CN106714168B - Automatic authentication method and system based on distance activation - Google Patents

Automatic authentication method and system based on distance activation Download PDF

Info

Publication number
CN106714168B
CN106714168B CN201710013519.7A CN201710013519A CN106714168B CN 106714168 B CN106714168 B CN 106714168B CN 201710013519 A CN201710013519 A CN 201710013519A CN 106714168 B CN106714168 B CN 106714168B
Authority
CN
China
Prior art keywords
authentication
target
distance
authentication module
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710013519.7A
Other languages
Chinese (zh)
Other versions
CN106714168A (en
Inventor
马骏
郝天磊
邵洁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NIO Co Ltd
Original Assignee
NIO Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NIO Co Ltd filed Critical NIO Co Ltd
Priority to CN201710013519.7A priority Critical patent/CN106714168B/en
Publication of CN106714168A publication Critical patent/CN106714168A/en
Application granted granted Critical
Publication of CN106714168B publication Critical patent/CN106714168B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60LPROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
    • B60L53/00Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles
    • B60L53/30Constructional details of charging stations
    • B60L53/31Charging columns specially adapted for electric vehicles
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60LPROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
    • B60L53/00Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles
    • B60L53/60Monitoring or controlling charging stations
    • B60L53/65Monitoring or controlling charging stations involving identification of vehicles or their battery types
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T10/00Road transport of goods or passengers
    • Y02T10/60Other road transportation technologies with climate change mitigation effect
    • Y02T10/70Energy storage systems for electromobility, e.g. batteries
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T10/00Road transport of goods or passengers
    • Y02T10/60Other road transportation technologies with climate change mitigation effect
    • Y02T10/7072Electromobility specific charging systems or methods for batteries, ultracapacitors, supercapacitors or double-layer capacitors
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T90/00Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02T90/10Technologies relating to charging of electric vehicles
    • Y02T90/12Electric charging stations
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T90/00Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02T90/10Technologies relating to charging of electric vehicles
    • Y02T90/16Information or communication technologies improving the operation of electric vehicles
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Abstract

The invention belongs to the field of security authentication, and particularly provides an automatic authentication method and system based on distance activation. The invention aims to solve the problems that the authentication process of a charging and battery replacing facility on a new energy automobile is complex and the safety is poor in the prior art. To this end, the method of the invention essentially comprises the following steps: acquiring the positions of a first target and a second target; determining the distance between the first target and the second target according to the positions of the first target and the second target; comparing the distance with a set threshold value; activating an authentication module when the distance is less than or equal to a threshold value; and authenticating the first target through the authentication module. Preferably, the first object is an electric vehicle and the second object is a charging pile. The automatic authorization method can simplify the authentication process of the battery charging and replacing facility on the electric automobile, and the battery charging and replacing facility cannot be stolen due to the loss of the authentication voucher, so that the battery charging and replacing experience of a user is greatly improved.

Description

Automatic authentication method and system based on distance activation
Technical Field
The invention belongs to the field of security authentication, and particularly provides an automatic authentication method and system based on distance activation.
Background
With the continuous research and development and popularization of new energy automobiles, more and more users have new energy automobiles, and the construction of matched charging and replacing facilities is more and more perfect. In order to prevent the charging and replacing facility from being illegally stolen by others, the charging and replacing facility needs to authenticate the new energy automobile. However, the authorization process of the new energy automobile and the charging and replacing facility in the market is complex and complicated, and the user experience is poor.
Specifically, the automatic authentication method between the current charging and battery replacing facility in the market and the new energy automobile mainly includes: physical lock, RFID card swiping, APP scanning/APP map clicking, fingerprint identification, iris identification and the like. For the automatic authentication method of the physical lock, a charging pile needs to be installed in a box with a lock, a user unlocks and unlocks the box by using a key before charging every time, the box is locked after charging, and the key is easy to lose; for the automatic authentication method for swiping the RFID card, the user is required to carry the RFID card every time the user charges, and the RFID card is easy to lose; for the automatic authentication method for APP scanning/APP map clicking, a user needs to scan a two-dimensional code or APP map clicking on a charging pile through a mobile phone APP, and the operation is complex; the automatic authentication method for fingerprint identification and iris identification has long authentication time and complex operation.
Accordingly, there is a need in the art for a new authorization method for charging and replacing a power facility to solve the above problems.
Disclosure of Invention
In order to solve the problems in the prior art, namely to solve the problems in the prior art that the authentication process of a charging and battery replacing facility on a new energy automobile is complex and the safety is poor, the invention provides an automatic authentication method based on distance activation, which comprises the following steps: acquiring the positions of a first target and a second target; determining a distance between the first target and the second target according to the positions of the first target and the second target; comparing the distance with a set threshold; activating an authentication module when the distance is less than or equal to the threshold; and authenticating the first target through the authentication module.
In a preferred embodiment of the above method, the authentication module is disposed on the second target.
In a preferred embodiment of the above method, the authentication module includes a first authentication module disposed on the first target.
In a preferred technical solution of the above method, the authentication module further includes a second authentication module disposed on the second target.
In a preferred technical solution of the above method, the step of "authenticating the first target by the authentication module" further includes: the authentication module sends authentication invitation information to the first target; the first target sends authentication request information to the authentication module when receiving the authentication invitation information; and the authentication module matches the authentication request information with pre-stored legal authentication information and judges whether the authentication request of the first target should be passed or not according to a matching result.
In a preferred technical solution of the above method, the step of "authenticating the first target by the authentication module" further includes: the first authentication module sends authentication request information to the second authentication module; and the second authentication module matches the authentication request information with pre-stored legal authentication information and judges whether the authentication request of the first target should be passed or not according to a matching result.
In a preferred technical solution of the above method, the step of sending authentication invitation information to the first target by the authentication module further includes: the authentication module sends authentication invitation information to the first target in a wireless communication mode or a wired communication mode; and/or the step of the first target sending authentication request information to the authentication module further comprises: and the first target sends authentication request information to the authentication module in a wireless communication mode or a wired communication mode.
In a preferred embodiment of the foregoing method, the step of sending authentication request information to the second authentication module by the first authentication module further includes: and the first authentication module sends authentication request information to the second authentication module in a wireless communication mode or a wired communication mode.
In a preferred technical solution of the above method, the wireless communication mode includes WIFI, bluetooth or ZIGBEE.
In a preferred embodiment of the above method, the wired communication includes power line carrier communication.
In a preferred technical solution of the above method, the first target is an object to be charged.
In a preferred embodiment of the foregoing method, the second target is a charging facility.
In a preferred technical solution of the above method, the object to be charged and replaced includes an electric vehicle, an electric bicycle, and an electric motorcycle.
In a preferred technical scheme of the method, the charging and replacing facility comprises a direct current charging pile, an alternating current charging pile, a direct current charger, an alternating current charger or a mobile charging vehicle.
In another aspect, the present invention provides a distance activation based automatic authentication system, comprising: the positioning module is used for acquiring the positions of a first target and a second target and determining the distance between the first target and the second target according to the positions of the first target and the second target; a control module that compares the distance with a set threshold and activates an authentication module when the distance is less than or equal to the threshold; the authentication module, the automatic authentication system can authenticate the first target through the authentication module.
In a preferred technical solution of the above automatic authentication system, the authentication module is disposed on the second target.
In a preferred embodiment of the above automatic authentication system, the authentication module includes a first authentication module disposed on the first target.
In a preferred technical solution of the above automatic authentication system, the authentication module further includes a second authentication module disposed on the second object.
In the preferred technical solution of the above automatic authentication system, in the process of authenticating the first target, the authentication module sends authentication invitation information to the first target, the first target sends authentication request information to the authentication module when receiving the authentication invitation information, and then the authentication module matches the authentication request information with pre-stored legal authentication information and judges whether the authentication request of the first target should be passed according to the matching result.
In the preferred technical solution of the above automatic authentication system, in the process of authenticating the first target, the first authentication module sends authentication request information to the second authentication module, and the second authentication module matches the authentication request information with pre-stored legal authentication information and judges whether the authentication request of the first target should be passed according to the matching result.
In the preferred technical solution of the above automatic authentication system, the authentication module sends an authentication invitation message to the first target in a wireless communication manner or a wired communication manner; and/or the first target sends authentication request information to the authentication module in a wireless communication mode or a wired communication mode.
In the above preferred technical solution of the automatic authentication system, the first authentication module sends authentication request information to the second authentication module through a wireless communication mode or a wired communication mode.
In a preferred technical solution of the above automatic authentication system, the wireless communication mode includes WIFI, bluetooth or ZIGBEE.
In a preferred technical solution of the above automatic authentication system, the wired communication mode includes power line carrier communication.
In a preferred technical solution of the above automatic authentication system, the first target is an object to be charged.
In a preferred technical solution of the above automatic authentication system, the second target is a charging facility.
In the preferred technical scheme of the automatic authentication system, the objects to be charged include an electric automobile, an electric bicycle and an electric motorcycle.
In the preferred technical scheme of the automatic authentication system, the charging and replacing facility includes a direct current charging pile, an alternating current charging pile, a direct current charger, an alternating current charger or a mobile charging vehicle.
As can be understood by those skilled in the art, in a preferred technical solution of the present invention, the position of the object to be charged and replaced is obtained through the positioning module, and then the distance between the charging and replacing facility and the object to be charged and replaced is obtained according to the position of the object to be charged and replaced and the position of the charging and replacing facility. And further, when the distance is smaller than or equal to a set threshold value, activating an authentication module, and further verifying whether the acquired authentication request information of the object to be charged and replaced is matched with the pre-stored legal authentication information by virtue of the authentication module, if so, authorizing the object to be charged and replaced, and charging or replacing the object by a charging and replacing facility.
Therefore, the automatic authorization method of the invention not only can simplify the authentication process of the charging and battery replacing facility on the electric automobile, but also can not cause the charging and battery replacing facility to be stolen due to the loss of the authentication voucher, thereby greatly improving the charging and battery replacing experience of users.
Scheme 1, an automatic authentication method based on distance activation, characterized in that, the method includes the following steps:
acquiring the positions of a first target and a second target;
determining a distance between the first target and the second target according to the positions of the first target and the second target;
comparing the distance with a set threshold;
activating an authentication module when the distance is less than or equal to the threshold;
and authenticating the first target through the authentication module.
Scheme 2, the automatic authentication method based on distance activation according to scheme 1, characterized in that the authentication module is arranged on the second target.
Scheme 3, the automatic authentication method based on distance activation according to scheme 1, wherein the authentication module comprises a first authentication module disposed on the first target.
Scheme 4, the automatic authentication method based on distance activation according to scheme 3, characterized in that, the authentication module further comprises a second authentication module disposed on the second target.
The automatic authentication method based on distance activation according to the claim 5 and the claim 2, wherein the step of authenticating the first target by the authentication module further comprises:
the authentication module sends authentication invitation information to the first target;
the first target sends authentication request information to the authentication module when receiving the authentication invitation information;
and the authentication module matches the authentication request information with pre-stored legal authentication information and judges whether the authentication request of the first target should be passed or not according to a matching result.
Scheme 6, the automatic authentication method based on distance activation according to scheme 4, wherein the step of authenticating the first target through the authentication module further comprises:
the first authentication module sends authentication request information to the second authentication module;
and the second authentication module matches the authentication request information with pre-stored legal authentication information and judges whether the authentication request of the first target should be passed or not according to a matching result.
Scheme 7, the automatic authentication method based on distance activation according to scheme 5, wherein the step of sending authentication invitation information to the first target by the authentication module further comprises: the authentication module sends authentication invitation information to the first target in a wireless communication mode or a wired communication mode; and/or
The step of the first target sending authentication request information to the authentication module further comprises: and the first target sends authentication request information to the authentication module in a wireless communication mode or a wired communication mode.
Scheme 8 and the automatic authentication method based on distance activation according to scheme 7, wherein the wireless communication mode includes WIFI, bluetooth or ZIGBEE.
Scheme 9, the automatic authentication method based on distance activation according to scheme 7, wherein the wired communication mode includes power line carrier communication.
Scheme 10, the automatic authentication method based on distance activation according to scheme 6, wherein the step of the first authentication module sending authentication request information to the second authentication module further comprises: and the first authentication module sends authentication request information to the second authentication module in a wireless communication mode or a wired communication mode.
Scheme 11 and the automatic authentication method based on distance activation according to scheme 10, wherein the wireless communication mode includes WIFI, bluetooth or ZIGBEE.
Scheme 12 and the automatic authentication method based on distance activation according to scheme 10, wherein the wired communication mode includes power line carrier communication.
Scheme 13, the automatic authentication method based on distance activation according to any one of schemes 1 to 12, wherein the first target is an object to be charged.
Scheme 14, the automatic authentication method based on distance activation according to scheme 13, wherein the second target is a charging and battery replacing facility.
Scheme 15 and the automatic authentication method based on distance activation according to scheme 14, wherein the objects to be charged include an electric automobile, an electric bicycle and an electric motorcycle.
The automatic authentication method based on distance activation according to the scheme 16 and the scheme 15 is characterized in that the charging and battery replacing facility comprises a direct current charging pile, an alternating current charging pile, a direct current charger, an alternating current charger or a mobile charging vehicle.
Scheme 17, an automatic authentication system based on distance activation, characterized in that the system comprises:
the positioning module is used for acquiring the positions of a first target and a second target and determining the distance between the first target and the second target according to the positions of the first target and the second target;
a control module that compares the distance with a set threshold and activates an authentication module when the distance is less than or equal to the threshold;
the authentication module, the automatic authentication system can authenticate the first target through the authentication module.
Scheme 18, the automatic authentication system based on distance activation according to scheme 17, wherein the authentication module is disposed on the second target.
Scheme 19. the automatic authentication system based on distance activation according to scheme 17, wherein the authentication module comprises a first authentication module disposed on the first object.
Scheme 20. the automatic authentication system based on distance activation according to scheme 19, wherein the authentication module further comprises a second authentication module disposed on the second target.
The automatic authentication system based on distance activation according to the scheme 21 and 18, wherein in the process of authenticating the first target, the authentication module sends authentication invitation information to the first target, the first target sends authentication request information to the authentication module when receiving the authentication invitation information, and then the authentication module matches the authentication request information with the pre-stored legal authentication information and judges whether the authentication request of the first target should be passed according to the matching result.
The distance-activation-based automatic authentication system according to claim 22 and claim 20, wherein during the process of authenticating the first target, the first authentication module sends authentication request information to the second authentication module, and the second authentication module matches the authentication request information with pre-stored legal authentication information and determines whether the authentication request of the first target should be passed according to a matching result.
Scheme 23, the automatic authentication system based on distance activation according to scheme 21, wherein the authentication module sends an authentication invitation message to the first target through a wireless communication mode or a wired communication mode; and/or
And the first target sends authentication request information to the authentication module in a wireless communication mode or a wired communication mode.
Scheme 24 and the automatic authentication system based on distance activation according to scheme 23, wherein the wireless communication mode includes WIFI, bluetooth or ZIGBEE.
Scheme 25, the automatic authentication system based on distance activation according to scheme 23, wherein the wired communication mode comprises power line carrier communication.
Scheme 26, the automatic authentication system based on distance activation according to scheme 22, wherein the first authentication module sends authentication request information to the second authentication module through wireless communication or wired communication.
Scheme 27 and the automatic authentication system based on distance activation according to scheme 26, wherein the wireless communication mode includes WIFI, bluetooth or ZIGBEE.
Scheme 28 and the automatic authentication system based on distance activation according to scheme 26, wherein the wired communication mode includes power line carrier communication.
Scheme 29, the automatic authentication system based on distance activation according to any of the schemes 17 to 28, wherein the first target is an object to be charged.
Scheme 30. the automatic authentication system based on distance activation according to scheme 29, wherein the second target is a charging and battery replacing facility.
Scheme 31 and the automatic authentication system based on distance activation according to scheme 30, wherein the objects to be charged include an electric automobile, an electric bicycle and an electric motorcycle.
Scheme 32 and the automatic authentication system based on distance activation according to scheme 31 are characterized in that the charging and replacing facility comprises a direct current charging pile, an alternating current charging pile, a direct current charger, an alternating current charger or a mobile charging vehicle.
Drawings
Fig. 1 is a flow chart of the steps of the automatic authentication method based on distance activation of the present invention.
Detailed Description
Preferred embodiments of the present invention are described below with reference to the accompanying drawings. It should be understood by those skilled in the art that these embodiments are only for explaining the technical principle of the present invention, and are not intended to limit the scope of the present invention. For example, although the description uses the charging of an electric vehicle as an example to describe the automatic authentication method of the present invention, it is obvious that the method of the present invention is also applicable to other authentication occasions, and those skilled in the art can make adjustments to the application occasions as needed without departing from the basic principle of the present invention, and therefore, the present invention will also fall into the protection scope of the present invention.
The automatic authentication system based on distance activation comprises a positioning module, an authentication module and a control module. The positioning module is used for acquiring the positions of the first target and the second target, and further determining the distance between the first target and the second target according to the positions of the first target and the second target. In a preferred embodiment, the first object is a mobile terminal, such as an electric car, whose real-time position can be obtained by means of a positioning module. However, the second objective is a fixed terminal, such as a charging pile, whose position can be obtained in real time by the positioning module, or can be pre-stored and called directly by the positioning module. Therefore, the term "acquiring" in the present application should be understood in a broad sense, and may be either acquiring the real-time position of the moving object or directly or indirectly calling the pre-stored position of the fixed object. Furthermore, the positioning module may be a part of an existing system, such as a positioning module of an existing car navigation system, or may be a separate device independent of an existing system, without departing from the basic principle of the present invention, and therefore, will fall within the scope of the present invention.
The control module can be respectively communicated with the positioning module and the authentication module, and is used for comparing the distance between the first target and the second target with a set threshold value and activating the authentication module when the distance is less than or equal to the set threshold value. Similarly, the control module may be physically part of an existing system, such as the vehicle VCU itself or a sub-module thereof, or may be a dedicated device separate from the existing system.
The authentication module is used for authenticating the first target. When the authentication module is activated, the second target authenticates the first target through the authentication module. Further, when the authentication request information of the first target collected by the authentication module is matched with the pre-stored legal authentication information, the second target provides authorization for the first target.
Further, the authentication module preferably comprises a first authentication module and a second authentication module. The first authentication module is arranged on the first target, and the second authentication module is arranged on the second target. When the distance between the first target and the second target is smaller than or equal to the set threshold value, the first authentication module and the second authentication module are activated simultaneously (or the control module activates one authentication module first and then activates the other authentication module by the activated authentication module first), the first authentication module sends authentication request information outwards, the second authentication device matches the authentication request information with the pre-stored legal authentication information after receiving the authentication request information, and then whether the second target should pass the authentication request of the first target is judged according to the matching result. Like the positioning module and the control module, the first authentication module and the second authentication module can be implemented in combination with the existing system or can be configured as dedicated modules.
Alternatively, the person skilled in the art may also set an authentication module (such as the second authentication module described above) only on the second object, if necessary. And when the distance between the first target and the second target is less than or equal to the set threshold value, the second authentication module is activated and sends authentication invitation information to the outside. The first target sends authentication request information to the second authentication module when receiving the authentication invitation information; the second authentication module matches the authentication request information with the pre-stored legal authentication information and judges whether the authentication request of the first target should be passed or not according to the matching result.
Furthermore, the person skilled in the art can also set an authentication module (such as the first authentication module mentioned above) only on the first object, if necessary. When the first authentication module is activated, the first authentication module directly sends authentication request information outwards. And after receiving the authentication request information, the second target matches the pre-stored legal authentication information, and then judges whether the second target passes the authentication request of the first target or not according to the matching result.
In a preferred embodiment of the present invention, the first object is an object to be charged and replaced, and specifically, the object to be charged and replaced may be an electric automobile, an electric bicycle, or the like. The second object is a charging and replacing facility, which may be, in particular, a dc charging pile, an ac charging pile, a dc charger, an ac charger, a mobile charging vehicle, or the like. Therefore, the authorization of the second target to the first target is to charge or replace the battery object to be charged or replaced by the charging and replacing facility, for example, the charging pile authorizes charging of the electric vehicle, or the mobile charging vehicle authorizes charging of the electric vehicle.
The automatic authentication method based on distance activation according to the present invention will be described in detail with reference to the accompanying drawings in conjunction with a charging pile and an electric vehicle.
As shown in fig. 1, the automatic authentication method based on distance activation of the present invention mainly includes: step S110, acquiring the positions of a charging pile and an electric automobile; step S120, determining the distance between the charging pile and the electric automobile according to the positions of the charging pile and the electric automobile; step S130, comparing the distance with a set threshold value; step S140, when the distance is less than or equal to the set threshold value, activating the authentication module; and S150, authenticating the electric automobile through the authentication module.
Specifically, in step S110, the positions of the charging pile and the electric vehicle are obtained through the positioning module. As mentioned above, the "acquisition" can be either a real-time location, for example for an electric vehicle, or a call to a pre-stored location, for example for a charging post.
Specifically, in step S120, the positioning module determines the distance between the charging pile and the electric vehicle according to the position obtained in step S110. Or a person skilled in the art can calculate the real-time distance between the charging pile and the electric vehicle according to the positions of the charging pile and the electric vehicle through other functional modules or functional units, such as a control module.
Specifically, in step S130, the real-time distance obtained in step S120 is compared with a set threshold. The threshold value may be set by a person skilled in the art according to actual conditions or safety requirements, and may be, for example, 5m, 10m, 20m, or the like. It should be further noted that the value of the threshold is not too large, so that the charging pile is prevented from frequently authenticating a passing legal electric vehicle; the value of this threshold value should not the undersize yet, when avoiding electric automobile to close on filling electric pile, fills electric pile and has not yet authorized electric automobile, influences user's the experience of charging.
Specifically, in step S140, when the real-time distance is less than or equal to the set threshold, the control module activates the authentication module; when the real-time distance is larger than the set distance, the control module enables the authentication module to keep a standby state or a closed state. The technical effect of the setting is that even if other people illegally steal the authentication key and send an authentication request to the authentication module on the charging pile, if the electric automobile which is legally registered is not near the charging pile, the authentication module can keep a non-working state, so that the illegal electric automobile cannot pass authentication and cannot be charged.
Furthermore, the mode of determining that the real-time distance between the charging pile and the electric automobile is smaller than or equal to the set threshold value can be judged by an infrared judgment module, an ultrasonic judgment module, a laser judgment module, a double-shooting judgment module and the like besides the positioning module. Those skilled in the art can understand that the control module, the positioning module and other forms of distance determination modules may be disposed on the electric vehicle, the charging pile, or a remote location, such as a background server or a cloud server.
Specifically, in step S150, the charging pile authenticates the electric vehicle through the authentication module. Preferably, the authentication module comprises a first authentication module and a second authentication module. The first authentication module is arranged on the electric automobile, and the second authentication module is arranged on the charging pile. When the distance between the charging pile and the electric automobile is smaller than or equal to a set threshold value, the first authentication module and the second authentication module are activated simultaneously (or one authentication module is activated firstly, and then the other authentication module is activated by the authentication module which is activated firstly), the first authentication module sends authentication request information outwards, the second authentication device matches the authentication request information with pre-stored legal authentication information after receiving the authentication request information, and then whether the charging pile passes the authentication request of the electric automobile is judged according to the matching result.
Those skilled in the art can also set an authentication module (such as the second authentication module described above) only on the charging pile according to needs. And when the distance between the charging pile and the electric automobile is smaller than or equal to a set threshold value, the second authentication module is activated and sends authentication invitation information to the outside. The electric automobile sends authentication request information to the second authentication module when receiving the authentication invitation information; the second authentication module matches the authentication request information with the pre-stored legal authentication information and judges whether the authentication request of the electric automobile should be passed according to the matching result.
The person skilled in the art can also set an authentication module (such as the first authentication module described above) only on the electric vehicle as required. When the first authentication module is activated, the first authentication module directly sends authentication request information outwards. And after receiving the authentication request information, the charging pile matches the authentication request information with prestored legal authentication information, and then judges whether the charging pile should pass the authentication request of the electric automobile or not according to the matching result.
In a preferred embodiment, the sending and receiving of the authentication invitation information and/or the authentication request information may be performed by a wireless communication method or a wired communication method. The wireless communication method may be, for example, WIFI, bluetooth, ZIGBEE, or the like, and the wired communication method may be, for example, power line carrier communication (PLC), or the like. In addition, the contents of the authentication invitation information and the authentication request information can be flexibly set according to the requirements. As an example, the authentication invitation information may include parameters related to the charging post and charging inquiry information for confirming the electric vehicle, and the authentication request information may include, but is not limited to, a frame number (VIN code) of the electric vehicle, an engine number (motor number), a battery number, a specific identification code preset and stored in the electric vehicle, or other numbers capable of identifying the identity of the electric vehicle. Changes and modifications in the information content do not depart from the basic concept of the present invention and thus fall within the scope of the present invention.
Further, in order to execute the method of the present invention, a legal electric vehicle needs to be registered and authenticated in the charging pile in advance, or in a background database or a cloud database that can communicate with the charging pile, which is a default premise of the technical scheme of the present invention. In other words, the technical scheme of the invention only judges the distance between the legally registered electric automobile and the charging pile, and because other electric automobiles are not in communication with the system of the invention, the system of the invention does not need to judge the distance between the legally registered electric automobile and the charging pile, and cannot judge the distance between the legally registered electric automobile and the charging pile. In addition, the operation of receiving the authentication request can be performed at the charging pile or at a remote end depending on the setting position of the authentication device. Moreover, the matching and judging operation can be performed by the second authentication module at the charging pile, or by a background server at a remote end.
Furthermore, in a preferred embodiment of the present invention, an authentication device capable of performing authentication information interaction with an authentication module on the charging pile is disposed on the electric vehicle, and specifically, the authentication device may be a smart car key, a vehicle-mounted smart terminal disposed on the vehicle, a mobile phone, or the like. Or other devices which are not easy to lose and are not easy to be falsely used by other people can be used as the authentication device by the technical personnel according to the needs.
It should be noted that, when the specific electric vehicle is the subject of legal registration and authentication in advance, in step S140, when the real-time distance between the electric vehicle and the charging pile is smaller than the set distance threshold, the charging pile directly provides authorization for the electric vehicle, so as to simplify the authentication process.
So far, the technical solutions of the present invention have been described in connection with the preferred embodiments shown in the drawings, but it is easily understood by those skilled in the art that the scope of the present invention is obviously not limited to these specific embodiments. Equivalent changes or substitutions of related technical features can be made by those skilled in the art without departing from the principle of the invention, and the technical scheme after the changes or substitutions can fall into the protection scope of the invention.

Claims (32)

1. An automatic authentication method based on distance activation, characterized in that the method comprises the following steps:
acquiring the positions of a first target and a second target, specifically comprising: the position of the first target is obtained in real time through a positioning module, the position of the second target is obtained in real time through the positioning module, or the position of the second target which is stored in advance is called through the positioning module; the first target is legally registered and authenticated;
determining a distance between the first target and the second target according to the positions of the first target and the second target;
comparing the distance with a set threshold;
activating an authentication module when the distance is less than or equal to the threshold;
authenticating the first target through the authentication module, specifically including: the authentication module matches the authentication request information of the first target with prestored legal authentication information and judges whether the authentication request of the first target should be passed according to the matching result;
the authentication request information is information that the first target sends to the authentication module according to the authentication invitation information sent by the authentication module after being activated, or the authentication request information is information that the authentication module outputs after being activated.
2. The distance activation-based automatic authentication method as claimed in claim 1, wherein said authentication module is disposed on said second target.
3. The distance activation-based automatic authentication method as claimed in claim 1, wherein said authentication module comprises a first authentication module provided on said first object.
4. The distance-activation-based automatic authentication method as recited in claim 3, wherein the authentication module further comprises a second authentication module disposed on the second target.
5. The distance-activation-based automatic authentication method as claimed in claim 2, wherein the step of authenticating the first object by the authentication module further comprises:
the authentication module sends authentication invitation information to the first target;
the first target sends authentication request information to the authentication module when receiving the authentication invitation information;
and the authentication module matches the authentication request information with pre-stored legal authentication information and judges whether the authentication request of the first target should be passed or not according to a matching result.
6. The distance-activation-based automatic authentication method as claimed in claim 4, wherein the step of authenticating the first object by the authentication module further comprises:
the first authentication module sends authentication request information to the second authentication module;
and the second authentication module matches the authentication request information with pre-stored legal authentication information and judges whether the authentication request of the first target should be passed or not according to a matching result.
7. The automatic authentication method based on distance activation according to claim 5, wherein the step of the authentication module sending authentication invitation information to the first target further comprises: the authentication module sends authentication invitation information to the first target in a wireless communication mode or a wired communication mode; and/or
The step of the first target sending authentication request information to the authentication module further comprises: and the first target sends authentication request information to the authentication module in a wireless communication mode or a wired communication mode.
8. The method of claim 7, wherein the wireless communication means comprises WIFI, Bluetooth or ZIGBEE.
9. The automatic authentication method based on distance activation according to claim 7, wherein the wired communication means comprises power line carrier communication.
10. The distance-activation-based automatic authentication method according to claim 6, wherein the step of the first authentication module sending authentication request information to the second authentication module further comprises: and the first authentication module sends authentication request information to the second authentication module in a wireless communication mode or a wired communication mode.
11. The method of claim 10, wherein the wireless communication means comprises WIFI, bluetooth or ZIGBEE.
12. The automatic authentication method based on distance activation according to claim 10, wherein the wired communication means comprises power line carrier communication.
13. The automatic authentication method based on distance activation according to any one of claims 1 to 12, wherein the first target is an object to be charged.
14. The automatic authentication method based on distance activation according to claim 13, wherein the second target is a charging and battery replacing facility.
15. The automatic authentication method based on distance activation according to claim 14, wherein the objects to be charged comprise electric cars, electric bicycles and electric motorcycles.
16. The automatic authentication method based on distance activation according to claim 15, wherein the charging and replacing facility comprises a dc charging pile, an ac charging pile, a dc charger, an ac charger or a mobile charging vehicle.
17. An automatic authentication system activated based on distance, the system comprising:
the positioning module is used for acquiring the positions of a first target and a second target and determining the distance between the first target and the second target according to the positions of the first target and the second target;
a control module that compares the distance with a set threshold and activates an authentication module when the distance is less than or equal to the threshold;
the authentication module, the automatic authentication system can authenticate the first target through the authentication module, and the method specifically includes: the authentication module matches the authentication request information of the first target with prestored legal authentication information and judges whether the authentication request of the first target should be passed according to the matching result; the authentication request information is information sent by the first target to the authentication module according to the authentication invitation information sent by the authentication module after being activated, or the authentication request information is information output by the authentication module after being activated;
the positioning module is further used for acquiring the position of the first target in real time and acquiring the position of the second target in real time or calling the position of the second target which is stored in advance;
the first target is legally registered and authenticated.
18. The distance activation based automatic authentication system as recited in claim 17, wherein the authentication module is disposed on the second target.
19. The distance activation-based automatic authentication system as recited in claim 17, wherein the authentication module comprises a first authentication module disposed on the first object.
20. The distance activation-based automatic authentication system as recited in claim 19, wherein the authentication module further comprises a second authentication module disposed on the second object.
21. The distance activation based automatic authentication system as claimed in claim 18, wherein during the process of authenticating the first target, the authentication module sends an authentication invitation message to the first target, the first target sends an authentication request message to the authentication module when receiving the authentication invitation message, and then the authentication module matches the authentication request message with the pre-stored legal authentication message and determines whether the authentication request of the first target should be passed according to the matching result.
22. The distance-activation-based automatic authentication system as claimed in claim 20, wherein during the authentication of the first target, the first authentication module sends an authentication request message to the second authentication module, and the second authentication module matches the authentication request message with the pre-stored legal authentication information and determines whether the authentication request of the first target should be passed according to the matching result.
23. The automatic authentication system based on distance activation according to claim 21, wherein the authentication module sends authentication invitation information to the first target through wireless communication or wired communication; and/or
And the first target sends authentication request information to the authentication module in a wireless communication mode or a wired communication mode.
24. The automatic authentication system based on distance activation according to claim 23, wherein the wireless communication means comprises WIFI, bluetooth or ZIGBEE.
25. The automatic authentication system based on distance activation according to claim 23, wherein said wired communication means comprises power line carrier communication.
26. The automatic authentication system based on distance activation according to claim 22, wherein the first authentication module sends authentication request information to the second authentication module through wireless communication or wired communication.
27. The automatic authentication system based on distance activation according to claim 26, wherein the wireless communication means comprises WIFI, bluetooth or ZIGBEE.
28. The automatic authentication system based on distance activation according to claim 26, wherein said wired communication means comprises power line carrier communication.
29. The automatic authentication system based on distance activation according to any of the claims 17 to 28, wherein the first target is an object to be charged.
30. The automatic authentication system based on distance activation according to claim 29, wherein the second target is a charging and battery replacing facility.
31. The automatic authentication system based on distance activation according to claim 30, wherein the objects to be charged comprise electric cars, electric bicycles and electric motorcycles.
32. The distance activation based automatic authentication system according to claim 31, wherein the charging and replacing facility comprises a dc charging post, an ac charging post, a dc charger, an ac charger or a mobile charging vehicle.
CN201710013519.7A 2017-01-09 2017-01-09 Automatic authentication method and system based on distance activation Active CN106714168B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710013519.7A CN106714168B (en) 2017-01-09 2017-01-09 Automatic authentication method and system based on distance activation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710013519.7A CN106714168B (en) 2017-01-09 2017-01-09 Automatic authentication method and system based on distance activation

Publications (2)

Publication Number Publication Date
CN106714168A CN106714168A (en) 2017-05-24
CN106714168B true CN106714168B (en) 2020-12-08

Family

ID=58908079

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710013519.7A Active CN106714168B (en) 2017-01-09 2017-01-09 Automatic authentication method and system based on distance activation

Country Status (1)

Country Link
CN (1) CN106714168B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107696888A (en) * 2017-08-30 2018-02-16 芜湖恒天易开软件科技股份有限公司 Charging pile identifies the method and system of vehicle automatic charging
CN108621847A (en) * 2018-05-21 2018-10-09 武汉盛硕电子有限公司 A kind of charging battery of electric vehicle management method
CN110745028B (en) * 2018-07-23 2022-03-04 奥动新能源汽车科技有限公司 Electric vehicle battery replacement encryption system and method
CN110901459B (en) * 2018-09-14 2021-05-14 比亚迪股份有限公司 Wireless charging equipment identification method and device
CN109228955A (en) * 2018-10-19 2019-01-18 恒大法拉第未来智能汽车(广东)有限公司 Charging method, charging method, charging equipment and vehicle
CN110481371B (en) * 2019-09-06 2022-07-29 广东好易点科技有限公司 Vehicle management method and system for charging pile
CN112550051A (en) * 2020-12-07 2021-03-26 中国联合网络通信集团有限公司 Charging indication method, MEC server and charging equipment
CN112706641B (en) * 2020-12-25 2022-10-18 环球车享汽车租赁有限公司 Charging control method and device for alternating-current charging pile and storage medium
CN113022362A (en) * 2021-04-16 2021-06-25 重庆长安新能源汽车科技有限公司 Alternating current charging method and system for realizing vehicle pile identification based on Bluetooth communication
CN114084023A (en) * 2021-12-03 2022-02-25 华为数字能源技术有限公司 Control method and device and charging pile

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5152644B2 (en) * 2008-01-25 2013-02-27 九州電力株式会社 Electric drive charging system and method
CN102299391A (en) * 2010-06-22 2011-12-28 崇越科技股份有限公司 Charging system and charging method thereof
CN103188223B (en) * 2011-12-29 2017-12-12 国民技术股份有限公司 Authentication method, apparatus and system
CN102593899B (en) * 2012-02-21 2014-03-12 北京联合大学 Midway charging system for electric vehicle

Also Published As

Publication number Publication date
CN106714168A (en) 2017-05-24

Similar Documents

Publication Publication Date Title
CN106714168B (en) Automatic authentication method and system based on distance activation
CN107627867B (en) Charging authorization method for object to be charged, and automatic authorization method and system for charging equipment
US9283856B2 (en) Methods, systems and apparatus for authorizing operation of an electric vehicle that is being charged at a charging station
CN110758322B (en) Vehicle starting method, device, equipment and storage medium
CN106912001B (en) Automatic authentication method and system based on WIFI broadcast
CN105882604B (en) A kind of electric vehicle control system
KR101623338B1 (en) Method and system for preventing electricity theft for charging electric vehicle
CN107963057A (en) A kind of keyless access system based on mobile phone
CN104468582B (en) Authentication and authorization method and system for user information
CN106878279A (en) Charging and conversion electric facility and the automatic right-discriminating method and system for treating charging and conversion electric object
CN110217196A (en) Door control system and method
US10121295B2 (en) System and method for accessing a vehicle
CN108688619B (en) Method and system for controlling a vehicle
CN104627021A (en) Electric vehicle control system and method
CN106891855A (en) A kind of automobile control method, device, entire car controller and automobile
CN107221973A (en) Object to be charged, the method for authenticating of charging equipment and system
EP3140825B1 (en) Authentication method for vehicular number plate recognition
CN107248212A (en) A kind of intelligent lock system and its method for unlocking based on NFC
CN112819997A (en) Method, apparatus and computer-readable storage medium for creating vehicle key
CN107040289B (en) Information transmission method and device based on near field communication
CN109927672B (en) Vehicle control system and method
CN113538814A (en) Intelligent bus vehicle-mounted terminal supporting digital RMB payment
CN108230492B (en) Unlocking method and system for vehicle-mounted safety box
CN117880786A (en) Takeaway vehicle safety management method and device, electronic equipment and storage medium
CN105799542A (en) Electric vehicle control system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant