CN107231019A - A kind of method and apparatus charged by charging device to user equipment - Google Patents
A kind of method and apparatus charged by charging device to user equipment Download PDFInfo
- Publication number
- CN107231019A CN107231019A CN201710359583.0A CN201710359583A CN107231019A CN 107231019 A CN107231019 A CN 107231019A CN 201710359583 A CN201710359583 A CN 201710359583A CN 107231019 A CN107231019 A CN 107231019A
- Authority
- CN
- China
- Prior art keywords
- charging
- authentication information
- user equipment
- information
- charging authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H02—GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
- H02J—CIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
- H02J7/00—Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries
- H02J7/00032—Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries characterised by data exchange
- H02J7/00036—Charger exchanging data with battery
-
- H—ELECTRICITY
- H02—GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
- H02J—CIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
- H02J7/00—Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries
- H02J7/0068—Battery or charger load switching, e.g. concurrent charging and load supply
Abstract
The purpose of the application is to provide a kind of method for being used to charge to user equipment by charging device, wherein, this method includes:Obtain the corresponding device identification information of the charging device;The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close the discharge circuit between the charging device and user equipment to charge to the user equipment.The application realizes shared charging device and eliminates the reliance on cabinet, reduces the cost of shared charging device, the popularization of shared charging device is more popularized.
Description
Technical field
The application is related to the communications field, more particularly to a kind of skill for being used to charge to user equipment by charging device
Art.
Background technology
Increasingly popularized as the improvement of people's living standards, mobile device (such as mobile phone, MP3, flat board) is used, and with
The function of mobile device is stronger and stronger, the limited battery capacity built in it, the situation for not enough power supply easily occur, in movement
Be inconvenient to use the power supply of fixation to be charged during use, and certain burden can be increased by carrying with charger baby.
The charging rack cost that presently, there are is high, and charger baby is thorough after scanning input cabinet Quick Response Code taking-up charger baby
Depart from cabinet no longer controlled;Because process is cumbersome during actual operation, hotel owner does not want to take the trouble (occupation of land side, and without interests driving) yet
Directly charger baby is pulled and used to user, causes charger baby completely out of control.
The content of the invention
The purpose of the application is to provide a kind of method for being used to charge to user equipment by charging device.
It is used for according to the one side of the application there is provided one kind at user equipment end by charging device to user equipment
The method charged, this method includes:
Obtain the corresponding device identification information of the charging device;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close
Discharge circuit between the charging device and user equipment to the user equipment to charge.
It is used to charge to user equipment at charging device end there is provided a kind of according to further aspect of the application
Method, this method includes:
The charging authentication information is obtained, wherein, the charging authentication information is inputted by user or by the user equipment
Send;
Verify the charging authentication information;
When the charging authentication information is by checking, the discharge circuit between closure charging device and the user equipment is with right
The user equipment is charged.
According to the another aspect of the application there is provided a kind of method for controlling charging device, this method includes:
Obtain the corresponding device identification information of charging device;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close
The discharge circuit of the charging device is externally to charge.
It is used to set user by charging device at network equipment end there is provided one kind according to another aspect of the application
The standby method charged, this method includes:
The charging authentication information request that user equipment is sent is received, wherein the charging authentication information request is known including device
Other information;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close
The discharge circuit of the corresponding charging device of described device identification information to the user equipment to charge;
The charging authentication information is back to the user equipment.
According to the one side of the application, there is provided a kind of side for being used to charge to user equipment by charging device
Method, wherein, this method includes:
User equipment obtains the corresponding device identification information of the charging device;
The user equipment determines the corresponding charging authentication information of described device identification information, wherein, the charging authentication
Information is used to close the discharge circuit between the charging device and user equipment to charge to the user equipment;
The charging device obtains the charging authentication information, wherein, the charging authentication information inputted by user or by
The user equipment is sent;
The charging device verifies the charging authentication information;
When the charging authentication information is by checking, the charging device closes the charging device and the user equipment
Between discharge circuit to be charged to the user equipment.
It is used for user equipment is charged by charging device there is provided a kind of according to further aspect of the application
Method, wherein, this method includes:
User equipment obtains the corresponding device identification information of the charging device;
The charging authentication information request that the user equipment is sent to the corresponding network equipment, wherein the charging authentication is believed
Breath request includes described device identification information;
The network equipment receives the charging authentication information request that the user equipment is sent;
The network equipment determines the corresponding charging authentication information of described device identification information, wherein, the charging authentication
Information is used to close the discharge circuit of the corresponding charging device of described device identification information to charge to the user equipment;
The charging authentication information is back to the user equipment by the network equipment;
The user equipment receives the corresponding charging authentication information of described device identification information that the network equipment is returned;
The charging device obtains the charging authentication information, wherein, the charging authentication information inputted by user or by
The user equipment is sent;
The charging device verifies the charging authentication information;
When the charging authentication information is by checking, the charging device closes the charging device and the user equipment
Between discharge circuit to be charged to the user equipment.
It is used for according to the one side of the application there is provided one kind at user equipment end by charging device to user equipment
The equipment charged, the equipment includes:
Processor;And
It is arranged to store the memory of computer executable instructions, the executable instruction makes the place when executed
Device is managed to perform:
Obtain the corresponding device identification information of the charging device;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close
Discharge circuit between the charging device and user equipment to the user equipment to charge.
It is used to charge to user equipment at charging device end there is provided a kind of according to further aspect of the application
Equipment, the equipment includes:
Processor;And
It is arranged to store the memory of computer executable instructions, the executable instruction makes the place when executed
Device is managed to perform:
The charging authentication information is obtained, wherein, the charging authentication information is inputted by user or by the user equipment
Send;
Verify the charging authentication information;
When the charging authentication information is by checking, the discharge circuit between closure charging device and the user equipment is with right
The user equipment is charged.
According to the another aspect of the application there is provided a kind of equipment for controlling charging device, the equipment includes:
Processor;And
It is arranged to store the memory of computer executable instructions, the executable instruction makes the place when executed
Device is managed to perform:
Obtain the corresponding device identification information of charging device;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close
The discharge circuit of the charging device is externally to charge.
It is used to set user by charging device at network equipment end there is provided one kind according to another aspect of the application
The standby equipment charged, the equipment includes:
Processor;And
It is arranged to store the memory of computer executable instructions, the executable instruction makes the place when executed
Device is managed to perform:
The charging authentication information request that user equipment is sent is received, wherein the charging authentication information request is known including device
Other information;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close
The discharge circuit of the corresponding charging device of described device identification information to the user equipment to charge;
The charging authentication information is back to the user equipment.
According to the one side of the application there is provided a kind of computer-readable medium including instructing, the instruction is in quilt
During execution system is proceeded as follows:
Obtain the corresponding device identification information of the charging device;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close
Discharge circuit between the charging device and user equipment to the user equipment to charge.
According to further aspect of the application there is provided a kind of computer-readable medium including instructing, the instruction exists
So that system is proceeded as follows when being performed:
The charging authentication information is obtained, wherein, the charging authentication information is inputted by user or by the user equipment
Send;
Verify the charging authentication information;
When the charging authentication information is by checking, the discharge circuit between closure charging device and the user equipment is with right
The user equipment is charged.
According to the another aspect of the application there is provided a kind of computer-readable medium including instructing, the instruction exists
So that system is proceeded as follows when being performed:
Obtain the corresponding device identification information of charging device;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close
The discharge circuit of the charging device is externally to charge.
According to another aspect of the application there is provided a kind of computer-readable medium including instructing, the instruction exists
So that system is proceeded as follows when being performed:
The charging authentication information request that user equipment is sent is received, wherein the charging authentication information request is known including device
Other information;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close
The discharge circuit of the corresponding charging device of described device identification information to the user equipment to charge;
The charging authentication information is back to the user equipment.
Compared with prior art, the application is to charge power supply by increasing circuit and digital keys that similar password protection is controlled,
Then by obtain charging device device identification information so that in the application obtain charging authentication information, and with charging device
Portion is matched with reference to authentication information, the charging device pair if the charging authentication information obtained matches checking unanimously with reference to authentication information
User equipment charges;This programme has reached the shared of charging device, and eliminates the reliance on cabinet, reduce further shared charging dress
The cost of realization is put, the popularization of shared charging device is more popularized.
Brief description of the drawings
By reading the detailed description made to non-limiting example made with reference to the following drawings, the application's is other
Feature, objects and advantages will become more apparent upon:
Fig. 1 shows to be used for charge to user equipment by charging device according to a kind of of the application one embodiment
System topological figure;
Fig. 2 shows to be used to set user by charging device at user equipment end according to a kind of of the application one embodiment
The standby method flow diagram charged;
Fig. 3 shows the sub-step of a step in Fig. 2;
Fig. 4 is shown to be used to carry out user equipment according to a kind of the of another embodiment of the application at charging device end
The method flow diagram of charging;
Fig. 5 is shown to be used to pass through charging device pair according to a kind of the of another embodiment of the application at network equipment end
The method flow diagram that user equipment is charged;
Fig. 6 is shown to be used to fill user equipment by charging device according to one kind of one embodiment of the application
The systems approach flow chart of electricity;
Fig. 7 is shown to be used to carry out user equipment by charging device according to one kind of another embodiment of the application
The systems approach flow chart of charging;
Fig. 8 shows a kind of structural representation of charging device of one embodiment according to the application;
Same or analogous reference represents same or analogous part in accompanying drawing.
Embodiment
The application is described in further detail below in conjunction with the accompanying drawings.
In one typical configuration of the application, terminal, the equipment of service network and trusted party include one or more
Processor (CPU), input/output interface, network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Internal memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moved
State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable
Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM),
Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, magnetic disk storage or other magnetic storage apparatus or
Any other non-transmission medium, the information that can be accessed by a computing device available for storage.
The application meaning equipment includes but is not limited to user equipment, the network equipment or user equipment and the network equipment passes through
Network is integrated constituted equipment.The user equipment, which includes but is not limited to any one, to carry out man-machine interaction with user
The mobile electronic product of (man-machine interaction is for example carried out by touch pad), such as smart mobile phone, tablet personal computer, the mobile electricity
Sub- product can use any operating system, such as android operating systems, iOS operating systems.Wherein, the network equipment
The electronic equipment of numerical computations and information processing according to the instruction for being previously set or storing, can be carried out automatically including a kind of, its
Hardware includes but is not limited to microprocessor, application specific integrated circuit (ASIC), PLD (PLD), field programmable gate
Array (FPGA), digital signal processor (DSP), embedded device etc..The network equipment includes but is not limited to computer, net
The cloud that network main frame, single network server, multiple webserver collection or multiple servers are constituted;Here, cloud is by based on cloud meter
The a large amount of computers or the webserver for calculating (Cloud Computing) are constituted, wherein, cloud computing is the one of Distributed Calculation
Kind, a virtual supercomputer being made up of the computer collection of a group loose couplings.The network includes but is not limited to interconnection
Net, wide area network, Metropolitan Area Network (MAN), LAN, VPN, wireless self-organization network (Ad Hoc networks) etc..Preferably, the equipment
Can also be run on the user equipment, the network equipment or user equipment and the network equipment, the network equipment, touch terminal or
The network equipment is integrated the program in constituted equipment with touch terminal by network.
Certainly, those skilled in the art will be understood that the said equipment is only for example, and other are existing or are likely to occur from now on
Equipment be such as applicable to the application, should also be included within the application protection domain, and be incorporated herein by reference herein.
In the description of the present application, " multiple " are meant that two or more, unless otherwise specifically defined.
Fig. 1 shows the typical application scenarios of the application, and user equipment obtains the device identification information of charging device
It is determined that corresponding charging authentication information is obtained, then by being charged after the checking of charging device.The program can be set by user
It is standby to coordinate completion with the side of charging device two, user equipment, the network equipment and charging device tripartite can also be passed through and coordinate completion.
Fig. 2 is shown to be used to set user by charging device according to a kind of of the application one side at user equipment end
The standby method charged, the method comprising the steps of S11 and step S12.
Specifically, in step s 11, user equipment obtains the corresponding device identification information of the charging device.For example, filling
The user equipmenies such as corresponding intrument identification information such as sequence number are posted on electric installation by detecting the acquisition of information of the user's input sequence
Row number;In another example, Quick Response Code is posted on charging device, wherein, user equipment by scan the Quick Response Code on the charging device come
Obtain its corresponding sequence number.
Then, in step s 12, user equipment determines the corresponding charging authentication information of described device identification information, wherein,
The charging authentication information is used to close the discharge circuit between the charging device and user equipment to enter the user equipment
Row charging.For example, user equipment is obtained after the sequence number of the corresponding charging device of charging device, obtained and charged based on the sequence number
The corresponding charging authentication information of device sequence number, the charging authentication information can be used between closure charging device and user equipment
Discharge circuit user equipment is charged.Obtaining the process of charging authentication information can locally complete in user equipment,
The processing of network equipment end can be uploaded to, after the processing of network equipment end, the charging authentication information is returned to user by the network equipment
Equipment.The charging authentication information can be default or generated in real time.
For example, user holds user equipment, user wants to charge to user equipment using charging device.User equipment
The corresponding sequence number of the charger baby is first obtained, for example, the charger baby pair that user equipment detection user inputs in a user device
The sequence number answered, can also obtain the sequence number of the charger baby by way of scanning Quick Response Code.User equipment is based on the charging
The corresponding charging authentication information of the sequence number is obtained after precious sequence number, wherein, the charging authentication information is that the charger baby is closed
Close the password of discharge circuit.User inputs charging authentication information to charger baby, and charging device is tested the charging authentication information
Card;If the charging authentication information can be powered by checking, the discharge circuit closure of charger baby to external equipment.
Preferably, this method also includes step S13.In step s 13, the charging authentication information is presented in user equipment;
Or user equipment sends the charging authentication information to the charging device, so that the charging device closes the electric discharge
Circuit charges to the user equipment.For example, user gets the corresponding charging authentication letter of the charging device sequence number
After breath, show charging authentication information on screen, user according to the charging authentication information of presentation charging device mechanical keys
The charging authentication information is manually entered on disk;Or user equipment is by bluetooth discovery and is connected to the charging device, then will
The charging authentication information is sent to the charging device with the mode of Bluetooth transmission.In another example, user equipment can also pass through NFC
Near Field Communication modes such as (Near Field Communication, near-field communication) sends charging authentication information, process with
It is above-mentioned similar, it will not be repeated here.
For example, after user equipment gets the sequence number of the charger baby, in the sequence number pair of the local search charger baby
The charging authentication information answered, the corresponding charging authentication information of the sequence number is returned after application database matching.User equipment is obtained
After charging authentication information, the charging authentication information is presented on its screen, user is according to the charging authentication information of presentation in charging
The charging authentication information is manually entered on the mechanical keyboard of device;Or user equipment can search the charging in bluetooth
Treasured, is set up after linking between user equipment and charger baby by bluetooth, is in the application recognized the charging by way of bluetooth
Information transfer is demonstrate,proved to the charger baby;User can also complete transmitting procedure by the short-range communication mode such as NFC.Charging device is obtained
Take after the charging authentication information, the charging authentication information is verified;If the charging authentication information passes through checking, charger baby
Discharge circuit closure, can be powered to external equipment.
Preferably, with reference to Fig. 3, step S12 includes sub-step S12a and sub-step S12b.In sub-step S12a, user
Equipment sends charging authentication information request to the corresponding network equipment, wherein the charging authentication information request includes described device
Identification information;In sub-step S12b, the described device identification information that user equipment receives the network equipment return is corresponding
Charging authentication information, wherein, the charging authentication information is used to close the electric discharge between the charging device and the user equipment
Circuit to the user equipment to charge.For example, user equipment is obtained after the sequence number of the charging device, to the network equipment
Charging authentication information request is sent, to the corresponding charging authentication information of the network device requests charging devices, wherein, the charging
Authentication information request contains the sequence number of the charging device;The network equipment carries out inquiry and obtains the default charging authentication of sequence number
Information is generated after dynamic charging authentication information in real time based on sequence number, and corresponding charging authentication information is returned to user equipment,
The charging authentication information is used for the discharge circuit for closing charging device, so as to be charged to user equipment.
For example, user is got after the sequence number of the charger baby, the sequence number is sent to the network equipment.The network equipment connects
The sequence number is received, the default charging authentication information of sequence number is determined after being inquired about in database or based on sequence number and dynamic
The state factor (such as time, random number etc.) generates charging authentication information in real time, and then, the network equipment returns the charging authentication information
Back to user equipment.User equipment is obtained after charging authentication information, passes through the short-range communications such as user's input or bluetooth, NFC
The charging authentication information is sent to charging device by mode.Charging device is obtained after the charging authentication information, to the charging authentication
Information is verified;If the charging authentication information can be supplied by checking, the discharge circuit closure of charger baby to external equipment
Electricity.
Preferably, in stepb, the corresponding charging authentication information of user equipment generation described device identification information, wherein,
The charging authentication information is used to close the discharge circuit of the charging device to charge to the user equipment.For example,
Intrinsic information (for example, hardware identification information or sequence number of charger baby etc.) of the user equipment based on the charger baby, or the charging
Precious intrinsic information and dynamic factor (for example, current time, counter times, random number etc.), generates the charging authentication information.
For example, user equipment is got after the sequence number of the charger baby, can the local search charger baby sequence number
Corresponding charging authentication information.In another example, user is got after the sequence number of the charger baby, the intrinsic letter based on the charger baby
Cease (for example, hardware identification information or sequence number of charger baby etc.), or the charger baby intrinsic information and dynamic factor (for example,
Current time, counter times, random number etc.), generate the charging authentication information.Further for example, user equipment sends out the sequence number
Deliver to the network equipment.The network equipment receives the sequence number, and the default charging of sequence number is determined after being inquired about in database
Authentication information generates charging authentication information, then, the net in real time based on sequence number and dynamic factor (such as time, random number etc.)
The charging authentication information is returned to user equipment by network equipment.User equipment is obtained after charging authentication information, is inputted by user
Or the charging authentication information transfer is given the charger baby by the Near Field Communication mode such as bluetooth, NFC.Charging device, which obtains the charging, to be recognized
Demonstrate,prove after information, the charging authentication information is verified;If the charging authentication information passes through checking, the discharge circuit of charger baby
Closure, can power to external equipment.
Preferably, described device identification information includes following at least any one:The device sequence number letter of the charging device
Breath;The 2 D code information of the charging device.For example, the device identification information that user equipment is obtained can be that user is manually entered
Charging device device sequence number information, can also the 2 D code information of charging device that arrives of user equipment scans.
For example, user holds user equipment, user wants to charge to user equipment using charger baby.User equipment is first
The corresponding sequence number of the charger baby is obtained, wherein, user equipment can detect the corresponding sequence of the charger baby that user is manually entered
Row number, can also obtain the sequence number of the charger baby by way of scanning Quick Response Code, wherein, the Quick Response Code is filled comprising the charging
The device identification information put.User equipment is got after the sequence number of the charger baby, can the local search charger baby sequence
The corresponding charging authentication information of row number.In another example, user is got after the sequence number of the charger baby, consolidating based on the charger baby
Have information (for example, hardware identification information or sequence number of charger baby etc.), or the charger baby intrinsic information and dynamic factor (example
Such as, current time, counter times, random number etc.), generate the charging authentication information.Further for example, user equipment is by the sequence number
Send to the network equipment.The network equipment receives the sequence number, determines that sequence number is default after being inquired about in database and fills
Electric authentication information generates charging authentication information in real time based on sequence number and dynamic factor (such as time, random number etc.), then, should
The charging authentication information is returned to user equipment by the network equipment.User equipment is obtained after charging authentication information, defeated by user
Enter or the Near Field Communication mode such as bluetooth, NFC by the charging authentication information transfer to the charger baby.Charger baby obtains the charging and recognized
Demonstrate,prove after information, the charging authentication information is verified;If the charging authentication information passes through checking, the discharge circuit of charger baby
Closure, can power to external equipment.
Fig. 4 is shown to be used to charge to user equipment according to a kind of of the application other side at charging device end
Method, wherein, the method comprising the steps of S21, step S22 and step S23.In the step s 21, filled described in charging device acquisition
Electric authentication information, wherein, the charging authentication information is inputted by user or sent by the user equipment;In step S22, fill
Electric installation verifies the charging authentication information;In step S23, when the charging authentication information is by checking, charging device is closed
The discharge circuit between charging device and the user equipment is closed to charge to the user equipment.Fig. 8 shows a kind of right
The structure chart for the charging device that user equipment is charged, including discharge circuit, the charging device are also described including being arranged at
Output control switch on discharge circuit, the checking information input module for obtaining charging authentication information, and respectively with institute
State output control switch, the output control module of checking information input module electrical connection;Wherein, the output control module
The charging authentication information of checking information input module input is received and verifies, when the charging authentication information is by checking,
The output control switch is controlled to close so that the charging device is externally charged by the discharge circuit.For example, charging dress
The charging authentication information for the physical keyboard detection user's input put, then, the output control module of the charging device verifies that this fills
Whether electric authentication information is correct, if the charging authentication information is by checking, the output control switch of charging device closes this and filled
Discharge circuit between electric installation and the user equipment, to be charged to the user equipment.
For example, user holds user equipment, user wants to charge to the user equipment using charger baby.User equipment
The corresponding sequence number of the charger baby is first obtained, for example, user equipment can detect user's key in the application that user equipment is installed
The device identification informations such as the corresponding sequence number of the charger baby entered, can also obtain the charger baby by way of scanning Quick Response Code
Sequence number.User equipment is got after the sequence number of the charger baby, should in user equipment local search according to the sequence number
The corresponding charging authentication information of charger baby, the corresponding charging authentication information of the sequence number is returned after local data base matching.Or,
User equipment is got after the sequence number of the charger baby, and the sequence number is sent to the network equipment;The network equipment is in its database
In match the corresponding charging authentication information of the sequence number, or, the corresponding charging authentication information of the sequence number is generated in real time, with
Afterwards, the charging authentication information is returned to user equipment by the network equipment.
User equipment is obtained after charging authentication information, and the charger baby can be searched in bluetooth, is set up and used by bluetooth
After connection between family equipment and charger baby, the charging is given by the charging authentication information transfer by way of bluetooth in the application
It is precious;User can also complete transmitting procedure by the short-range communication mode such as NFC.User can also be by the secondary or physical bond of charger baby
Disk inputs the charging authentication information, so that charger baby receives the charging authentication information.
Charger baby is received after the charging authentication information, and itself and the reference authentication information inside charger baby match testing
Card;Here, this with reference to authentication information can charger baby be locally stored or charger baby inside generate in real time.Example
Such as, comprising checking information module occurs for charger baby, after charger baby receives the charging authentication information of user's offer, checking letter
Breath generation module generates the reference authentication information for verifying the charging authentication information in real time, wherein, mould occurs for the checking information
Block can be based on the charger baby intrinsic information (for example, hardware identification information or sequence number of charger baby etc.), or the charger baby
Intrinsic information and dynamic factor (for example, current time, counter times, random number etc.), generate this and refer to authentication information.If should
Charging authentication information passes through checking with each all same of reference authentication information, then the charging authentication information;Then, charger baby
Output control module sends closure switch instruction to output control switch, and after output control switch is closed, discharge circuit is connected
Logical, the charger baby is started to charge up to user equipment.
Preferably, in step S22, including sub-step S22a (not shown) and sub-step S22b (not shown).In sub-step
In rapid S22a, when charging device receives the charging authentication information, corresponding reference authentication information is generated;In sub-step S22b
In, charging device verifies the charging authentication information according to the reference authentication information.Recognize for example, charging device receives charging
Demonstrate,prove information simultaneously, module occurs for checking information, and generation refers to authentication information simultaneously, wherein, this can be default with reference to authentication information
Reference authentication information or intrinsic information based on the charger baby (for example, the hardware identification information or sequence of charger baby
Number etc.), or the charger baby intrinsic information and dynamic factor (for example, current time, counter times, random number etc.), generation
Reference authentication information;Then, occur module in checking information to be matched charging authentication information with reference to authentication information, it is right
Charging authentication information is verified.
For example, user equipment gets the sequence number of the charger baby, corresponding charging authentication letter is determined based on the sequence number
Breath.User equipment is obtained after charging authentication information, by way of detecting user's input or the short range transmission side such as bluetooth, NFC
Formula is by charging authentication information transfer to charger baby.Charger baby is received after the charging authentication information, by its with inside charger baby
Matching checking is carried out with reference to authentication information, whether successive appraximation charging authentication information is consistent with reference to authentication information;Here, the ginseng
Examining authentication information can in real time generate inside the local default or charger baby of charger baby.For example, charger baby is included
Module occurs for checking information, and after charger baby receives the charging authentication information of user's offer, it is real that module occurs for the checking information
Shi Shengcheng is used for the reference authentication information for verifying the charging authentication information, wherein, module, which occurs, for the checking information to be filled based on this
Electric precious intrinsic information (for example, hardware identification information or sequence number of charger baby etc.), or the intrinsic information of the charger baby and dynamic
The state factor (for example, current time, counter times, random number etc.), generates this and refers to authentication information.If charging authentication information with
With reference to each all same of authentication information, then charging authentication Information Authentication success, the output control module of charger baby is to output
Controlling switch sends closure switch instruction, and after output control switch is closed, discharge circuit is connected, and the charger baby is set to user
It is standby to start to charge up.
Preferably, in step S23, when the charging authentication information is not verified, and the charging of the user equipment
Duration exceedes predetermined charging duration threshold value, disconnects the discharge circuit to stop charging to the user equipment.For example,
When charging equipment has been switched off, it is impossible to when operating, start urgent charge function, be connected to charging device, charging device is to user
Equipment promptly charges certain time.Charging authentication information is not verified, and charging duration exceedes the predetermined charging duration threshold value
When, the discharge circuit is disconnected to stop charging to the user equipment.
For example, user holds user equipment, user wants to charge to user equipment using charger baby, and now user sets
Standby to be shut down because of not enough power supply, user equipment is connected to charging device, and charging device starts urgent charge function.User sets
The corresponding sequence number of the charger baby is first obtained after standby start, wherein, user equipment can detect what user installed in user equipment
The corresponding sequence number of the charger baby keyed in, can also obtain the sequence of the charger baby by way of scanning Quick Response Code
Number.User equipment is got after the sequence number of the charger baby, according to the sequence number in the user equipment local search charger baby
Corresponding charging authentication information, the corresponding charging authentication information of the sequence number is returned after local data base matching.Or, Yong Hushe
It is standby to get after the sequence number of the charger baby, the sequence number is sent to the network equipment;The network equipment is matched in its database
To the corresponding charging authentication information of the sequence number, or, the corresponding charging authentication information of the sequence number is generated in real time, then, should
The charging authentication information is returned to user equipment by the network equipment.
User equipment is obtained after charging authentication information, and the charger baby can be searched in bluetooth, is set up and used by bluetooth
After connection between family equipment and charger baby, the charging is given by the charging authentication information transfer by way of bluetooth in the application
It is precious;User can also complete transmitting procedure by the short-range communication mode such as NFC.User can also be by the secondary or physical bond of charger baby
Disk inputs the charging authentication information, so that charger baby receives the charging authentication information.
Charger baby is received after the charging authentication information, and itself and the reference authentication information inside charger baby match testing
Card;Here, this with reference to authentication information can charger baby be locally stored or charger baby inside generate in real time.Example
Such as, comprising checking information module occurs for charger baby, after charger baby receives the charging authentication information of user's offer, checking letter
Breath generation module generates the reference authentication information for verifying the charging authentication information in real time, wherein, mould occurs for the checking information
Block can be based on the charger baby intrinsic information (for example, hardware identification information or sequence number of charger baby etc.), or the charger baby
Intrinsic information and dynamic factor (for example, current time, counter times, random number etc.), generate this and refer to authentication information.If should
Charging authentication Information Authentication is successful, then the output control module of charger baby sends closure switch instruction to output control switch, when
After output control switch closure, discharge circuit is connected, and the charger baby is started to charge up to the user equipment or other users equipment.
Preferably, according to a kind of method for controlling charging device of the another aspect of the application, wherein, this method bag
Include step S41 (not shown) and step S42 (not shown).In step S41, user equipment obtains the corresponding device of charging device
Identification information;In step S42, the corresponding charging authentication information of described device identification information is determined, wherein the charging authentication
Information is used to close the discharge circuit of the charging device externally to charge.For example, user equipment obtains the sequence of the charging device
After row information, selection is charged using the charging device to other users equipment, then according to the sequence number of the charging device
The corresponding charging charging authentication information externally charged of generation.
For example, user holds user equipment, user want by the application use charger baby to the user equipment of oneself or
The user equipment of other users is charged.User equipment first obtains the corresponding sequence number of the charger baby, wherein, user equipment can
To detect the corresponding sequence number of the charger baby of user's key entry, the charger baby can also be obtained by way of scanning Quick Response Code
Sequence number.User equipment is got after the sequence number of the charger baby, and according to the sequence number, in user equipment local search, this fills
The precious corresponding charging authentication information of electricity, the corresponding charging authentication information of the sequence number is returned after local data base matching.Or, use
Family equipment is got after the sequence number of the charger baby, and the sequence number is sent to the network equipment;The network equipment is in its database
The corresponding charging authentication information of the sequence number is matched, or, the corresponding charging authentication information of the sequence number is generated in real time, with
Afterwards, the charging authentication information is returned to user equipment by the network equipment.
User equipment is obtained after charging authentication information, and the charger baby can be searched in bluetooth, is set up and used by bluetooth
After linking between family equipment and charger baby, the charging is given by the charging authentication information transfer by way of bluetooth in the application
It is precious;User can also complete transmitting procedure by the short-range communication mode such as NFC.User can also be by the secondary or physical bond of charger baby
Disk inputs the charging authentication information, so that charger baby receives the charging authentication information.
Charger baby is received after the charging authentication information, and itself and the reference authentication information inside charger baby match testing
Card;Here, this with reference to authentication information can charger baby be locally stored or charger baby inside generate in real time.Example
Such as, comprising checking information module occurs for charger baby, after charger baby receives the charging authentication information of user's offer, checking letter
Breath generation module generates the reference authentication information for verifying the charging authentication information in real time, wherein, mould occurs for the checking information
Block can be based on the charger baby intrinsic information (for example, hardware identification information or sequence number of charger baby etc.), or the charger baby
Intrinsic information and dynamic factor (for example, current time, counter times, random number etc.), generate this and refer to authentication information.If should
Charging authentication Information Authentication is failed, and the urgent charge function time exceedes scheduled time threshold value, then charger baby output control mould
Block is sent to output control switch disconnects switch order, and after output control switch disconnects, output discharge circuit disconnects, the charger baby
User equipment is stopped to charge.
Fig. 5 is shown to be used to set user by charging device according to a kind of of the application another further aspect at network equipment end
The standby method charged, wherein, the method comprising the steps of S31, step S32 and step S33.Wherein, in step S31, net
Network equipment receives the charging authentication information request that user equipment is sent, wherein, the charging authentication information request is known including device
Other information;In step s 32, the network equipment determines the corresponding charging authentication information of described device identification information, wherein, it is described to fill
Electric authentication information is used to close the discharge circuit of the corresponding charging device of described device identification information to enter the user equipment
Row charging;In step S33, the charging authentication information is back to the user equipment by the network equipment.For example, the network equipment
The authentication information request for including charging device identification information that user equipment is sent is received, wherein, the network equipment is based on charging and filled
Identification information such as sequence number is put, the corresponding charging authentication information of sequence number is determined in database, and the charging authentication information is returned
Back to user equipment.In another example, what network equipment reception user equipment was sent includes charging device identification information such as sequence number
Authentication information request, based on the charging device identification information (for example, charger baby sequence number etc.), or the device identification information and dynamic
The state factor (for example, current time, counter times, random number etc.), generates the charging authentication information.Then, the network equipment will
The charging authentication information is back to the user equipment.
For example, user holds user equipment, user wants to charge to user equipment using charger baby.User equipment is first
The corresponding sequence number of the charger baby is obtained, wherein, user equipment can detect the charger baby that user inputs in a user device
Corresponding sequence number, can also obtain the sequence number of the charger baby by way of scanning Quick Response Code.User equipment gets this
After the sequence number of charger baby, the sequence number is sent to the network equipment, after the network equipment is matched in its database, it is determined that should
The default charging authentication information of sequence number, then, the charging authentication information is returned to user equipment by the network equipment.
User equipment is obtained after charging authentication information, and the charger baby can be searched in bluetooth, is set up and used by bluetooth
After linking between family equipment and charger baby, the charging is given by the charging authentication information transfer by way of bluetooth in the application
It is precious;User can also complete transmitting procedure by the short-range communication mode such as NFC.User can also be by the secondary or physical bond of charger baby
Disk inputs the charging authentication information, so that charger baby receives the charging authentication information.
Charger baby is received after the charging authentication information, and itself and the reference authentication information inside charger baby match testing
Card;Here, this with reference to authentication information can charger baby be locally stored or charger baby inside generate in real time.Example
Such as, comprising checking information module occurs for charger baby, after charger baby receives the charging authentication information of user's offer, checking letter
Breath generation module generates the reference authentication information for verifying the charging authentication information in real time, wherein, mould occurs for the checking information
Block can be based on the charger baby intrinsic information (for example, hardware identification information or sequence number of charger baby etc.), or the charger baby
Intrinsic information and dynamic factor (for example, current time, counter times, random number etc.), generate this and refer to authentication information.If should
Charging authentication information passes through checking with each all same of reference authentication information, then the charging authentication information;Then, charger baby
Output control module sends closure switch instruction to output control switch, and after output control switch is closed, discharge circuit is connected
Logical, the charger baby is started to charge up to user equipment.
Preferably, in step s 32, the network equipment is believed according to the certification of the corresponding charging device of described device identification information
Breath generation is set, the corresponding charging authentication information of generation described device identification information, wherein, the charging authentication information is used to close
The discharge circuit of the charging device is closed to charge to the user equipment.For example, the network equipment receives user equipment hair
That send includes the authentication information request of charging device identification information such as sequence number, based on the charging device identification information (for example, filling
Electric treasured sequence number etc.), or the device identification information and dynamic factor (for example, current time, counter times, random number etc.),
Generate the charging authentication information.Then, the charging authentication information is back to the user equipment by the network equipment.
For example, user holds user equipment, user wants to charge to user equipment using charger baby.User equipment is first
The corresponding sequence number of the charger baby is obtained, wherein, user equipment can detect the charger baby that user inputs in a user device
Corresponding sequence number, can also obtain the sequence number of the charger baby by way of scanning Quick Response Code.User equipment gets this
After the sequence number of charger baby, the sequence number is sent to the network equipment, after the network equipment is matched in its database, it is determined that should
The default charging authentication information of sequence number, then, the charging authentication information is returned to user equipment by the network equipment;And example
Such as, user equipment sends the sequence number to map network equipment, and the network equipment receives being filled comprising charging for user equipment transmission
The authentication information request of identification information such as sequence number is put, based on the charging device identification information (for example, charger baby sequence number etc.),
Or the device identification information and dynamic factor (for example, current time, counter times, random number etc.), generate the charging authentication
Information.Then, the charging authentication information is back to the user equipment by the network equipment.
User equipment is obtained after charging authentication information, and the charger baby can be searched in bluetooth, is set up and used by bluetooth
After linking between family equipment and charger baby, the charging is given by the charging authentication information transfer by way of bluetooth in the application
It is precious;User can also complete transmitting procedure by the short-range communication mode such as NFC.User can also be by the secondary or physical bond of charger baby
Disk inputs the charging authentication information, so that charger baby receives the charging authentication information.
Charger baby is received after the charging authentication information, and itself and the reference authentication information inside charger baby match testing
Card;Here, this with reference to authentication information can charger baby be locally stored or charger baby inside generate in real time.Example
Such as, comprising checking information module occurs for charger baby, after charger baby receives the charging authentication information of user's offer, checking letter
Breath generation module generates the reference authentication information for verifying the charging authentication information in real time, wherein, mould occurs for the checking information
Block can be based on the charger baby intrinsic information (for example, hardware identification information or sequence number of charger baby etc.), or the charger baby
Intrinsic information and dynamic factor (for example, current time, counter times, random number etc.), generate this and refer to authentication information.If should
Charging authentication information passes through checking with each all same of reference authentication information, then the charging authentication information;Then, charger baby
Output control module sends closure switch instruction to output control switch, and after output control switch is closed, discharge circuit is connected
Logical, the charger baby is started to charge up to user equipment.
Preferably, the authentication information generation, which is set, includes following at least any one:Certification letter in the charging device
Cease generating algorithm configuration;Authentication information forming element information in the charging device, wherein, the authentication information forming element
Information includes connecing for described device identification information, the hardware identification information of the charging device and the charging authentication information request
Receive at least one of temporal information.For example, the network equipment receive user equipment send include charging device identification information such as sequence
The authentication information request of row number, based on the charging device identification information (for example, charger baby sequence number etc.), or device identification letter
Breath, dynamic factor (for example, current time, counter times, random number etc.), and specific algorithm configuration or with sequence number pair
The algorithm configuration answered, generates the charging authentication information.
For example, user holds user equipment, user wants to charge to user equipment using charger baby.User equipment is first
The corresponding sequence number of the charger baby is obtained, wherein, user equipment can detect the charger baby that user inputs in a user device
Corresponding sequence number, can also obtain the sequence number of the charger baby by way of scanning Quick Response Code.User equipment gets this
After the sequence number of charger baby, the sequence number is sent to the network equipment, after the network equipment is matched in its database, it is determined that should
The default charging authentication information of sequence number, then, the charging authentication information is returned to user equipment by the network equipment;And example
Such as, user equipment sends the sequence number to map network equipment, and the network equipment receives being filled comprising charging for user equipment transmission
The authentication information request of identification information such as sequence number is put, based on the charging device identification information (for example, charger baby sequence number etc.),
Or the device identification information, dynamic factor (for example, current time, counter times, random number etc.), and specifically algorithm is matched somebody with somebody
Put or algorithm configuration corresponding with sequence number, generate the charging authentication information.Then, the network equipment returns the charging authentication information
It is back to the user equipment.
User equipment is obtained after charging authentication information, and the charger baby can be searched in bluetooth, is set up and used by bluetooth
After linking between family equipment and charger baby, the charging is given by the charging authentication information transfer by way of bluetooth in the application
It is precious;User can also complete transmitting procedure by the short-range communication mode such as NFC.User can also be by the secondary or physical bond of charger baby
Disk inputs the charging authentication information, so that charger baby receives the charging authentication information.
Charger baby is received after the charging authentication information, and itself and the reference authentication information inside charger baby match testing
Card;Here, this with reference to authentication information can charger baby be locally stored or charger baby inside generate in real time.Example
Such as, comprising checking information module occurs for charger baby, after charger baby receives the charging authentication information of user's offer, checking letter
Breath generation module generates the reference authentication information for verifying the charging authentication information in real time, wherein, mould occurs for the checking information
Block can be based on the charger baby intrinsic information (for example, hardware identification information or sequence number of charger baby etc.), or the charger baby
Intrinsic information and dynamic factor (for example, current time, counter times, random number etc.), and specific algorithm configuration or with
The corresponding algorithm configuration of sequence number, generates this and refers to authentication information.If the charging authentication information with reference to authentication information each
All same, then the charging authentication information, which passes through, verifies;Then, the output control module of charger baby sends to output control switch and closed
Combination switch is instructed, and after output control switch is closed, discharge circuit is connected, and the charger baby is started to charge up to user equipment.
Fig. 6 is shown is used for user equipment is charged by charging device according to a kind of of the application one side
Method, wherein, this method includes:
User equipment obtains the corresponding device identification information of the charging device;
The user equipment determines the corresponding charging authentication information of described device identification information, wherein, the charging authentication
Information is used to close the discharge circuit between the charging device and user equipment to charge to the user equipment;
The charging device obtains the charging authentication information, wherein, the charging authentication information inputted by user or by
The user equipment is sent;
The charging device verifies the charging authentication information;
When the charging authentication information is by checking, the charging device closes the charging device and the user equipment
Between discharge circuit to be charged to the user equipment.
Fig. 7 is shown to be used to charge to user equipment by charging device according to one kind of the another aspect of the application
Method, wherein, this method includes:
User equipment obtains the corresponding device identification information of the charging device;
The charging authentication information request that the user equipment is sent to the corresponding network equipment, wherein the charging authentication is believed
Breath request includes described device identification information;
The network equipment receives the charging authentication information request that the user equipment is sent;
The network equipment determines the corresponding charging authentication information of described device identification information, wherein, the charging authentication
Information is used to close the discharge circuit of the corresponding charging device of described device identification information to charge to the user equipment;
The charging authentication information is back to the user equipment by the network equipment;
The user equipment receives the corresponding charging authentication information of described device identification information that the network equipment is returned;
The charging device obtains the charging authentication information, wherein, the charging authentication information inputted by user or by
The user equipment is sent;
The charging device verifies the charging authentication information;
When the charging authentication information is by checking, the charging device closes the charging device and the user equipment
Between discharge circuit to be charged to the user equipment.
It is used for according to the one side of the application there is provided one kind at user equipment end by charging device to user equipment
The equipment charged, the equipment includes:
Processor;And
It is arranged to store the memory of computer executable instructions, the executable instruction makes the place when executed
Device is managed to perform:
Obtain the corresponding device identification information of the charging device;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close
Discharge circuit between the charging device and user equipment to the user equipment to charge.
It is used to charge to user equipment at charging device end there is provided a kind of according to further aspect of the application
Equipment, the equipment includes:
Processor;And
It is arranged to store the memory of computer executable instructions, the executable instruction makes the place when executed
Device is managed to perform:
The charging authentication information is obtained, wherein, the charging authentication information is inputted by user or by the user equipment
Send;
Verify the charging authentication information;
When the charging authentication information is by checking, the discharge circuit between closure charging device and the user equipment is with right
The user equipment is charged.
According to the another aspect of the application there is provided a kind of equipment for controlling charging device, the equipment includes:
Processor;And
It is arranged to store the memory of computer executable instructions, the executable instruction makes the place when executed
Device is managed to perform:
Obtain the corresponding device identification information of charging device;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close
The discharge circuit of the charging device is externally to charge.
It is used to set user by charging device at network equipment end there is provided one kind according to another aspect of the application
The standby equipment charged, the equipment includes:
Processor;And
It is arranged to store the memory of computer executable instructions, the executable instruction makes the place when executed
Device is managed to perform:
The charging authentication information request that user equipment is sent is received, wherein the charging authentication information request is known including device
Other information;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close
The discharge circuit of the corresponding charging device of described device identification information to the user equipment to charge;
The charging authentication information is back to the user equipment.
According to the one side of the application there is provided a kind of computer-readable medium including instructing, the instruction is in quilt
During execution system is proceeded as follows:
Obtain the corresponding device identification information of the charging device;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close
Discharge circuit between the charging device and user equipment to the user equipment to charge.
According to further aspect of the application there is provided a kind of computer-readable medium including instructing, the instruction exists
So that system is proceeded as follows when being performed:
The charging authentication information is obtained, wherein, the charging authentication information is inputted by user or by the user equipment
Send;
Verify the charging authentication information;
When the charging authentication information is by checking, the discharge circuit between closure charging device and the user equipment is with right
The user equipment is charged.
According to the another aspect of the application there is provided a kind of computer-readable medium including instructing, the instruction exists
So that system is proceeded as follows when being performed:
Obtain the corresponding device identification information of charging device;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close
The discharge circuit of the charging device is externally to charge.
According to another aspect of the application there is provided a kind of computer-readable medium including instructing, the instruction exists
So that system is proceeded as follows when being performed:
The charging authentication information request that user equipment is sent is received, wherein the charging authentication information request is known including device
Other information;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is used to close
The discharge circuit of the corresponding charging device of described device identification information to the user equipment to charge;
The charging authentication information is back to the user equipment.
It should be noted that the application can be carried out in the assembly of software and/or software and hardware, for example, can adopt
Realized with application specific integrated circuit (ASIC), general purpose computer or any other similar hardware device.In one embodiment
In, the software program of the application can realize steps described above or function by computing device.Similarly, the application
Software program (including related data structure) can be stored in computer readable recording medium storing program for performing, for example, RAM memory,
Magnetically or optically driver or floppy disc and similar devices.In addition, some steps or function of the application can employ hardware to realize, example
Such as, as coordinating with processor so as to performing the circuit of each step or function.
In addition, the part of the application can be applied to computer program product, such as computer program instructions, when its quilt
When computer is performed, by the operation of the computer, it can call or provide according to the present processes and/or technical scheme.
Those skilled in the art will be understood that existence form of the computer program instructions in computer-readable medium includes but is not limited to
Source file, executable file, installation package file etc., correspondingly, the mode that computer program instructions are computer-executed include but
It is not limited to:The computer directly performs the instruction, or the computer compiles and performs program after corresponding compiling after the instruction again,
Either the computer reads and performs the instruction or the computer reads and installed and performed again after corresponding installation after the instruction
Program.Here, computer-readable medium can be available for computer access any available computer-readable recording medium or
Communication media.
Communication media includes thereby including such as computer-readable instruction, data structure, program module or other data
Signal of communication is sent to the medium of another system from a system.Communication media may include have the transmission medium led (such as electric
Cable and line (for example, optical fiber, coaxial etc.)) and can propagate wireless (not having the transmission the led) medium of energy wave, such as sound, electricity
Magnetic, RF, microwave and infrared.Computer-readable instruction, data structure, program module or other data can be embodied as example wireless
Modulated message signal in medium (such as carrier wave or be such as embodied as the similar mechanism of a part for spread spectrum technique).
Term " modulated message signal " refers to that one or more feature is modified or set in the way of coding information in the signal
Fixed signal.Modulation can be simulation, numeral or Hybrid Modulation Technology.
Unrestricted as example, computer-readable recording medium may include to refer to for storage is such as computer-readable
Make, the volatibility that any method or technique of the information of data structure, program module or other data is realized and it is non-volatile, can
Mobile and immovable medium.For example, computer-readable recording medium includes, but not limited to volatile memory, such as with
Machine memory (RAM, DRAM, SRAM);And nonvolatile memory, such as flash memory, various read-only storages (ROM, PROM,
EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memory (MRAM, FeRAM);And magnetic and optical storage apparatus (hard disk,
Tape, CD, DVD);Or other currently known media or Future Development can store the computer used for computer system
Readable information/data.
Here, including a device according to one embodiment of the application, the device includes being used to store computer program
The memory of instruction and the processor for execute program instructions, wherein, when the computer program instructions are by the computing device
When, trigger methods and/or techniques scheme of the plant running based on foregoing multiple embodiments according to the application.
It is obvious to a person skilled in the art that the application is not limited to the details of above-mentioned one exemplary embodiment, Er Qie
In the case of without departing substantially from spirit herein or essential characteristic, the application can be realized in other specific forms.Therefore, no matter
From the point of view of which point, embodiment all should be regarded as exemplary, and be nonrestrictive, scope of the present application is by appended power
Profit is required rather than described above is limited, it is intended that all in the implication and scope of the equivalency of claim by falling
Change is included in the application.Any reference in claim should not be considered as to the claim involved by limitation.This
Outside, it is clear that the word of " comprising " one is not excluded for other units or step, and odd number is not excluded for plural number.That is stated in device claim is multiple
Unit or device can also be realized by a unit or device by software or hardware.The first, the second grade word is used for table
Show title, and be not offered as any specific order.
Claims (16)
1. a kind of method for being used to charge to user equipment by charging device at user equipment end, wherein, this method bag
Include:
Obtain the corresponding device identification information of the charging device;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is described for closing
Discharge circuit between charging device and user equipment to the user equipment to charge.
2. according to the method described in claim 1, wherein, methods described also includes:
The charging authentication information is presented;Or
The charging authentication information is sent to the charging device, come pair so that the charging device closes the discharge circuit
The user equipment is charged.
3. method according to claim 1 or 2, wherein, it is described to determine the corresponding charging authentication of described device identification information
Information, wherein, the discharge circuit that the charging authentication information is used to close between the charging device and user equipment is with to described
User equipment, which carries out charging, to be included:
Charging authentication information request is sent to the corresponding network equipment, wherein the charging authentication information request includes described device
Identification information;
The corresponding charging authentication information of described device identification information that the network equipment is returned is received, wherein, the charging is recognized
Card information is used to close the discharge circuit between the charging device and the user equipment to charge to the user equipment.
4. method according to claim 1 or 2, wherein, it is described to determine the corresponding charging authentication of described device identification information
Information, wherein, the discharge circuit that the charging authentication information is used to close between the charging device and user equipment is with to described
User equipment, which carries out charging, to be included:
The corresponding charging authentication information of described device identification information is generated, wherein, the charging authentication information is described for closing
The discharge circuit of charging device to the user equipment to charge.
5. method according to any one of claim 1 to 4, wherein, described device identification information is at least appointed including following
One:
The device sequence number information of the charging device;
The Quick Response Code identification information of the charging device.
6. a kind of method for being used to charge to user equipment at charging device end, wherein, this method includes:
Charging authentication information is obtained, wherein, the charging authentication information is inputted by user or sent by user equipment;
Verify the charging authentication information;
When the charging authentication information is by checking, the discharge circuit between closure charging device and the user equipment is with to described
User equipment is charged.
7. method according to claim 6, wherein, the checking charging authentication information includes:
When receiving the charging authentication information, corresponding reference authentication information is generated;
The charging authentication information is verified according to the reference authentication information.
Wherein, described when the charging authentication information is by checking, the electric discharge between closure charging device and the user equipment is electric
Road is included with carrying out charging to the user equipment:
When the charging authentication information and the encrypted message match, close between the charging device and the user equipment
Discharge circuit to the user equipment to charge.
8. the method according to claim 6 or 7, described when the charging authentication information is by checking, charging device is closed
Discharge circuit between the user equipment is also included with being charged to the user equipment:
When the charging authentication information is not verified, and the charging duration of the user equipment exceedes predetermined charging duration threshold
Value, disconnects the discharge circuit to stop charging to the user equipment.
9. a kind of method for controlling charging device, wherein, this method includes:
Obtain the corresponding device identification information of charging device;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is described for closing
The discharge circuit of charging device is externally to charge.
10. a kind of method for being used to charge to user equipment by charging device at network equipment end, wherein, this method bag
Include:
The charging authentication information request that user equipment is sent is received, wherein, the charging authentication information request is recognized including device
Information;
The corresponding charging authentication information of described device identification information is determined, wherein, the charging authentication information is described for closing
The discharge circuit of the corresponding charging device of device identification information to the user equipment to charge;
The charging authentication information is back to the user equipment.
11. method according to claim 10, wherein, it is described to determine the corresponding charging authentication letter of described device identification information
Breath, wherein, the charging authentication information is used for the discharge circuit for closing the corresponding charging device of described device identification information with right
The user equipment, which carries out charging, to be included:
Generated and set according to the authentication information of the corresponding charging device of described device identification information, generate described device identification information
Corresponding charging authentication information, wherein, the charging authentication information is used to close the discharge circuit of the charging device with to institute
User equipment is stated to be charged.
12. method according to claim 11, wherein, the authentication information generation, which is set, includes following at least any one:
Authentication information generating algorithm configuration in the charging device;
Authentication information forming element information in the charging device, wherein, the authentication information forming element information includes institute
State the receiving time information of device identification information, the hardware identification information of the charging device and the charging authentication information request
At least one of.
13. a kind of method for being used to charge to user equipment by charging device, wherein, this method includes:
User equipment obtains the corresponding device identification information of the charging device;
The user equipment determines the corresponding charging authentication information of described device identification information, wherein, the charging authentication information
For closing the discharge circuit between the charging device and user equipment to be charged to the user equipment;
The charging device obtains the charging authentication information, wherein, the charging authentication information is inputted by user or by described
User equipment is sent;
The charging device verifies the charging authentication information;
When the charging authentication information is by checking, the charging device is closed between the charging device and the user equipment
Discharge circuit to the user equipment to charge.
14. a kind of method for being used to charge to user equipment by charging device, wherein, this method includes:
User equipment obtains the corresponding device identification information of the charging device;
The charging authentication information request that the user equipment is sent to the corresponding network equipment, wherein the charging authentication information please
Ask including described device identification information;
The network equipment receives the charging authentication information request that the user equipment is sent;
The network equipment determines the corresponding charging authentication information of described device identification information, wherein, the charging authentication information
For closing the discharge circuit of the corresponding charging device of described device identification information to be charged to the user equipment;
The charging authentication information is back to the user equipment by the network equipment;
The user equipment receives the corresponding charging authentication information of described device identification information that the network equipment is returned;
The charging device obtains the charging authentication information, wherein, the charging authentication information is inputted by user or by described
User equipment is sent;
The charging device verifies the charging authentication information;
When the charging authentication information is by checking, the charging device is closed between the charging device and the user equipment
Discharge circuit to the user equipment to charge.
15. a kind of equipment for being used to charge to user equipment by charging device, wherein, the equipment includes:
Processor;And
It is arranged to store the memory of computer executable instructions, the executable instruction makes the processor when executed
Perform the operation of the method as any one of claim 1 to 12.
16. a kind of computer-readable medium including instructing, the instruction causes system to carry out such as claim 1 when executed
To the operation of method any one of 12.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710359583.0A CN107231019B (en) | 2017-05-19 | 2017-05-19 | Method and equipment for charging user equipment through charging device |
PCT/CN2018/087421 WO2018210324A1 (en) | 2017-05-19 | 2018-05-18 | Method and device for charging user equipment by charging device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710359583.0A CN107231019B (en) | 2017-05-19 | 2017-05-19 | Method and equipment for charging user equipment through charging device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107231019A true CN107231019A (en) | 2017-10-03 |
CN107231019B CN107231019B (en) | 2021-04-30 |
Family
ID=59933250
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710359583.0A Active CN107231019B (en) | 2017-05-19 | 2017-05-19 | Method and equipment for charging user equipment through charging device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107231019B (en) |
WO (1) | WO2018210324A1 (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107135227A (en) * | 2017-05-27 | 2017-09-05 | 深圳来电科技有限公司 | Verification method and equipment |
CN107785963A (en) * | 2017-10-31 | 2018-03-09 | 北京伊电园网络科技有限公司 | A kind of charging method and charging system |
CN108400639A (en) * | 2018-03-30 | 2018-08-14 | 上海掌门科技有限公司 | The control method and system of a kind of charger baby and its charge parameter |
CN108683231A (en) * | 2018-06-04 | 2018-10-19 | 深圳金海螺科技有限公司 | Charging unit, system and charging method |
WO2018210324A1 (en) * | 2017-05-19 | 2018-11-22 | 上海掌门科技有限公司 | Method and device for charging user equipment by charging device |
CN110730211A (en) * | 2019-09-20 | 2020-01-24 | 深圳小黄电智能科技有限公司 | Shared charging control method, shared charging client and shared charging service terminal |
CN111476631A (en) * | 2020-03-31 | 2020-07-31 | 深圳街电科技有限公司 | Mobile power supply discharging method, server, leasing equipment and mobile power supply |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104281802A (en) * | 2013-07-01 | 2015-01-14 | 宏达国际电子股份有限公司 | Method for wireless charging authentication and related wireless charging system |
CN205017028U (en) * | 2015-06-03 | 2016-02-03 | 吴钰淳 | Novel charging system |
CN205141726U (en) * | 2015-11-05 | 2016-04-06 | 上海网电网络科技有限公司 | Novel charge preciously and novel charging device |
CN106356919A (en) * | 2016-08-31 | 2017-01-25 | 四川省魅力传媒有限公司 | Emergency charging method and system for intelligent charging terminal |
CN106602657A (en) * | 2016-12-29 | 2017-04-26 | 杭州微飞胜科技有限公司 | Charging pile and working method thereof |
CN106684937A (en) * | 2015-11-05 | 2017-05-17 | 上海网电网络科技有限公司 | Charging control method, device and system based on mobile charging device |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160180721A1 (en) * | 2014-10-03 | 2016-06-23 | Ivan Otulic | System and method for tracking, surveillance and remote control of powered personal recreational vehicles |
CN106330822B (en) * | 2015-06-19 | 2019-12-17 | 中兴新能源汽车有限责任公司 | Authentication method, equipment and system for automobile charging terminal and authentication server |
CN106329585B (en) * | 2015-06-19 | 2020-03-27 | 中兴新能源汽车有限责任公司 | Wireless charging authentication method and device |
CN105172609A (en) * | 2015-09-02 | 2015-12-23 | 青岛特锐德电气股份有限公司 | Electric vehicle, charging device, charging system and method |
CN106427645B (en) * | 2016-11-16 | 2019-04-26 | 东软集团股份有限公司 | A kind of method, apparatus and system of electric car charging |
CN107231019B (en) * | 2017-05-19 | 2021-04-30 | 上海掌门科技有限公司 | Method and equipment for charging user equipment through charging device |
-
2017
- 2017-05-19 CN CN201710359583.0A patent/CN107231019B/en active Active
-
2018
- 2018-05-18 WO PCT/CN2018/087421 patent/WO2018210324A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104281802A (en) * | 2013-07-01 | 2015-01-14 | 宏达国际电子股份有限公司 | Method for wireless charging authentication and related wireless charging system |
CN205017028U (en) * | 2015-06-03 | 2016-02-03 | 吴钰淳 | Novel charging system |
CN205141726U (en) * | 2015-11-05 | 2016-04-06 | 上海网电网络科技有限公司 | Novel charge preciously and novel charging device |
CN106684937A (en) * | 2015-11-05 | 2017-05-17 | 上海网电网络科技有限公司 | Charging control method, device and system based on mobile charging device |
CN106356919A (en) * | 2016-08-31 | 2017-01-25 | 四川省魅力传媒有限公司 | Emergency charging method and system for intelligent charging terminal |
CN106602657A (en) * | 2016-12-29 | 2017-04-26 | 杭州微飞胜科技有限公司 | Charging pile and working method thereof |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018210324A1 (en) * | 2017-05-19 | 2018-11-22 | 上海掌门科技有限公司 | Method and device for charging user equipment by charging device |
CN107135227A (en) * | 2017-05-27 | 2017-09-05 | 深圳来电科技有限公司 | Verification method and equipment |
CN107785963A (en) * | 2017-10-31 | 2018-03-09 | 北京伊电园网络科技有限公司 | A kind of charging method and charging system |
CN107785963B (en) * | 2017-10-31 | 2020-11-24 | 杭州小电科技股份有限公司 | Charging method and charging system |
CN108400639A (en) * | 2018-03-30 | 2018-08-14 | 上海掌门科技有限公司 | The control method and system of a kind of charger baby and its charge parameter |
CN108683231A (en) * | 2018-06-04 | 2018-10-19 | 深圳金海螺科技有限公司 | Charging unit, system and charging method |
CN110730211A (en) * | 2019-09-20 | 2020-01-24 | 深圳小黄电智能科技有限公司 | Shared charging control method, shared charging client and shared charging service terminal |
CN110730211B (en) * | 2019-09-20 | 2022-04-29 | 深圳小黄电智能科技有限公司 | Shared charging control method, shared charging client and shared charging service terminal |
CN111476631A (en) * | 2020-03-31 | 2020-07-31 | 深圳街电科技有限公司 | Mobile power supply discharging method, server, leasing equipment and mobile power supply |
CN111476631B (en) * | 2020-03-31 | 2023-08-29 | 深圳街电科技有限公司 | Mobile power supply discharging method, server, leasing equipment and mobile power supply |
Also Published As
Publication number | Publication date |
---|---|
WO2018210324A1 (en) | 2018-11-22 |
CN107231019B (en) | 2021-04-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107231019A (en) | A kind of method and apparatus charged by charging device to user equipment | |
CN106302762B (en) | Smart machine binding method and device | |
CN105099673A (en) | Authorization method, authorization requesting method and devices | |
CN104618330B (en) | Method for processing business, device and terminal | |
CN109992949B (en) | Equipment authentication method, over-the-air card writing method and equipment authentication device | |
CN107104484B (en) | Method and equipment for charging user equipment through charging device | |
CN104778773A (en) | System and method for controlling entrance guard by mobile phone | |
CN108566641A (en) | Pay householder method, device and equipment | |
CN107566449B (en) | Mobile power supply leasing method and system, mobile terminal, server and leasing terminal | |
CN105827656B (en) | Identity identifying method and device based on NFC payment | |
CN112200949B (en) | Entrance guard starting method and device and identity verification system | |
CN110175828A (en) | User's verification method and device based on the signing of bank card quick payment | |
CN107038569A (en) | Information interacting method and device | |
CN107146339A (en) | A kind of offline internet express delivery cabinet and its control system and control method | |
CN103548392B (en) | For providing the method and apparatus of network access to attachment device | |
CN108460875A (en) | A kind of entrance guard authentication method and device based on dynamic two-dimension code | |
KR20120078313A (en) | Method and apparatus for entry authentication using user terminal | |
CN110334824A (en) | Safety moves in method and device | |
CN105574948A (en) | Checking-in method and equipment | |
CN107148068A (en) | A kind of method and apparatus for being used to connect WAP | |
CN105405012A (en) | Smart IC card and payment processing method | |
CN105825442A (en) | Method and device for self service of hotel | |
JP5960512B2 (en) | Charging system for electric mobile object, charging device for electric mobile object, portable communication terminal and server device included therein, and charging method for electric mobile object | |
CN107172588A (en) | A kind of WiFi network recommends method and device | |
CN106911658A (en) | The transmission method of data, data sending terminal, data receiver and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |