CN111049830B - Data information leakage prevention method for charging pile - Google Patents

Data information leakage prevention method for charging pile Download PDF

Info

Publication number
CN111049830B
CN111049830B CN201911284740.1A CN201911284740A CN111049830B CN 111049830 B CN111049830 B CN 111049830B CN 201911284740 A CN201911284740 A CN 201911284740A CN 111049830 B CN111049830 B CN 111049830B
Authority
CN
China
Prior art keywords
charging pile
data
byte stream
communication
charging
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911284740.1A
Other languages
Chinese (zh)
Other versions
CN111049830A (en
Inventor
刘崇汉
唐钊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Guohan Energy Development Co Ltd
Original Assignee
Chongqing Guohan Energy Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Guohan Energy Development Co Ltd filed Critical Chongqing Guohan Energy Development Co Ltd
Priority to CN201911284740.1A priority Critical patent/CN111049830B/en
Publication of CN111049830A publication Critical patent/CN111049830A/en
Application granted granted Critical
Publication of CN111049830B publication Critical patent/CN111049830B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/10Active monitoring, e.g. heartbeat, ping or trace-route
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T90/00Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02T90/10Technologies relating to charging of electric vehicles
    • Y02T90/16Information or communication technologies improving the operation of electric vehicles
    • Y02T90/167Systems integrating technologies related to power network operation and communication or information technologies for supporting the interoperability of electric or hybrid vehicles, i.e. smartgrids as interface for battery charging of electric vehicles [EV] or hybrid vehicles [HEV]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S30/00Systems supporting specific end-user applications in the sector of transportation
    • Y04S30/10Systems supporting the interoperability of electric or hybrid vehicles
    • Y04S30/12Remote or cooperative charging

Abstract

The invention discloses a method for preventing data information leakage of a charging pile, which comprises the following steps: detecting whether the charging pile is implanted with viruses or invaded or not in an idle state before charging; carrying out heartbeat interaction with a cloud server in real time when the charging pile is in a charging state, and detecting whether data communication between modules or chips in the charging pile is invaded or not; when the charging pile transmits the charging data of the user to the cloud server, the byte stream of the data is coded and sequenced to realize data encryption transmission. The system can not only carry out encryption transmission on data when the charging pile and the cloud server carry out data transmission, but also detect whether the charging pile is invaded in real time, and can also detect whether the charging pile is invaded in an idle state; when user information safety has been protected, also played fine guard action to charging pile self data safety.

Description

Data information leakage prevention method for charging pile
Technical Field
The invention relates to the technical field of data processing, in particular to a method for preventing data information leakage of a charging pile.
Background
With the consumption aggravation and pollution problem of the traditional energy sources, the popularization and application of new energy sources are advocated in the world; electric vehicles have become popular in more and more countries and regions as a new energy application form; and a large amount of electric automobile faces this problem of charging, all solves electric automobile's electric power continuation of journey's problem through filling electric pile at present.
And need can acquire some data information of electric automobile and need with data transmission to the high in the clouds in real time in the charging process, in order to avoid filling electric pile in the in-process of acquireing electric automobile data, reveal user's personal information or other privacy simultaneously, just must encrypt the data information who acquires, at present there is not the method to the data leakage of prevention filling electric pile.
Disclosure of Invention
The invention aims to overcome the defects of the prior art, provides a method for preventing leakage of data information of a charging pile, and solves the problem that personal information or other privacy of a user is leaked by the existing charging pile.
The purpose of the invention is realized by the following technical scheme: a data information leakage prevention method for a charging pile comprises the following steps:
carrying out heartbeat interaction with a cloud server in real time when the charging pile is in a charging state, and detecting whether data communication between modules or chips in the charging pile is invaded or not;
when the charging pile transmits the charging data of the user to the cloud server, the byte stream of the data is coded and sequenced to realize data encryption transmission.
The method comprises the steps of monitoring whether data communication between modules in the charging pile is invaded or not in real time when the charging pile is in a charging state, and detecting whether the charging pile is implanted with viruses or invaded or not when the charging pile is in an idle state.
When the charging pile transmits the charging data of the user to the cloud server, the following contents are included in the process of coding and sequencing the byte stream of the data to realize data encryption transmission:
judging whether the length of the data area in the byte stream meets a preset length value or not, and if not, completing by 0;
storing each byte in the data byte stream in a cross way, dividing the data length of the byte stream into a plurality of byte stream data areas with equal length by taking a threshold length as a reference, checking the byte stream, and recording the time stamp of division of each byte stream data area;
and randomly scrambling all the byte stream data areas, sending the scrambled byte stream data areas to a cloud server through a public key, and sending timestamps divided by all the byte stream data areas to the cloud server in a private key mode.
The byte stream check processing includes the following contents:
the data length of the byte stream can be divided by the threshold length, and the exclusive or check is carried out on the bytes of each threshold length in sequence until the tail of the byte stream;
the length of the byte stream data cannot be divided by the threshold length, the rest bytes are discarded from the end of the data, and the bytes are subjected to exclusive-or check in sequence every threshold length.
The relation between the threshold length and the preset length value for dividing the byte stream data area length is that the preset length value is an integral multiple of the threshold length.
When filling electric pile and being in charged state in real time with high in the clouds server carry out the heartbeat interaction to whether data communication between the detection charging pile inner module or the chip suffers the content that the invasion step included as follows:
the charging pile actively sends a heartbeat request to a cloud server within a specified heartbeat period, and reports the state;
if the cloud server receives the heartbeat request in a heartbeat cycle, sending an empty packet signal to the charging pile to respond and establish communication connection;
and detecting whether data communication between the modules or chips in the charging pile is invaded or not.
And if the cloud server does not receive the heartbeat request reported by the charging pile in N continuous heartbeat cycles, determining that the charging pile is in failure and lost.
The step of detecting whether data communication between modules or chips in the charging pile is invaded comprises the following contents:
carrying out protocol analysis, comparison and analysis processing on two paths of non-homogeneous communication modes between modules or chips in the charging pile;
judging whether the two-path communication data quantity between each module or each chip is the same as the communication data content or not;
if the communication data volume is the same as the communication data content, the intrusion is not considered, and if the communication data volume is different from the communication data content, the intrusion is considered.
Before the protocol analysis, comparison and analysis processing steps are carried out on the two paths of non-homogeneous communication modes between the modules or chips in the charging pile, communication connection of data communication is carried out on all the modules or chips which transmit user data information in the charging pile in a two-path non-homogeneous communication mode.
The method comprises the steps of detecting whether the charging pile is implanted with viruses or invaded when the charging pile is in an idle state, detecting the flash capacity state in the charging pile, calculating the result of whether the CRC checksum and the CRC checksum of the plug-in chip are different, and judging whether the charging pile is invaded or not according to the capacity change.
The invention has the beneficial effects that: a data information leakage prevention method for a charging pile can not only carry out encryption transmission on data when the charging pile and a cloud server carry out data transmission, but also detect whether the charging pile is invaded in real time, and can also detect whether the charging pile is invaded in an idle state; when user information safety has been protected, also played fine guard action to charging pile self data safety.
Drawings
FIG. 1 is a flow chart of the method of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
In the description of the present invention, it should be noted that the terms "upper", "inner", "outer", etc. indicate orientations or positional relationships based on those shown in the drawings or orientations or positional relationships that the products of the present invention conventionally use, which are merely for convenience of description and simplification of description, but do not indicate or imply that the devices or elements referred to must have a specific orientation, be constructed in a specific orientation, and be operated, and thus, should not be construed as limiting the present invention.
In the description of the present invention, it should also be noted that, unless otherwise explicitly specified or limited, the terms "disposed," "mounted," and "connected" are to be construed broadly, e.g., as meaning fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
The technical solutions of the present invention are further described in detail below with reference to the accompanying drawings, but the scope of the present invention is not limited to the following.
As shown in fig. 1, a method for preventing leakage of data information of a charging pile includes the following steps:
s1, detecting whether the charging pile is implanted with viruses or invaded or not in an idle state before charging;
s2, carrying out heartbeat interaction with a cloud server in real time when the charging pile is in a charging state, and detecting whether data communication between modules or chips in the charging pile is invaded or not;
and S3, when the charging pile transmits the charging data of the user to the cloud server, coding and sequencing the byte stream of the data to realize data encryption transmission.
Further, when the charging pile transmits the charging data of the user to the cloud server, the following contents are included in the process of coding and sequencing the byte stream of the data to realize data encryption transmission:
s21, judging whether the length of the data area in the byte stream meets a preset length value or not, and if not, completing by 0;
s22, storing each byte in the data byte stream in a crossed manner, dividing the data length of the byte stream into a plurality of byte stream data areas with equal length by taking a threshold length as a reference, checking the byte stream, and recording the time stamp of division of each byte stream data area;
and S23, randomly disordering all the byte stream data areas, sending the disordered byte stream data areas to the cloud server through the public key, and sending the time stamps divided by all the byte stream data areas to the cloud server through the private key.
The relation between the threshold length and the preset length value for dividing the byte stream data area length is that the preset length value is an integral multiple of the threshold length.
Further, the preset length value is 16 bytes, and the threshold length for dividing the length of the byte stream data area is 4 bytes; for a data region less than 16 bytes in the byte stream, 16 bytes must be filled with 0.
The byte stream check processing includes the following contents:
the length of byte stream data can be divided by 4, and exclusive or check is carried out on every 4 bytes in sequence until the tail of the byte stream;
the length of the byte stream data cannot be divided by 4, the bytes which are left by dividing 4 bytes are discarded from the end of the data, and exclusive-or check is carried out on every 4 bytes.
Furthermore, the encryption rule of the data is basically invariable, the cloud server knows the encryption rule of the data, and the cloud server does not know the time stamps of the division of all byte stream data areas which change in real time; therefore, the cloud server decrypts the data by combining the encryption rule interface after receiving the timestamp; the time stamp is sent by a private key and is not easy to intercept, so that the confidentiality is high, the time stamp has unique certainty when being generated and cannot be counterfeited or changed, and even if someone intercepts the data and knows the encryption rule, the data cannot be decrypted without knowing the time stamp divided by all byte stream data areas corresponding to the data, the confidentiality of the data is further improved, and the leakage of user information is effectively prevented.
When filling electric pile and being in charged state in real time with high in the clouds server carry out the heartbeat interaction to whether data communication between the detection charging pile inner module or the chip suffers the content that the invasion step included as follows:
the charging pile actively sends a heartbeat request to a cloud server within a specified heartbeat period of 60 seconds, and reports the state;
if the cloud server receives the heartbeat request within 60 seconds, an empty packet signal is sent to the charging pile to respond and establish communication connection;
and detecting whether data communication between the modules or chips in the charging pile is invaded or not.
Further, if the cloud server does not receive the heartbeat request reported by the charging pile in 3 continuous heartbeat cycles, the charging pile is considered to be failed and lost.
Further, the step of detecting whether data communication between modules or chips in the charging pile is invaded includes the following contents:
carrying out protocol analysis, comparison and analysis processing on two paths of non-homogeneous communication modes between modules or chips in the charging pile;
judging whether the two-path communication data quantity between each module or each chip is the same as the communication data content or not;
if the communication data volume is the same as the communication data content, the intrusion is not considered, and if the communication data volume is different from the communication data content, the intrusion is considered.
Before the protocol analysis, comparison and analysis processing steps are carried out on the two paths of non-homogeneous communication modes between the modules or chips in the charging pile, communication connection of data communication is carried out on all the modules or chips which transmit user data information in the charging pile in a two-path non-homogeneous communication mode.
Further, except encrypting data on the software level, need erase the silk screen printing to each module, chip on the hardware level, seal module, chip through coloured hot melt adhesive after the paster, carry out dual guarantee.
The method comprises the steps of detecting whether the charging pile is implanted with viruses or invaded when the charging pile is in an idle state, detecting the flash capacity state in the charging pile, calculating the result of CRC (cyclic redundancy check) and whether the result of CRC checksum of a plug-in chip and capacity change judge whether the charging pile is invaded.
Further, the flash mainly comprises three areas: the method comprises the following steps that 1, an area bootstrap program and a self-checking program are adopted, 2, an area operation program and 3, a backup program are adopted; the running program jumps to a self-checking program at a specific moment → CRC is carried out from the area 2 one by one → a result is obtained → the CRC and the memory capacity information stored in the plug-in flash chip are obtained → the residual capacity of the area 2 is analyzed → whether intrusion is caused is judged.
If the CRC results are consistent and the capacity is unchanged, the CRC result is normal;
if the CRC result is consistent and the capacity is reduced, replacing the memory capacity information in the plug-in flash;
if the CRC result is inconsistent and the capacity is unchanged, replacing the CRC in the plug-in flash;
if the CRC results are inconsistent and the capacity is reduced, the abnormal condition is indicated, and the possibility of intrusion exists.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes performed by the present specification and drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (9)

1. A method for preventing data information leakage of a charging pile is characterized by comprising the following steps: the data information encryption method comprises the following steps:
carrying out heartbeat interaction with a cloud server in real time when the charging pile is in a charging state, and detecting whether data communication between modules or chips in the charging pile is invaded or not;
when the charging pile transmits user charging data to the cloud server, encoding and sequencing byte streams of the data to realize data encryption transmission;
when the charging pile transmits the charging data of the user to the cloud server, the following contents are included in the process of coding and sequencing the byte stream of the data to realize data encryption transmission:
judging whether the length of the data area in the byte stream meets a preset length value or not, and if not, completing by 0;
storing each byte in the data byte stream in a cross way, dividing the data length of the byte stream into a plurality of byte stream data areas with equal length by taking a threshold length as a reference, checking the byte stream, and recording the time stamp of division of each byte stream data area;
and randomly scrambling all the byte stream data areas, sending the scrambled byte stream data areas to a cloud server in a public key mode, and sending timestamps divided by all the byte stream data areas to the cloud server in a private key mode.
2. The method for preventing data information leakage of the charging pile according to claim 1, wherein the method comprises the following steps: the method comprises the steps of monitoring whether data communication between modules in the charging pile is invaded or not in real time when the charging pile is in a charging state, and detecting whether the charging pile is implanted with viruses or invaded or not when the charging pile is in an idle state.
3. The method for preventing data information leakage of the charging pile according to claim 1, wherein the method comprises the following steps: the byte stream check processing includes the following contents:
the data length of the byte stream can be divided by the threshold length, and the exclusive or check is carried out on the bytes of each threshold length in sequence until the tail of the byte stream;
the length of the byte stream data cannot be divided by the threshold length, the rest bytes are discarded from the end of the data, and the bytes are subjected to exclusive-or check in sequence every threshold length.
4. The method for preventing data information leakage of the charging pile according to claim 1, wherein the method comprises the following steps: the relation between the threshold length and the preset length value for dividing the byte stream data area length is that the preset length value is an integral multiple of the threshold length.
5. The method for preventing data information leakage of the charging pile according to claim 1, wherein the method comprises the following steps: when filling electric pile and being in charged state in real time with high in the clouds server carry out the heartbeat interaction to whether data communication between the detection charging pile inner module or the chip suffers the content that the invasion step included as follows:
the charging pile actively sends a heartbeat request to a cloud server within a specified heartbeat period, and reports the state;
if the cloud server receives the heartbeat request in a heartbeat cycle, sending an empty packet signal to the charging pile to respond and establish communication connection;
and detecting whether data communication between the modules or chips in the charging pile is invaded or not.
6. The method for preventing data information leakage of the charging pile according to claim 5, wherein: and if the cloud server does not receive the heartbeat request reported by the charging pile in N continuous heartbeat cycles, determining that the charging pile is in failure and lost.
7. The method for preventing data information leakage of the charging pile according to claim 5, wherein: the step of detecting whether data communication between modules or chips in the charging pile is invaded comprises the following contents:
carrying out protocol analysis, comparison and analysis processing on two paths of non-homogeneous communication modes between modules or chips in the charging pile;
judging whether the two-path communication data quantity between each module or each chip is the same as the communication data content or not;
if the communication data volume is the same as the communication data content, the intrusion is not considered, and if the communication data volume is different from the communication data content, the intrusion is considered.
8. The method for preventing data information leakage of the charging pile according to claim 7, wherein: before the protocol analysis, comparison and analysis processing steps are carried out on the two paths of non-homogeneous communication modes between the modules or chips in the charging pile, communication connection of data communication is carried out on all the modules or chips which transmit user data information in the charging pile in a two-path non-homogeneous communication mode.
9. The method for preventing data information leakage of the charging pile according to claim 2, wherein: the method comprises the steps of detecting whether the charging pile is implanted with viruses or invaded when the charging pile is in an idle state, detecting the flash capacity state in the charging pile, calculating the result of whether the CRC checksum and the CRC checksum of the plug-in chip are different, and judging whether the charging pile is invaded or not according to the capacity change.
CN201911284740.1A 2019-12-13 2019-12-13 Data information leakage prevention method for charging pile Active CN111049830B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911284740.1A CN111049830B (en) 2019-12-13 2019-12-13 Data information leakage prevention method for charging pile

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911284740.1A CN111049830B (en) 2019-12-13 2019-12-13 Data information leakage prevention method for charging pile

Publications (2)

Publication Number Publication Date
CN111049830A CN111049830A (en) 2020-04-21
CN111049830B true CN111049830B (en) 2021-12-07

Family

ID=70236254

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911284740.1A Active CN111049830B (en) 2019-12-13 2019-12-13 Data information leakage prevention method for charging pile

Country Status (1)

Country Link
CN (1) CN111049830B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113688407A (en) * 2021-07-30 2021-11-23 山东云海国创云计算装备产业创新中心有限公司 Data management method and related device
CN115022373A (en) * 2022-06-21 2022-09-06 浙江浩瀚能源科技有限公司 Data security detection method, system, equipment and storage medium for charging pile
CN115859387B (en) * 2022-12-01 2024-04-09 深圳市赛特新能科技有限公司 Electric automobile charging safety detection method
CN116155634B (en) * 2023-04-23 2023-08-04 驿羚江苏大数据有限公司 Charging process safety protection method and system based on SaaS mode

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105912618A (en) * 2016-04-07 2016-08-31 浙江万马新能源有限公司 Block chain based charging pile charging transaction communication method and device
CN106850670A (en) * 2017-03-06 2017-06-13 浙江晨泰科技股份有限公司 A kind of charging pile communication system encrypting and decrypting method
CN109068096A (en) * 2018-08-23 2018-12-21 蔡岳林 Remote visible express system and method
CN110012097A (en) * 2019-04-04 2019-07-12 苏州足加新能源科技有限公司 Communication means between charging pile client and charging pile server
CN110099069A (en) * 2019-05-17 2019-08-06 赛尔网络有限公司 A kind of wisdom charging pile data transmission device, processing system and method
CN110182092A (en) * 2019-04-26 2019-08-30 上海电享信息科技有限公司 A kind of implementation method of intelligent charging spot communication protocol
CN110401191A (en) * 2019-07-29 2019-11-01 浙江大学 Charging pile for electric vehicle service logic consistency analysis method based on sequential logic

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
LT2936369T (en) * 2012-12-21 2020-07-27 Biobex, Llc Verification of password using a keyboard with a secure password entry mode

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105912618A (en) * 2016-04-07 2016-08-31 浙江万马新能源有限公司 Block chain based charging pile charging transaction communication method and device
CN106850670A (en) * 2017-03-06 2017-06-13 浙江晨泰科技股份有限公司 A kind of charging pile communication system encrypting and decrypting method
CN109068096A (en) * 2018-08-23 2018-12-21 蔡岳林 Remote visible express system and method
CN110012097A (en) * 2019-04-04 2019-07-12 苏州足加新能源科技有限公司 Communication means between charging pile client and charging pile server
CN110182092A (en) * 2019-04-26 2019-08-30 上海电享信息科技有限公司 A kind of implementation method of intelligent charging spot communication protocol
CN110099069A (en) * 2019-05-17 2019-08-06 赛尔网络有限公司 A kind of wisdom charging pile data transmission device, processing system and method
CN110401191A (en) * 2019-07-29 2019-11-01 浙江大学 Charging pile for electric vehicle service logic consistency analysis method based on sequential logic

Also Published As

Publication number Publication date
CN111049830A (en) 2020-04-21

Similar Documents

Publication Publication Date Title
CN111049830B (en) Data information leakage prevention method for charging pile
CN106973056B (en) Object-oriented security chip and encryption method thereof
CN103929428B (en) A kind of method for realizing vehicle electronics information system communication safety
CN104463007A (en) Data authentication method and apparatus thereof
CN111343164B (en) Data encryption method and device applied to electric energy meter and storage medium
US20070061674A1 (en) Transmission data packet construction for better header authentication
CN107113180B (en) Packet transmission device, packet reception device, and storage medium
CN112217795B (en) Method and device for managing communication security of intelligent electric meter
CN101783793A (en) Method, system and device for improving safety of monitoring data
US20210144130A1 (en) Method for securing communication without management of states
CN102655643A (en) Wireless data encryption method and wireless data decryption method
CN107392001B (en) Authorization method, system and card
CN110049027A (en) A kind of transmission platform for block chain network information
CN106850669B (en) Message security transmission method for Internet of things monitoring system
CN109274636B (en) Data safety transmission method and device, system and train thereof
CN106453362A (en) Data transmission method and apparatus of vehicle-mounted device
CN101742229B (en) Method, system and device for improving safety of monitoring data
CN113259121A (en) Method, device and equipment for safely transmitting monitoring data of capacitor bank
CN106936834B (en) Method for intrusion detection of IEC61850 digital substation SMV message
CN113873340B (en) Data processing method, device, equipment, system and storage medium
CN102164042A (en) Connectivity fault alarming method and device
CN115134169A (en) Block chain data management method and system
CN104363098A (en) Digital-encryption-based distributed monitoring terminal information safety protection method
CN108243034B (en) Fault determination method, receiver and transmitter
CN107493262B (en) Method and device for transmitting data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PP01 Preservation of patent right

Effective date of registration: 20221103

Granted publication date: 20211207

PP01 Preservation of patent right