CN111160890B - Charging pile system storage method based on chain data structure encryption technology - Google Patents

Charging pile system storage method based on chain data structure encryption technology Download PDF

Info

Publication number
CN111160890B
CN111160890B CN201911246534.1A CN201911246534A CN111160890B CN 111160890 B CN111160890 B CN 111160890B CN 201911246534 A CN201911246534 A CN 201911246534A CN 111160890 B CN111160890 B CN 111160890B
Authority
CN
China
Prior art keywords
charging
data
charging pile
central server
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911246534.1A
Other languages
Chinese (zh)
Other versions
CN111160890A (en
Inventor
徐恺
李德胜
吴志鹏
王旭
郑隽一
张育铭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guochuang Mobile Energy Innovation Center Jiangsu Co Ltd
Original Assignee
Guochuang Mobile Energy Innovation Center Jiangsu Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guochuang Mobile Energy Innovation Center Jiangsu Co Ltd filed Critical Guochuang Mobile Energy Innovation Center Jiangsu Co Ltd
Priority to CN201911246534.1A priority Critical patent/CN111160890B/en
Publication of CN111160890A publication Critical patent/CN111160890A/en
Application granted granted Critical
Publication of CN111160890B publication Critical patent/CN111160890B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/18Payment architectures involving self-service terminals [SST], vending machines, kiosks or multimedia terminals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S30/00Systems supporting specific end-user applications in the sector of transportation
    • Y04S30/10Systems supporting the interoperability of electric or hybrid vehicles
    • Y04S30/14Details associated with the interoperability, e.g. vehicle recognition, authentication, identification or billing

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Finance (AREA)
  • Public Health (AREA)
  • Water Supply & Treatment (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Tourism & Hospitality (AREA)
  • Computer Security & Cryptography (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a charging pile system storage method based on a chain data structure encryption technology, which comprises the following steps: receiving a charging demand from a user side, carrying out matching transaction selective charging action on a charging pile group through each charging pile, carrying out identity verification on a user and checking with a central server through the charging piles, carrying out charging transaction action on the charging piles, and storing data information packets generated by interaction with the user in a data block storage mode through the charging piles; the central server issues the integral chained data information to all charging pile nodes for confirmation and reaching consensus, and the central server approves the charging interaction transaction to finish encrypted storage of the chained data structure technology of the charging data; according to the invention, all information of user transaction charging is encrypted and stored in the charging pile through the data block in a chain data structure, so that the problems that the existing charging pile system is simple in information algorithm, and data information is easy to steal, decipher or unsafe to transmit are solved.

Description

Charging pile system storage method based on chain data structure encryption technology
Technical Field
The invention belongs to the technical field of electric vehicle charging pile systems, and particularly relates to a charging pile system storage method based on a chained data structure encryption technology.
Background
In recent years, with the rapid development of the new energy automobile market and the increasing strictness of each country in terms of energy saving and emission reduction laws and regulations, the new energy automobile has an increasing dependence on the charging demand of the charging pile.
According to the latest data of the national power grid and the Chinese electric vehicle charging infrastructure promotion alliance, the amount of the Chinese charging piles is over 100 ten thousand by 6 months in 2019, and China also becomes one of the largest global new energy vehicle markets.
Along with the increase of the quantity of the charging piles, the safety guarantee problem of the charging transaction data of the charging piles is gradually highlighted, and the problem of data safety of the data of the charging piles interacting with users and the data safety of interconnection becomes particularly critical.
The defects and shortcomings of the prior art:
at present, a plurality of data encryption technologies are applied to a charging pile system, but most of the data encryption technologies have some defects in solving the practical engineering problems: at present, conventional data transmission and algorithms, such as CRC check encryption, MD5 algorithm, AES algorithm, DES algorithm, etc., are subject to encryption algorithm and encryption key agreed by both parties, and once the algorithm or key is stolen or cracked, data transmission and storage have no security effect.
Disclosure of Invention
The invention provides a charging pile system storage method based on a chain data structure encryption technology, aiming at solving the problems that the existing charging pile system information algorithm is simple, and data information is easy to steal, decipher or unsafe to transmit.
The technical scheme adopted by the invention for solving the technical problems is as follows:
a charging pile system storage method based on a chained data structure encryption technology comprises at least one charging pile group, at least one charging pile group is configured with at least one charging pile, and the at least one charging pile is configured with a plurality of data blocks, and the method comprises the following steps:
receiving a charging demand from a user side, and performing matching transaction selective charging action on the charging pile group through each charging pile to prepare for charging transaction with the charging pile;
based on the charging transaction information of the charging pile, the charging pile performs identity authentication on the user and checks the user with the central server;
responding to the central server to check the user identity information, and performing charging transaction action on the charging pile;
based on the central server checking the passing users, the charging pile stores data information packets generated by interaction with the users in a data block storage mode; and
each data block of the storage data generates integral chained data information through a chained data structure encryption technology;
based on the integral chained data information, the central server issues the integral chained data information to all charging pile nodes to determine whether the charging pile nodes succeed or not and achieve consensus;
and responding to successful confirmation and consensus achievement of the charging pile nodes, and approving the charging interaction transaction by the central server, wherein the central server stores and deploys the whole chained data information after the consensus achievement of each node and the data information generated before the consensus achievement into the central server according to the time sequence and the chained data structure of the data blocks, and the encrypted storage of the chained data structure technology of the charging data is completed.
Preferably, the method comprises:
and responding to the situation that the central server fails to check the user identity information, and refusing the charging transaction action by the charging pile.
Preferably, the method comprises:
and responding to unsuccessful confirmation and consensus achievement of the charging pile nodes, reporting the abnormity to a central server by the charging pile, rejecting the synchronously changed data packet data, rejecting the charging transaction behavior by the central server, and keeping the original chain data structure unchanged.
Preferably, the method of the chained data structure technique includes:
based on each data block which is stored with the data information packet, encrypting the data block through an encryption algorithm to generate a secret message after the data block is encrypted;
responding to the secret message after the data block is encrypted, distributing the secret message to the head of the next data block, receiving the interactive transaction information data of each charging pile behind the secret message by the central server according to the time sequence until the next data block is fully stored, carrying out data block encryption on the data block with the secret message and the normal information data again, generating the next secret message and distributing the next secret message to the head of the next data block, so as to form a mode of encrypting the data block and the data block, and completing the one-time chain data structure encryption technology.
Preferably, the method comprises: the transaction selective charging behavior at least comprises charging and discharging behaviors, storage, interaction and backup of transaction data, and deployment of various central server software.
Preferably, the method comprises: the data information at least comprises charging starting time, charging ending time, electricity charge of the current charging time period, total charge of the current charging, the current charging pile ID number, current user information, current user starting SOC, current user ending SOC and transaction price.
Preferably, the method comprises: the central server provides consultation of transaction, and can be a single server host or a distributed server cluster.
Compared with the prior art, the invention has the following beneficial effects: the invention provides a chain data structure encryption technology in the charging pile system, and in the charging interactive transaction process of the user and the charging pile, the charging pile system sequentially connects and combines the data of the interactive transactions in a time sequence and a block mode to form a chain data structure, compared with other traditional encryption algorithm methods, the encryption method based on the chain data structure has the encryption advantage that the data cannot be tampered in the charging transaction in the charging pile system, once the data is tampered or stolen and other unsafe problems occur, the corresponding data block in the chain data structure is reported to the central server abnormally, the corresponding charging pile node refuses the data of the data information packet after synchronous change, so that the safety of the data information can be ensured, the data information is prevented from changing, the original information record is kept unchanged, and the safety and the stability of the interactive transaction charging data information are ensured.
Drawings
The invention is further illustrated with reference to the following figures and examples.
FIG. 1 is a flow chart of an interactive transaction process according to an embodiment of the present invention;
FIG. 2 is a block diagram of a database partition data block according to an embodiment of the present invention;
fig. 3 is a diagram illustrating a structure of a data block chain type encrypted data according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example one
As shown in fig. 1 to 3, a storage method of a charging pile system based on a chain data structure encryption technology includes at least one charging pile group, where at least one charging pile group is configured with at least one charging pile, and the at least one charging pile is configured with a plurality of data blocks, where the method includes:
receiving a charging demand from a user side, and carrying out matching transaction selective charging action on the charging pile group through each charging pile to prepare for carrying out charging transaction with the charging pile;
based on the charging transaction information of the charging pile, the charging pile performs identity authentication on the user and checks the user with the central server;
responding to the fact that the central server checks the user identity information, and enabling the charging pile to conduct charging transaction;
based on the central server checking the passing users, the charging pile stores data information packets generated by interaction with the users in a data block storage mode; and
each data block of the storage data generates integral chained data information through a chained data structure encryption technology;
based on the integral chained data information, the central server issues the integral chained data information to all charging pile nodes to determine whether the charging pile nodes succeed or not and to achieve consensus;
and responding to successful confirmation and consensus achievement of the charging pile nodes, and approving the charging interaction transaction by the central server, wherein the central server stores and deploys the whole chained data information after the consensus achievement of the nodes and the data information generated before the consensus achievement into the central server according to the time sequence and the chained data structure of the data blocks, and the encrypted storage of the chained data structure technology of the charging data is completed.
The method comprises the following steps:
and responding to the situation that the central server fails to check the user identity information, and refusing the charging transaction action by the charging pile.
The method comprises the following steps:
and responding to unsuccessful confirmation and consensus achievement of the charging pile nodes, reporting the abnormity to a central server by the charging pile, rejecting the synchronously changed data packet data, rejecting the charging transaction behavior by the central server, and keeping the original chain data structure unchanged.
The method of the chained data structure technology comprises the following steps:
based on each data block which is fully stored with the data information packet, the data block is encrypted through an encryption algorithm to generate a secret message after the data block is encrypted;
responding to the secret message after the data block is encrypted, distributing the secret message to the head of the next data block, receiving the interactive transaction information data of each charging pile behind the secret message by the central server according to the time sequence until the next data block is fully stored, carrying out data block encryption on the data block with the secret message and the normal information data again, generating the next secret message and distributing the next secret message to the head of the next data block, so as to form a mode of encrypting the data block and the data block, and completing the one-time chain data structure encryption technology.
The method comprises the following steps: the transaction selective charging behavior at least comprises charging and discharging behaviors, storage, interaction and backup of transaction data, and deployment of various central server software.
The method comprises the following steps: the data information at least comprises charging starting time, charging ending time, electricity charge of the current charging time period, total charge of the current charging, the current charging pile ID number, current user information, current user starting SOC, current user ending SOC and transaction price.
The method comprises the following steps: the central server provides consultation of transaction, and can be a single server host or a distributed server cluster.
The invention provides a chain data structure encryption technology in the charging pile system, and in the charging interactive transaction process of the user and the charging pile, the charging pile system sequentially connects and combines the data of the interactive transactions in a time sequence and a block mode to form a chain data structure, compared with other traditional encryption algorithm methods, the encryption method based on the chain data structure has the encryption advantage that the data cannot be tampered in the charging transaction in the charging pile system, once the data is tampered or stolen and other unsafe problems occur, the corresponding data block in the chain data structure is reported to the central server abnormally, the data information packet data after synchronous change is rejected by the corresponding charging pile node, so that the safety of the data information can be ensured, the data information is prevented from changing, the original information record is kept unchanged, and the safety and the stability of the interactive transaction charging data information are ensured.
In light of the foregoing description of the preferred embodiment of the present invention, many modifications and variations will be apparent to those skilled in the art without departing from the spirit and scope of the invention. The technical scope of the present invention is not limited to the content of the specification, and must be determined according to the scope of the claims.

Claims (6)

1. A charging pile system storage method based on a chain data structure encryption technology is characterized by comprising at least one charging pile group, at least one charging pile group is configured with at least one charging pile, and the at least one charging pile is configured with a plurality of data blocks, and the method comprises the following steps:
receiving a charging demand from a user side, and carrying out matching transaction selective charging action on the charging pile group through each charging pile to prepare for carrying out charging transaction with the charging pile;
based on the charging transaction information of the charging pile, the charging pile performs identity authentication on the user and checks the user with the central server;
responding to the fact that the central server checks the user identity information, and enabling the charging pile to conduct charging transaction;
based on the central server checking the passing users, the charging pile stores data information packets generated by interaction with the users in a data block storage mode; and
encrypting each data block which is fully stored with the data information packet through an encryption algorithm to generate a secret message after the data block is encrypted;
responding to the secret message after the data block encryption, distributing the secret message to the head of the next data block, receiving the interactive transaction information data of each charging pile behind the secret message by the central server according to the time sequence until the next data block is fully stored, carrying out data block encryption on the data block with the secret message and the normal information data again, generating the next secret message, distributing the next secret message to the head of the next data block, forming a mode of encrypting the data block and sleeving the data block, and completing a one-time chain data structure encryption technology;
each data block of the storage data generates integral chained data information through a chained data structure encryption technology;
based on the integral chained data information, the central server issues the integral chained data information to all charging pile nodes to determine whether the charging pile nodes succeed or not and to achieve consensus;
and responding to successful confirmation and consensus achievement of the charging pile nodes, and approving the charging interaction transaction by the central server, wherein the central server stores and deploys the whole chained data information after the consensus achievement of each node and the data information generated before the consensus achievement into the central server according to the time sequence and the chained data structure of the data blocks, and the encrypted storage of the chained data structure technology of the charging data is completed.
2. The method according to claim 1, characterized in that it comprises:
and responding to the situation that the central server fails to check the user identity information, and refusing the charging transaction action by the charging pile.
3. The method of claim 2, wherein the method comprises:
and responding to unsuccessful confirmation and consensus achievement of the charging pile nodes, reporting the abnormity to a central server by the charging pile, rejecting the synchronously changed data packet data, rejecting the charging transaction behavior by the central server, and keeping the original chain data structure unchanged.
4. The method of claim 3, wherein the method comprises:
the transaction selective charging behavior at least comprises charging and discharging behaviors, storage, interaction and backup of transaction data, and deployment of various central server software.
5. The method of claim 4, wherein the method comprises:
the data information at least comprises charging starting time, charging ending time, electricity charge of the current charging time period, total charge of the current charging, the current charging pile ID number, current user information, current user starting SOC, current user ending SOC and transaction price.
6. The method of claim 5, wherein: the central server is an independent server host or a distributed server cluster.
CN201911246534.1A 2019-12-09 2019-12-09 Charging pile system storage method based on chain data structure encryption technology Active CN111160890B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911246534.1A CN111160890B (en) 2019-12-09 2019-12-09 Charging pile system storage method based on chain data structure encryption technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911246534.1A CN111160890B (en) 2019-12-09 2019-12-09 Charging pile system storage method based on chain data structure encryption technology

Publications (2)

Publication Number Publication Date
CN111160890A CN111160890A (en) 2020-05-15
CN111160890B true CN111160890B (en) 2022-08-23

Family

ID=70556528

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911246534.1A Active CN111160890B (en) 2019-12-09 2019-12-09 Charging pile system storage method based on chain data structure encryption technology

Country Status (1)

Country Link
CN (1) CN111160890B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101098225A (en) * 2006-06-29 2008-01-02 中国银联股份有限公司 Safety data transmission method and paying method, paying terminal and paying server
CN101145233A (en) * 2006-09-12 2008-03-19 中国农业银行 Data ciphered-mortgage transaction system, teller identification system, trans-center transaction system and method
CN101593333A (en) * 2008-05-28 2009-12-02 北京中食新华科技有限公司 E-commerce information security processing method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101098225A (en) * 2006-06-29 2008-01-02 中国银联股份有限公司 Safety data transmission method and paying method, paying terminal and paying server
CN101145233A (en) * 2006-09-12 2008-03-19 中国农业银行 Data ciphered-mortgage transaction system, teller identification system, trans-center transaction system and method
CN101593333A (en) * 2008-05-28 2009-12-02 北京中食新华科技有限公司 E-commerce information security processing method

Also Published As

Publication number Publication date
CN111160890A (en) 2020-05-15

Similar Documents

Publication Publication Date Title
CN111464518B (en) Method and device for sending and verifying cross-link communication data
CN110958110B (en) Block chain private data management method and system based on zero knowledge proof
CN103051453B (en) A kind of mobile terminal network affaris safety trade system based on digital certificate and method
CN107220820A (en) Resource transfers method, device and storage medium
CN103259650A (en) Fair and rational multi-secret sharing method for honest participants
CN110930153B (en) Block chain privacy data management method and system based on hidden third party account
CN109743182B (en) Intelligent contract approval method and system based on block chain
CN110910139B (en) Trusted hardware and high-performance decentralized anonymous encryption method based on block chain
CN110213038B (en) Method and system for forming consensus of block chain
CN112019326A (en) Vehicle charging safety management method and system
CN111461799B (en) Data processing method, data processing device, computer equipment and medium
CN105787727A (en) HCE offline payment system and realization method
CN111163109A (en) Block chain center-removing type node anti-counterfeiting method
CN104579659A (en) Device for safety information interaction
KR101919693B1 (en) Anonymous payment method to provide location privacy for wireless charging of electrical vehicles and system therefor
CN113852628A (en) Decentralized single sign-on method, decentralized single sign-on device and storage medium
Belkaaloul et al. Anonymous authentication protocol for efficient communications in vehicle to grid networks
CN111160890B (en) Charging pile system storage method based on chain data structure encryption technology
CN112926983A (en) Block chain-based deposit certificate transaction encryption system and method
CN110852887A (en) Method and device for acquiring transaction processing state in decentralized application cluster
CN111311210B (en) Asymmetric encryption digital currency transaction data processing method and device
CN109389398A (en) A kind of generation method and system of transaction certificate
CN101833822B (en) Security protection method for electric power prepaid system
CN113886884A (en) Demand side response user identity authentication management method
Zhdanova Security and Trust in Safety Critical Infrastructures

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 213100 5-a201, Chuangyan port, Changzhou science and Education City, No. 18, Changwu Middle Road, Wujin District, Changzhou City, Jiangsu Province

Applicant after: Guochuang mobile energy innovation center (Jiangsu) Co.,Ltd.

Address before: Room 354, No. 18, Xinya Road, Wujin national high tech Industrial Development Zone, Changzhou, Jiangsu 213100

Applicant before: National innovation energy automobile intelligent energy equipment innovation center (Jiangsu) Co.,Ltd.

GR01 Patent grant
GR01 Patent grant