CN107743065A - Battery uses verification method, battery system and automobile - Google Patents
Battery uses verification method, battery system and automobile Download PDFInfo
- Publication number
- CN107743065A CN107743065A CN201710984461.0A CN201710984461A CN107743065A CN 107743065 A CN107743065 A CN 107743065A CN 201710984461 A CN201710984461 A CN 201710984461A CN 107743065 A CN107743065 A CN 107743065A
- Authority
- CN
- China
- Prior art keywords
- battery
- key value
- key
- request
- checking
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
Abstract
The embodiment of the invention discloses a kind of battery to use verification method, battery system and automobile, and method therein includes:Obtain the first key value corresponding with battery;The identification information of battery is obtained, calculating is encrypted to identification information using default AES, obtains the second key value;First key value is compared with the second key value, whether the use request for determining battery based on comparison result passes through checking;If by checking, operation is performed.Method, battery system and the automobile of the present invention, use for battery is provided with secret key calibration link, just can be with normal use battery after verifying successfully, the data such as secret key are stored using block chain technology, ensure that secret key will not be changed and stolen, reliable guarantee is provided for the identification of battery uniqueness, prevents battery to be disassembled, potential safety hazard caused by battery modules and battery manager are used separately etc..
Description
Technical field
The present invention relates to cell art, more particularly to a kind of battery to use verification method, battery system and automobile.
Background technology
In New-energy electric vehicle industry and new energy storing technology, battery plays the effect of key.At present, people couple
The demand of battery is also increasing, reasonably using battery, the security being related to during electric car use, and battery system
The service life of system.The use for battery (such as charging, electric discharge, obtain battery status etc.) mostly of battery system in vehicle
It is not provided with encrypted authentication function so that battery system can be dismantled arbitrarily, and confusion uses;Also, the battery in some vehicles
Although system is provided with encrypted authentication function, do not have battery product uniqueness identification function, password or ID can be obtained by the external world
Take and change, it is poor to the integrality recognition effect of battery, battery modules easily occur with battery manager by artificially dismounting etc.
Problem, cause battery problem safe to use and battery bag manufacturer to be lost in, while be also unfavorable for battery bag secondary recovery and echelon profit
With.
The content of the invention
In view of this, the embodiment of the present invention provides a kind of battery and uses verification method, battery system and automobile, can be right
The use of battery carries out safety verification.
One side according to embodiments of the present invention, there is provided a kind of battery uses verification method, including:Receive for electricity
The use request in pond, obtains the first key value corresponding with the battery;The identification information of the battery is obtained, using default
AES the identification information is encrypted calculating, obtain the second key value;By the first key value and described the
Two key values are compared, and determine described use asks whether pass through checking based on comparison result;If it is determined that described use please
Ask by checking, then battery is performed and the operation corresponding using request.
Alternatively, if it is determined that described pass through checking using request, then second key is stored in block chain node
Value;Wherein, when being verified next time to the use request, using second key value as the first key value.
Alternatively, the acquisition first key value corresponding with the battery includes:Obtained in the block chain node
It relative to current point in time is newest key value as the first key value to take storage time.
Alternatively, if the battery uses to be first, the first key value obtained is in the block chain link
Default key value in point.
Alternatively, the identification information for obtaining the battery:Obtain battery modules ID and battery manager ID;It is based on
The battery modules ID and battery manager ID generation battery IDs.
Alternatively, the battery modules ID that battery modules generate according to the data related to the battery is obtained;Wherein,
The data related to the battery include:Battery manufacture manufacturer, device name, sequence number, build date.
Alternatively, the battery modules ID and battery manager ID is combined, generates the battery ID;Using default
AES the battery ID is encrypted calculating, obtain second key value;Wherein, the default AES
Including:MD5 algorithms.
Alternatively, calculating is encrypted to the battery ID using MD5 algorithms, using the MD5 values of acquisition as described second
Key value;Wherein, the computations include:Enter row information filling to the battery ID, to filling result interpolation data, being based on
The magic number of standard is handled addition result, carries out loop computation to result.
Alternatively, second key value includes:Binary numeral that regular length is 128, regular length are 32
16 binary values.
Alternatively, the first key value and the second key value step-by-step are contrasted one by one, if described first
Each is all identical corresponding for key value and second key value, it is determined that described to pass through checking using request.
According to another aspect of the present invention, there is provided a kind of battery system, including:Battery manager, battery manager include:
Data reception module, for receiving the use request for battery;Key Acquisition Module is relative with the battery for obtaining
The first key value answered;Cipher key calculation module, for obtaining the identification information of the battery, using default AES to institute
State identification information and calculating is encrypted, obtain the second key value;Key verification module, for by the first key value with it is described
Second key value is compared, and determines described use asks whether pass through checking based on comparison result;Battery control module, it is used for
If it is determined that described pass through checking using request, then to battery execution and the operation corresponding using request.
Alternatively, data memory module, for if it is determined that described pass through checking using request, then in block chain node
Store second key value;Wherein, next time to it is described using request verify when, using second key value as
The first key value.
Alternatively, the Key Acquisition Module, for obtaining storage time in the block chain node relative to current
Time point is newest key value as the first key value.
Alternatively, if the battery uses to be first, the first key value that the Key Acquisition Module obtains
For the default key value in the block chain node.
Alternatively, the cipher key calculation module, for obtaining battery modules ID and battery manager ID from battery modules,
Based on the battery modules ID and battery manager ID generation battery IDs.
Alternatively, the cipher key calculation module, generated for obtaining battery modules according to the data related to the battery
The battery modules ID;Wherein, the data related to the battery include:Battery manufacture manufacturer, device name, sequence
Number, build date.
Alternatively, the cipher key calculation module, it is raw for the battery modules ID and battery manager ID to be combined
Into the battery ID;Calculating is encrypted to the battery ID using default AES, obtains second key value;Its
In, the default AES includes:MD5 algorithms.
Alternatively, the cipher key calculation module, for calculating to be encrypted to the battery ID using MD5 algorithms, will obtain
The MD5 values obtained are used as second key value;Wherein, the computations include:Enter row information to the battery ID fill, be right
Filling result interpolation data, measured magic number are handled addition result, carry out loop computation to result.
Alternatively, second key value includes:Binary numeral that regular length is 128, regular length are 32
16 binary values.
Alternatively, the key verification module, for by the first key value and the second key value step-by-step one by one
Contrasted, if each is all identical corresponding for the first key value and second key value, it is determined that described to make
Pass through checking with request.
Alternatively, vehicle-mounted Tbox modules;The battery manager is communicated by the vehicle-mounted Tbox with other parts,
Wherein, other parts include:On-vehicle parts, APP applications.
According to another aspect of the invention, there is provided a kind of automobile, including battery system as described above.
The battery of the present invention uses verification method, battery system and automobile, using default AES to battery
Calculating is encrypted in identification information, obtains the second key value, and request is used to battery using first key value and the second key value
Carry out than checking, if by checking, corresponding operate is performed to battery;Use for battery is provided with secret key verification ring
Section, it can just be provided reliable guarantee with normal use battery for the identification of battery uniqueness, prevent making after verifying successfully
Potential safety hazard caused by battery is disassembled during, battery modules and battery manager are used separately etc.;Using block chain
Technology stores to data such as secret keys, ensures that secret key will not be changed and stolen, and is advantageous to exclude cell safety hidden danger, realizes
Protection to battery user's personal safety as well as the property safety, and it is beneficial to management of the battery bag manager to battery, it is remarkably improved production
The security performance of product.
The additional aspect of the embodiment of the present invention and advantage will be set forth in part in the description, and these will be retouched from following
Become obvious in stating, or recognized by the practice of the present invention.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only
Some embodiments of the present invention, for those of ordinary skill in the art, without having to pay creative labor, also
Other accompanying drawings can be obtained according to these accompanying drawings:
Fig. 1 is the flow chart of one embodiment that verification method is used according to the battery of the present invention;
Fig. 2 is the module diagram according to one embodiment of the battery system of the present invention;
Fig. 3 is the module diagram of the battery manager in one embodiment according to the battery system of the present invention.
Embodiment
The various exemplary embodiments of the present invention are described in detail now with reference to accompanying drawing.It should be noted that:Unless have in addition
Body illustrates that the unlimited system of part and the positioned opposite of step, numerical expression and the numerical value otherwise illustrated in these embodiments is originally
The scope of invention.
Simultaneously, it should be appreciated that for the ease of description, the size of the various pieces shown in accompanying drawing is not according to reality
Proportionate relationship draw.
The description only actually at least one exemplary embodiment is illustrative to be never used as to the present invention below
And its application or any restrictions that use.
It may be not discussed in detail for technology, method and apparatus known to person of ordinary skill in the relevant, but suitable
In the case of, the technology, method and apparatus should be considered as part for specification.
It should be noted that:Similar label and letter represents similar terms in following accompanying drawing, therefore, once a certain Xiang Yi
It is defined, then it need not be further discussed in subsequent accompanying drawing in individual accompanying drawing.
The embodiment of the present invention can apply to computer system/server, and it can be with numerous other universal or special calculating
System environments or configuration operate together.Suitable for be used together with computer system/server well-known computing system, ring
The example of border and/or configuration includes but is not limited to:Personal computer system, server computer system, thin client, thick client
Machine, hand-held or laptop devices, the system based on microprocessor, set top box, programmable consumer electronics, NetPC Network PC,
Minicomputer system, large computer system and distributed cloud computing technology environment including any of the above described system, etc..
Computer system/server can be in computer system executable instruction (such as journey performed by computer system
Sequence module) general linguistic context under describe.Generally, program module can include routine, program, target program, component, logic, number
According to structure etc., they perform specific task or realize specific abstract data type.Computer system/server can be with
Implement in distributed cloud computing environment, in distributed cloud computing environment, task is by by the long-range of communication network links
Manage what equipment performed.In distributed cloud computing environment, program module can be located at the Local or Remote meter for including storage device
In calculation system storage medium.
" first ", " second " hereinafter is only used for distinguishing in description, not other special implications.
Fig. 1 is the flow chart of one embodiment that verification method is used according to the battery of the present invention, as shown in Figure 1:
Step 101, the use request for battery is received.It can also be asked using request for the use for battery bag
Ask, will hereafter be illustrated by taking battery as an example.
The first key value corresponding with battery is obtained, and caches first key value.
Use request for battery includes:Charge, discharge, reading battery data, checking that battery status etc. is asked.Use
Request can be that part, other parts of automobile in battery system are sent, and other parts of automobile include:ECU
(Electronic Control Unit, electronic control unit) etc., it can also be answered using request for the APP in mobile phone
With transmission.
Step 102, the identification information of battery is obtained, identification information is encrypted calculating using default AES,
The second key value is obtained, and caches first key value.The identification information of battery can have a variety of, and default AES can also
Have a variety of, can be set according to specific design requirement.
Step 103, first key value is compared with the second key value, determines whether use request based on comparison result
Pass through checking.
Step 104, if it is determined that request is used by verifying, then the operation corresponding with using request is performed to battery,
Control battery fills point, electric discharge, reads battery data, checks battery status operation etc., can be completed by sending control instruction
Operation.If it is determined that using request not over checking, then battery can not be used.
Battery in above-described embodiment uses verification method, it is determined that to the secret key of storage and the secret key verification that newly calculates into
In the case of work(, battery could be used, it is achieved thereby that the cryptographic operation to battery system, it is ensured that battery it is unique
Property, reduce battery system is dismantled and the chaotic hidden danger used wantonly, while can also safeguard battery management person and cell tube
The interests of reason company.
In one embodiment, first key value, second key value etc. can be stored by block chain node, can utilized
Block chain node itself has the characteristics of encryption, ensures that secret key will not be changed and stolen.Block chain be Distributed Storage,
Point-to-point transmission, common recognition mechanism, the new application pattern of the computer technology such as AES, it have decentralization, opening,
The features such as autonomy, information can not distort.First, second key value etc. is stored by block chain technology, the number of storage
According to immutable and other people can not steal battery secret key data, effectively record and store key value, there is very strong practicality.
If it is determined that the second key value is then stored in block chain node by checking using request.Next time to making
When being verified with request, using the second key value as first key value, mark of the default AES to battery is reused
Know information and calculating is encrypted, obtain the second new key value, and carry out comparison.When being verified, in block chain link
It is newest key value as first key value that storage time is obtained in point relative to current point in time.If battery is to make for the first time
With the first key value then obtained is the default key value in block chain node.For example, to one piece of new battery, first key
Value carries out storage operation of dispatching from the factory by producer, is stored in block chain node.
In one embodiment, battery modules ID and battery manager ID is obtained, based on battery modules ID and cell tube
Manage device ID generation battery IDs.Battery modules ID can have a variety of generation methods, for example, generated according to the data related to battery
Battery modules ID, the data related to battery include:Battery manufacture manufacturer, device name, sequence number, build date etc..Will be with
The related data of battery carry out sequential combination, generation battery modules ID.
Battery ID has a variety of generation methods.For example, battery modules ID and battery manager ID is combined, battery ID is generated.
Battery modules ID and battery manager ID sequential combinations can be formed battery ID.Using default AES to battery ID
Calculating is encrypted, obtains the second key value.AES can have a variety of, for example, MD5 algorithms.
MD5 is the algorithms of Message Digest Algorithm 5, is Message Digest Algorithm 5, is widely used
A kind of hash function, to provide the integrity protection of message.When AES uses MD5 algorithms, using MD5 algorithms to electricity
Calculating is encrypted in pond ID, using the MD5 values of acquisition as the second key value.Second key value includes:Regular length is 128
Binary numeral, 16 binary values that regular length is 32 etc..
Md5 encryption algorithm for encryption, which calculates, to be included:Enter row information filling to battery ID, to filling result interpolation data, being based on
The magic number of standard is handled addition result, carries out the steps such as loop computation to result.Battery ID data are passed through into MD5
16 binary values that regular length after AES encryption is the binary numeral of 128 or regular length is 32, often
The secondary MD5 values used are the values after being encrypted by same MD5 algorithms.
First key value (MD5 values) and the second key value (MD5 values) step-by-step are contrasted one by one, if first key value
Each is all identical corresponding for (MD5 values) and the second key value (MD5 values), then first key value (MD5 values) and the second key
Value (MD5 values) is identical, illustrates that battery is complete, it is determined that using request by verifying, battery may be used, otherwise battery
It can not be used.
For example, the primary ID of battery modules is 123456, the primary ID of battery manager is 654321, then corresponding battery
ID is 123456654321, and battery ID is entered into encryption by MD5 algorithms for 123456654321.
The first step, battery ID is filled, filling one 1 and n 0 below so that the message length of filling is to 512 complementations
As a result it is equal to 448.Second step, behind the data for having carried out first step processing plus 64 are stored, and length is 512 multiple
Number.3rd step, the result of second step is encased in standard magic number:The magic number (physical sequential) of standard is (A=
(01234567) 16, B=(89ABCDEF) 16, C=(FEDCBA98) 16, D=(76543210) 16).
4th step, the result data Jing Guo three step process is divided into 16 groups, then carries out four-wheel loop computation, set
Four nonlinear functions:F (X, Y, Z)=(X&Y) | ((~X) &Z), G (X, Y, Z)=(X&Z) | (Y& (~Z)), H (X, Y, Z)=
X ∧ Y ∧ Z, I (X, Y, Z)=Y ∧ (X | (~Z)), then by A, B, C, 3 in D copy a, b, c, d are through F, G, H, I computings
Result afterwards is added with the 4th, along with 32 words and the additive constant of 32 word, and by the value ring shift left of gained
Some positions, acquired results are finally added into one of a, b, c, d, and be recycled to A, B, C, D, thus complete one cycle, wherein adding
Method constant T [i] (i is the value among the 64 of 1) is equal to the 4294967296 integer part (i for being multiplied by abs (sin (i)) acquired results
Represented with radian).For example, the MD5 values of battery ID generation are cd6bfc8505b54cee, it is close as the uniqueness of battery
Spoon, when there is battery artificially to be dismantled, not for it is original-pack when, the result after encryption differs with original secret key.
When battery system is sent using order, data newest in block chain are read, decrypt the first secret key therein
It is worth (the first MD5 values), such as the first MD5 values are cd6bfc8505b54cee, storage is in a register.Block chain itself is to storage
Data there is very powerful encryption function, it is ensured that battery system secret key is not modified and is unique, and the first MD5 is suitable
In battery fingerprint.
Current battery modules ID and battery manager ID are read, generates battery ID, and added by md5 encryption algorithm
It is close.For example, the 2nd MD5 values after encryption are cd6bfc8505b54cee, by the first MD5 values cd6bfc8505b54cee and second
MD5 values cd6bfc8505b54cee is contrasted by turn, if identical, for galvanic cell system, battery can enter to exercise
With otherwise, battery can not be used.The MD5 values (SK2) that battery bag ID is encrypted are stored and arrive block chain by contrast verification after passing through
In.
Battery in above-described embodiment uses verification method, and the use for battery is provided with secret key calibration link, works as school
It can just be provided reliable guarantee with normal use battery for the identification of battery uniqueness, prevent using process after testing successfully
Potential safety hazard caused by middle battery is disassembled, battery modules and battery manager are used separately etc.;Using block chain technology pair
The data such as secret key are stored, and cause the secret key related to battery equivalent to fingerprint, to ensure secret key not using the characteristic of block chain
It can be changed and be stolen, be advantageous to exclude cell safety hidden danger, realize the protection to battery user's personal safety as well as the property safety, and
Beneficial to management of the battery bag manager to battery, the security performance of product is remarkably improved, and can be applied to various vehicles.
As shown in Fig. 2 the present invention provides a kind of battery system 20, including battery manager 21, battery modules 22 and Tbox
Module 23.Battery modules 22 are used to produce battery modules ID.Block chain 24 stores to the secret key of battery system, can be electricity
A node of the data memory module of pool manager 22 as block chain.Battery modules 22 can be one with battery manager 21
One is correspondingly arranged.Vehicle-mounted Tbox (Telematics BOX) module 23 is the part in car networking system, is mainly used in after
Platform system/cell phone application communication.Battery manager 21 is communicated by vehicle-mounted Tbox modules 23 with other parts, other portions
Part includes:On-vehicle parts, APP applications etc..
As shown in figure 3, battery manager 21 includes:Data reception module 211, Key Acquisition Module 212, cipher key calculation mould
Block 213, cipher key calculation module 214, key verification module 215 and data memory module 216.The reception pair of data reception module 211
Asked in the use of battery.Key Acquisition Module 212 obtains the first key value corresponding with battery.Cipher key calculation module 213
The identification information of battery is obtained, calculating is encrypted to identification information using default AES, obtains the second key value.It is close
First key value is compared key authentication module 214 with the second key value, determines whether lead to using request based on comparison result
Cross checking.If it is determined that using request by checking, then Battery control module 215 is corresponding with using request to battery execution
Operation.
If it is determined that using request by checking, then it is close to store second in block chain node 24 for data memory module 216
Key value, when next time to being verified using request, using the second key value as first key value.Key Acquisition Module 212
It is newest key value as first key value that storage time is obtained in block chain node 24 relative to current point in time.If
Battery uses to be first, then the first key value that Key Acquisition Module 212 obtains is the default key value in block chain node.
Key verification module 215 is contrasted first key value and the second key value step-by-step one by one, if first key value and second
Each is all identical corresponding for key value, it is determined that passes through checking using request.
Cipher key calculation module 213 obtains battery modules ID and battery manager ID from battery modules, based on battery modules
ID and battery manager ID generation battery IDs.Cipher key calculation module 213 obtains battery modules 22 according to the data related to battery
The battery modules ID of generation, the data related to battery include:Battery manufacture manufacturer, device name, sequence number, build date
Deng.Cipher key calculation module 213 combines battery modules ID and battery manager ID, generates battery ID, is calculated using default encryption
Method battery ID is encrypted calculating, obtains the second key value.Default AES includes:MD5 algorithms etc..
Cipher key calculation module 213 battery ID is encrypted calculating using MD5 algorithms, using the MD5 values of acquisition as second
Key value, computations include:Enter row information filling to battery ID, to filling result interpolation data, measured magic number pair
Addition result is handled, carries out loop computation to result.Second key value includes:Regular length is 128 and two entered
Numerical value processed, 16 binary values that regular length is 32 etc..
In one embodiment, the present invention provides a kind of automobile, including the as above battery system of any one embodiment.
Battery in above-described embodiment uses verification method, battery system and automobile, obtains the corresponding with battery of storage
First key value, be encrypted calculating to the identification information of battery using default AES, obtain the second key value, make
Battery is carried out than checking using request with first key value and the second key value, if by checking, to battery execution pair
The operation answered;Use for battery is provided with secret key calibration link, can be with normal use battery just after verifying successfully
The identification of battery uniqueness provides reliable guarantee, prevents that battery is disassembled in use, battery modules and battery management
Potential safety hazard caused by device is used separately etc.;The data such as secret key are stored using block chain technology, utilize block chain
Characteristic causes the secret key related to battery equivalent to fingerprint, to ensure that secret key will not be changed and stolen, be advantageous to exclude battery peace
Full hidden danger, the protection to battery user's personal safety as well as the property safety is realized, and be beneficial to management of the battery bag manager to battery, can
The security performance of product is significantly improved, and can be applied to various vehicles.
Methods and apparatus of the present invention, equipment may be achieved in many ways.For example, software, hardware, firmware can be passed through
Or any combinations of software, hardware, firmware realize methods and apparatus of the present invention, equipment.The step of for method
Order is stated merely to illustrate, order described in detail above is not limited to the step of method of the invention, unless with other
Mode illustrates.In addition, in certain embodiments, the present invention can be also embodied as recording program in the recording medium, this
A little programs include being used for the machine readable instructions for realizing the method according to the invention.Thus, the present invention also covering storage is used to hold
The recording medium of the program of row the method according to the invention.
Description of the invention provides for the sake of example and description, and is not exhaustively or by the present invention
It is limited to disclosed form.Many modifications and variations are obvious for the ordinary skill in the art.Select and retouch
State embodiment and be to more preferably illustrate the principle and practical application of the present invention, and one of ordinary skill in the art is managed
The present invention is solved so as to design the various embodiments with various modifications suitable for special-purpose.
The embodiment provides A1, a kind of battery to use verification method, wherein, including:Receive for battery
Use request, obtain the first key value corresponding with the battery;The identification information of the battery is obtained, use is default
AES the identification information is encrypted calculating, obtains the second key value;By the first key value and described second
Key value is compared, and determines described use asks whether pass through checking based on comparison result;If it is determined that described use request
By checking, then battery is performed and the operation corresponding using request.
A2, the method as described in A1, wherein, in addition to:If it is determined that described pass through checking using request, then in block chain
Second key value is stored in node;Wherein, when being verified next time to the use request, by second key
Value is used as the first key value.
A3, the method as described in A2, wherein, the acquisition first key value corresponding with the battery includes:Institute
It is newest key value as the first key value to state and storage time is obtained in block chain node relative to current point in time.
A4, the method as described in A3, wherein, if the battery uses to be first, the first key value obtained
For the default key value in the block chain node.
A5, the method as described in A1, wherein, the identification information for obtaining the battery:Obtain battery modules ID and
Battery manager ID;Based on the battery modules ID and battery manager ID generation battery IDs.
A6, the method as described in A5, wherein, battery modules are obtained according to the data generation related to the battery
Battery modules ID;Wherein, the data related to the battery include:Battery manufacture manufacturer, device name, sequence number, system
Make the date.
A7, the method as described in A5, wherein, in addition to:The battery modules ID and battery manager ID is combined,
Generate the battery ID;Calculating is encrypted to the battery ID using default AES, obtains second key value;
Wherein, the default AES includes:MD5 algorithms.
A8, the method as described in A7, wherein, in addition to:Calculating is encrypted to the battery ID using MD5 algorithms, will
The MD5 values of acquisition are used as second key value;Wherein, the computations include:The battery ID is entered row information filling,
Filling result interpolation data, measured magic number are handled addition result, to result progress loop computation.
A9, the method as described in A7, wherein, second key value includes:Regular length is the binary number of 128
Value, 16 binary values that regular length is 32.
A10, the method as described in A1, wherein, in addition to:By the first key value and the second key value step-by-step by
One is contrasted, if each is all identical corresponding for the first key value and second key value, it is determined that described
Pass through checking using request.
B11, a kind of battery system, wherein also including:Battery manager, including:Data reception module, for receiving pair
Asked in the use of battery;Key Acquisition Module, for obtaining the first key value corresponding with the battery;Cipher key calculation mould
Block, for obtaining the identification information of the battery, calculating is encrypted to the identification information using default AES, obtained
Obtain the second key value;Key verification module, for the first key value to be compared with second key value, based on than
Determine described use asks whether pass through checking to result;Battery control module, for if it is determined that described passed through using request
Checking, then battery is performed and the operation corresponding using request.
B12, the system as described in B11, wherein, in addition to:Data memory module, for if it is determined that described use request
By checking, then second key value is stored in block chain node;Wherein, tested next time using request described
During card, using second key value as the first key value.
B13, the system as described in B12, wherein, the Key Acquisition Module, for being obtained in the block chain node
Storage time is newest key value as the first key value relative to current point in time.
B14, the system as described in B13, wherein, if the battery uses to be first, the Key Acquisition Module obtains
The first key value taken is the default key value in the block chain node.
B15, the system as described in B11, wherein, the cipher key calculation module, for obtaining battery modules from battery modules
ID and battery manager ID, based on the battery modules ID and battery manager ID generation battery IDs.
B16, the system as described in B15, wherein, the cipher key calculation module, for obtain battery modules according to it is described
The battery modules ID of the related data generation of battery;Wherein, the data related to the battery include:Battery manufacture
Manufacturer, device name, sequence number, build date.
B17, the system as described in B15, wherein, the cipher key calculation module, for by the battery modules ID and described
Battery manager ID is combined, and generates the battery ID;Calculating is encrypted to the battery ID using default AES, obtained
Obtain second key value;Wherein, the default AES includes:MD5 algorithms.
B18, the system as described in B17, wherein, in addition to:The cipher key calculation module, for using MD5 algorithms to institute
State battery ID and calculating is encrypted, using the MD5 values of acquisition as second key value;Wherein, the computations include:It is right
The battery ID enter row information filling, to filling result interpolation data, measured magic number to addition result handled, it is right
Result carries out loop computation.
B19, the system as described in B17, wherein, second key value includes:Regular length is the binary number of 128
Value, 16 binary values that regular length is 32.
B20, the system as described in B11, wherein, the key verification module, for by the first key value with it is described
Second key value step-by-step is contrasted one by one, if the first key value and second key value it is corresponding each all
It is identical, it is determined that described to pass through checking using request.
B21, the system as described in B11, wherein, in addition to:Vehicle-mounted Tbox modules;The battery manager passes through the car
Tbox is carried to be communicated with other parts, wherein, other parts include:On-vehicle parts, APP applications.
C22, a kind of automobile, wherein, including the battery system as described in B11 to any one of B21.
Claims (10)
1. a kind of battery uses verification method, it is characterised in that including:
The use request for battery is received, obtains the first key value corresponding with the battery;
The identification information of the battery is obtained, calculating is encrypted to the identification information using default AES, is obtained
Second key value;
The first key value is compared with second key value, whether the use request is determined based on comparison result
Pass through checking;
If it is determined that described pass through checking using request, then to battery execution and the operation corresponding using request.
2. the method as described in claim 1, it is characterised in that also include:
If it is determined that described pass through checking using request, then second key value is stored in block chain node;Wherein, under
When once being verified to the use request, using second key value as the first key value.
3. method as claimed in claim 2, it is characterised in that described to obtain the first key value bag corresponding with the battery
Include:
It is newest key value as described first that storage time is obtained in the block chain node relative to current point in time
Key value.
4. method as claimed in claim 3, it is characterised in that
If the battery uses to be first, the first key value obtained is default close in the block chain node
Key value.
5. the method as described in claim 1, it is characterised in that the identification information for obtaining the battery:
Obtain battery modules ID and battery manager ID;
Based on the battery modules ID and battery manager ID generation battery IDs.
6. a kind of battery system, it is characterised in that also include:
Battery manager, including:
Data reception module, for receiving the use request for battery;
Key Acquisition Module, for obtaining the first key value corresponding with the battery;
Cipher key calculation module, for obtaining the identification information of the battery, using default AES to the identification information
Calculating is encrypted, obtains the second key value;
Key verification module, it is true based on comparison result for the first key value to be compared with second key value
Fixed described use asks whether pass through checking;
Battery control module, for if it is determined that described use asks by checking, then to perform battery and described use is asked
Corresponding operation.
7. system as claimed in claim 6, it is characterised in that also include:
Data memory module, for if it is determined that it is described using request by checking, then described the is stored in block chain node
Two key values;Wherein, it is when being verified next time to the use request, second key value is close as described first
Key value.
8. system as claimed in claim 7, it is characterised in that
The Key Acquisition Module, it is newest for obtaining storage time in the block chain node relative to current point in time
Key value as the first key value.
9. system as claimed in claim 8, it is characterised in that
If the battery uses to be first, the first key value that the Key Acquisition Module obtains is in the block
Default key value in chain node.
A kind of 10. automobile, it is characterised in that
Including the battery system as described in any one of claim 6 to 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710984461.0A CN107743065A (en) | 2017-10-20 | 2017-10-20 | Battery uses verification method, battery system and automobile |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710984461.0A CN107743065A (en) | 2017-10-20 | 2017-10-20 | Battery uses verification method, battery system and automobile |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107743065A true CN107743065A (en) | 2018-02-27 |
Family
ID=61237890
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710984461.0A Pending CN107743065A (en) | 2017-10-20 | 2017-10-20 | Battery uses verification method, battery system and automobile |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107743065A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108537545A (en) * | 2018-04-04 | 2018-09-14 | 江西迪比科股份有限公司 | A kind of method and system that the automobile batteries group based on block chain is verified, charged |
CN109543788A (en) * | 2018-11-08 | 2019-03-29 | 深圳市云雄能源管理有限公司 | A kind of battery information management method, device, storage medium and system |
CN109788353A (en) * | 2018-12-05 | 2019-05-21 | 安徽站乾科技有限公司 | A kind of set-top box encryption copy prevention method |
CN110346745A (en) * | 2019-07-30 | 2019-10-18 | 福建星云电子股份有限公司 | A kind of battery modules detection instrument checking tool |
CN114465731A (en) * | 2022-03-01 | 2022-05-10 | 上海万向区块链股份公司 | Battery credible encryption management system and method based on block chain |
CN115458822A (en) * | 2022-10-09 | 2022-12-09 | 四川长虹网络科技有限责任公司 | Battery control system and method |
WO2023230768A1 (en) * | 2022-05-30 | 2023-12-07 | 北京小米移动软件有限公司 | Battery encryption circuit, battery check method and apparatus, device and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060178170A1 (en) * | 2005-02-08 | 2006-08-10 | Samsung Electronics Co., Ltd. | Wireless communication device having battery authentication, and associated method |
CN102035009A (en) * | 2009-09-16 | 2011-04-27 | 寰群科技股份有限公司 | Secondary battery device with anti-theft function, power supply control device and anti-theft method of secondary battery |
CN102386652A (en) * | 2010-08-27 | 2012-03-21 | 株式会社电装 | Battery management apparatus |
CN105597317A (en) * | 2015-12-24 | 2016-05-25 | 腾讯科技(深圳)有限公司 | Virtual object display method, device and system |
CN106026219A (en) * | 2015-03-31 | 2016-10-12 | 瑞萨电子株式会社 | Battery control ic, battery pack, and authentication method thereof |
CN106329585A (en) * | 2015-06-19 | 2017-01-11 | 中兴新能源汽车有限责任公司 | Wireless charging authentication method and device |
-
2017
- 2017-10-20 CN CN201710984461.0A patent/CN107743065A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060178170A1 (en) * | 2005-02-08 | 2006-08-10 | Samsung Electronics Co., Ltd. | Wireless communication device having battery authentication, and associated method |
CN102035009A (en) * | 2009-09-16 | 2011-04-27 | 寰群科技股份有限公司 | Secondary battery device with anti-theft function, power supply control device and anti-theft method of secondary battery |
CN102386652A (en) * | 2010-08-27 | 2012-03-21 | 株式会社电装 | Battery management apparatus |
CN106026219A (en) * | 2015-03-31 | 2016-10-12 | 瑞萨电子株式会社 | Battery control ic, battery pack, and authentication method thereof |
CN106329585A (en) * | 2015-06-19 | 2017-01-11 | 中兴新能源汽车有限责任公司 | Wireless charging authentication method and device |
CN105597317A (en) * | 2015-12-24 | 2016-05-25 | 腾讯科技(深圳)有限公司 | Virtual object display method, device and system |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108537545A (en) * | 2018-04-04 | 2018-09-14 | 江西迪比科股份有限公司 | A kind of method and system that the automobile batteries group based on block chain is verified, charged |
CN109543788A (en) * | 2018-11-08 | 2019-03-29 | 深圳市云雄能源管理有限公司 | A kind of battery information management method, device, storage medium and system |
CN109788353A (en) * | 2018-12-05 | 2019-05-21 | 安徽站乾科技有限公司 | A kind of set-top box encryption copy prevention method |
CN110346745A (en) * | 2019-07-30 | 2019-10-18 | 福建星云电子股份有限公司 | A kind of battery modules detection instrument checking tool |
CN110346745B (en) * | 2019-07-30 | 2023-12-05 | 福建星云电子股份有限公司 | Battery module detects check-up frock for instrument |
CN114465731A (en) * | 2022-03-01 | 2022-05-10 | 上海万向区块链股份公司 | Battery credible encryption management system and method based on block chain |
CN114465731B (en) * | 2022-03-01 | 2023-12-29 | 上海万向区块链股份公司 | Battery trusted encryption management system and method based on blockchain |
WO2023230768A1 (en) * | 2022-05-30 | 2023-12-07 | 北京小米移动软件有限公司 | Battery encryption circuit, battery check method and apparatus, device and storage medium |
CN115458822A (en) * | 2022-10-09 | 2022-12-09 | 四川长虹网络科技有限责任公司 | Battery control system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107743065A (en) | Battery uses verification method, battery system and automobile | |
CN109359974A (en) | Block chain method of commerce and device, electronic equipment | |
CN110046996A (en) | The generation method and device of block chain transaction | |
CN109409122A (en) | File memory method and its electronic equipment, storage medium | |
CN110460439A (en) | Information transferring method, device, client, server-side and storage medium | |
CN111989893A (en) | Chain of proof and decomposition | |
CN109478279A (en) | Method and system for realizing block chain | |
CN109472164A (en) | The verification method and its network and electronic equipment of contract dataset | |
CN103401844B (en) | The processing method of operation requests and system | |
CN108268767A (en) | Web application authorization method and device | |
CN109479000A (en) | Reutilization system, key generating device, data security devices, car-mounted computer, reuse method and computer program | |
CN106416124A (en) | Semi-deterministic digital signature generation | |
JP2002537685A (en) | How to verify the use of a public key generated by an onboard system | |
CN107483485A (en) | Generation method, authorization method, relevant apparatus and the terminal device of authorization code | |
CN101420300A (en) | Double factor combined public key generating and authenticating method | |
CN112288434B (en) | Privacy transaction method, device, zero knowledge proof system and privacy transaction architecture model | |
CN109886687A (en) | A kind of result verification method and system for realizing multi-party computations based on block chain | |
CN109905360A (en) | Data verification method and terminal device | |
CN109491965A (en) | The storage method and its network and electronic equipment of purchase sale of electricity contract | |
CN112270005B (en) | Data transmission method and system | |
CN108768963A (en) | The communication means and system of trusted application and safety element | |
CN112019326A (en) | Vehicle charging safety management method and system | |
CN108717666A (en) | Personalized vehicle insurance computational methods, system and terminal based on block chain | |
CN110519274A (en) | Block chain information transmission method, device, equipment and storage medium | |
US20230179412A1 (en) | Private key creation using location data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180227 |
|
RJ01 | Rejection of invention patent application after publication |