CN107231019A - A kind of method and apparatus charged by charging device to user equipment - Google Patents

A kind of method and apparatus charged by charging device to user equipment Download PDF

Info

Publication number
CN107231019A
CN107231019A CN201710359583.0A CN201710359583A CN107231019A CN 107231019 A CN107231019 A CN 107231019A CN 201710359583 A CN201710359583 A CN 201710359583A CN 107231019 A CN107231019 A CN 107231019A
Authority
CN
China
Prior art keywords
charging
authentication information
user equipment
information
charging authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710359583.0A
Other languages
Chinese (zh)
Other versions
CN107231019B (en
Inventor
顾晓斌
龚蔚
鲍渊智
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zhangmen Science and Technology Co Ltd
Original Assignee
Shanghai Zhangmen Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Zhangmen Science and Technology Co Ltd filed Critical Shanghai Zhangmen Science and Technology Co Ltd
Priority to CN201710359583.0A priority Critical patent/CN107231019B/en
Publication of CN107231019A publication Critical patent/CN107231019A/en
Priority to PCT/CN2018/087421 priority patent/WO2018210324A1/en
Application granted granted Critical
Publication of CN107231019B publication Critical patent/CN107231019B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J7/00Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries
    • H02J7/00032Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries characterised by data exchange
    • H02J7/00036Charger exchanging data with battery
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J7/00Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries
    • H02J7/0068Battery or charger load switching, e.g. concurrent charging and load supply

Abstract

The purpose of the application is to provide a kind of method for being used to charge to user equipment by charging device, wherein, this method includes:Obtain the corresponding device identification information of the charging device;The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close the discharge circuit between the charging device and user equipment to charge to the user equipment.The application realizes shared charging device and eliminates the reliance on cabinet, reduces the cost of shared charging device, the popularization of shared charging device is more popularized.

Description

A kind of method and apparatus charged by charging device to user equipment
Technical field
The application is related to the communications field, more particularly to a kind of skill for being used to charge to user equipment by charging device Art.
Background technology
Increasingly popularized as the improvement of people's living standards, mobile device (such as mobile phone, MP3, flat board) is used, and with The function of mobile device is stronger and stronger, the limited battery capacity built in it, the situation for not enough power supply easily occur, in movement Be inconvenient to use the power supply of fixation to be charged during use, and certain burden can be increased by carrying with charger baby.
The charging rack cost that presently, there are is high, and charger baby is thorough after scanning input cabinet Quick Response Code taking-up charger baby Depart from cabinet no longer controlled;Because process is cumbersome during actual operation, hotel owner does not want to take the trouble (occupation of land side, and without interests driving) yet Directly charger baby is pulled and used to user, causes charger baby completely out of control.
The content of the invention
The purpose of the application is to provide a kind of method for being used to charge to user equipment by charging device.
It is used for according to the one side of the application there is provided one kind at user equipment end by charging device to user equipment The method charged, this method includes:
Obtain the corresponding device identification information of the charging device;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close Discharge circuit between the charging device and user equipment to the user equipment to charge.
It is used to charge to user equipment at charging device end there is provided a kind of according to further aspect of the application Method, this method includes:
The charging authentication information is obtained, wherein, the charging authentication information is inputted by user or by the user equipment Send;
Verify the charging authentication information;
When the charging authentication information is by checking, the discharge circuit between closure charging device and the user equipment is with right The user equipment is charged.
According to the another aspect of the application there is provided a kind of method for controlling charging device, this method includes:
Obtain the corresponding device identification information of charging device;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close The discharge circuit of the charging device is externally to charge.
It is used to set user by charging device at network equipment end there is provided one kind according to another aspect of the application The standby method charged, this method includes:
The charging authentication information request that user equipment is sent is received, wherein the charging authentication information request is known including device Other information;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close The discharge circuit of the corresponding charging device of described device identification information to the user equipment to charge;
The charging authentication information is back to the user equipment.
According to the one side of the application, there is provided a kind of side for being used to charge to user equipment by charging device Method, wherein, this method includes:
User equipment obtains the corresponding device identification information of the charging device;
The user equipment determines the corresponding charging authentication information of described device identification information, wherein, the charging authentication Information is used to close the discharge circuit between the charging device and user equipment to charge to the user equipment;
The charging device obtains the charging authentication information, wherein, the charging authentication information inputted by user or by The user equipment is sent;
The charging device verifies the charging authentication information;
When the charging authentication information is by checking, the charging device closes the charging device and the user equipment Between discharge circuit to be charged to the user equipment.
It is used for user equipment is charged by charging device there is provided a kind of according to further aspect of the application Method, wherein, this method includes:
User equipment obtains the corresponding device identification information of the charging device;
The charging authentication information request that the user equipment is sent to the corresponding network equipment, wherein the charging authentication is believed Breath request includes described device identification information;
The network equipment receives the charging authentication information request that the user equipment is sent;
The network equipment determines the corresponding charging authentication information of described device identification information, wherein, the charging authentication Information is used to close the discharge circuit of the corresponding charging device of described device identification information to charge to the user equipment;
The charging authentication information is back to the user equipment by the network equipment;
The user equipment receives the corresponding charging authentication information of described device identification information that the network equipment is returned;
The charging device obtains the charging authentication information, wherein, the charging authentication information inputted by user or by The user equipment is sent;
The charging device verifies the charging authentication information;
When the charging authentication information is by checking, the charging device closes the charging device and the user equipment Between discharge circuit to be charged to the user equipment.
It is used for according to the one side of the application there is provided one kind at user equipment end by charging device to user equipment The equipment charged, the equipment includes:
Processor;And
It is arranged to store the memory of computer executable instructions, the executable instruction makes the place when executed Device is managed to perform:
Obtain the corresponding device identification information of the charging device;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close Discharge circuit between the charging device and user equipment to the user equipment to charge.
It is used to charge to user equipment at charging device end there is provided a kind of according to further aspect of the application Equipment, the equipment includes:
Processor;And
It is arranged to store the memory of computer executable instructions, the executable instruction makes the place when executed Device is managed to perform:
The charging authentication information is obtained, wherein, the charging authentication information is inputted by user or by the user equipment Send;
Verify the charging authentication information;
When the charging authentication information is by checking, the discharge circuit between closure charging device and the user equipment is with right The user equipment is charged.
According to the another aspect of the application there is provided a kind of equipment for controlling charging device, the equipment includes:
Processor;And
It is arranged to store the memory of computer executable instructions, the executable instruction makes the place when executed Device is managed to perform:
Obtain the corresponding device identification information of charging device;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close The discharge circuit of the charging device is externally to charge.
It is used to set user by charging device at network equipment end there is provided one kind according to another aspect of the application The standby equipment charged, the equipment includes:
Processor;And
It is arranged to store the memory of computer executable instructions, the executable instruction makes the place when executed Device is managed to perform:
The charging authentication information request that user equipment is sent is received, wherein the charging authentication information request is known including device Other information;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close The discharge circuit of the corresponding charging device of described device identification information to the user equipment to charge;
The charging authentication information is back to the user equipment.
According to the one side of the application there is provided a kind of computer-readable medium including instructing, the instruction is in quilt During execution system is proceeded as follows:
Obtain the corresponding device identification information of the charging device;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close Discharge circuit between the charging device and user equipment to the user equipment to charge.
According to further aspect of the application there is provided a kind of computer-readable medium including instructing, the instruction exists So that system is proceeded as follows when being performed:
The charging authentication information is obtained, wherein, the charging authentication information is inputted by user or by the user equipment Send;
Verify the charging authentication information;
When the charging authentication information is by checking, the discharge circuit between closure charging device and the user equipment is with right The user equipment is charged.
According to the another aspect of the application there is provided a kind of computer-readable medium including instructing, the instruction exists So that system is proceeded as follows when being performed:
Obtain the corresponding device identification information of charging device;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close The discharge circuit of the charging device is externally to charge.
According to another aspect of the application there is provided a kind of computer-readable medium including instructing, the instruction exists So that system is proceeded as follows when being performed:
The charging authentication information request that user equipment is sent is received, wherein the charging authentication information request is known including device Other information;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close The discharge circuit of the corresponding charging device of described device identification information to the user equipment to charge;
The charging authentication information is back to the user equipment.
Compared with prior art, the application is to charge power supply by increasing circuit and digital keys that similar password protection is controlled, Then by obtain charging device device identification information so that in the application obtain charging authentication information, and with charging device Portion is matched with reference to authentication information, the charging device pair if the charging authentication information obtained matches checking unanimously with reference to authentication information User equipment charges;This programme has reached the shared of charging device, and eliminates the reliance on cabinet, reduce further shared charging dress The cost of realization is put, the popularization of shared charging device is more popularized.
Brief description of the drawings
By reading the detailed description made to non-limiting example made with reference to the following drawings, the application's is other Feature, objects and advantages will become more apparent upon:
Fig. 1 shows to be used for charge to user equipment by charging device according to a kind of of the application one embodiment System topological figure;
Fig. 2 shows to be used to set user by charging device at user equipment end according to a kind of of the application one embodiment The standby method flow diagram charged;
Fig. 3 shows the sub-step of a step in Fig. 2;
Fig. 4 is shown to be used to carry out user equipment according to a kind of the of another embodiment of the application at charging device end The method flow diagram of charging;
Fig. 5 is shown to be used to pass through charging device pair according to a kind of the of another embodiment of the application at network equipment end The method flow diagram that user equipment is charged;
Fig. 6 is shown to be used to fill user equipment by charging device according to one kind of one embodiment of the application The systems approach flow chart of electricity;
Fig. 7 is shown to be used to carry out user equipment by charging device according to one kind of another embodiment of the application The systems approach flow chart of charging;
Fig. 8 shows a kind of structural representation of charging device of one embodiment according to the application;
Same or analogous reference represents same or analogous part in accompanying drawing.
Embodiment
The application is described in further detail below in conjunction with the accompanying drawings.
In one typical configuration of the application, terminal, the equipment of service network and trusted party include one or more Processor (CPU), input/output interface, network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Internal memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moved State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, magnetic disk storage or other magnetic storage apparatus or Any other non-transmission medium, the information that can be accessed by a computing device available for storage.
The application meaning equipment includes but is not limited to user equipment, the network equipment or user equipment and the network equipment passes through Network is integrated constituted equipment.The user equipment, which includes but is not limited to any one, to carry out man-machine interaction with user The mobile electronic product of (man-machine interaction is for example carried out by touch pad), such as smart mobile phone, tablet personal computer, the mobile electricity Sub- product can use any operating system, such as android operating systems, iOS operating systems.Wherein, the network equipment The electronic equipment of numerical computations and information processing according to the instruction for being previously set or storing, can be carried out automatically including a kind of, its Hardware includes but is not limited to microprocessor, application specific integrated circuit (ASIC), PLD (PLD), field programmable gate Array (FPGA), digital signal processor (DSP), embedded device etc..The network equipment includes but is not limited to computer, net The cloud that network main frame, single network server, multiple webserver collection or multiple servers are constituted;Here, cloud is by based on cloud meter The a large amount of computers or the webserver for calculating (Cloud Computing) are constituted, wherein, cloud computing is the one of Distributed Calculation Kind, a virtual supercomputer being made up of the computer collection of a group loose couplings.The network includes but is not limited to interconnection Net, wide area network, Metropolitan Area Network (MAN), LAN, VPN, wireless self-organization network (Ad Hoc networks) etc..Preferably, the equipment Can also be run on the user equipment, the network equipment or user equipment and the network equipment, the network equipment, touch terminal or The network equipment is integrated the program in constituted equipment with touch terminal by network.
Certainly, those skilled in the art will be understood that the said equipment is only for example, and other are existing or are likely to occur from now on Equipment be such as applicable to the application, should also be included within the application protection domain, and be incorporated herein by reference herein.
In the description of the present application, " multiple " are meant that two or more, unless otherwise specifically defined.
Fig. 1 shows the typical application scenarios of the application, and user equipment obtains the device identification information of charging device It is determined that corresponding charging authentication information is obtained, then by being charged after the checking of charging device.The program can be set by user It is standby to coordinate completion with the side of charging device two, user equipment, the network equipment and charging device tripartite can also be passed through and coordinate completion.
Fig. 2 is shown to be used to set user by charging device according to a kind of of the application one side at user equipment end The standby method charged, the method comprising the steps of S11 and step S12.
Specifically, in step s 11, user equipment obtains the corresponding device identification information of the charging device.For example, filling The user equipmenies such as corresponding intrument identification information such as sequence number are posted on electric installation by detecting the acquisition of information of the user's input sequence Row number;In another example, Quick Response Code is posted on charging device, wherein, user equipment by scan the Quick Response Code on the charging device come Obtain its corresponding sequence number.
Then, in step s 12, user equipment determines the corresponding charging authentication information of described device identification information, wherein, The charging authentication information is used to close the discharge circuit between the charging device and user equipment to enter the user equipment Row charging.For example, user equipment is obtained after the sequence number of the corresponding charging device of charging device, obtained and charged based on the sequence number The corresponding charging authentication information of device sequence number, the charging authentication information can be used between closure charging device and user equipment Discharge circuit user equipment is charged.Obtaining the process of charging authentication information can locally complete in user equipment, The processing of network equipment end can be uploaded to, after the processing of network equipment end, the charging authentication information is returned to user by the network equipment Equipment.The charging authentication information can be default or generated in real time.
For example, user holds user equipment, user wants to charge to user equipment using charging device.User equipment The corresponding sequence number of the charger baby is first obtained, for example, the charger baby pair that user equipment detection user inputs in a user device The sequence number answered, can also obtain the sequence number of the charger baby by way of scanning Quick Response Code.User equipment is based on the charging The corresponding charging authentication information of the sequence number is obtained after precious sequence number, wherein, the charging authentication information is that the charger baby is closed Close the password of discharge circuit.User inputs charging authentication information to charger baby, and charging device is tested the charging authentication information Card;If the charging authentication information can be powered by checking, the discharge circuit closure of charger baby to external equipment.
Preferably, this method also includes step S13.In step s 13, the charging authentication information is presented in user equipment; Or user equipment sends the charging authentication information to the charging device, so that the charging device closes the electric discharge Circuit charges to the user equipment.For example, user gets the corresponding charging authentication letter of the charging device sequence number After breath, show charging authentication information on screen, user according to the charging authentication information of presentation charging device mechanical keys The charging authentication information is manually entered on disk;Or user equipment is by bluetooth discovery and is connected to the charging device, then will The charging authentication information is sent to the charging device with the mode of Bluetooth transmission.In another example, user equipment can also pass through NFC Near Field Communication modes such as (Near Field Communication, near-field communication) sends charging authentication information, process with It is above-mentioned similar, it will not be repeated here.
For example, after user equipment gets the sequence number of the charger baby, in the sequence number pair of the local search charger baby The charging authentication information answered, the corresponding charging authentication information of the sequence number is returned after application database matching.User equipment is obtained After charging authentication information, the charging authentication information is presented on its screen, user is according to the charging authentication information of presentation in charging The charging authentication information is manually entered on the mechanical keyboard of device;Or user equipment can search the charging in bluetooth Treasured, is set up after linking between user equipment and charger baby by bluetooth, is in the application recognized the charging by way of bluetooth Information transfer is demonstrate,proved to the charger baby;User can also complete transmitting procedure by the short-range communication mode such as NFC.Charging device is obtained Take after the charging authentication information, the charging authentication information is verified;If the charging authentication information passes through checking, charger baby Discharge circuit closure, can be powered to external equipment.
Preferably, with reference to Fig. 3, step S12 includes sub-step S12a and sub-step S12b.In sub-step S12a, user Equipment sends charging authentication information request to the corresponding network equipment, wherein the charging authentication information request includes described device Identification information;In sub-step S12b, the described device identification information that user equipment receives the network equipment return is corresponding Charging authentication information, wherein, the charging authentication information is used to close the electric discharge between the charging device and the user equipment Circuit to the user equipment to charge.For example, user equipment is obtained after the sequence number of the charging device, to the network equipment Charging authentication information request is sent, to the corresponding charging authentication information of the network device requests charging devices, wherein, the charging Authentication information request contains the sequence number of the charging device;The network equipment carries out inquiry and obtains the default charging authentication of sequence number Information is generated after dynamic charging authentication information in real time based on sequence number, and corresponding charging authentication information is returned to user equipment, The charging authentication information is used for the discharge circuit for closing charging device, so as to be charged to user equipment.
For example, user is got after the sequence number of the charger baby, the sequence number is sent to the network equipment.The network equipment connects The sequence number is received, the default charging authentication information of sequence number is determined after being inquired about in database or based on sequence number and dynamic The state factor (such as time, random number etc.) generates charging authentication information in real time, and then, the network equipment returns the charging authentication information Back to user equipment.User equipment is obtained after charging authentication information, passes through the short-range communications such as user's input or bluetooth, NFC The charging authentication information is sent to charging device by mode.Charging device is obtained after the charging authentication information, to the charging authentication Information is verified;If the charging authentication information can be supplied by checking, the discharge circuit closure of charger baby to external equipment Electricity.
Preferably, in stepb, the corresponding charging authentication information of user equipment generation described device identification information, wherein, The charging authentication information is used to close the discharge circuit of the charging device to charge to the user equipment.For example, Intrinsic information (for example, hardware identification information or sequence number of charger baby etc.) of the user equipment based on the charger baby, or the charging Precious intrinsic information and dynamic factor (for example, current time, counter times, random number etc.), generates the charging authentication information.
For example, user equipment is got after the sequence number of the charger baby, can the local search charger baby sequence number Corresponding charging authentication information.In another example, user is got after the sequence number of the charger baby, the intrinsic letter based on the charger baby Cease (for example, hardware identification information or sequence number of charger baby etc.), or the charger baby intrinsic information and dynamic factor (for example, Current time, counter times, random number etc.), generate the charging authentication information.Further for example, user equipment sends out the sequence number Deliver to the network equipment.The network equipment receives the sequence number, and the default charging of sequence number is determined after being inquired about in database Authentication information generates charging authentication information, then, the net in real time based on sequence number and dynamic factor (such as time, random number etc.) The charging authentication information is returned to user equipment by network equipment.User equipment is obtained after charging authentication information, is inputted by user Or the charging authentication information transfer is given the charger baby by the Near Field Communication mode such as bluetooth, NFC.Charging device, which obtains the charging, to be recognized Demonstrate,prove after information, the charging authentication information is verified;If the charging authentication information passes through checking, the discharge circuit of charger baby Closure, can power to external equipment.
Preferably, described device identification information includes following at least any one:The device sequence number letter of the charging device Breath;The 2 D code information of the charging device.For example, the device identification information that user equipment is obtained can be that user is manually entered Charging device device sequence number information, can also the 2 D code information of charging device that arrives of user equipment scans.
For example, user holds user equipment, user wants to charge to user equipment using charger baby.User equipment is first The corresponding sequence number of the charger baby is obtained, wherein, user equipment can detect the corresponding sequence of the charger baby that user is manually entered Row number, can also obtain the sequence number of the charger baby by way of scanning Quick Response Code, wherein, the Quick Response Code is filled comprising the charging The device identification information put.User equipment is got after the sequence number of the charger baby, can the local search charger baby sequence The corresponding charging authentication information of row number.In another example, user is got after the sequence number of the charger baby, consolidating based on the charger baby Have information (for example, hardware identification information or sequence number of charger baby etc.), or the charger baby intrinsic information and dynamic factor (example Such as, current time, counter times, random number etc.), generate the charging authentication information.Further for example, user equipment is by the sequence number Send to the network equipment.The network equipment receives the sequence number, determines that sequence number is default after being inquired about in database and fills Electric authentication information generates charging authentication information in real time based on sequence number and dynamic factor (such as time, random number etc.), then, should The charging authentication information is returned to user equipment by the network equipment.User equipment is obtained after charging authentication information, defeated by user Enter or the Near Field Communication mode such as bluetooth, NFC by the charging authentication information transfer to the charger baby.Charger baby obtains the charging and recognized Demonstrate,prove after information, the charging authentication information is verified;If the charging authentication information passes through checking, the discharge circuit of charger baby Closure, can power to external equipment.
Fig. 4 is shown to be used to charge to user equipment according to a kind of of the application other side at charging device end Method, wherein, the method comprising the steps of S21, step S22 and step S23.In the step s 21, filled described in charging device acquisition Electric authentication information, wherein, the charging authentication information is inputted by user or sent by the user equipment;In step S22, fill Electric installation verifies the charging authentication information;In step S23, when the charging authentication information is by checking, charging device is closed The discharge circuit between charging device and the user equipment is closed to charge to the user equipment.Fig. 8 shows a kind of right The structure chart for the charging device that user equipment is charged, including discharge circuit, the charging device are also described including being arranged at Output control switch on discharge circuit, the checking information input module for obtaining charging authentication information, and respectively with institute State output control switch, the output control module of checking information input module electrical connection;Wherein, the output control module The charging authentication information of checking information input module input is received and verifies, when the charging authentication information is by checking, The output control switch is controlled to close so that the charging device is externally charged by the discharge circuit.For example, charging dress The charging authentication information for the physical keyboard detection user's input put, then, the output control module of the charging device verifies that this fills Whether electric authentication information is correct, if the charging authentication information is by checking, the output control switch of charging device closes this and filled Discharge circuit between electric installation and the user equipment, to be charged to the user equipment.
For example, user holds user equipment, user wants to charge to the user equipment using charger baby.User equipment The corresponding sequence number of the charger baby is first obtained, for example, user equipment can detect user's key in the application that user equipment is installed The device identification informations such as the corresponding sequence number of the charger baby entered, can also obtain the charger baby by way of scanning Quick Response Code Sequence number.User equipment is got after the sequence number of the charger baby, should in user equipment local search according to the sequence number The corresponding charging authentication information of charger baby, the corresponding charging authentication information of the sequence number is returned after local data base matching.Or, User equipment is got after the sequence number of the charger baby, and the sequence number is sent to the network equipment;The network equipment is in its database In match the corresponding charging authentication information of the sequence number, or, the corresponding charging authentication information of the sequence number is generated in real time, with Afterwards, the charging authentication information is returned to user equipment by the network equipment.
User equipment is obtained after charging authentication information, and the charger baby can be searched in bluetooth, is set up and used by bluetooth After connection between family equipment and charger baby, the charging is given by the charging authentication information transfer by way of bluetooth in the application It is precious;User can also complete transmitting procedure by the short-range communication mode such as NFC.User can also be by the secondary or physical bond of charger baby Disk inputs the charging authentication information, so that charger baby receives the charging authentication information.
Charger baby is received after the charging authentication information, and itself and the reference authentication information inside charger baby match testing Card;Here, this with reference to authentication information can charger baby be locally stored or charger baby inside generate in real time.Example Such as, comprising checking information module occurs for charger baby, after charger baby receives the charging authentication information of user's offer, checking letter Breath generation module generates the reference authentication information for verifying the charging authentication information in real time, wherein, mould occurs for the checking information Block can be based on the charger baby intrinsic information (for example, hardware identification information or sequence number of charger baby etc.), or the charger baby Intrinsic information and dynamic factor (for example, current time, counter times, random number etc.), generate this and refer to authentication information.If should Charging authentication information passes through checking with each all same of reference authentication information, then the charging authentication information;Then, charger baby Output control module sends closure switch instruction to output control switch, and after output control switch is closed, discharge circuit is connected Logical, the charger baby is started to charge up to user equipment.
Preferably, in step S22, including sub-step S22a (not shown) and sub-step S22b (not shown).In sub-step In rapid S22a, when charging device receives the charging authentication information, corresponding reference authentication information is generated;In sub-step S22b In, charging device verifies the charging authentication information according to the reference authentication information.Recognize for example, charging device receives charging Demonstrate,prove information simultaneously, module occurs for checking information, and generation refers to authentication information simultaneously, wherein, this can be default with reference to authentication information Reference authentication information or intrinsic information based on the charger baby (for example, the hardware identification information or sequence of charger baby Number etc.), or the charger baby intrinsic information and dynamic factor (for example, current time, counter times, random number etc.), generation Reference authentication information;Then, occur module in checking information to be matched charging authentication information with reference to authentication information, it is right Charging authentication information is verified.
For example, user equipment gets the sequence number of the charger baby, corresponding charging authentication letter is determined based on the sequence number Breath.User equipment is obtained after charging authentication information, by way of detecting user's input or the short range transmission side such as bluetooth, NFC Formula is by charging authentication information transfer to charger baby.Charger baby is received after the charging authentication information, by its with inside charger baby Matching checking is carried out with reference to authentication information, whether successive appraximation charging authentication information is consistent with reference to authentication information;Here, the ginseng Examining authentication information can in real time generate inside the local default or charger baby of charger baby.For example, charger baby is included Module occurs for checking information, and after charger baby receives the charging authentication information of user's offer, it is real that module occurs for the checking information Shi Shengcheng is used for the reference authentication information for verifying the charging authentication information, wherein, module, which occurs, for the checking information to be filled based on this Electric precious intrinsic information (for example, hardware identification information or sequence number of charger baby etc.), or the intrinsic information of the charger baby and dynamic The state factor (for example, current time, counter times, random number etc.), generates this and refers to authentication information.If charging authentication information with With reference to each all same of authentication information, then charging authentication Information Authentication success, the output control module of charger baby is to output Controlling switch sends closure switch instruction, and after output control switch is closed, discharge circuit is connected, and the charger baby is set to user It is standby to start to charge up.
Preferably, in step S23, when the charging authentication information is not verified, and the charging of the user equipment Duration exceedes predetermined charging duration threshold value, disconnects the discharge circuit to stop charging to the user equipment.For example, When charging equipment has been switched off, it is impossible to when operating, start urgent charge function, be connected to charging device, charging device is to user Equipment promptly charges certain time.Charging authentication information is not verified, and charging duration exceedes the predetermined charging duration threshold value When, the discharge circuit is disconnected to stop charging to the user equipment.
For example, user holds user equipment, user wants to charge to user equipment using charger baby, and now user sets Standby to be shut down because of not enough power supply, user equipment is connected to charging device, and charging device starts urgent charge function.User sets The corresponding sequence number of the charger baby is first obtained after standby start, wherein, user equipment can detect what user installed in user equipment The corresponding sequence number of the charger baby keyed in, can also obtain the sequence of the charger baby by way of scanning Quick Response Code Number.User equipment is got after the sequence number of the charger baby, according to the sequence number in the user equipment local search charger baby Corresponding charging authentication information, the corresponding charging authentication information of the sequence number is returned after local data base matching.Or, Yong Hushe It is standby to get after the sequence number of the charger baby, the sequence number is sent to the network equipment;The network equipment is matched in its database To the corresponding charging authentication information of the sequence number, or, the corresponding charging authentication information of the sequence number is generated in real time, then, should The charging authentication information is returned to user equipment by the network equipment.
User equipment is obtained after charging authentication information, and the charger baby can be searched in bluetooth, is set up and used by bluetooth After connection between family equipment and charger baby, the charging is given by the charging authentication information transfer by way of bluetooth in the application It is precious;User can also complete transmitting procedure by the short-range communication mode such as NFC.User can also be by the secondary or physical bond of charger baby Disk inputs the charging authentication information, so that charger baby receives the charging authentication information.
Charger baby is received after the charging authentication information, and itself and the reference authentication information inside charger baby match testing Card;Here, this with reference to authentication information can charger baby be locally stored or charger baby inside generate in real time.Example Such as, comprising checking information module occurs for charger baby, after charger baby receives the charging authentication information of user's offer, checking letter Breath generation module generates the reference authentication information for verifying the charging authentication information in real time, wherein, mould occurs for the checking information Block can be based on the charger baby intrinsic information (for example, hardware identification information or sequence number of charger baby etc.), or the charger baby Intrinsic information and dynamic factor (for example, current time, counter times, random number etc.), generate this and refer to authentication information.If should Charging authentication Information Authentication is successful, then the output control module of charger baby sends closure switch instruction to output control switch, when After output control switch closure, discharge circuit is connected, and the charger baby is started to charge up to the user equipment or other users equipment.
Preferably, according to a kind of method for controlling charging device of the another aspect of the application, wherein, this method bag Include step S41 (not shown) and step S42 (not shown).In step S41, user equipment obtains the corresponding device of charging device Identification information;In step S42, the corresponding charging authentication information of described device identification information is determined, wherein the charging authentication Information is used to close the discharge circuit of the charging device externally to charge.For example, user equipment obtains the sequence of the charging device After row information, selection is charged using the charging device to other users equipment, then according to the sequence number of the charging device The corresponding charging charging authentication information externally charged of generation.
For example, user holds user equipment, user want by the application use charger baby to the user equipment of oneself or The user equipment of other users is charged.User equipment first obtains the corresponding sequence number of the charger baby, wherein, user equipment can To detect the corresponding sequence number of the charger baby of user's key entry, the charger baby can also be obtained by way of scanning Quick Response Code Sequence number.User equipment is got after the sequence number of the charger baby, and according to the sequence number, in user equipment local search, this fills The precious corresponding charging authentication information of electricity, the corresponding charging authentication information of the sequence number is returned after local data base matching.Or, use Family equipment is got after the sequence number of the charger baby, and the sequence number is sent to the network equipment;The network equipment is in its database The corresponding charging authentication information of the sequence number is matched, or, the corresponding charging authentication information of the sequence number is generated in real time, with Afterwards, the charging authentication information is returned to user equipment by the network equipment.
User equipment is obtained after charging authentication information, and the charger baby can be searched in bluetooth, is set up and used by bluetooth After linking between family equipment and charger baby, the charging is given by the charging authentication information transfer by way of bluetooth in the application It is precious;User can also complete transmitting procedure by the short-range communication mode such as NFC.User can also be by the secondary or physical bond of charger baby Disk inputs the charging authentication information, so that charger baby receives the charging authentication information.
Charger baby is received after the charging authentication information, and itself and the reference authentication information inside charger baby match testing Card;Here, this with reference to authentication information can charger baby be locally stored or charger baby inside generate in real time.Example Such as, comprising checking information module occurs for charger baby, after charger baby receives the charging authentication information of user's offer, checking letter Breath generation module generates the reference authentication information for verifying the charging authentication information in real time, wherein, mould occurs for the checking information Block can be based on the charger baby intrinsic information (for example, hardware identification information or sequence number of charger baby etc.), or the charger baby Intrinsic information and dynamic factor (for example, current time, counter times, random number etc.), generate this and refer to authentication information.If should Charging authentication Information Authentication is failed, and the urgent charge function time exceedes scheduled time threshold value, then charger baby output control mould Block is sent to output control switch disconnects switch order, and after output control switch disconnects, output discharge circuit disconnects, the charger baby User equipment is stopped to charge.
Fig. 5 is shown to be used to set user by charging device according to a kind of of the application another further aspect at network equipment end The standby method charged, wherein, the method comprising the steps of S31, step S32 and step S33.Wherein, in step S31, net Network equipment receives the charging authentication information request that user equipment is sent, wherein, the charging authentication information request is known including device Other information;In step s 32, the network equipment determines the corresponding charging authentication information of described device identification information, wherein, it is described to fill Electric authentication information is used to close the discharge circuit of the corresponding charging device of described device identification information to enter the user equipment Row charging;In step S33, the charging authentication information is back to the user equipment by the network equipment.For example, the network equipment The authentication information request for including charging device identification information that user equipment is sent is received, wherein, the network equipment is based on charging and filled Identification information such as sequence number is put, the corresponding charging authentication information of sequence number is determined in database, and the charging authentication information is returned Back to user equipment.In another example, what network equipment reception user equipment was sent includes charging device identification information such as sequence number Authentication information request, based on the charging device identification information (for example, charger baby sequence number etc.), or the device identification information and dynamic The state factor (for example, current time, counter times, random number etc.), generates the charging authentication information.Then, the network equipment will The charging authentication information is back to the user equipment.
For example, user holds user equipment, user wants to charge to user equipment using charger baby.User equipment is first The corresponding sequence number of the charger baby is obtained, wherein, user equipment can detect the charger baby that user inputs in a user device Corresponding sequence number, can also obtain the sequence number of the charger baby by way of scanning Quick Response Code.User equipment gets this After the sequence number of charger baby, the sequence number is sent to the network equipment, after the network equipment is matched in its database, it is determined that should The default charging authentication information of sequence number, then, the charging authentication information is returned to user equipment by the network equipment.
User equipment is obtained after charging authentication information, and the charger baby can be searched in bluetooth, is set up and used by bluetooth After linking between family equipment and charger baby, the charging is given by the charging authentication information transfer by way of bluetooth in the application It is precious;User can also complete transmitting procedure by the short-range communication mode such as NFC.User can also be by the secondary or physical bond of charger baby Disk inputs the charging authentication information, so that charger baby receives the charging authentication information.
Charger baby is received after the charging authentication information, and itself and the reference authentication information inside charger baby match testing Card;Here, this with reference to authentication information can charger baby be locally stored or charger baby inside generate in real time.Example Such as, comprising checking information module occurs for charger baby, after charger baby receives the charging authentication information of user's offer, checking letter Breath generation module generates the reference authentication information for verifying the charging authentication information in real time, wherein, mould occurs for the checking information Block can be based on the charger baby intrinsic information (for example, hardware identification information or sequence number of charger baby etc.), or the charger baby Intrinsic information and dynamic factor (for example, current time, counter times, random number etc.), generate this and refer to authentication information.If should Charging authentication information passes through checking with each all same of reference authentication information, then the charging authentication information;Then, charger baby Output control module sends closure switch instruction to output control switch, and after output control switch is closed, discharge circuit is connected Logical, the charger baby is started to charge up to user equipment.
Preferably, in step s 32, the network equipment is believed according to the certification of the corresponding charging device of described device identification information Breath generation is set, the corresponding charging authentication information of generation described device identification information, wherein, the charging authentication information is used to close The discharge circuit of the charging device is closed to charge to the user equipment.For example, the network equipment receives user equipment hair That send includes the authentication information request of charging device identification information such as sequence number, based on the charging device identification information (for example, filling Electric treasured sequence number etc.), or the device identification information and dynamic factor (for example, current time, counter times, random number etc.), Generate the charging authentication information.Then, the charging authentication information is back to the user equipment by the network equipment.
For example, user holds user equipment, user wants to charge to user equipment using charger baby.User equipment is first The corresponding sequence number of the charger baby is obtained, wherein, user equipment can detect the charger baby that user inputs in a user device Corresponding sequence number, can also obtain the sequence number of the charger baby by way of scanning Quick Response Code.User equipment gets this After the sequence number of charger baby, the sequence number is sent to the network equipment, after the network equipment is matched in its database, it is determined that should The default charging authentication information of sequence number, then, the charging authentication information is returned to user equipment by the network equipment;And example Such as, user equipment sends the sequence number to map network equipment, and the network equipment receives being filled comprising charging for user equipment transmission The authentication information request of identification information such as sequence number is put, based on the charging device identification information (for example, charger baby sequence number etc.), Or the device identification information and dynamic factor (for example, current time, counter times, random number etc.), generate the charging authentication Information.Then, the charging authentication information is back to the user equipment by the network equipment.
User equipment is obtained after charging authentication information, and the charger baby can be searched in bluetooth, is set up and used by bluetooth After linking between family equipment and charger baby, the charging is given by the charging authentication information transfer by way of bluetooth in the application It is precious;User can also complete transmitting procedure by the short-range communication mode such as NFC.User can also be by the secondary or physical bond of charger baby Disk inputs the charging authentication information, so that charger baby receives the charging authentication information.
Charger baby is received after the charging authentication information, and itself and the reference authentication information inside charger baby match testing Card;Here, this with reference to authentication information can charger baby be locally stored or charger baby inside generate in real time.Example Such as, comprising checking information module occurs for charger baby, after charger baby receives the charging authentication information of user's offer, checking letter Breath generation module generates the reference authentication information for verifying the charging authentication information in real time, wherein, mould occurs for the checking information Block can be based on the charger baby intrinsic information (for example, hardware identification information or sequence number of charger baby etc.), or the charger baby Intrinsic information and dynamic factor (for example, current time, counter times, random number etc.), generate this and refer to authentication information.If should Charging authentication information passes through checking with each all same of reference authentication information, then the charging authentication information;Then, charger baby Output control module sends closure switch instruction to output control switch, and after output control switch is closed, discharge circuit is connected Logical, the charger baby is started to charge up to user equipment.
Preferably, the authentication information generation, which is set, includes following at least any one:Certification letter in the charging device Cease generating algorithm configuration;Authentication information forming element information in the charging device, wherein, the authentication information forming element Information includes connecing for described device identification information, the hardware identification information of the charging device and the charging authentication information request Receive at least one of temporal information.For example, the network equipment receive user equipment send include charging device identification information such as sequence The authentication information request of row number, based on the charging device identification information (for example, charger baby sequence number etc.), or device identification letter Breath, dynamic factor (for example, current time, counter times, random number etc.), and specific algorithm configuration or with sequence number pair The algorithm configuration answered, generates the charging authentication information.
For example, user holds user equipment, user wants to charge to user equipment using charger baby.User equipment is first The corresponding sequence number of the charger baby is obtained, wherein, user equipment can detect the charger baby that user inputs in a user device Corresponding sequence number, can also obtain the sequence number of the charger baby by way of scanning Quick Response Code.User equipment gets this After the sequence number of charger baby, the sequence number is sent to the network equipment, after the network equipment is matched in its database, it is determined that should The default charging authentication information of sequence number, then, the charging authentication information is returned to user equipment by the network equipment;And example Such as, user equipment sends the sequence number to map network equipment, and the network equipment receives being filled comprising charging for user equipment transmission The authentication information request of identification information such as sequence number is put, based on the charging device identification information (for example, charger baby sequence number etc.), Or the device identification information, dynamic factor (for example, current time, counter times, random number etc.), and specifically algorithm is matched somebody with somebody Put or algorithm configuration corresponding with sequence number, generate the charging authentication information.Then, the network equipment returns the charging authentication information It is back to the user equipment.
User equipment is obtained after charging authentication information, and the charger baby can be searched in bluetooth, is set up and used by bluetooth After linking between family equipment and charger baby, the charging is given by the charging authentication information transfer by way of bluetooth in the application It is precious;User can also complete transmitting procedure by the short-range communication mode such as NFC.User can also be by the secondary or physical bond of charger baby Disk inputs the charging authentication information, so that charger baby receives the charging authentication information.
Charger baby is received after the charging authentication information, and itself and the reference authentication information inside charger baby match testing Card;Here, this with reference to authentication information can charger baby be locally stored or charger baby inside generate in real time.Example Such as, comprising checking information module occurs for charger baby, after charger baby receives the charging authentication information of user's offer, checking letter Breath generation module generates the reference authentication information for verifying the charging authentication information in real time, wherein, mould occurs for the checking information Block can be based on the charger baby intrinsic information (for example, hardware identification information or sequence number of charger baby etc.), or the charger baby Intrinsic information and dynamic factor (for example, current time, counter times, random number etc.), and specific algorithm configuration or with The corresponding algorithm configuration of sequence number, generates this and refers to authentication information.If the charging authentication information with reference to authentication information each All same, then the charging authentication information, which passes through, verifies;Then, the output control module of charger baby sends to output control switch and closed Combination switch is instructed, and after output control switch is closed, discharge circuit is connected, and the charger baby is started to charge up to user equipment.
Fig. 6 is shown is used for user equipment is charged by charging device according to a kind of of the application one side Method, wherein, this method includes:
User equipment obtains the corresponding device identification information of the charging device;
The user equipment determines the corresponding charging authentication information of described device identification information, wherein, the charging authentication Information is used to close the discharge circuit between the charging device and user equipment to charge to the user equipment;
The charging device obtains the charging authentication information, wherein, the charging authentication information inputted by user or by The user equipment is sent;
The charging device verifies the charging authentication information;
When the charging authentication information is by checking, the charging device closes the charging device and the user equipment Between discharge circuit to be charged to the user equipment.
Fig. 7 is shown to be used to charge to user equipment by charging device according to one kind of the another aspect of the application Method, wherein, this method includes:
User equipment obtains the corresponding device identification information of the charging device;
The charging authentication information request that the user equipment is sent to the corresponding network equipment, wherein the charging authentication is believed Breath request includes described device identification information;
The network equipment receives the charging authentication information request that the user equipment is sent;
The network equipment determines the corresponding charging authentication information of described device identification information, wherein, the charging authentication Information is used to close the discharge circuit of the corresponding charging device of described device identification information to charge to the user equipment;
The charging authentication information is back to the user equipment by the network equipment;
The user equipment receives the corresponding charging authentication information of described device identification information that the network equipment is returned;
The charging device obtains the charging authentication information, wherein, the charging authentication information inputted by user or by The user equipment is sent;
The charging device verifies the charging authentication information;
When the charging authentication information is by checking, the charging device closes the charging device and the user equipment Between discharge circuit to be charged to the user equipment.
It is used for according to the one side of the application there is provided one kind at user equipment end by charging device to user equipment The equipment charged, the equipment includes:
Processor;And
It is arranged to store the memory of computer executable instructions, the executable instruction makes the place when executed Device is managed to perform:
Obtain the corresponding device identification information of the charging device;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close Discharge circuit between the charging device and user equipment to the user equipment to charge.
It is used to charge to user equipment at charging device end there is provided a kind of according to further aspect of the application Equipment, the equipment includes:
Processor;And
It is arranged to store the memory of computer executable instructions, the executable instruction makes the place when executed Device is managed to perform:
The charging authentication information is obtained, wherein, the charging authentication information is inputted by user or by the user equipment Send;
Verify the charging authentication information;
When the charging authentication information is by checking, the discharge circuit between closure charging device and the user equipment is with right The user equipment is charged.
According to the another aspect of the application there is provided a kind of equipment for controlling charging device, the equipment includes:
Processor;And
It is arranged to store the memory of computer executable instructions, the executable instruction makes the place when executed Device is managed to perform:
Obtain the corresponding device identification information of charging device;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close The discharge circuit of the charging device is externally to charge.
It is used to set user by charging device at network equipment end there is provided one kind according to another aspect of the application The standby equipment charged, the equipment includes:
Processor;And
It is arranged to store the memory of computer executable instructions, the executable instruction makes the place when executed Device is managed to perform:
The charging authentication information request that user equipment is sent is received, wherein the charging authentication information request is known including device Other information;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close The discharge circuit of the corresponding charging device of described device identification information to the user equipment to charge;
The charging authentication information is back to the user equipment.
According to the one side of the application there is provided a kind of computer-readable medium including instructing, the instruction is in quilt During execution system is proceeded as follows:
Obtain the corresponding device identification information of the charging device;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close Discharge circuit between the charging device and user equipment to the user equipment to charge.
According to further aspect of the application there is provided a kind of computer-readable medium including instructing, the instruction exists So that system is proceeded as follows when being performed:
The charging authentication information is obtained, wherein, the charging authentication information is inputted by user or by the user equipment Send;
Verify the charging authentication information;
When the charging authentication information is by checking, the discharge circuit between closure charging device and the user equipment is with right The user equipment is charged.
According to the another aspect of the application there is provided a kind of computer-readable medium including instructing, the instruction exists So that system is proceeded as follows when being performed:
Obtain the corresponding device identification information of charging device;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close The discharge circuit of the charging device is externally to charge.
According to another aspect of the application there is provided a kind of computer-readable medium including instructing, the instruction exists So that system is proceeded as follows when being performed:
The charging authentication information request that user equipment is sent is received, wherein the charging authentication information request is known including device Other information;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close The discharge circuit of the corresponding charging device of described device identification information to the user equipment to charge;
The charging authentication information is back to the user equipment.
It should be noted that the application can be carried out in the assembly of software and/or software and hardware, for example, can adopt Realized with application specific integrated circuit (ASIC), general purpose computer or any other similar hardware device.In one embodiment In, the software program of the application can realize steps described above or function by computing device.Similarly, the application Software program (including related data structure) can be stored in computer readable recording medium storing program for performing, for example, RAM memory, Magnetically or optically driver or floppy disc and similar devices.In addition, some steps or function of the application can employ hardware to realize, example Such as, as coordinating with processor so as to performing the circuit of each step or function.
In addition, the part of the application can be applied to computer program product, such as computer program instructions, when its quilt When computer is performed, by the operation of the computer, it can call or provide according to the present processes and/or technical scheme. Those skilled in the art will be understood that existence form of the computer program instructions in computer-readable medium includes but is not limited to Source file, executable file, installation package file etc., correspondingly, the mode that computer program instructions are computer-executed include but It is not limited to:The computer directly performs the instruction, or the computer compiles and performs program after corresponding compiling after the instruction again, Either the computer reads and performs the instruction or the computer reads and installed and performed again after corresponding installation after the instruction Program.Here, computer-readable medium can be available for computer access any available computer-readable recording medium or Communication media.
Communication media includes thereby including such as computer-readable instruction, data structure, program module or other data Signal of communication is sent to the medium of another system from a system.Communication media may include have the transmission medium led (such as electric Cable and line (for example, optical fiber, coaxial etc.)) and can propagate wireless (not having the transmission the led) medium of energy wave, such as sound, electricity Magnetic, RF, microwave and infrared.Computer-readable instruction, data structure, program module or other data can be embodied as example wireless Modulated message signal in medium (such as carrier wave or be such as embodied as the similar mechanism of a part for spread spectrum technique). Term " modulated message signal " refers to that one or more feature is modified or set in the way of coding information in the signal Fixed signal.Modulation can be simulation, numeral or Hybrid Modulation Technology.
Unrestricted as example, computer-readable recording medium may include to refer to for storage is such as computer-readable Make, the volatibility that any method or technique of the information of data structure, program module or other data is realized and it is non-volatile, can Mobile and immovable medium.For example, computer-readable recording medium includes, but not limited to volatile memory, such as with Machine memory (RAM, DRAM, SRAM);And nonvolatile memory, such as flash memory, various read-only storages (ROM, PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memory (MRAM, FeRAM);And magnetic and optical storage apparatus (hard disk, Tape, CD, DVD);Or other currently known media or Future Development can store the computer used for computer system Readable information/data.
Here, including a device according to one embodiment of the application, the device includes being used to store computer program The memory of instruction and the processor for execute program instructions, wherein, when the computer program instructions are by the computing device When, trigger methods and/or techniques scheme of the plant running based on foregoing multiple embodiments according to the application.
It is obvious to a person skilled in the art that the application is not limited to the details of above-mentioned one exemplary embodiment, Er Qie In the case of without departing substantially from spirit herein or essential characteristic, the application can be realized in other specific forms.Therefore, no matter From the point of view of which point, embodiment all should be regarded as exemplary, and be nonrestrictive, scope of the present application is by appended power Profit is required rather than described above is limited, it is intended that all in the implication and scope of the equivalency of claim by falling Change is included in the application.Any reference in claim should not be considered as to the claim involved by limitation.This Outside, it is clear that the word of " comprising " one is not excluded for other units or step, and odd number is not excluded for plural number.That is stated in device claim is multiple Unit or device can also be realized by a unit or device by software or hardware.The first, the second grade word is used for table Show title, and be not offered as any specific order.

Claims (16)

1. a kind of method for being used to charge to user equipment by charging device at user equipment end, wherein, this method bag Include:
Obtain the corresponding device identification information of the charging device;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is described for closing Discharge circuit between charging device and user equipment to the user equipment to charge.
2. according to the method described in claim 1, wherein, methods described also includes:
The charging authentication information is presented;Or
The charging authentication information is sent to the charging device, come pair so that the charging device closes the discharge circuit The user equipment is charged.
3. method according to claim 1 or 2, wherein, it is described to determine the corresponding charging authentication of described device identification information Information, wherein, the discharge circuit that the charging authentication information is used to close between the charging device and user equipment is with to described User equipment, which carries out charging, to be included:
Charging authentication information request is sent to the corresponding network equipment, wherein the charging authentication information request includes described device Identification information;
The corresponding charging authentication information of described device identification information that the network equipment is returned is received, wherein, the charging is recognized Card information is used to close the discharge circuit between the charging device and the user equipment to charge to the user equipment.
4. method according to claim 1 or 2, wherein, it is described to determine the corresponding charging authentication of described device identification information Information, wherein, the discharge circuit that the charging authentication information is used to close between the charging device and user equipment is with to described User equipment, which carries out charging, to be included:
The corresponding charging authentication information of described device identification information is generated, wherein, the charging authentication information is described for closing The discharge circuit of charging device to the user equipment to charge.
5. method according to any one of claim 1 to 4, wherein, described device identification information is at least appointed including following One:
The device sequence number information of the charging device;
The Quick Response Code identification information of the charging device.
6. a kind of method for being used to charge to user equipment at charging device end, wherein, this method includes:
Charging authentication information is obtained, wherein, the charging authentication information is inputted by user or sent by user equipment;
Verify the charging authentication information;
When the charging authentication information is by checking, the discharge circuit between closure charging device and the user equipment is with to described User equipment is charged.
7. method according to claim 6, wherein, the checking charging authentication information includes:
When receiving the charging authentication information, corresponding reference authentication information is generated;
The charging authentication information is verified according to the reference authentication information.
Wherein, described when the charging authentication information is by checking, the electric discharge between closure charging device and the user equipment is electric Road is included with carrying out charging to the user equipment:
When the charging authentication information and the encrypted message match, close between the charging device and the user equipment Discharge circuit to the user equipment to charge.
8. the method according to claim 6 or 7, described when the charging authentication information is by checking, charging device is closed Discharge circuit between the user equipment is also included with being charged to the user equipment:
When the charging authentication information is not verified, and the charging duration of the user equipment exceedes predetermined charging duration threshold Value, disconnects the discharge circuit to stop charging to the user equipment.
9. a kind of method for controlling charging device, wherein, this method includes:
Obtain the corresponding device identification information of charging device;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is described for closing The discharge circuit of charging device is externally to charge.
10. a kind of method for being used to charge to user equipment by charging device at network equipment end, wherein, this method bag Include:
The charging authentication information request that user equipment is sent is received, wherein, the charging authentication information request is recognized including device Information;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is described for closing The discharge circuit of the corresponding charging device of device identification information to the user equipment to charge;
The charging authentication information is back to the user equipment.
11. method according to claim 10, wherein, it is described to determine the corresponding charging authentication letter of described device identification information Breath, wherein, the charging authentication information is used for the discharge circuit for closing the corresponding charging device of described device identification information with right The user equipment, which carries out charging, to be included:
Generated and set according to the authentication information of the corresponding charging device of described device identification information, generate described device identification information Corresponding charging authentication information, wherein, the charging authentication information is used to close the discharge circuit of the charging device with to institute User equipment is stated to be charged.
12. method according to claim 11, wherein, the authentication information generation, which is set, includes following at least any one:
Authentication information generating algorithm configuration in the charging device;
Authentication information forming element information in the charging device, wherein, the authentication information forming element information includes institute State the receiving time information of device identification information, the hardware identification information of the charging device and the charging authentication information request At least one of.
13. a kind of method for being used to charge to user equipment by charging device, wherein, this method includes:
User equipment obtains the corresponding device identification information of the charging device;
The user equipment determines the corresponding charging authentication information of described device identification information, wherein, the charging authentication information For closing the discharge circuit between the charging device and user equipment to be charged to the user equipment;
The charging device obtains the charging authentication information, wherein, the charging authentication information is inputted by user or by described User equipment is sent;
The charging device verifies the charging authentication information;
When the charging authentication information is by checking, the charging device is closed between the charging device and the user equipment Discharge circuit to the user equipment to charge.
14. a kind of method for being used to charge to user equipment by charging device, wherein, this method includes:
User equipment obtains the corresponding device identification information of the charging device;
The charging authentication information request that the user equipment is sent to the corresponding network equipment, wherein the charging authentication information please Ask including described device identification information;
The network equipment receives the charging authentication information request that the user equipment is sent;
The network equipment determines the corresponding charging authentication information of described device identification information, wherein, the charging authentication information For closing the discharge circuit of the corresponding charging device of described device identification information to be charged to the user equipment;
The charging authentication information is back to the user equipment by the network equipment;
The user equipment receives the corresponding charging authentication information of described device identification information that the network equipment is returned;
The charging device obtains the charging authentication information, wherein, the charging authentication information is inputted by user or by described User equipment is sent;
The charging device verifies the charging authentication information;
When the charging authentication information is by checking, the charging device is closed between the charging device and the user equipment Discharge circuit to the user equipment to charge.
15. a kind of equipment for being used to charge to user equipment by charging device, wherein, the equipment includes:
Processor;And
It is arranged to store the memory of computer executable instructions, the executable instruction makes the processor when executed Perform the operation of the method as any one of claim 1 to 12.
16. a kind of computer-readable medium including instructing, the instruction causes system to carry out such as claim 1 when executed To the operation of method any one of 12.
CN201710359583.0A 2017-05-19 2017-05-19 Method and equipment for charging user equipment through charging device Active CN107231019B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710359583.0A CN107231019B (en) 2017-05-19 2017-05-19 Method and equipment for charging user equipment through charging device
PCT/CN2018/087421 WO2018210324A1 (en) 2017-05-19 2018-05-18 Method and device for charging user equipment by charging device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710359583.0A CN107231019B (en) 2017-05-19 2017-05-19 Method and equipment for charging user equipment through charging device

Publications (2)

Publication Number Publication Date
CN107231019A true CN107231019A (en) 2017-10-03
CN107231019B CN107231019B (en) 2021-04-30

Family

ID=59933250

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710359583.0A Active CN107231019B (en) 2017-05-19 2017-05-19 Method and equipment for charging user equipment through charging device

Country Status (2)

Country Link
CN (1) CN107231019B (en)
WO (1) WO2018210324A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107135227A (en) * 2017-05-27 2017-09-05 深圳来电科技有限公司 Verification method and equipment
CN107785963A (en) * 2017-10-31 2018-03-09 北京伊电园网络科技有限公司 A kind of charging method and charging system
CN108400639A (en) * 2018-03-30 2018-08-14 上海掌门科技有限公司 The control method and system of a kind of charger baby and its charge parameter
CN108683231A (en) * 2018-06-04 2018-10-19 深圳金海螺科技有限公司 Charging unit, system and charging method
WO2018210324A1 (en) * 2017-05-19 2018-11-22 上海掌门科技有限公司 Method and device for charging user equipment by charging device
CN110730211A (en) * 2019-09-20 2020-01-24 深圳小黄电智能科技有限公司 Shared charging control method, shared charging client and shared charging service terminal
CN111476631A (en) * 2020-03-31 2020-07-31 深圳街电科技有限公司 Mobile power supply discharging method, server, leasing equipment and mobile power supply

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104281802A (en) * 2013-07-01 2015-01-14 宏达国际电子股份有限公司 Method for wireless charging authentication and related wireless charging system
CN205017028U (en) * 2015-06-03 2016-02-03 吴钰淳 Novel charging system
CN205141726U (en) * 2015-11-05 2016-04-06 上海网电网络科技有限公司 Novel charge preciously and novel charging device
CN106356919A (en) * 2016-08-31 2017-01-25 四川省魅力传媒有限公司 Emergency charging method and system for intelligent charging terminal
CN106602657A (en) * 2016-12-29 2017-04-26 杭州微飞胜科技有限公司 Charging pile and working method thereof
CN106684937A (en) * 2015-11-05 2017-05-17 上海网电网络科技有限公司 Charging control method, device and system based on mobile charging device

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160180721A1 (en) * 2014-10-03 2016-06-23 Ivan Otulic System and method for tracking, surveillance and remote control of powered personal recreational vehicles
CN106330822B (en) * 2015-06-19 2019-12-17 中兴新能源汽车有限责任公司 Authentication method, equipment and system for automobile charging terminal and authentication server
CN106329585B (en) * 2015-06-19 2020-03-27 中兴新能源汽车有限责任公司 Wireless charging authentication method and device
CN105172609A (en) * 2015-09-02 2015-12-23 青岛特锐德电气股份有限公司 Electric vehicle, charging device, charging system and method
CN106427645B (en) * 2016-11-16 2019-04-26 东软集团股份有限公司 A kind of method, apparatus and system of electric car charging
CN107231019B (en) * 2017-05-19 2021-04-30 上海掌门科技有限公司 Method and equipment for charging user equipment through charging device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104281802A (en) * 2013-07-01 2015-01-14 宏达国际电子股份有限公司 Method for wireless charging authentication and related wireless charging system
CN205017028U (en) * 2015-06-03 2016-02-03 吴钰淳 Novel charging system
CN205141726U (en) * 2015-11-05 2016-04-06 上海网电网络科技有限公司 Novel charge preciously and novel charging device
CN106684937A (en) * 2015-11-05 2017-05-17 上海网电网络科技有限公司 Charging control method, device and system based on mobile charging device
CN106356919A (en) * 2016-08-31 2017-01-25 四川省魅力传媒有限公司 Emergency charging method and system for intelligent charging terminal
CN106602657A (en) * 2016-12-29 2017-04-26 杭州微飞胜科技有限公司 Charging pile and working method thereof

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018210324A1 (en) * 2017-05-19 2018-11-22 上海掌门科技有限公司 Method and device for charging user equipment by charging device
CN107135227A (en) * 2017-05-27 2017-09-05 深圳来电科技有限公司 Verification method and equipment
CN107785963A (en) * 2017-10-31 2018-03-09 北京伊电园网络科技有限公司 A kind of charging method and charging system
CN107785963B (en) * 2017-10-31 2020-11-24 杭州小电科技股份有限公司 Charging method and charging system
CN108400639A (en) * 2018-03-30 2018-08-14 上海掌门科技有限公司 The control method and system of a kind of charger baby and its charge parameter
CN108683231A (en) * 2018-06-04 2018-10-19 深圳金海螺科技有限公司 Charging unit, system and charging method
CN110730211A (en) * 2019-09-20 2020-01-24 深圳小黄电智能科技有限公司 Shared charging control method, shared charging client and shared charging service terminal
CN110730211B (en) * 2019-09-20 2022-04-29 深圳小黄电智能科技有限公司 Shared charging control method, shared charging client and shared charging service terminal
CN111476631A (en) * 2020-03-31 2020-07-31 深圳街电科技有限公司 Mobile power supply discharging method, server, leasing equipment and mobile power supply
CN111476631B (en) * 2020-03-31 2023-08-29 深圳街电科技有限公司 Mobile power supply discharging method, server, leasing equipment and mobile power supply

Also Published As

Publication number Publication date
WO2018210324A1 (en) 2018-11-22
CN107231019B (en) 2021-04-30

Similar Documents

Publication Publication Date Title
CN107231019A (en) A kind of method and apparatus charged by charging device to user equipment
CN106302762B (en) Smart machine binding method and device
CN105099673A (en) Authorization method, authorization requesting method and devices
CN104618330B (en) Method for processing business, device and terminal
CN109992949B (en) Equipment authentication method, over-the-air card writing method and equipment authentication device
CN107104484B (en) Method and equipment for charging user equipment through charging device
CN104778773A (en) System and method for controlling entrance guard by mobile phone
CN108566641A (en) Pay householder method, device and equipment
CN107566449B (en) Mobile power supply leasing method and system, mobile terminal, server and leasing terminal
CN105827656B (en) Identity identifying method and device based on NFC payment
CN112200949B (en) Entrance guard starting method and device and identity verification system
CN110175828A (en) User's verification method and device based on the signing of bank card quick payment
CN107038569A (en) Information interacting method and device
CN107146339A (en) A kind of offline internet express delivery cabinet and its control system and control method
CN103548392B (en) For providing the method and apparatus of network access to attachment device
CN108460875A (en) A kind of entrance guard authentication method and device based on dynamic two-dimension code
KR20120078313A (en) Method and apparatus for entry authentication using user terminal
CN110334824A (en) Safety moves in method and device
CN105574948A (en) Checking-in method and equipment
CN107148068A (en) A kind of method and apparatus for being used to connect WAP
CN105405012A (en) Smart IC card and payment processing method
CN105825442A (en) Method and device for self service of hotel
JP5960512B2 (en) Charging system for electric mobile object, charging device for electric mobile object, portable communication terminal and server device included therein, and charging method for electric mobile object
CN107172588A (en) A kind of WiFi network recommends method and device
CN106911658A (en) The transmission method of data, data sending terminal, data receiver and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant