CN110612619A - Authentication method, device and storage medium for non-intelligent battery - Google Patents

Authentication method, device and storage medium for non-intelligent battery Download PDF

Info

Publication number
CN110612619A
CN110612619A CN201880031261.6A CN201880031261A CN110612619A CN 110612619 A CN110612619 A CN 110612619A CN 201880031261 A CN201880031261 A CN 201880031261A CN 110612619 A CN110612619 A CN 110612619A
Authority
CN
China
Prior art keywords
key
battery
processor
smart battery
acquiring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201880031261.6A
Other languages
Chinese (zh)
Inventor
王仕博
郑伟宏
周游
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SZ DJI Technology Co Ltd
SZ DJI Innovations Technology Co Ltd
Original Assignee
SZ DJI Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SZ DJI Technology Co Ltd filed Critical SZ DJI Technology Co Ltd
Publication of CN110612619A publication Critical patent/CN110612619A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01MPROCESSES OR MEANS, e.g. BATTERIES, FOR THE DIRECT CONVERSION OF CHEMICAL ENERGY INTO ELECTRICAL ENERGY
    • H01M10/00Secondary cells; Manufacture thereof
    • H01M10/42Methods or arrangements for servicing or maintenance of secondary cells or secondary half-cells
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01MPROCESSES OR MEANS, e.g. BATTERIES, FOR THE DIRECT CONVERSION OF CHEMICAL ENERGY INTO ELECTRICAL ENERGY
    • H01M50/00Constructional details or processes of manufacture of the non-active parts of electrochemical cells other than fuel cells, e.g. hybrid cells
    • H01M50/20Mountings; Secondary casings or frames; Racks, modules or packs; Suspension devices; Shock absorbers; Transport or carrying devices; Holders
    • H01M50/202Casings or frames around the primary casing of a single cell or a single battery
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01MPROCESSES OR MEANS, e.g. BATTERIES, FOR THE DIRECT CONVERSION OF CHEMICAL ENERGY INTO ELECTRICAL ENERGY
    • H01M50/00Constructional details or processes of manufacture of the non-active parts of electrochemical cells other than fuel cells, e.g. hybrid cells
    • H01M50/20Mountings; Secondary casings or frames; Racks, modules or packs; Suspension devices; Shock absorbers; Transport or carrying devices; Holders
    • H01M50/247Mountings; Secondary casings or frames; Racks, modules or packs; Suspension devices; Shock absorbers; Transport or carrying devices; Holders specially adapted for portable devices, e.g. mobile phones, computers, hand tools or pacemakers
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02EREDUCTION OF GREENHOUSE GAS [GHG] EMISSIONS, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
    • Y02E60/00Enabling technologies; Technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02E60/10Energy storage using batteries

Abstract

Provided are a method, apparatus and storage medium for authenticating a non-smart battery, the method including a removable device (900) obtaining a first key (S101) of a non-smart battery (1000) to be authenticated; acquiring a second key (S102) of the removable device (900); authenticating the first key and the second key (S103); if the authentication is successful, normally starting the movable equipment (900) (S104); or the non-smart battery (1000) acquires a first key (S301) of the removable device (900) to be powered; acquiring a second key of the non-smart battery (1000) (S302); authenticating the first key and the second key (S303); if the authentication is successful, normally supplying power to the mobile device (900) (S304); so that the mobile device (900) can be started normally to work, the quality of the non-intelligent battery (1000) is guaranteed, the situation that the battery in a non-original factory cannot pass the authentication is avoided, or other batteries with the quality not meeting the requirements are used in products is avoided, and the quality of the battery and the product safety are improved.

Description

Authentication method, device and storage medium for non-intelligent battery Technical Field
The embodiment of the invention relates to the technical field of electronic equipment, in particular to an authentication method, equipment and a storage medium for a non-intelligent battery.
Background
The intelligent battery is widely applied to the fields of notebook computers, unmanned aerial vehicles, electric automobiles, mobile phones and the like, and a management circuit is arranged in the intelligent battery and can manage the residual electric quantity, encryption, abnormity and charging. However, the smart battery has the disadvantages of complex manufacturing process, high cost, low productivity and the like. Therefore, non-smart batteries are still used in mobile devices such as electric toothbrushes, toys, electric bicycles, and the like.
The non-intelligent battery is generally only provided with a voltage detection circuit, the electricity quantity of the battery is inaccurately estimated, and the yield of the battery can only be controlled through strict delivery detection of a manufacturer. After some mobile device products are released from the market, some non-intelligent battery manufacturers produce and sell non-intelligent batteries compatible with the mobile device products, however, some non-intelligent manufacturers reduce battery cost and earn benefits by reducing battery capacity and factory detection standards. These non-smart batteries may degrade performance of the mobile device product and present a serious safety hazard (e.g., the batteries may explode).
Disclosure of Invention
The embodiment of the invention provides an authentication method, equipment and a storage medium of a non-intelligent battery, which are used for authenticating the non-intelligent battery installed on a mobile device.
In a first aspect, an embodiment of the present invention provides an authentication method for a non-smart battery, which is applied to a mobile device, and includes:
acquiring a first secret key of a non-intelligent battery to be authenticated;
acquiring a second key of the removable device;
authenticating the first key and the second key;
and if the authentication is successful, normally starting the movable equipment.
In a second aspect, an embodiment of the present invention provides an authentication method for a non-smart battery, where the authentication method is applied to the non-smart battery, and the method includes:
acquiring a first secret key of a mobile device to be powered;
acquiring a second secret key of the non-intelligent battery;
authenticating the first key and the second key;
and if the authentication is successful, normally supplying power to the mobile equipment.
In a third aspect, an embodiment of the present invention provides a mobile device, including: a processor and a memory, wherein the processor is capable of processing a plurality of data,
the memory to store program instructions;
the processor executing the program instructions to:
acquiring a first secret key of a non-intelligent battery to be authenticated;
acquiring a second key of the removable device;
authenticating the first key and the second key;
and if the authentication is successful, normally starting the movable equipment.
In a fourth aspect, an embodiment of the present invention provides a non-smart battery, including: a memory and a processor;
the memory to store program instructions;
the processor executing the program instructions to:
acquiring a first secret key of a mobile device to be powered;
acquiring a second secret key of the non-intelligent battery;
authenticating the first key and the second key;
and if the authentication is successful, normally supplying power to the mobile equipment.
In a fifth aspect, an embodiment of the present invention provides a computer-readable storage medium, including: the computer readable storage medium has stored therein program instructions that, when run on a processor, perform the method of authenticating a non-smart battery of the first aspect.
In a sixth aspect, an embodiment of the present invention provides a computer-readable storage medium, including: the computer readable storage medium has stored therein program instructions that, when run on a processor, perform the method of authenticating a non-smart battery of the second aspect.
In a seventh aspect, an embodiment of the present invention provides a program product, where the program instructions of the program product are stored in a readable storage medium, and at least one processor of the removable device reads and executes the program instructions from the readable storage medium, so that the removable device executes the authentication method for the non-smart battery according to the first aspect.
In a tenth aspect, an embodiment of the present invention provides a program product, program instructions of which are stored in a readable storage medium, and at least one processor of a non-smart battery reads and executes the program instructions from the readable storage medium, so that the non-smart battery performs the authentication method of the non-smart battery according to the second aspect.
According to the authentication method, the authentication device and the storage medium for the non-intelligent battery provided by the embodiment of the invention, the mobile device obtains the first secret key of the non-intelligent battery and the second secret key of the mobile device, then authenticates the first secret key and the second secret key, if the authentication is successful, the mobile device is normally started to work, or the non-intelligent battery obtains the first secret key and the second secret key of the mobile device, then authenticates the first secret key and the second secret key, if the authentication is successful, the mobile device is normally powered on, so that the mobile device is normally started to work, the non-intelligent battery which cannot pass the authentication is prevented from being used in a mobile device product, the quality of the non-intelligent battery is ensured in such a way, the use safety of the mobile device product is improved, and the performance of the mobile device product is ensured.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
Fig. 1 is a flowchart of a first embodiment of an authentication method for a non-smart battery according to an embodiment of the present invention;
fig. 2 is a flowchart of a second embodiment of an authentication method for a non-intelligent battery according to an embodiment of the present invention;
fig. 3 is a flowchart of a third embodiment of an authentication method for a non-smart battery according to an embodiment of the present invention;
fig. 4 is a flowchart of a fourth embodiment of an authentication method for a non-smart battery according to an embodiment of the present invention;
fig. 5 is a specific application diagram of an implementation of an authentication method for a non-smart battery according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a first authentication apparatus for a non-smart battery according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a second authentication apparatus for a non-smart battery according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a third embodiment of an authentication apparatus for a non-smart battery according to an embodiment of the present invention;
FIG. 9 is a schematic structural diagram of a mobile device provided in an embodiment of the present invention;
fig. 10 is a schematic structural diagram of a non-smart battery according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Based on batteries with lower capacity and lower detection standard, which are provided by some manufacturers at present, the invention provides a non-intelligent battery authentication method, which authenticates batteries installed in mobile equipment products, avoids the batteries with poorer quality from being used in the mobile equipment products, and ensures the use safety of the mobile equipment products. It should be understood in the embodiments of the present invention that the non-smart battery refers to a battery other than the smart battery.
The movable device refers to a device which can move through a self-configured power system or can move under the action of external force, for example: electric toothbrushes, toys, artware, electric bicycles, some terminal devices, unmanned aerial vehicles, and the like require movable devices using non-smart batteries.
Fig. 1 is a flowchart of a first embodiment of an authentication method for a non-intelligent battery according to an embodiment of the present invention, and as shown in fig. 1, the scheme of this embodiment is applied to a mobile device, where an execution subject of the authentication method may be the mobile device, specifically, the execution subject may be a processor of the mobile device, and the authentication method for a non-intelligent battery specifically includes the following steps:
s101: a first key of a non-smart battery to be authenticated is obtained.
In this step, after the non-smart battery is installed in the mobile device, the non-smart battery needs to be authenticated, and first, a key of the non-smart battery to be authenticated, that is, the first key, needs to be acquired, where the first key may be stored in a preset component of the non-smart battery in advance, and is directly read from the preset component of the non-smart battery to be acquired when the mobile device needs, or the non-smart battery may send the first key, and the mobile device receives the first key, which is not limited in this scheme.
Optionally, the preset component of the non-smart battery may be an encryption chip, or a storage device such as a memory.
S102: a second key of the removable device is obtained.
In this step, the removable device further needs to obtain its own key, i.e. the second key mentioned above, where obtaining the second key of the removable device may include the following possible ways:
one possible way is to: and acquiring the second key locally stored by the removable device. Specifically, the second key of the removable device may be pre-configured in the removable device, for example, the second key is stored in a local storage configured in the removable device, and when necessary, the second key stored in the local storage may be directly read.
Another possible way is: and receiving the second key sent by the terminal equipment. Specifically, the second key may be stored in a terminal device, where the terminal device may include a terminal such as a laptop, a desktop, a smart phone, and the like, and when the non-smart battery needs to be authenticated, the mobile device may be connected to the terminal device in a wired or wireless manner, and obtain the second key from the terminal device. For example: the second key is sent to the removable device via a cell phone, computer, etc.
Another possible way is: the second key is obtained from a server. In particular, the second key may be stored in a server, from which the removable device may retrieve the second key.
In a specific implementation, in order to avoid the leakage of the key and ensure the security of the information, the second key may be stored in a server of a manufacturer of the mobile device product. In some embodiments, the removable device may establish a communication link directly with the server and obtain the second key from the server. In other embodiments, the removable device may establish a communication connection with the server via an intermediary device (e.g., a terminal device, etc.), and indirectly obtain the second key from the server, i.e., the intermediary device obtains the second key from the server, and the removable device obtains the second key from the intermediary device.
In the above scheme, it should be understood that S101 and S102 have no restriction on the order, and may be executed successively or simultaneously, and the first key and the second key may be obtained before authentication.
S103: the first key and the second key are authenticated.
After the first key and the second key are obtained, the first key and the second key are authenticated, and specifically, the first key and the second key may be authenticated by using one or more algorithms of an RSA public key Encryption Algorithm, a Data Encryption Standard (DES), an Advanced Encryption Standard (AES), a Secure Hash Algorithm (SHA) (e.g., SHA224), and the like. Other authentication algorithms can be adopted to authenticate the first key and the second key, and the scheme is not limited.
In a specific implementation of the scheme, the first secret key is a public key, and the second secret key is a private key; or, the first secret key is a private key, and the second secret key is a public key.
S104: and if the authentication is successful, normally starting the movable equipment.
If the first key and the second key are successfully authenticated, the non-smart battery is considered to be a non-smart battery meeting requirements, for example, a factory non-smart battery of the mobile device or the non-smart battery is qualified in quality and can be used, and the mobile device can be normally started so that a user can continuously use the mobile device.
In the authentication method for the non-smart battery provided by this embodiment, the mobile device obtains the first key of the non-smart battery and the second key of the mobile device, and then authenticates the first key and the second key, if the authentication is successful, the mobile device starts normally to operate, so as to ensure the quality of the non-smart battery, and avoid a non-original factory battery that cannot be authenticated, or a battery whose quality does not meet the requirements from being used in the mobile device.
Fig. 2 is a flowchart of a second embodiment of an authentication method for a non-intelligent battery according to an embodiment of the present invention, as shown in fig. 2, based on the above embodiment, the authentication method for a non-intelligent battery specifically includes the following steps:
s201: a first key of a non-smart battery to be authenticated is obtained.
S202: a second key of the removable device is obtained.
S203: the first key and the second key are authenticated.
Wherein the detailed principle and explanation of steps S201-S203 are the same as steps S101-S103, please refer to the previous section.
S204: and if the authentication fails, refusing to normally start the mobile equipment.
In this step, if the authentication of the first key and the second key fails, the non-smart battery is determined to be not a genuine battery of the mobile device or the non-smart battery is not qualified and is not allowed to be used, and normal starting may be rejected or the process of starting the mobile device may be ended.
Optionally, in a specific implementation of the scheme, the method may further include a reason for prompting that the battery is not qualified or the device is not started, and therefore, the authentication method for the non-intelligent battery further includes:
s205: and sending prompt information according to a preset mode, wherein the prompt information is used for indicating that the battery authentication fails.
In this step, after the mobile device fails to authenticate the first key and the second key, the mobile device may send a prompt message according to a preset mode so as to indicate the reason why the mobile device fails to start, or indicate that the non-intelligent battery fails to authenticate, and the mode of sending the prompt message may prompt the user that the non-intelligent battery currently installed on the mobile device has a potential safety hazard.
The sending mode of the prompt message is not limited by the scheme, and the prompt message can be a voice message for playing and prompting authentication failure, or a prompt message for indicating authentication failure can be displayed on an interaction device (such as a display screen) of the mobile equipment, or a battery authentication failure can be informed to a user by controlling an indicator lamp of the mobile equipment to light or flash according to a preset mode, and the equipment is not started, so that the scheme is not limited.
In the authentication method for the non-intelligent battery provided by this embodiment, the mobile device obtains the first key of the non-intelligent battery and the second key of the mobile device, and then authenticates the first key and the second key, and if the authentication fails, the mobile device is refused to be normally started, so that the quality of the non-intelligent battery is ensured, a non-genuine battery which cannot be authenticated or other batteries whose quality does not meet the requirements are prevented from being used in a product, and meanwhile, a prompt message can be sent to a user to prompt the user that the battery authentication fails, so that the user can replace a proper battery as soon as possible to use, and the quality of the battery and the product safety are improved.
Fig. 3 is a flowchart of a third embodiment of an authentication method for a non-intelligent battery according to an embodiment of the present invention, and as shown in fig. 3, different from the technical solutions of the two embodiments, an execution subject of the authentication method for a non-intelligent battery according to the present embodiment is the non-intelligent battery itself, specifically, an execution subject is a processor of the non-intelligent battery, and the method specifically includes the following steps:
s301: a first key of a removable device to be powered is obtained.
In this step, the non-smart battery needs to obtain the key of the removable device, that is, the first key in the step, and the specific obtaining manner may be to read the first key stored in the storage device of the removable device in advance, or may also receive the first key sent by the removable device, which is not limited in this scheme. The storage means of the removable device may be a memory or the like.
S302: a second key for the non-smart battery is obtained.
In this step, the non-smart battery further needs to obtain its own second key, where the second key may be pre-programmed or configured in a preset component of the non-smart battery, and is read from the preset component when it needs to be used, where the preset component may be a storage device such as an encryption chip or a memory.
In the above scheme, it should be understood that S301 and S302 have no restriction on the order, and the first key and the second key may be obtained before authentication.
S303: the first key and the second key are authenticated.
In this step, after the non-smart battery acquires the first key and the second key, the first key and the second key are authenticated, and specifically, the first key and the second key may be authenticated by using one or more algorithms of an RSA public key Encryption Algorithm, a Data Encryption Standard (DES), an Advanced Encryption Standard (AES), a Secure Hash Algorithm (SHA) (e.g., SHA224), and the like. Other authentication algorithms can be adopted to authenticate the first key and the second key, and the scheme is not limited.
In a specific implementation of the scheme, the first secret key is a public key, and the second secret key is a private key; or the first secret key is a private key and the second secret key is a public key.
S304: and if the authentication is successful, normally supplying power to the mobile equipment.
If the first secret key and the second secret key are successfully authenticated, the non-intelligent battery is considered to be a factory battery of the mobile equipment, or the quality of the non-intelligent battery is qualified, or the non-intelligent battery is considered to be matched with the mobile equipment and can be used, power is normally supplied to the mobile equipment, so that the mobile equipment is normally started, and a user can conveniently continue to use the mobile equipment.
In the authentication method for the non-smart battery provided by this embodiment, the non-smart battery obtains the first key and the second key of the mobile device, and then authenticates the first key and the second key, and if the authentication is successful, the mobile device is normally powered on, so that the mobile device is normally started to operate.
Fig. 4 is a flowchart of a fourth embodiment of an authentication method for a non-intelligent battery according to an embodiment of the present invention, as shown in fig. 4, based on the embodiment shown in fig. 3, the authentication method for a non-intelligent battery specifically includes the following steps:
s401: a first key of a removable device to be powered is obtained.
S402: a second key for the non-smart battery is obtained.
S403: the first key and the second key are authenticated.
Wherein the detailed principles and explanations of steps S401-S403 are the same as steps S301-S303, please refer to the previous section.
S404: and if the authentication fails, refusing to supply power to the mobile equipment.
In this step, if the non-smart battery fails to authenticate the first key and the second key, it is determined that the non-smart battery is not matched with the mobile device, for example: the mobile device is not a genuine device of the non-smart battery, or the mobile device is of an unqualified quality, or the like. Power to the removable device may be denied.
On the basis of the embodiments shown in fig. 3 and 4, before obtaining the second key from the preset component of the non-smart battery, the method further includes:
and the non-intelligent battery receives the second key sent by the terminal equipment, or acquires the second key from the server, and then writes the second key into a preset component.
In the scheme, the non-intelligent battery can acquire the second key from the terminal equipment such as the writer or a computer connected with the writer, or can establish connection with the server through the intermediate equipment to acquire the second key, and then write the second key into the preset component, so that the second key can be read when authentication is required.
In the authentication method for the non-smart battery provided in this embodiment, the non-smart battery obtains the first key and the second key of the mobile device, and then authenticates the first key and the second key, and if the authentication fails, the non-smart battery refuses to supply power to the mobile device, thereby avoiding applying the non-smart battery to the non-factory mobile device or the unqualified mobile device, and avoiding hidden troubles caused by applying the non-smart battery to an unmatched mobile device product.
On the basis of the above embodiments, the authentication method of the non-smart battery provided by the present invention is described by taking a secret key in any mobile device, i.e., product, as a private key and a secret key in the non-smart battery as a public key as an example.
Fig. 5 is a schematic diagram of an example of an authentication method for a non-intelligent battery according to an embodiment of the present invention, where as shown in fig. 5, a mobile device establishes a communication connection with a server through an intermediate device or directly, obtains a corresponding private key, stores the private key in a local storage device (also referred to as a storage medium) of the mobile device, and burns the public key into an encryption chip of the non-intelligent battery through an encryption fixture, where the encryption fixture includes the intermediate device or a burner. The private key and the public key are authenticated after the movable equipment body is triggered to start through the operation of a user and the like, if the private key and the public key are successfully started, the movable equipment body is normally started, otherwise, the movable equipment body is abnormally exited;
one specific implementation process of the scheme is as follows:
1. the encryption jig acquires a private key from the server.
2. The encryption jig burns the public key into the non-intelligent battery encryption chip.
3. The removable device body obtains the private key from the server.
4. The removable device body stores the private key in the storage means.
5. And reading the public key of the non-intelligent battery through the communication link after the movable equipment main body is started.
6. The removable device body authenticates the private key and the public key.
7. If the authentication is successful, the removable device is normally started for use by the user.
8. If the authentication fails, normal start of the removable device is denied.
In this scheme, it should be understood that the public key and the private key may not be acquired by the server, but may be stored in the local terminal device in advance. Optionally, the private key may not be burned through the jig, and may be burned through the communication link by the mobile device main body.
According to the authentication method of the non-intelligent battery, the non-intelligent battery is authenticated through the secret key, the defects that the manufacturing process of the intelligent battery is complex, the cost is high, the productivity is reduced and the like are overcome, and meanwhile, the phenomenon that low-quality batteries produced by non-original factories flow into the market to influence the product performance can be avoided.
Fig. 6 is a schematic structural diagram of a first embodiment of an authentication apparatus for a non-intelligent battery according to an embodiment of the present invention, and as shown in fig. 6, a mobile device 600 according to this embodiment includes:
an obtaining module 601, configured to obtain a first key of a non-smart battery to be authenticated;
the obtaining module 601 is further configured to obtain a second key of the authentication device of the non-smart battery;
a processing module 602, configured to authenticate the first key and the second key;
the processing module 602 is further configured to normally start the authentication device of the non-intelligent battery if the authentication is successful.
The authentication apparatus for a non-intelligent battery provided in this embodiment is used to implement the technical solution of the mobile device in any of the foregoing method embodiments, and the implementation principle and technical effect are similar, which are not described herein again.
On the basis of the above embodiment, the processing module 602 is further configured to refuse to normally start the removable device if the authentication fails.
Optionally, the processing module 602 is further configured to send a prompt message according to a preset manner, where the prompt message is used to indicate that the battery authentication fails.
Optionally, the obtaining module 601 is specifically configured to:
and acquiring a first secret key from a preset component in the non-intelligent battery to be authenticated.
Optionally, the preset component includes an encryption chip or a storage device.
Optionally, the obtaining module 601 is specifically configured to:
acquiring the second key locally stored by the removable device; alternatively, the first and second electrodes may be,
receiving the second key sent by the terminal equipment; alternatively, the first and second electrodes may be,
the second key is obtained from a server.
Optionally, the first secret key is a public key, and the second secret key is a private key; alternatively, the first and second electrodes may be,
the first secret key is a private key, and the second secret key is a public key.
Optionally, the processing module 602 is specifically configured to:
the first key and the second key are authenticated using one or more algorithms in RSA, DES, AES, SHA.
The authentication apparatus for a non-intelligent battery provided in any of the above embodiments is used to implement the technical solution of the mobile device in any of the above method embodiments, and the implementation principle and technical effect are similar, which are not described herein again.
Fig. 7 is a schematic structural diagram of a second authentication apparatus for a non-intelligent battery according to an embodiment of the present invention, and as shown in fig. 7, an authentication apparatus 700 for a non-intelligent battery according to this embodiment includes:
an obtaining module 701, configured to obtain a first key of a to-be-powered mobile device;
the obtaining module 701 is further configured to obtain a second key of the authentication apparatus 20 of the non-smart battery;
a processing module 702, configured to authenticate the first key and the second key;
the processing module 702 is further configured to normally supply power to the mobile device if the authentication is successful.
The authentication device for the non-intelligent battery provided in this embodiment is used to implement the technical scheme of the non-intelligent battery in any one of the foregoing method embodiments, and the implementation principle and the technical effect are similar, which are not described herein again.
On the basis of the foregoing embodiment, the obtaining module 701 is specifically configured to:
reading the first key from the storage of the removable device; alternatively, the first and second electrodes may be,
and receiving the first key sent by the removable device.
Fig. 8 is a schematic structural diagram of a third embodiment of an authentication apparatus for a non-intelligent battery according to an embodiment of the present invention, and as shown in fig. 8, the authentication apparatus 20 for a non-intelligent battery further includes: a preset component 703;
the obtaining module 701 is specifically configured to:
a second key is obtained from a pre-set component 703 of the non-smart battery.
Optionally, the preset component 703 includes an encryption chip or a storage device.
Optionally, the obtaining module 701 is further configured to:
receiving the second key sent by the terminal equipment, or acquiring the second key from a server;
and writing the second key into the preset component.
Optionally, the first secret key is a public key, and the second secret key is a private key;
alternatively, the first and second electrodes may be,
the first secret key is a private key, and the second secret key is a public key.
The processing module 702 is specifically configured to:
the first key and the second key are authenticated using one or more algorithms in RSA, DES, AES, SHA.
The authentication device for a non-intelligent battery provided in the foregoing embodiment is used to implement the technical solution of the non-intelligent battery in any of the foregoing method embodiments, and the implementation principle and technical effect are similar, which are not described herein again.
Fig. 9 is a schematic structural diagram of a removable device according to an embodiment of the present invention, and as shown in fig. 9, the removable device 900 according to the embodiment includes: a memory 901 and a processor 902,
the memory 901 is used for storing program instructions;
the processor 902, executing the program instructions for:
acquiring a first secret key of a non-intelligent battery to be authenticated;
acquiring a second key of the removable device;
authenticating the first key and the second key;
and if the authentication is successful, normally starting the movable equipment.
Optionally, the processor 902 is further configured to:
and if the authentication fails, refusing to normally start the mobile equipment.
Optionally, the processor 902 is further configured to:
and sending prompt information according to a preset mode, wherein the prompt information is used for indicating that the battery authentication fails.
Optionally, the processor 902 is specifically configured to:
and acquiring a first secret key from a preset component in the non-intelligent battery to be authenticated.
Optionally, the preset component includes an encryption chip or a storage device.
Optionally, the processor 902 is specifically configured to obtain the second key locally stored in the removable device; in this scheme, the second key may be stored in the memory 901, or may be stored in another storage device in the removable device.
Or, receiving the second key sent by the terminal device;
alternatively, the second key is obtained from a server.
Optionally, the first secret key is a public key, and the second secret key is a private key; alternatively, the first and second electrodes may be,
the first secret key is a private key, and the second secret key is a public key.
Optionally, the processor 902 is specifically configured to:
the first key and the second key are authenticated using one or more algorithms in RSA, DES, AES, SHA.
The mobile device provided in this embodiment is used to implement the technical solution of the mobile device in any of the foregoing method embodiments, and the implementation principle and technical effect are similar, which are not described herein again.
Fig. 10 is a schematic structural diagram of a non-smart battery according to an embodiment of the present invention, and as shown in fig. 10, the non-smart battery 1000 includes: a memory 1001 and a processor 1002;
the memory 1001 for storing program instructions;
the processor 1002 executing the program instructions for:
acquiring a first secret key of a mobile device to be powered;
acquiring a second secret key of the non-intelligent battery;
authenticating the first key and the second key;
and if the authentication is successful, normally supplying power to the mobile equipment.
Optionally, the processor 1002 is further configured to:
and if the authentication fails, refusing to supply power to the mobile equipment.
Optionally, the processor 1002 is specifically configured to:
reading the first key from the storage of the removable device; alternatively, the first and second electrodes may be,
and receiving the first key sent by the removable device.
Optionally, the processor 1002 is specifically configured to:
and acquiring a second key from a preset component of the non-smart battery.
Optionally, the preset component includes an encryption chip or a storage device. In this embodiment, it should be understood that the storage device in the preset component may be the aforementioned memory 1001, or may be another storage device different from the memory 1001, and this embodiment is not limited thereto.
Optionally, the processor 1002 is further configured to:
receiving the second key sent by the terminal equipment, or acquiring the second key from a server;
and writing the second key into the preset component.
Optionally, the first secret key is a public key, and the second secret key is a private key;
alternatively, the first and second electrodes may be,
the first secret key is a private key, and the second secret key is a public key.
Optionally, the processor 1002 is specifically configured to:
the first key and the second key are authenticated using one or more algorithms in RSA, DES, AES, SHA.
The non-intelligent battery provided in this embodiment is used for executing the technical scheme of the non-intelligent battery in any one of the foregoing method embodiments, and the implementation principle and the technical effect are similar, which are not described herein again.
An embodiment of the present invention further provides a computer-readable storage medium, including: the computer-readable storage medium has stored therein program instructions that, when run on a processor, perform a method of authentication of the non-smart battery on the removable device side.
An embodiment of the present invention further provides a computer-readable storage medium, including: the computer readable storage medium has stored therein program instructions that, when run on a processor, perform the method of authenticating a non-smart battery of the second aspect.
An embodiment of the present invention further provides a program product, program instructions of which are stored in a readable storage medium, and at least one processor of the removable device reads and executes the program instructions from the readable storage medium, so that the removable device executes an authentication method for a non-smart battery.
An embodiment of the present invention further provides a program product, where program instructions of the program product are stored in a readable storage medium, and at least one processor of the non-smart battery reads and executes the program instructions from the readable storage medium, so that the non-smart battery executes an authentication method of the non-smart battery.
In the above embodiments of the mobile device and the non-smart battery, it is understood that the Processor may be a Central Processing Unit (CPU), and the Processor may also be other general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, and the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: various media capable of storing program codes, such as a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, and an optical disk.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (34)

  1. An authentication method of a non-intelligent battery, which is applied to a mobile device, the method comprising:
    acquiring a first secret key of a non-intelligent battery to be authenticated;
    acquiring a second key of the removable device;
    authenticating the first key and the second key;
    and if the authentication is successful, normally starting the movable equipment.
  2. The method of claim 1, further comprising:
    and if the authentication fails, refusing to normally start the mobile equipment.
  3. The method of claim 2, further comprising:
    and sending prompt information according to a preset mode, wherein the prompt information is used for indicating that the battery authentication fails.
  4. The method according to any one of claims 1 to 3, wherein the obtaining a first key of the non-smart battery to be authenticated comprises:
    and acquiring a first secret key from a preset component in the non-intelligent battery to be authenticated.
  5. The method of claim 4,
    the preset component comprises an encryption chip or a storage device.
  6. The method of any of claims 1 to 5, wherein obtaining the second key of the removable device comprises:
    acquiring the second key locally stored by the removable device; alternatively, the first and second electrodes may be,
    receiving the second key sent by the terminal equipment; alternatively, the first and second electrodes may be,
    the second key is obtained from a server.
  7. The method according to any one of claims 1 to 6,
    the first secret key is a public key, and the second secret key is a private key; alternatively, the first and second electrodes may be,
    the first secret key is a private key, and the second secret key is a public key.
  8. The method of any of claims 1 to 7, wherein the authenticating the first key and the second key comprises:
    and authenticating the first key and the second key by using one or more of RSA, a data encryption standard DES, an advanced encryption standard AES and a secure Hash Algorithm SHA.
  9. An authentication method of a non-smart battery, applied to the non-smart battery, the method comprising:
    acquiring a first secret key of a mobile device to be powered;
    acquiring a second secret key of the non-intelligent battery;
    authenticating the first key and the second key;
    and if the authentication is successful, normally supplying power to the mobile equipment.
  10. The method of claim 9, further comprising:
    and if the authentication fails, refusing to supply power to the mobile equipment.
  11. The method according to claim 9 or 10, wherein the obtaining of the first key of the removable device to be powered comprises:
    reading the first key from the storage of the removable device; alternatively, the first and second electrodes may be,
    and receiving the first key sent by the removable device.
  12. The method of any of claims 9 to 11, wherein obtaining the second key for the non-smart battery comprises:
    and acquiring a second key from a preset component of the non-smart battery.
  13. The method of claim 12, wherein the predetermined component comprises a cryptographic chip or a storage device.
  14. The method of claim 12 or 13, wherein before obtaining the second key from the predetermined component of the non-smart battery, the method further comprises:
    receiving the second key sent by the terminal equipment, or acquiring the second key from a server;
    and writing the second key into the preset component.
  15. The method according to any one of claims 9 to 14,
    the first secret key is a public key, and the second secret key is a private key;
    alternatively, the first and second electrodes may be,
    the first secret key is a private key, and the second secret key is a public key.
  16. The method according to any one of claims 9 to 15, wherein the authenticating the first key and the second key comprises:
    and authenticating the first key and the second key by using one or more of RSA, a data encryption standard DES, an advanced encryption standard AES and a secure Hash Algorithm SHA.
  17. A mobile device, comprising: a processor and a memory, wherein the processor is capable of processing a plurality of data,
    the memory to store program instructions;
    the processor executing the program instructions to:
    acquiring a first secret key of a non-intelligent battery to be authenticated;
    acquiring a second key of the removable device;
    authenticating the first key and the second key;
    and if the authentication is successful, normally starting the movable equipment.
  18. The removable device of claim 17, wherein the processor is further configured to:
    and if the authentication fails, refusing to normally start the mobile equipment.
  19. The removable device of claim 18, wherein the processor is further configured to:
    and sending prompt information according to a preset mode, wherein the prompt information is used for indicating that the battery authentication fails.
  20. The mobile device according to any of claims 17 to 19, wherein the processor is specifically configured to:
    and acquiring a first secret key from a preset component in the non-intelligent battery to be authenticated.
  21. The removable device of claim 20,
    the preset component comprises an encryption chip or a storage device.
  22. The mobile device according to any of claims 17 to 21, wherein the processor is specifically configured to:
    acquiring the second key locally stored by the removable device; alternatively, the first and second electrodes may be,
    receiving the second key sent by the terminal equipment; alternatively, the first and second electrodes may be,
    the second key is obtained from a server.
  23. The mobile device according to any of claims 17 to 22,
    the first secret key is a public key, and the second secret key is a private key; alternatively, the first and second electrodes may be,
    the first secret key is a private key, and the second secret key is a public key.
  24. The mobile device according to any of claims 17 to 23, wherein the processor is specifically configured to:
    and authenticating the first key and the second key by using one or more of RSA, a data encryption standard DES, an advanced encryption standard AES and a secure Hash Algorithm SHA.
  25. A non-smart battery, comprising: a memory and a processor;
    the memory to store program instructions;
    the processor executing the program instructions to:
    acquiring a first secret key of a mobile device to be powered;
    acquiring a second secret key of the non-intelligent battery;
    authenticating the first key and the second key;
    and if the authentication is successful, normally supplying power to the mobile equipment.
  26. The non-smart battery of claim 25, wherein the processor is further configured to:
    and if the authentication fails, refusing to supply power to the mobile equipment.
  27. The non-smart battery of claim 25 or 26, wherein the processor is specifically configured to:
    reading the first key from the storage of the removable device; alternatively, the first and second electrodes may be,
    and receiving the first key sent by the removable device.
  28. The non-smart battery of any of claims 25 to 27, wherein the processor is specifically configured to:
    and acquiring a second key from a preset component of the non-smart battery.
  29. The non-smart battery of claim 28, wherein the predetermined component comprises a cryptographic chip or a memory device.
  30. The non-smart battery of claim 28 or 29, wherein the processor is further configured to:
    receiving the second key sent by the terminal equipment, or acquiring the second key from a server;
    and writing the second key into the preset component.
  31. The non-smart battery of any one of claims 25 to 30,
    the first secret key is a public key, and the second secret key is a private key;
    alternatively, the first and second electrodes may be,
    the first secret key is a private key, and the second secret key is a public key.
  32. The non-smart battery of any of claims 25-31, wherein the processor is specifically configured to:
    and authenticating the first key and the second key by using one or more of RSA, a data encryption standard DES, an advanced encryption standard AES and a secure Hash Algorithm SHA.
  33. A computer-readable storage medium, comprising: the computer readable storage medium having stored therein program instructions which, when run on a processor, perform a method of authenticating a non-smart battery as claimed in any one of claims 1 to 8.
  34. A computer-readable storage medium, comprising: the computer readable storage medium has stored therein program instructions that, when run on a processor, perform the method of authenticating a non-smart battery of any of claims 9 to 16.
CN201880031261.6A 2018-01-05 2018-01-05 Authentication method, device and storage medium for non-intelligent battery Pending CN110612619A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/071649 WO2019134138A1 (en) 2018-01-05 2018-01-05 Non-smart battery authentication method, device and storage medium

Publications (1)

Publication Number Publication Date
CN110612619A true CN110612619A (en) 2019-12-24

Family

ID=67144041

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880031261.6A Pending CN110612619A (en) 2018-01-05 2018-01-05 Authentication method, device and storage medium for non-intelligent battery

Country Status (2)

Country Link
CN (1) CN110612619A (en)
WO (1) WO2019134138A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111988335A (en) * 2020-08-31 2020-11-24 广州极飞科技有限公司 Battery cell identity authentication method and related device

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111460427A (en) * 2020-02-26 2020-07-28 上海钧正网络科技有限公司 Binding method and device of power supply equipment, storage medium and equipment
CN112073199B (en) * 2020-08-18 2022-01-04 深圳易马达科技有限公司 Battery authentication method, device, terminal equipment and medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060204004A1 (en) * 2005-03-08 2006-09-14 Texas Instruments Incorporated System and method for secure authentication of a "smart" battery by a host
US20090292918A1 (en) * 2005-12-20 2009-11-26 Panasonic Corporation Authentication system and authentication device
CN102035009A (en) * 2009-09-16 2011-04-27 寰群科技股份有限公司 Secondary battery device with anti-theft function, power supply control device and anti-theft method of secondary battery
CN102111272A (en) * 2010-12-24 2011-06-29 武汉天喻信息产业股份有限公司 Method for authenticating external equipment by using mobile terminal
CN102647276A (en) * 2011-02-17 2012-08-22 英飞凌科技股份有限公司 Systems and methods for device and data authentication
CN105793815A (en) * 2013-12-03 2016-07-20 无线电系统公司 Method and apparatus for verifying battery authenticity
CN105914820A (en) * 2016-05-05 2016-08-31 深圳市三颗子弹科技有限公司 Separated mobile power supply with identification function and authentication identification method thereof

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105235542B (en) * 2015-10-27 2018-02-06 北京博望华科科技有限公司 A kind of batteries of electric automobile monitoring system and monitoring method based on information security
US10505378B2 (en) * 2016-06-30 2019-12-10 Infineon Technologies Ag Ensuring backward compatibility in battery authentication applications

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060204004A1 (en) * 2005-03-08 2006-09-14 Texas Instruments Incorporated System and method for secure authentication of a "smart" battery by a host
US20090292918A1 (en) * 2005-12-20 2009-11-26 Panasonic Corporation Authentication system and authentication device
CN102035009A (en) * 2009-09-16 2011-04-27 寰群科技股份有限公司 Secondary battery device with anti-theft function, power supply control device and anti-theft method of secondary battery
CN102111272A (en) * 2010-12-24 2011-06-29 武汉天喻信息产业股份有限公司 Method for authenticating external equipment by using mobile terminal
CN102647276A (en) * 2011-02-17 2012-08-22 英飞凌科技股份有限公司 Systems and methods for device and data authentication
CN105793815A (en) * 2013-12-03 2016-07-20 无线电系统公司 Method and apparatus for verifying battery authenticity
CN105914820A (en) * 2016-05-05 2016-08-31 深圳市三颗子弹科技有限公司 Separated mobile power supply with identification function and authentication identification method thereof

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111988335A (en) * 2020-08-31 2020-11-24 广州极飞科技有限公司 Battery cell identity authentication method and related device

Also Published As

Publication number Publication date
WO2019134138A1 (en) 2019-07-11

Similar Documents

Publication Publication Date Title
US10044198B2 (en) Battery control IC, battery pack, and authentication method thereof
CN110612619A (en) Authentication method, device and storage medium for non-intelligent battery
KR20150099441A (en) Method and apparatus for authenticating client credentials
KR102507530B1 (en) Method for probiding smart key service and electronic device thereof
CN105512576A (en) Method for secure storage of data and electronic equipment
US9621986B2 (en) Electronic device, audio device, and method for supplying power to the audio device
CN108091808B (en) Battery, equipment, charging control method and device
CN112448450A (en) Charging control method and device, electronic equipment and storage medium
KR20200050813A (en) Payment method using biometric authentication and electronic device thereof
KR20200031275A (en) Electronic device for performing authorization using accessory and method for the same
CN112738046A (en) One-key login method, terminal and system server
US10790623B2 (en) Safe charging interface
CN108196659A (en) charging management method, device, storage medium and terminal device
KR20160058375A (en) A Protected Communication with an Embedded Secure Element
CN104899533A (en) Method, apparatus and system for acquiring identify card information
CN107729775B (en) Method and device for realizing switching between intelligent secret key equipment modes
CN112860501B (en) Detection method, detection device, storage medium and mobile terminal
KR20190093383A (en) Electronic device for installing a profile and method for the same
CN103020509A (en) Terminal equipment encryption and decryption method, device and terminal equipment
KR101458125B1 (en) One time password generator
CN107835507B (en) Communication processing method applied to Bluetooth shield and Bluetooth shield
JP2021175319A (en) Electronic apparatus, control method, and program
KR20200101053A (en) Electronic device and certification method in electronic device
CN111199263B (en) Intelligent power supply system
CN114666665B (en) Certificate authentication method, storage medium and television

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20191224

WD01 Invention patent application deemed withdrawn after publication