CN102404312B - Points of trust is used to provide service - Google Patents
Points of trust is used to provide service Download PDFInfo
- Publication number
- CN102404312B CN102404312B CN201110276927.4A CN201110276927A CN102404312B CN 102404312 B CN102404312 B CN 102404312B CN 201110276927 A CN201110276927 A CN 201110276927A CN 102404312 B CN102404312 B CN 102404312B
- Authority
- CN
- China
- Prior art keywords
- trust
- points
- vehicles
- information
- mobile
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60L—PROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
- B60L3/00—Electric devices on electrically-propelled vehicles for safety purposes; Monitoring operating variables, e.g. speed, deceleration or energy consumption
- B60L3/12—Recording operating variables ; Monitoring of operating variables
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60L—PROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
- B60L53/00—Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles
- B60L53/60—Monitoring or controlling charging stations
- B60L53/65—Monitoring or controlling charging stations involving identification of vehicles or their battery types
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60L—PROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
- B60L2240/00—Control parameters of input or output; Target parameters
- B60L2240/40—Drive Train control parameters
- B60L2240/54—Drive Train control parameters related to batteries
- B60L2240/545—Temperature
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60L—PROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
- B60L2240/00—Control parameters of input or output; Target parameters
- B60L2240/40—Drive Train control parameters
- B60L2240/54—Drive Train control parameters related to batteries
- B60L2240/547—Voltage
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60L—PROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
- B60L2240/00—Control parameters of input or output; Target parameters
- B60L2240/40—Drive Train control parameters
- B60L2240/54—Drive Train control parameters related to batteries
- B60L2240/549—Current
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60L—PROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
- B60L2240/00—Control parameters of input or output; Target parameters
- B60L2240/70—Interactions with external data bases, e.g. traffic centres
- B60L2240/72—Charging station selection relying on external data
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60L—PROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
- B60L2250/00—Driver interactions
- B60L2250/10—Driver interactions by alarm
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02T—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
- Y02T10/00—Road transport of goods or passengers
- Y02T10/60—Other road transportation technologies with climate change mitigation effect
- Y02T10/70—Energy storage systems for electromobility, e.g. batteries
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02T—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
- Y02T10/00—Road transport of goods or passengers
- Y02T10/60—Other road transportation technologies with climate change mitigation effect
- Y02T10/7072—Electromobility specific charging systems or methods for batteries, ultracapacitors, supercapacitors or double-layer capacitors
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02T—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
- Y02T10/00—Road transport of goods or passengers
- Y02T10/60—Other road transportation technologies with climate change mitigation effect
- Y02T10/72—Electric energy management in electromobility
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02T—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
- Y02T90/00—Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
- Y02T90/10—Technologies relating to charging of electric vehicles
- Y02T90/12—Electric charging stations
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02T—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
- Y02T90/00—Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
- Y02T90/10—Technologies relating to charging of electric vehicles
- Y02T90/16—Information or communication technologies improving the operation of electric vehicles
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02T—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
- Y02T90/00—Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
- Y02T90/10—Technologies relating to charging of electric vehicles
- Y02T90/16—Information or communication technologies improving the operation of electric vehicles
- Y02T90/167—Systems integrating technologies related to power network operation and communication or information technologies for supporting the interoperability of electric or hybrid vehicles, i.e. smartgrids as interface for battery charging of electric vehicles [EV] or hybrid vehicles [HEV]
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S30/00—Systems supporting specific end-user applications in the sector of transportation
- Y04S30/10—Systems supporting the interoperability of electric or hybrid vehicles
- Y04S30/14—Details associated with the interoperability, e.g. vehicle recognition, authentication, identification or billing
Abstract
Disclose use points of trust and service is provided.In certain embodiments, processor may be used for by performing user authentication, platform authentication and environmental and points of trust system foundation trust.Processor can be trusted and points of trust system interaction information in response to setting up.In certain embodiments, points of trust system can cooperate to provide various service, such as convoy, battery charging, vehicle safety and/or discharge report services.
Description
Related application
This application claims the entitled " REMOTE submitted on March 23rd, 2010
MAINTENANCE " the priority of U.S. Provisional Application 61/316,498, it is integrally incorporated
Herein.
The application is the entitled of agency's Reference Number 073338.0734 of JIUYUE in 2010 submission on the 10th
“System and Methods for Remote Maintenance In An Electronic
Network With Multiple Clients " the U.S. Patent application of serial number 12/879,226
Part continuation application, it is integrally incorporated herein.
Technical field
This invention relates generally to information exchange, more specifically, be directed to use with points of trust and clothes are provided
Business.
Background technology
The service provided to client may need to send security information via communication network.Such as, visitor
Family end can send the request of service to service provider, and service provider can ask from client then
Seek payment information.The sender of security information may wish to certification recipient before sending the information.
Accompanying drawing explanation
In order to be more fully understood from the present invention and its feature and advantage, presently in connection with accompanying drawing, reference
Hereinafter describe, in the accompanying drawings:
Fig. 1 illustrates one or more service system and provides service to one or more FTP client FTPs
The example of network;
Fig. 2 illustrates the example of FTP client FTP;
Fig. 3 A-Fig. 3 C illustrates and is used for providing the example of the convoy method that (escort) services;
Fig. 4,5,6,7A-7C and 8A-8B illustrate for the method that provides battery charging services
Example;
Fig. 9 illustrates the example for the method providing vehicle safety to service;And
Figure 10 illustrates the example of the method for providing discharge report services.
Detailed description of the invention
Embodiments of the invention and its advantage are best understood by referring to Fig. 1 to Figure 10 of figure,
Identical reference is for the identical and appropriate section of each figure.
General introduction
According to the present invention it is possible to be reduced or eliminated with for providing what the prior art of service was associated to ask
Topic and shortcoming.
In certain embodiments, processor can be by performing user authentication, platform authentication and environment
Certification is operated trusts to set up with points of trust system.Processor can be trusted and letter in response to setting up
Dot system is appointed to send information.In certain embodiments, points of trust system can be cooperated to provide various clothes
Business, such as convoy, battery charging, vehicle safety and/or discharge report services.
Certain embodiments of the present invention can provide one or more technological merit.The skill of one embodiment
Art advantage can be that mobile device can include allowing mobile device efficiently to receive service
Points of trust system.Another technological merit of one embodiment can be points of trust system can cooperate with
Various service, such as convoy, battery charging, vehicle safety and/or discharge report services are provided.
Certain embodiments of the present invention can not include any technological merit in above technological merit, bag
Include some in above technological merit or all technological merits.Other technological merit roots one or more
Can be aobvious according to the claims included herein, description and accompanying drawing to those skilled in the art
And be clear to.
Fig. 1 illustrates one or more service system 10 and provides clothes to one or more FTP client FTPs 20
The example of the network 2 of business.System 10 and 20 can include can be used among system 10 and 12
Set up the points of trust system 12 trusted.In certain embodiments, mobile device can include permitting
Permitted mobile device and participated in providing the points of trust system 12 of service more efficiently.In certain embodiments,
Points of trust system 12 can cooperate to provide various service, such as convoy, battery charging, traffic work
Tool safety and/or discharge report services.
In the example illustrated, network 2 includes being coupled to one or more visitor via communication network 18
The one or more service systems 10 of family end system 20.Service system 10 can be to one or more
FTP client FTP 20 provides one or more service.Service example include escort, battery charging,
Vehicle safety and/or discharge report services.Another example of service includes managing software and/or consolidating
Part updates and/or state.
The example of service system 10 includes vehicle service center, traffic information center, Charging
System, payment system, and other system any of service can be provided to FTP client FTP 20.Hand over
Logical utility services center can be easy for providing the center of service to the vehicles.Traffic information center can
To include the center with the Real-time Traffic Information that can be used to plan drive route.Charging system is permissible
It is the power supply (such as, battery) of FTP client FTP 20 (such as, the vehicles) can be charged
System.Payment system can be the system that can pay with authorization service.The example of payment system is permissible
Including bank, credit card company, credit agency, firm, or can pay with authorization service other
Suitable tissue.
Service system 10 can include the feature allowing service system 10 to communicate with other entity security.
Such as, service system 10 can include setting up, with other entity, the points of trust system 12 trusted.Trust
Dot system 12 is described in greater detail below.As another example, service system 10 can include pipe
Reason is used for the server of the security strategy of other entity of certification.Strategy can define needs in client system
System 20 is authorized to a set of property value met before the license of service.
FTP client FTP 20 can receive service from service system 10.The example of FTP client FTP 20
Including being called computer clients end system, mobile client end system and Vehicular Client
The computer of end system, mobile device and the vehicles.
Computer can be any computing of such as server, notebook computer or desktop PC
Equipment.Mobile device can be by the handheld device of wireless communication mode.The reality of mobile device
Example include phone (such as honeycomb, movement or intelligence), digital assistants (such as individual
Or enterprise) and game station.The vehicles can be designed to transport setting of people and/or goods
Standby.The example of the vehicles include land transport (such as automobile, train, bicycle and motorcycle),
Boats and ships (such as ship and steamer) and aircraft (such as aircraft).In certain embodiments, hand over
Logical instrument can include the transceiver allowing radio communication.Communication network 18 is retouched in further detail below
State.
One or more service systems 10 and/or one or more FTP client FTP 20 can include letter
Appoint dot system 12 (or points of trust).In certain embodiments, points of trust system 12 can be by holding
Row user authentication, platform authentication and/or environmental are built with other points of trust systems 12 one or more
Vertical trust, in order to other points of trust system 12 interactive information.Certification relates to for service
Perform certification and/or the use for service performs charging.
In certain embodiments, set up trust can include from the first points of trust system to the second points of trust
System sends points of trust information, to allow second points of trust system authentication the first points of trust system.In reality
Execute in example, set up trust and can include receiving points of trust information from points of trust system, and use trust
Dot information authentication trust dot system.Points of trust information can include can be used to authentication trust dot system
Information.The example of points of trust information is more fully described with reference to Fig. 2.Trust computing and trust cube
(TrustCube) it is the method and system that can provide among points of trust system 12 and can ensure report
Example.
In certain embodiments, FTP client FTP 20 can also include one or more virtual machine (VM)
22, virtual machine manager (VMM) 24, trusted platform module architecture module (TPM) 26, the Resources list 28,
Client network system 30, resource 32 and gps receiver 40.
Trusted platform module architecture module 26 can generate the points of trust information that can be used to authentication module 26.At certain
In a little embodiments, trusted platform module architecture module (TPM) 26 can utilize points of trust system 12 to work.?
In some embodiment, trusted platform module architecture module 26 includes having can fire in processor unique
At least one processor of Rivest, Shamir and Adleman (RSA) key.Can use
RSA key carrys out the FTP client FTP 20 of authentication trust console module 26.In certain embodiments, letter
Appoint console module 26 that such as PRNG can be used to generate cryptographic key
(cryptographic key)。
In certain embodiments, virtual machine 22 can be with client network system 30 and/or and client
The process that end network system 30 is associated is corresponding.It is, for example possible to use virtual machine 22 combines biography
Sensor.One or more virtual machines 22 can run one or more operating system (OS).At certain
In a little embodiments, virtual machine 22 can share the process money of FTP client FTP 20 by virtual machine 24
Source and the operating system of use special purpose.
Virtual machine manager (VMM) 24 can create, runs, monitors and/or terminate virtual machine
22.Virtual machine manager 24 can intercept the fault between virtual machine 22 and/or interruption and/or control
Application have to hardware and/or the access of software.Virtual machine manager 24 can also be by application
And/or between the various threads of virtual machine 22 operation, share the multitask of time management processor.Virtual
Machine manager 24 can manage the communication among virtual machine 22.
The Resources list 28 can include the most addressable entity white list and/or will denied access
The blacklist of entity.
Client network 30 can be easy for the client system of the cooperation in the parts of FTP client FTP 20
Network in system 20.Such as, the net of processor during client network 30 can be the management vehicles
Network (such as FlexRay network).As another example, controller zone network (CAN or CAN
Bus) allow microcontroller and equipment to communicate with one another in the case of there is no master computer.Reality additionally
Example includes Time Triggered agreement (TTP) and avionic full-duplex switched-type Ethernet (AFDX)
Network.
Client network 30 can manage resource 32, the such as resource of FTP client FTP 20, such as,
Processor and/or their associated software, firmware and/or the process relevant with processor instruction.Example
As, client network 30 can include each using software and/or firmware so that the central authorities of work process
Unit (CPU).Client network 30 can be responsible for maintenance and/or the work of resource 32, including pipe
Manage firmware and/or the more new state of software that resource 32 each with FTP client FTP 20 be associated and/
Or version.
Global positioning system (GPS) receptor 40 and offer place and the GPS navigation of temporal information
Satellite system is docked.
Fig. 2 illustrates the example of FTP client FTP 20.FTP client FTP 20 can be computer client
System, mobile client end system or vehicular client system.In the example of example, client
End system includes interface (IF) 120, logic 122 and one or more memorizer 124.Logic
122 can include one or more processor 130 and such as points of trust module 132 and service module
The application of 134.Points of trust module 132 can include line module 140, console module 144 and
Environment module 148.Service module 134 can include convoy module 150, battery charging module 152,
Vehicle safety module 154 and discharge reporting modules 156.
Points of trust module 132 can be used to set up and the trust of other points of trust system.Points of trust mould
Block 132 can perform certification to set up trust.As discussed previously, certification relates to authorize
And/or charging.Points of trust module 132 can perform user authentication, platform authentication and/or environmental.
Points of trust module 132 can use points of trust information to perform certification.The example of points of trust information
Including user, equipment and environmental information, it is described in greater detail below.Points of trust module 132
The information of checking can be checked and meet demand to determine whether points of trust can accept.Such as, points of trust can
With it on white list or the most on the blacklist in the case of acceptable.If points of trust can connect
Be subject to, then points of trust can be allowed access to service and/or can continue and entity communication.
User authentication module 140 performs user authentication with certification user.User authentication module 140 is permissible
Use user information authentication user.User profile belongs to specific user and can be by user's typing.With
Family information can include identifier (such as username and password) and biometric information (such as physiology
Learn or behavioural information).Physiological information is relevant with the feature of health.Example include fingerprint, palmmprint,
Hand-characteristic, facial characteristics, DNA, iris or retina scanning and abnormal smells from the patient.Behavioural information with
The behavior of people is relevant.Example includes keying in rhythm, gait and voice.
Console module 144 performs platform authentication with authentication platform.Console module 144 can use by putting down
The facility information that platform provides performs certification.Facility information can include identifier (such as sign-on ID
Symbol (ID)), the network address (such as Internet protocol (IP) address), machine address (such as matchmaker
Body access control (MAC) address), certificate (such as PKIX (PKI) certificate) and
/ or other identifier of the equipment of identification.
Environment module 148 performs platform environment certification with authentication platform environment.Environment module 148 is permissible
Environmental information is used to perform certification.Environmental information can include the software letter of the software run on platform
Breath (such as software version and/or state), hardware information (such as hardware version and hardware configuration),
And by the peripheral hardware information (such as peripheral hardware identifier) of the peripheral hardware of platform management.
Service module 134 is easy to provide service to FTP client FTP 20.In instances, service includes
Convoy, battery charging, vehicle safety and/or discharge report services.However, it is possible to provide appoint
What appropriate number of any appropriate services.
Convoy module 150 performs convoy and processes, and convoy processes the road obtained according to task list planning
Line, then the instruction vehicles move along route.In certain embodiments, convoy processes and can wrap
Include and set up trust by the vehicles points of trust system of the vehicles with Mobile trust dot system.From shifting
Dynamic points of trust system receives the task list including task.Set up with service trust dot system and trust, and
The route of task is obtained from service trust dot system.The instruction vehicles move along route.At convoy
The example of reason is more fully described with reference to Fig. 3.
Battery charging module 152 performs to allow batter-charghing system to charge the battery of the vehicles
Battery charging process.In certain embodiments, battery charging process can include by the vehicles
Vehicles points of trust system authentication charging points of trust system.Send vehicles points of trust information to permit
Permitted charging points of trust system authentication vehicles points of trust system.By the battery information of vehicle battery
It is sent to points of trust system of charging.The payment information corresponding with the vehicles is sent to points of trust of charging
System is to allow charging points of trust system to battery charging.The example of battery charging process is with reference to Fig. 4
It is more fully described to Fig. 8.
Vehicle safety module 154 performs to will be responsive to the record transmission that safe trigger event is made
Process to the vehicle safety of one or more points of trust systems.Vehicle safety process certain
In a little embodiments, the vehicles points of trust system of the vehicles in vehicle environmental can sense
Safe trigger event.In response to safe trigger records vehicle environmental to produce record.Will note
Record is sent to points of trust system to allow points of trust system that record is sent to Mobile trust dot system.Letter
Dot system is appointed to be stored in data base by record.The example that vehicle safety processes is with reference to figure
9 are more fully described.
Discharge reporting modules 156 performs to collect the vehicles of the discharge for calculating the vehicles and drives
The discharge report sailing data processes.In certain embodiments, discharge report processes and can include by handing over
The vehicles points of trust systematic collection driving data of logical instrument.The center that is sent to by driving data is trusted
Dot system is to allow the one or more discharge values of the center points of trust system-computed vehicles.Discharge report
The example that announcement processes is more fully described with reference to Figure 10.
Fig. 3 to Figure 10 illustrates the example of method of servicing.In instances, FTP client FTP 20 can wrap
Include mobile device, the vehicles or other FTP client FTP.Service system 10 can include traffic
Utility services center, traffic information center, charging system or other service system.In instances,
Each system 10 and 20 can have points of trust system (or points of trust).System 10 can be passed through
With 20 other assembly and/or points of trust perform the method.
Fig. 3 illustrates the example of the method for providing the service of convoy.In instances, FTP client FTP
20 include mobile device and the vehicles, and service system 10 includes vehicle service center and friendship
Logical information centre.Points of trust (such as vehicles points of trust) can be passed through and perform method.
Task list is received from user in step 210.Task can include action to be performed (such as
Carry out groceries buying), place (address can be expressed as), firm or place type (such as
Grocery store).In certain embodiments, task list can be entered in mobile device by user.This
User can be allowed in user's incoming task list (such as when driving) at one's leisure.Mobile
Equipment moves in the vehicles together with user in step 212.The vehicles can detect someone
Enter in the vehicles, it is possible to request user provides ID.
Step 214 can be performed to 222 to set up between Mobile trust point and vehicles points of trust
Trust.In step 214 solicited message.In certain embodiments, request may require that and includes from user
The user profile obtained and the points of trust information of the Mobile trust dot information provided by mobile device.Move
Dynamic points of trust generates points of trust information in step 216.
Information is received in step 218.In step 220, vehicles points of trust checks that Mobile trust point is
No acceptable.Points of trust can be checked by performing user, platform and/or environmental.If moved
Dynamic points of trust is unacceptable, then method returns to step 214 with solicited message again.If mobile letter
Appoint point acceptable, then method proceeds to step 222, and wherein, the vehicles are according to user profile and shifting
Whether dynamic points of trust information check user and mobile device can accept.If user and mobile device can not
Accept, then method returns step 214 with solicited message again.If user and mobile device can accept,
Then method proceeds to step 224.
Vehicles points of trust is in step 224 request task list.In step 226 from Mobile trust point
Receive task list.Vehicles points of trust asks route in step 228 from center points of trust.
Step 230 can be performed to 238 to set up between center points of trust and vehicles points of trust
Trust.Center points of trust in step 230 solicited message with certification vehicles points of trust.The vehicles
Points of trust generates points of trust information in step 232.Points of trust information can include being provided by the vehicles
Facility information, user profile and/or Mobile trust dot information.
In step 234, points of trust information is sent to center points of trust, to allow center points of trust certification
Vehicles points of trust.In step 236, center points of trust checks whether vehicles points of trust can connect
It is subject to.Can be considered as can accept by points of trust in the case of points of trust information is acceptable.Can by from
The information of acceptable points of trust is considered as credible;Can will regard from the information of unacceptable points of trust
For being unworthy trusting.If vehicles points of trust is unacceptable, then method returns center points of trust again
The step 230 of secondary solicited message.If vehicles points of trust can accept, then method proceeds to step
238。
In step 238, center points of trust checks whether user and the vehicles can accept.Can be according to plan
Slightly it is considered as can accept by entity.Strategy can be specified needs what kind of letter in order to acceptable from entity
Breath.Such as, strategy can specify the what kind of user profile of needs, facility information and/or environment
Information.If they are not, then method returns step 230, center points of trust solicited message again.
If they can accept, then method proceeds to step 240.
Step 240 can be performed to 244 to obtain the route of task.Center points of trust is in step 240
Send the request of route.Traffic information center sends route in step 242.Can be according to real-time traffic
Report programme path.For example, it is possible to programme path is to avoid traffic congestion.Center points of trust is in step
244 routes are transmitted to vehicles points of trust.
Vehicles points of trust sends the request of payment information in step 246 to Mobile trust point.Mobile
Points of trust is in step 248 and 250 certification vehicles points of trust.Mobile trust point is in step 252
Deliver letters breath.
Start to escort in step 254.Convoy can be performed by any suitable method.Such as, traffic
The one or more parts of instrument may indicate that the vehicles move along route or may indicate that use
Family is along route mobile traffic.
Perform step 256 to 264 to check center points of trust.The vehicles in step 256 to center
Points of trust sends the request of user account.Center points of trust generates and sends points of trust letter in step 258
Breath.Points of trust information is received in step 260.The vehicles check traffic work in step 262 and 264
Tool service centre.
Payment information is sent in step 266.Vehicle service center updates user's account in step 268
Family, and send the result to vehicles points of trust in step 270.Vehicles points of trust is in step
272 forward the result to Mobile trust point.
Fig. 4 to Fig. 8 illustrates the example of the method for providing battery charging services.Fig. 4 illustrates and is used for
The example overview of the method for battery charging services is provided.In instances, FTP client FTP 20 includes moving
Dynamic equipment and the vehicles, service system 10 includes charging system and payment system.Can be by letter
Point (vehicles points of trust of the such as vehicles) is appointed to perform method.
In certain embodiments, send from mobile device rather than store in a vehicle to authorize clothes
The information that business pays.This is possible to prevent uncommitted people obtain the vehicles and obtain service.At certain
In a little situations, to obtaining user's charge of service via Mobile trust point less than not using Mobile trust point
User.In these cases, the user of Mobile trust point is used can to cause less problem and wind
Danger is less.Correspondingly, service provider can pay less insurance for points of trust user, and because of
And can provide service at lower cost.Furthermore it is possible to encourage user in the case of cost is less
Use the use of points of trust.
In some embodiments it is possible to step 308 perform certification with vehicles points of trust with fill
Set up between electricity points of trust and trust.In certain embodiments, certification can be included in vehicles trust
Point receives charging points of trust information, and uses charging points of trust authentification of message charging points of trust.Certification
Can also include sending vehicles points of trust information to allow charging points of trust certification vehicles letter
Ren Dian.
Any suitable points of trust information can be used.Charging points of trust information can include charging system
Identifier (such as service provider's title and/or machine identifier) and system mode (in such as working or
Get out charging).Vehicles points of trust information can include that such as facility information and/or user are believed
Breath.Vehicle device information can include the vehicles describe (such as manufacture and/or model) and/
Or vehicle identification numbers.
Vehicles points of trust is in step 310 request charging.Charging points of trust asks electricity in step 312
Pond information.Battery information can include describe battery parameter, such as, the voltage of battery, manufacture,
Model, current charge (such as x% capacity), capacity, vacancy, temperature or further feature.?
Battery information is sent to points of trust of charging by step 314.
Charging points of trust authorizes vehicles points of trust in step 316.Charging points of trust is in step 318
Charging is got out to vehicles points of trust notice charging system.Vehicles points of trust is in step 320
Authorize the vehicles.
In a particular embodiment, certification can be performed in step 321, with vehicles points of trust with
Set up between Mobile trust point and trust.In a particular embodiment, certification can be included in vehicles letter
Point is appointed to receive Mobile trust dot information and use Mobile trust dot information certification Mobile trust point.Certification
Can also include sending vehicles points of trust information, to allow the Mobile trust point certification vehicles to believe
Ren Dian.
Vehicles points of trust asks the payment information of user account in step 322 from Mobile trust point.
The payment information corresponding with account is received from Mobile trust point in step 324.Payment information can include
Allow information account charged for service.In certain embodiments, Mobile trust point can connect
Receive the key allowing Mobile trust point encryption payment information.
Send payment information to charge points of trust or be sent to payment system in step 326, to permit
Permitted charging points of trust battery is charged.Charging points of trust can forward the information to payment system.
Payment system is in step 328 account with power of attorney, and in step 330, account authorization is sent to the vehicles.
Vehicles points of trust is in step 332 authority to pay.
Vehicles points of trust performs status checkout in step 334.Status checkout can relate to determining to be awarded
Weigh the vehicles and/or authorized payment.Status checkout can relate to determining that the vehicles are in charging
Period cannot move, and such as, the vehicles are berthing and are being provided with brake.If status checkout is not
Qualified, then send alarm to Mobile trust point.If status checkout passes through, then the vehicles are in step
336 send request to start to charge up.
Charging system starts to charge the vehicles in step 338.In step 340, charged state is sent out
Give Mobile trust point.When charged state may indicate that the electric charge of battery and charges remaining to battery
Between.Mobile device can show charged state.In certain embodiments, charging system can be connected
Intelligence instrument (such as ammeter or solar panel harvester) to energy source cooperates.Intelligence instrument can
Can assess the charge parameter in such as charging interval.
Fig. 5 illustrates the method for being mutually authenticated between vehicles points of trust and charging points of trust
Example.In step 410, the vehicles detect that battery is at alert level.Alert level can be should
To battery charging rank, such as, less than 10,10 to 25 or 25 to 50 percentage ratio electricity
Rank in the scope of lotus.
Vehicles points of trust step 412 from charging points of trust solicited message.Charging points of trust is in step
Rapid 414 generate points of trust information, and send information to vehicles points of trust in step 416.Hand over
In step 418, logical instrument points of trust determines whether charging points of trust can accept.If charging points of trust is not
Acceptable, then method returns the step 412 of vehicles solicited message again.If charging points of trust
Acceptable, then method proceeds to vehicles points of trust and can connect to charging points of trust notice charging points of trust
The step 420 being subject to.
Charging points of trust in step 422 from vehicles points of trust solicited message.Vehicles points of trust
Generate points of trust information in step 424 and send information in step 426.Charging points of trust is in step
428 determine whether vehicles points of trust can accept.If vehicles points of trust is unacceptable, then
Method returns step 422 with solicited message again.If vehicles points of trust can accept, then method
Proceed to step 430 can accept to vehicles points of trust notice vehicles points of trust.Method can
To be continued by Fig. 6,7 or 8.
Fig. 6 illustrates for the example to the method that the battery of the vehicles is charged.The vehicles are believed
Appoint point in step 432 from charging points of trust request charging.Charging points of trust asks battery in step 434
Information.Vehicles points of trust sends battery information in step 436.Charging points of trust is in step 438
Charge type is set.Charge type can include the electricity described by battery information to provide to battery
The amount of lotus.In step 440, charging station is connected to the vehicles.
Step 442 charge points of trust request payment information, and vehicles points of trust by request forwarding
To Mobile trust point.Mobile trust point sends payment information to the traffic in step 444 forwarding information
Instrument points of trust.The mandate that charging points of trust pays in step 446 request.Payment system is in step
448 pay to points of trust notified on authorization of charging.
The battery of the vehicles is charged by charging station in step 450.The vehicles show in step 452
The state of charging.Charged state is sent to mobile device in step 454 by the vehicles, and mobile
Equipment shows this state in step 456.Charging terminates in step 458.Charging points of trust is in step
460 requests pay, and vehicles points of trust pays in step 462 notified on authorization.Charging points of trust
Charge information is sent subsequently in step 464.
Fig. 7 illustrates for another example to the method that the battery of the vehicles charges.Step 510
Can be essentially similar to 442 with the step 432 of Fig. 6 to 520.
Step 522 to 540 perform to be mutually authenticated with Mobile trust point and vehicles points of trust it
Between set up trust.Vehicles points of trust in step 522 from Mobile trust point solicited message.Mobile letter
Appoint point to generate points of trust information in step 524, and send information to vehicles letter in step 526
Ren Dian.In step 528, vehicles points of trust checks whether Mobile trust point can accept.If it is mobile
Points of trust is unacceptable, then method returns step 522, again solicited message.If Mobile trust point
Acceptable, then method proceeds to step 530, and wherein, vehicles points of trust is led to Mobile trust point
Know that Mobile trust point can accept.
Mobile trust point in step 532 from vehicles points of trust solicited message.Vehicles points of trust
Generate points of trust information in step 534, and send information to Mobile trust point in step 536.Move
In step 538, dynamic points of trust checks whether vehicles points of trust can accept.If the vehicles are trusted
Point is unacceptable, then method returns step 532, again solicited message.If vehicles points of trust
Acceptable, then method proceeds to step 540, and Mobile trust point notifies traffic to vehicles points of trust
Instrument points of trust can accept.
Vehicles points of trust information generates one time key in step 542, and in step 554 by one
Secondary property key is sent to Mobile trust point.Mobile trust point uses one time key to encrypt in step 546
Payment information.Encryption payment information can include the credit number such as encrypted.Mobile trust point is subsequently
In step 548, the payment information of encryption is sent to vehicles points of trust.Vehicles points of trust exists
Step 550 deciphers payment information.Step 552 can be with step 444 to 464 substantially class to 576
Seemingly.
Fig. 8 illustrates for another example to the method that the battery of the vehicles is charged.Step
610 to 620 can be substantially similar to 442 with step 432.
Step 622 is described as mobile device to 628 and generates the vehicle service center of key.Traffic
Instrument points of trust asks one time key in step 622 from center points of trust.Center points of trust is in step
624 generate one time keys, and in step 626, one time key are sent to vehicles points of trust
And it is sent to Mobile trust point in step 628.Step 630 can be with step 546 to 576 to 660
Substantially similar.
Fig. 9 illustrates the example for the method providing vehicle safety to service.Can be at the vehicles
Environment performs the method by the vehicles points of trust of the vehicles.Vehicle environmental can wrap
Include at least some of of any content in herein below: the inside of the vehicles, the outside of the vehicles
And/or the region around the vehicles.
Safe trigger event is detected in step 710.Safe trigger event can be visual phenomenon (such as
Flash of light), hearing phenomenon (such as impact sound) or mobile (such as shake or vibrate).
In step 712 recording vehicle environment to produce record.Can regard by being configured to detection
Feel and/or any suitable equipment (such as picture pick-up device or recorder) the recording traffic work of audible signal
Tool environment.In step 714, record is sent to center points of trust.
Record is stored in data base by center points of trust in step 716.The record of storage can be used
As the evidence in the hearing about safe trigger event.Record is sent out by center points of trust in step 718
Give Mobile trust point.The user of mobile device can play record subsequently.
Figure 10 illustrates the example of the method for providing discharge report services.The vehicles can be passed through
Vehicles points of trust perform method.
Driving data is collected in step 730.Driving data can include any conjunction that can calculate discharge
Suitable data.Such as, data can include temperature, noise and the discharge from aerofluxus detection.Drive number
According to identifying that only battery operationally discharges in work or both in work, only engine
Emission.In certain embodiments, driving data can not include the personal data of user.?
In other embodiments, personal data can be included.
In step 732, driving data is sent to center points of trust.Center points of trust is in step 734
Calculate the discharge value of the vehicles.For example, it is possible to calculating CO2 emission.
Without departing from the present invention device disclosed herein and system can be made
Revise, add or omit.The parts of device and system can be integrated or separate.Furthermore, it is possible to
Device and the operation of system is performed by more, less or other parts.For example, it is possible to it is logical
Cross parts and perform service module 134 and the operation of points of trust module 132, or can be by many
The operation of module 132 or 134 is performed in parts.Further, it is possible to use include software, hardware
And/or any suitable logic of other logic performs device and the operation of system.As presents makes
, " each " refers to each component of set or each component of the subclass of set.
Without departing from the present invention the methods disclosed herein can be made amendment, add
Add or omit.Method can include more, less or other step.Furthermore it is possible to press
Any proper order performs step.
In some embodiments it is possible to the first step prior to (such as causing) second step will be performed
Entity be considered as contributing to second step.Such as, as sporocarp performs step A prior to step B,
Then entity also contributes to step B.In some embodiments it is possible to it is permissible prior to second instance performing
The first instance of the first step of the second step performed is considered as allowing second instance to perform second step.
Such as, if first instance performs step A of step B that can perform prior to second instance, then
First instance allows also to second instance and performs step B.
The parts of device disclosed herein and system can include interface, logic, memorizer and/or
Other appropriate members.Interface inputs, and sends output, processes input and/or output, and/or holds
Other proper operation of row.Interface can include hardware and/or software.
The operation of logic execution unit, such as, performs the instruction in order to generate output according to input.Patrol
Collect and can include hardware, software and/or other logic.Logic can be coded in one or more to be had
In shape media and operation can be performed when being performed by computer.
Some logic (such as processor) can manage the operation of parts.Processor can include grasping
Make to explain and/or perform the logic (such as equipment or device) of other logic.The example bag of processor
Include in herein below in any content is one or more: computer, microprocessor, microcontroller,
Digital signal processor (DSP), special IC (ASIC) or be configured to explain and/
Or perform programmed instruction and/or process any other numeral or analog circuit of data.
In a particular embodiment, computer program, software, computer can be had to perform by coding
Instruct and/or can be held by the one or more computer-readable medias of the instruction that computer performs
The operation of row embodiment.In a particular embodiment, can be by storing, implementing and/or encode meter
Calculation machine program and/or there is storage and/or the one or more computers of computer program of coding can
Read media and perform the operation of embodiment.
The logic of such as digital content (" content ") can be wrapped (such as, software (including updating))
Include file, code (such as object or executable code), data record and/or client can access
Other data structure electronically any.Example can include text, electronic watch
Lattice, Email, medical records, image, webpage, program (such as word processing and file management
Program) and/or other electronic data or program.
Memory stores information.Memorizer can include one or more non-transitory, tangible,
Computer-readable and/or computer executable storage media.The example of memorizer includes computer
Memorizer (such as, random access storage device (RAM), read only memory (ROM) or electricity
Erasable Programmable Read Only Memory EPROM (EEPROM), mass memory media (such as, hard disk),
Dismountable storage media (such as, compact disk (CD) or digital video disc (DVD)), data base
And/or the network storage (such as, server), even if and/or also retaining in the case of not providing electric energy
Other computer-readable medium of data or volatibility or nonvolatile memory.
Can be by any suitable communications coupling device communicated according to any suitable communication protocols
Assembly with system.Communication network (e.g., network 18) can include in herein below one or more
Many part or all: public switch telephone network (PSTN), publicly-owned or private data network, office
Territory net (LAN), Metropolitan Area Network (MAN) (MAN), wide area network (WAN), local, Virtual Private Network (VPN),
The region of such as the Internet or global communication or computer network, wired or wireless network, enterprise
In-house network, other suitable communication link, or any combination of any content in content before this.Communication
Network can include router, hub, switch, gateway, call controller and/or with any
Suitable form or other suitable assembly any of layout.
Although the aspect in some embodiment describes the disclosure, but the change of embodiment and conversion will
Can will be apparent to practitioners skilled in the art.Correspondingly, the above description of embodiment is not intended to this
Open.In the case of without departing from scope and spirit of the present invention as defined by the appended claims permissible
There is other to change, replace and conversion.
Claims (7)
1. the method that the service being associated with the vehicles is provided, including:
By the vehicles points of trust system of the vehicles by following steps and the first points of trust system
Set up and trust:
At least one user profile and facility information is received from described first points of trust system,
And
User according to the vehicles described in described user profile or described facility information certification or
The equipment being associated with the user of the described vehicles;
The task list including multiple task, the plurality of task is received from described first points of trust system
Treat to be performed by the user of the described vehicles;
By sending vehicles points of trust information to allow described second letter to the second points of trust system
Appoint vehicles points of trust system described in dot system certification, set up letter with described second points of trust system
Appoint;
The route performing the plurality of task is obtained from described second points of trust system;And
The described vehicles are indicated to move along described route.
2. the method for claim 1, also includes:
The second points of trust information is received from described second points of trust system;
According to the second points of trust system described in described second points of trust authentification of message;And
Payment information is sent to described second points of trust system.
3. the method that the service being associated with the vehicles is provided, including:
By the vehicles points of trust system authentication charging points of trust system of the vehicles;
Vehicles points of trust information is sent, to allow described charging letter to described charging points of trust system
Appoint vehicles points of trust system described in dot system certification;
The battery information of the battery of the described vehicles is sent to described charging points of trust system;
The request to payment information is received from described charging points of trust system;
Vehicles letter is sent to the Mobile trust dot system being associated with the user of the described vehicles
Appoint dot information, to allow vehicles points of trust system described in described Mobile trust dot system certification;
After vehicles points of trust system described in described Mobile trust dot system success identity, from institute
State Mobile trust dot system and receive described payment information;And
The payment information corresponding with the described vehicles that will receive from described Mobile trust dot system
It is sent to described charging points of trust system, to allow described charging points of trust system that battery is filled
Electricity.
4. method as claimed in claim 3, also includes:
Key is sent to described Mobile trust dot system, to allow described Mobile trust dot system to encrypt
Described payment information.
5. method as claimed in claim 3, also includes:
Display shows the charged state of the electric charge of described battery.
6. method as claimed in claim 3, also includes:
Will indicate that the charged state of the electric charge of described battery is sent to Mobile trust dot system, to allow
State Mobile trust dot system and show described charged state.
7. method as claimed in claim 3, also includes:
Key is received from points of trust center;And
Send the key to described Mobile trust dot system, to allow described Mobile trust dot system
Encrypt described payment information.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/879,226 US9059978B2 (en) | 2010-03-23 | 2010-09-10 | System and methods for remote maintenance in an electronic network with multiple clients |
US12/879,226 | 2010-09-10 | ||
US13/053,670 US9286485B2 (en) | 2010-03-23 | 2011-03-22 | Using trust points to provide services |
US13/053,670 | 2011-03-22 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102404312A CN102404312A (en) | 2012-04-04 |
CN102404312B true CN102404312B (en) | 2016-08-10 |
Family
ID=45886099
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110276927.4A Active CN102404312B (en) | 2010-09-10 | 2011-09-08 | Points of trust is used to provide service |
Country Status (2)
Country | Link |
---|---|
JP (2) | JP5927815B2 (en) |
CN (1) | CN102404312B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102522318B (en) * | 2011-12-30 | 2013-11-27 | 厦门大学 | Self-splitting and transfer method for GaN-based epitaxial film |
US9854438B2 (en) * | 2013-03-06 | 2017-12-26 | Gogoro Inc. | Apparatus, method and article for authentication, security and control of portable charging devices and power storage devices, such as batteries |
JP6210020B2 (en) * | 2014-05-26 | 2017-10-11 | 株式会社オートネットワーク技術研究所 | Power storage device and power supply system |
JP6477281B2 (en) * | 2015-06-17 | 2019-03-06 | 株式会社オートネットワーク技術研究所 | In-vehicle relay device, in-vehicle communication system, and relay program |
DE102018007859A1 (en) * | 2018-10-05 | 2020-04-09 | Daimler Ag | Method for controlling a charging station for charging vehicles, and a charging station and a vehicle therefor |
CN109587151A (en) * | 2018-12-13 | 2019-04-05 | 泰康保险集团股份有限公司 | Access control method, device, equipment and computer readable storage medium |
US11046201B2 (en) * | 2019-03-25 | 2021-06-29 | Micron Technology, Inc. | Electric vehicle charging station system |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8677505B2 (en) * | 2000-11-13 | 2014-03-18 | Digital Doors, Inc. | Security system with extraction, reconstruction and secure recovery and storage of data |
US20040181327A1 (en) * | 2003-03-11 | 2004-09-16 | Tsosie Everett K. | Vehicle security through an automatic control system |
US8229458B2 (en) * | 2007-04-08 | 2012-07-24 | Enhanced Geographic Llc | Systems and methods to determine the name of a location visited by a user of a wireless device |
WO2009001447A1 (en) * | 2007-06-27 | 2008-12-31 | Fujitsu Limited | Authentication method, authentication system, authentication device, and computer program |
JP5019382B2 (en) * | 2007-10-30 | 2012-09-05 | マーキュリー・システムズ株式会社 | Mobile body status verification information control system |
US8065517B2 (en) * | 2007-11-01 | 2011-11-22 | Infineon Technologies Ag | Method and system for transferring information to a device |
JP4946826B2 (en) * | 2007-11-26 | 2012-06-06 | 富士通株式会社 | Emission apportioning device and emission apportioning program |
JP2009217395A (en) * | 2008-03-07 | 2009-09-24 | Nec Corp | Virtual server software update system, virtual server software update method, server and program for server |
JP4973780B2 (en) * | 2008-03-31 | 2012-07-11 | 富士通株式会社 | Authentication method, authentication apparatus, program, and recording medium |
JP5163238B2 (en) * | 2008-04-02 | 2013-03-13 | トヨタ自動車株式会社 | Charging service system and charging service station |
JP2010061237A (en) * | 2008-09-01 | 2010-03-18 | Fujitsu Ten Ltd | In-vehicle settlement system, in-vehicle settlement device, and in-vehicle settlement communication interface card |
JP4650567B2 (en) * | 2008-12-24 | 2011-03-16 | 三菱自動車工業株式会社 | Electric vehicle charging display |
JP5353291B2 (en) * | 2009-02-19 | 2013-11-27 | ソニー株式会社 | Guide route delivery apparatus, guide route delivery method, and guide route delivery program |
US7906937B2 (en) * | 2009-06-02 | 2011-03-15 | Coulomb Technologies, Inc. | Overcurrent and ground fault protection in a networked charging station for electric vehicles |
-
2011
- 2011-09-08 CN CN201110276927.4A patent/CN102404312B/en active Active
- 2011-09-09 JP JP2011196651A patent/JP5927815B2/en not_active Expired - Fee Related
-
2015
- 2015-10-23 JP JP2015209382A patent/JP6131994B2/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
JP2016040727A (en) | 2016-03-24 |
JP5927815B2 (en) | 2016-06-01 |
JP6131994B2 (en) | 2017-05-24 |
JP2012059270A (en) | 2012-03-22 |
CN102404312A (en) | 2012-04-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102404312B (en) | Points of trust is used to provide service | |
US9286485B2 (en) | Using trust points to provide services | |
CN105637916B (en) | Authorization access to vehicle data | |
CN108430060A (en) | Secured session between mobile device and base station communicates | |
CN110519286A (en) | A kind of intelligent transportation Data Access Security method based on alliance's block chain | |
CN104053149B (en) | A kind of method and system for the security mechanism for realizing car networking equipment | |
CN108510252A (en) | A kind of intelligent electric automobile power grid security payment system and method based on block chain | |
CN108650220A (en) | Provide, obtain method, the equipment of mobile terminal certificate and automobile end chip certificate | |
CN109361718A (en) | Identity identifying method, device and medium | |
CN109636118A (en) | Dispatching method, device, server and the system of electric vehicle using motor | |
CN111431988B (en) | Vehicle information storage method and device based on block chain and storage medium | |
WO2019007849A1 (en) | A method for granting access to a service provided by a connected device | |
Zhao et al. | Challenges and opportunities for securing intelligent transportation system | |
CN108399544B (en) | Method and device for auxiliary signing of block chain contract based on Internet of things | |
CN109885790A (en) | The method and apparatus for obtaining satisfaction evaluation data | |
US11626977B2 (en) | Out-of-band key splitting and key derivation | |
CN112187459B (en) | Credible authentication method and system among modules in intelligent network networking | |
CN109559107B (en) | Shared vehicle settlement exception handling method, vehicle, server, device and system | |
Nurfatih et al. | Enhancing Trust Model of Information Vehicular Ad-Hoc Networks Through Blockchain Consensus Algorithm | |
CN109242591B (en) | Shared unmanned aerial vehicle renting method, device and system | |
Sarkar et al. | Cloud enabled Blockchain-based secured communication in mutual intelligent transportation using neural synchronization | |
CN111555857A (en) | Edge network and network transmission method | |
Chen et al. | Preserving Privacy and Traceability in Car-sharing Blockchain Based on Attribute Cryptosystem | |
US20240046797A1 (en) | Grid-related event prediction | |
Agarwal et al. | Forecasting-based Authentication Schemes for Network Resource Management in Vehicular Communication Network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |