责任公司 Battery control system and method

Similar Documents

Publication Publication Date Title
CN107743065A (en) Battery uses verification method, battery system and automobile
CN109359974A (en) Block chain method of commerce and device, electronic equipment
CN110046996A (en) The generation method and device of block chain transaction
CN109409122A (en) File memory method and its electronic equipment, storage medium
CN110460439A (en) Information transferring method, device, client, server-side and storage medium
CN111989893A (en) Chain of proof and decomposition
CN109478279A (en) Method and system for realizing block chain
CN109472164A (en) The verification method and its network and electronic equipment of contract dataset
CN103401844B (en) The processing method of operation requests and system
CN108268767A (en) Web application authorization method and device
CN109479000A (en) Reutilization system, key generating device, data security devices, car-mounted computer, reuse method and computer program
CN106416124A (en) Semi-deterministic digital signature generation
JP2002537685A (en) How to verify the use of a public key generated by an onboard system
CN107483485A (en) Generation method, authorization method, relevant apparatus and the terminal device of authorization code
CN101420300A (en) Double factor combined public key generating and authenticating method
CN112288434B (en) Privacy transaction method, device, zero knowledge proof system and privacy transaction architecture model
CN109886687A (en) A kind of result verification method and system for realizing multi-party computations based on block chain
CN109905360A (en) Data verification method and terminal device
CN109491965A (en) The storage method and its network and electronic equipment of purchase sale of electricity contract
CN112270005B (en) Data transmission method and system
CN108768963A (en) The communication means and system of trusted application and safety element
CN112019326A (en) Vehicle charging safety management method and system
CN108717666A (en) Personalized vehicle insurance computational methods, system and terminal based on block chain
CN110519274A (en) Block chain information transmission method, device, equipment and storage medium
US20230179412A1 (en) Private key creation using location data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180227

RJ01 Rejection of invention patent application after publication