CN111460427A - Binding method and device of power supply equipment, storage medium and equipment - Google Patents

Binding method and device of power supply equipment, storage medium and equipment Download PDF

Info

Publication number
CN111460427A
CN111460427A CN202010118700.6A CN202010118700A CN111460427A CN 111460427 A CN111460427 A CN 111460427A CN 202010118700 A CN202010118700 A CN 202010118700A CN 111460427 A CN111460427 A CN 111460427A
Authority
CN
China
Prior art keywords
power supply
equipment
supply equipment
key
electric vehicle
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010118700.6A
Other languages
Chinese (zh)
Inventor
杨磊
李俊
王慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Junzheng Network Technology Co Ltd
Original Assignee
Shanghai Junzheng Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Junzheng Network Technology Co Ltd filed Critical Shanghai Junzheng Network Technology Co Ltd
Priority to CN202010118700.6A priority Critical patent/CN111460427A/en
Publication of CN111460427A publication Critical patent/CN111460427A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Finance (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Electric Propulsion And Braking For Vehicles (AREA)
  • Charge And Discharge Circuits For Batteries Or The Like (AREA)

Abstract

The invention discloses a binding method and device of power supply equipment, a storage medium and equipment. The method includes performing by an electric vehicle: receiving the equipment number and the super key of the target power supply equipment from the server side; if the power supply equipment to be authenticated is detected to be accessed within the preset validity period, authenticating the equipment number and the super key of the power supply equipment to be authenticated; and if the authentication is successful, generating a user key through the super key of the target power supply equipment, and communicating with the target power supply equipment through the generated user key to finish the binding of the power supply equipment. By adopting the technical scheme, the condition that the power supply equipment of the electric vehicle is stolen can be prevented.

Description

Binding method and device of power supply equipment, storage medium and equipment
Technical Field
The invention relates to the technical field of shared vehicles, the field of electric bicycles and the field of battery leasing, in particular to a binding method and device of power supply equipment, a storage medium and equipment.
Background
At present, in urban life, the travel mode of people does not only depend on urban public transport, and people avoid driving to travel as far as possible under the condition that conditions allow, but adopt public transport to travel along with the concept of green travel is accepted by more and more users. Most users select a riding mode under the conditions that public transportation cannot be reached or the traveling distance is short and the public transportation is not suitable. The riding mode is convenient, precious time is saved for a user, the traveling experience of the user is improved, and the selection of the user on the traveling mode is increased.
With the increasing demand for the bicycle, sharing the bicycle becomes one of the necessary ways for people to go out. The shared bicycle is a vehicle for realizing sharing by renting on a platform through people in parks, campuses, residential areas and other traffic convergence places with certain pedestrian flow of enterprises. The sharing bicycle provides a bicycle time sharing rental service, and is a new business form which is started in recent years.
However, a shared electric vehicle which is preferred by customers in the shared single vehicle has a troublesome problem in the operation process. That is, most of the power supply devices of the shared electric vehicle are lead-acid batteries or lithium batteries, and since the power supply devices are connected with the vehicle only through the conducting wires, only one fixed communication protocol exists between the vehicle and the batteries. In this case, a situation in which the power supply apparatus is stolen easily occurs. This results in both the failure of the vehicle to operate properly and the direct loss of battery theft. Therefore, a binding scheme of the power supply device is urgently to appear.
Disclosure of Invention
In view of the above-mentioned defects of the prior art, the technical problem to be solved by the present invention is that the power supply device of the shared electric vehicle is very easy to be stolen during the use due to the simple connection of the conducting wire. To solve the above problems, we have established a binding relationship of the battery with the vehicle, which cannot be used when the battery is inserted into another vehicle.
In order to achieve the above purpose, the invention provides a binding method and device of power supply equipment, a storage medium and equipment.
In a preferred embodiment of the invention, the method is performed by an electric vehicle, the method comprising: receiving the equipment number and the super key of the target power supply equipment from the server side;
if the power supply equipment to be authenticated is detected to be accessed within the preset validity period, authenticating the equipment number and the super key of the power supply equipment to be authenticated;
and if the authentication is successful, generating a user key through the super key of the target power supply equipment, and communicating with the target power supply equipment through the generated user key to finish the binding of the power supply equipment.
The situation that batteries are stolen often happens to electric bicycles purchased or rented by users. After being stolen, the battery on the market can be normally used after being installed on other vehicles. The scheme can prevent the battery of the user from being normally used after the battery is stolen, and reduces the use value of stolen goods. The cost performance of the stealing behavior is radically reduced.
Optionally, authenticating the device number and the super key of the power supply device to be authenticated includes:
acquiring the equipment number of the power supply equipment to be authenticated, and if the equipment number of the power supply equipment to be authenticated is detected to be consistent with the equipment number of the target power supply equipment, successfully authenticating the equipment number of the power supply equipment to be authenticated;
encrypting an authentication message through the obtained super key of the target power supply equipment, and sending the authentication message to the power supply equipment to be authenticated;
and if the information that the power supply equipment to be authenticated successfully decrypts the authentication message through the super key of the power supply equipment to be authenticated is received, the super key of the power supply equipment to be authenticated is authenticated successfully.
Optionally, before generating the user key through the super key of the target power supply device, the method further includes:
if the fact that the user key of the target power supply equipment is received is detected, generating the user key through the super key of the target power supply equipment, wherein the method comprises the following steps:
and generating user key modification information through the super key of the target power supply equipment, and modifying the received user key of the target power supply equipment.
Optionally, after the user key of the target power supply device is modified, the method further includes:
and reporting the modified information to the server.
Optionally, the method further includes:
and if the equipment number of the power supply equipment to be authenticated is not consistent with the equipment number of the target power supply equipment, or the power supply equipment to be authenticated does not successfully decrypt the authentication message through the super key, the authentication of the power supply equipment to be authenticated fails.
In another preferred embodiment of the present invention, the present application provides a method for binding a power supply device, where the method is performed by the power supply device, and the method includes:
the equipment number and the super key of the power supply equipment are sent to the electric vehicle through the server side;
if the electric vehicle is detected to be accessed within the preset validity period, receiving an authentication request of the electric vehicle for the equipment number and the super key of the power supply equipment;
and if the authentication is successful, modifying the local user key through the super key of the power supply equipment so as to communicate with the electric vehicle through the modified user key to finish the binding with the electric vehicle.
Optionally, receiving an authentication request of the electric vehicle for a device number and a super key of the power supply device includes:
acquiring an equipment number authentication request, and sending an equipment number to the electric vehicle for the electric vehicle to authenticate whether the equipment numbers are consistent, wherein if so, the equipment number authentication is successful;
and acquiring a super key authentication request, receiving an authentication message encrypted by the electric vehicle through a super key, and if decryption is completed through a local super key, sending information of successful decryption to the electric vehicle for the electric vehicle to determine that super key authentication is successful.
In another preferred embodiment of the present invention, the present application provides a binding apparatus for a power supply device, where the apparatus is configured on an electric vehicle, and the apparatus includes:
the information acquisition module is used for receiving the equipment number and the super key of the target power supply equipment from the server side;
the power supply equipment authentication module is used for authenticating the equipment number and the super key of the power supply equipment to be authenticated if the power supply equipment to be authenticated is detected to be accessed within the preset validity period;
and the user key binding module is used for generating a user key through the super key of the target power supply equipment if the authentication is successful, so as to communicate with the target power supply equipment through the generated user key and finish the binding of the power supply equipment.
The device is specifically configured to: authenticating the equipment number and the super key of the power supply equipment to be authenticated comprises the following steps:
acquiring the equipment number of the power supply equipment to be authenticated, and if the equipment number of the power supply equipment to be authenticated is detected to be consistent with the equipment number of the target power supply equipment, successfully authenticating the equipment number of the power supply equipment to be authenticated;
encrypting an authentication message through the obtained super key of the target power supply equipment, and sending the authentication message to the power supply equipment to be authenticated;
and if the information that the power supply equipment to be authenticated successfully decrypts the authentication message through the super key of the power supply equipment to be authenticated is received, the super key of the power supply equipment to be authenticated is authenticated successfully.
Optionally, before generating the user key through the super key of the target power supply device, the method further includes:
if the fact that the user key of the target power supply equipment is received is detected, generating the user key through the super key of the target power supply equipment, wherein the method comprises the following steps:
and generating user key modification information through the super key of the target power supply equipment, and modifying the received user key of the target power supply equipment.
Optionally, after the user key of the target power supply device is modified, the method further includes:
and reporting the modified information to the server.
Optionally, the method further includes:
and if the equipment number of the power supply equipment to be authenticated is not consistent with the equipment number of the target power supply equipment, or the power supply equipment to be authenticated does not successfully decrypt the authentication message through the super key, the authentication of the power supply equipment to be authenticated fails.
In another preferred embodiment of the present invention, an apparatus for binding a power supply device is provided, where the apparatus is configured to a power supply device, and the apparatus includes:
the information sending module is used for sending the equipment number and the super key of the power supply equipment to the electric vehicle through the server side;
the authentication request receiving module is used for receiving an authentication request of the electric vehicle for the equipment number and the super key of the power supply equipment if the electric vehicle is detected to be accessed within a preset validity period;
and the user key modification module is used for modifying a local user key through the super key of the power supply equipment if the authentication is successful so as to communicate with the electric vehicle through the modified user key to finish the binding with the electric vehicle.
The device is specifically configured to: receiving an authentication request of the electric vehicle for a device number and a super key of a power supply device, including:
acquiring an equipment number authentication request, and sending an equipment number to the electric vehicle for the electric vehicle to authenticate whether the equipment numbers are consistent, wherein if so, the equipment number authentication is successful;
and acquiring a super key authentication request, receiving an authentication message encrypted by the electric vehicle through a super key, and if decryption is completed through a local super key, sending information of successful decryption to the electric vehicle for the electric vehicle to determine that super key authentication is successful.
In another preferred embodiment of the present invention, the present application provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the binding method for the power supply device according to the present application.
In another preferred embodiment of the present invention, an electronic device is provided, which includes a memory, a processor, and a computer program stored in the memory and executable by the processor, and when the processor executes the computer program, the binding method of the power supply device according to the embodiment of the present invention is implemented.
The technical scheme provided by the invention has the following technical effects:
the invention is suitable for the binding operation of an electric vehicle and power supply equipment, the vehicle and the battery are communicated in the modes of RS485 or CAN (Controller Area Network) bus and the like, and a fixed communication protocol is arranged between the vehicle and the battery. Each battery has a super key and a user key, and the super key can be used for modifying the user key of the battery. The user key is stored in one copy in each of the car and the battery. The vehicle and the battery transmit information in an encryption mode (the key is a user key), and authentication is performed. If the keys are matched, the authentication can be passed, and if the keys are not matched, the decryption of the information of the two parties cannot be passed, so that the authentication cannot be successfully performed. The battery is not discharged to the outside in case of unsuccessful authentication, so that even if the battery is stolen, the stolen battery cannot be used.
The conception, the specific structure and the technical effects of the present invention will be further described with reference to the accompanying drawings to fully understand the objects, the features and the effects of the present invention.
Drawings
Fig. 1 is a schematic diagram of a binding method of a power supply device according to an embodiment of the present application;
fig. 2 is a schematic diagram of a binding method of a power supply device according to an embodiment of the present application;
fig. 3 is a schematic diagram of a binding apparatus of a power supply device according to an embodiment of the present application;
fig. 4 is a schematic diagram of a binding apparatus of a power supply device according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The embodiments of the present invention are described below with reference to specific embodiments, and other advantages and effects of the present invention will be easily understood by those skilled in the art from the disclosure of the present specification. The invention is capable of other and different embodiments and of being practiced or of being carried out in various ways, and its several details are capable of modification in various respects, all without departing from the spirit and scope of the present invention. It is to be noted that the features in the following embodiments and examples may be combined with each other without conflict.
It should be noted that the drawings provided in the following embodiments are only for illustrating the basic idea of the present invention, and the drawings only show the components related to the present invention rather than the number, shape and size of the components in actual implementation, and the type, quantity and proportion of the components in actual implementation may be changed freely, and the layout of the components may be more complicated.
Some exemplary embodiments of the invention have been described for illustrative purposes, and it is to be understood that the invention may be practiced otherwise than as specifically described.
Fig. 1 is a schematic diagram of a binding method of a power supply device according to an embodiment of the present application, where the present embodiment is applicable to a case of binding between a shared electric vehicle and a battery, and the method may be performed by a binding apparatus of the power supply device according to the embodiment of the present application, where the apparatus may be implemented by software and/or hardware, and may be integrated in the shared electric vehicle.
As shown in fig. 1, the binding method of the power supply device includes:
and S110, receiving the device number and the super key of the target power supply device from the server side.
In this embodiment, the device number and the super key of the target power supply device may be obtained by the request, or in an actual binding scenario, the two-dimensional code of the electric vehicle and the two-dimensional code of the battery are scanned by a worker holding the intelligent terminal, and are sent to the server, and the server determines the device number and the super key thereof through the two-dimensional code of the battery. The electric vehicle can be a shared electric vehicle, a shared battery car and other vehicles sharing electric energy. The technical scheme aims to bind the battery and the electric vehicle, so that even if lawbreakers steal the battery, the battery cannot be used due to the fact that the binding relation does not exist.
In this embodiment, a binding relationship of the battery with the vehicle is established, and the battery cannot be used when it is inserted into another vehicle. The vehicle and the battery are communicated in modes of RS485 or CAN and the like, and a fixed communication protocol is arranged between the vehicle and the battery. The battery is not discharged to the outside in case of unsuccessful authentication, so that even if the battery is stolen, the stolen battery cannot be used.
And S120, if the power supply equipment to be authenticated is detected to be accessed within the preset validity period, authenticating the equipment number and the super key of the power supply equipment to be authenticated.
The preset validity period may be 1 minute, 2 minutes, and the like, and in such a time period, as long as the battery is connected with the electric vehicle, it is considered that the binding work can be continued in the validity period. If the connection is not carried out in the event, the validity period is considered to be exceeded, the connected equipment is directly determined to be invalid, and subsequent binding work is not carried out.
In this technical solution, optionally, authenticating the device number and the super key of the power supply device to be authenticated includes: acquiring the equipment number of the power supply equipment to be authenticated, and if the equipment number of the power supply equipment to be authenticated is detected to be consistent with the equipment number of the target power supply equipment, successfully authenticating the equipment number of the power supply equipment to be authenticated; encrypting an authentication message through the obtained super key of the target power supply equipment, and sending the authentication message to the power supply equipment to be authenticated; and if the information that the power supply equipment to be authenticated successfully decrypts the authentication message through the super key of the power supply equipment to be authenticated is received, the super key of the power supply equipment to be authenticated is authenticated successfully.
In the technical scheme, the equipment number can be authenticated, the super key is authenticated after the equipment number is successfully authenticated, a message can be sent to a battery connected to a vehicle in the process of authenticating the super key, the content of the message can be fixed, and the super key is considered to be successfully authenticated as long as the battery can be normally decrypted and data in the message is read. After decryption, the decryption result can be returned to the vehicle end for vehicle verification. The content of the message may also be a control instruction, for example, power is intermittently supplied three times, and when the battery is capable of performing corresponding operation of intermittently supplying power, it may be determined that the authentication is successful, that is, the battery connected to the vehicle is the target power supply device.
In this embodiment, optionally, the method further includes: and if the equipment number of the power supply equipment to be authenticated is not consistent with the equipment number of the target power supply equipment, or the power supply equipment to be authenticated does not successfully decrypt the authentication message through the super key, the authentication of the power supply equipment to be authenticated fails. If either one of the two devices fails to be authenticated, the battery device currently connected to the vehicle is not the target battery device, that is, the battery is possibly stolen. After the authentication fails, if the user continues to connect, the battery can be controlled not to supply power to the shared vehicle, and the binding operation flow between the two can be terminated. In the scheme, when the authentication fails, corresponding sound and light alarm information can be sent out, and a notification message is sent to the person who performs the authentication so as to prompt the worker that the current power supply equipment is unavailable. The advantage of this kind of setting is can be tied up the battery on inherent electric vehicle, avoids appearing the condition that other people used the battery after stealing and use at will.
S130, if the authentication is successful, generating a user key through the super key of the target power supply equipment, and communicating with the target power supply equipment through the generated user key to finish the binding of the power supply equipment.
The super key is obtained by the electric vehicle end, and the super key is consistent with the power supply equipment, so that the user keys at the two ends can be generated through the super key. The update process may be performed if the power supply device already possesses the original user key. With such an arrangement, it is possible to have a uniform user key at both ends. And the authentication operation can be carried out through the user key, the electric vehicle end and the power supply equipment end can carry out mutual authentication, if the user keys at the two ends are not consistent, the fact that the user keys at the two ends are not consistent is shown, the fact that the user keys at the two ends are not bound is indicated, and the power supply equipment can be controlled not to supply power to the connected electric vehicle. The advantage of setting up like this can effectively avoid the condition that the battery of sharing electric motor car was stolen.
In this embodiment, optionally, before generating the user key through the super key of the target power supply device, the method further includes: if the fact that the user key of the target power supply equipment is received is detected, generating the user key through the super key of the target power supply equipment, wherein the method comprises the following steps: and generating user key modification information through the super key of the target power supply equipment, and modifying the received user key of the target power supply equipment. Wherein, if the user key of the battery is obtained through the server before, the user keys at the two ends can be updated once. The advantage of setting up like this can be according to the actual use demand, bind battery and electric motor car.
In this embodiment, optionally, after the user key of the target power supply device is modified, the method further includes: and reporting the modified information to the server. In the technical scheme, after the binding is successful, the information of the successful binding can be reported to the server so that the server can store the association relationship between the two, and the management of the equipment is facilitated.
In the technical scheme, the super secret key acquired by the electric vehicle terminal can be destroyed after the information of successful binding is reported to the server. The advantage of this arrangement is that the super key information of the power supply apparatus can be secured.
According to the technical scheme, the device number and the super key of the target power supply device are received from the server side at the electric vehicle side; if the power supply equipment to be authenticated is detected to be accessed within the preset validity period, authenticating the equipment number and the super key of the power supply equipment to be authenticated; and if the authentication is successful, generating a user key through the super key of the target power supply equipment, and communicating with the target power supply equipment through the generated user key to finish the binding of the power supply equipment. By using the technical scheme, the condition that the power supply equipment of the electric vehicle is stolen can be prevented.
The present embodiment also provides a specific implementation manner.
When a user purchases the battery, the binding operation of the vehicle and the battery is carried out, the working personnel send the serial numbers of the battery and the vehicle to the server through the APP, and the server informs the vehicle of the binding operation. The process is as follows:
1. the working personnel respectively use the APP to scan the vehicle and the two-dimensional code of the battery to upload information to the server;
2. the server inquires the super key of the battery and sends the serial number of the battery, the super key and the user key required to be used to the vehicle;
3. the vehicle authenticates the battery through the super key after detecting the battery in the valid period, modifies the user key after the authentication is finished, and terminates the process and destroys the super key if the battery is not detected after overtime;
4. and after the modification is finished, reporting to the server, and destroying the super key locally.
Fig. 2 is a schematic diagram of a binding method of a power supply device according to an embodiment of the present application, where the present embodiment is applicable to a case of sharing a binding between an electric vehicle and a battery, and the method may be performed by a binding apparatus of the power supply device according to the embodiment of the present application, and the apparatus may be implemented by software and/or hardware and may be integrated in the power supply device.
As shown in fig. 2, the binding method of the power supply device includes:
and S210, sending the equipment number of the power supply equipment and the super key to the electric vehicle through the server side.
S220, if the electric vehicle is detected to be accessed within the preset validity period, receiving an authentication request of the electric vehicle for the equipment number and the super key of the power supply equipment.
And S230, if the authentication is successful, modifying the local user key through the super key of the power supply equipment so as to communicate with the electric vehicle through the modified user key, and finishing the binding with the electric vehicle.
According to the technical scheme, the equipment number and the super key of the power supply equipment are transmitted to the electric vehicle through the server side at the power supply equipment side; if the electric vehicle is detected to be accessed within the preset validity period, receiving an authentication request of the electric vehicle for the equipment number and the super key of the power supply equipment; and if the authentication is successful, modifying the local user key through the super key of the power supply equipment so as to communicate with the electric vehicle through the modified user key to finish the binding with the electric vehicle. By using the technical scheme, the condition that the power supply equipment of the electric vehicle is stolen can be prevented.
In this embodiment, optionally, the receiving an authentication request of the electric vehicle for the device number and the super key of the power supply device includes: acquiring an equipment number authentication request, and sending an equipment number to the electric vehicle for the electric vehicle to authenticate whether the equipment numbers are consistent, wherein if so, the equipment number authentication is successful; and acquiring a super key authentication request, receiving an authentication message encrypted by the electric vehicle through a super key, and if decryption is completed through a local super key, sending information of successful decryption to the electric vehicle for the electric vehicle to determine that super key authentication is successful.
The technical scheme corresponds to the technical scheme and has corresponding beneficial effects, and the details are not repeated herein.
Fig. 3 is a schematic diagram of a binding apparatus of a power supply device according to an embodiment of the present application, and as shown in fig. 3, the binding apparatus of the power supply device includes:
an information obtaining module 310, configured to receive, from the server, the device number and the super key of the target power supply device;
the power supply equipment authentication module 320 is configured to authenticate the equipment number and the super key of the power supply equipment to be authenticated if it is detected that the power supply equipment to be authenticated is accessed within a preset validity period;
and the user key binding module 330 is configured to, if the authentication is successful, generate a user key through the super key of the target power supply device, so as to communicate with the target power supply device through the generated user key, and complete binding of the power supply device.
Wherein each module may be a virtual device executing a corresponding segment of functional code in a processor. All the virtual devices can be connected according to the logical relationship so as to realize the complete technical scheme of the application.
According to the technical scheme, the device number and the super key of the target power supply device are received from the server side at the electric vehicle side; if the power supply equipment to be authenticated is detected to be accessed within the preset validity period, authenticating the equipment number and the super key of the power supply equipment to be authenticated; and if the authentication is successful, generating a user key through the super key of the target power supply equipment, and communicating with the target power supply equipment through the generated user key to finish the binding of the power supply equipment. By using the technical scheme, the condition that the power supply equipment of the electric vehicle is stolen can be prevented.
The product can execute the method provided by the embodiment of the application, and has the corresponding functional modules and beneficial effects of the execution method.
Fig. 4 is a schematic diagram of a binding apparatus of a power supply device according to an embodiment of the present application, and as shown in fig. 4, the binding apparatus of the power supply device includes:
the information sending module 410 is used for sending the equipment number and the super key of the power supply equipment to the electric vehicle through the server side;
an authentication request receiving module 420, configured to receive an authentication request for a device number and a super key of a power supply device from the electric vehicle if it is detected that the electric vehicle is accessed within a preset validity period;
and the user key modification module 430 is configured to modify a local user key through the super key of the power supply device if the authentication is successful, so as to communicate with the electric vehicle through the modified user key to complete the binding with the electric vehicle.
Wherein each module may be a virtual device executing a corresponding segment of functional code in a processor. All the virtual devices can be connected according to the logical relationship so as to realize the complete technical scheme of the application.
According to the technical scheme, the device number and the super key of the target power supply device are received from the server side at the electric vehicle side; if the power supply equipment to be authenticated is detected to be accessed within the preset validity period, authenticating the equipment number and the super key of the power supply equipment to be authenticated; and if the authentication is successful, generating a user key through the super key of the target power supply equipment, and communicating with the target power supply equipment through the generated user key to finish the binding of the power supply equipment. By using the technical scheme, the condition that the power supply equipment of the electric vehicle is stolen can be prevented.
The product can execute the method provided by the embodiment of the application, and has the corresponding functional modules and beneficial effects of the execution method.
Embodiments of the present application also provide a storage medium containing computer-executable instructions that, when executed by a computer processor, perform a method for providing power based on a solar panel, the method comprising:
receiving the equipment number and the super key of the target power supply equipment from the server side;
if the power supply equipment to be authenticated is detected to be accessed within the preset validity period, authenticating the equipment number and the super key of the power supply equipment to be authenticated;
and if the authentication is successful, generating a user key through the super key of the target power supply equipment, and communicating with the target power supply equipment through the generated user key to finish the binding of the power supply equipment.
Alternatively, the first and second electrodes may be,
the equipment number and the super key of the power supply equipment are sent to the electric vehicle through the server side;
if the electric vehicle is detected to be accessed within the preset validity period, receiving an authentication request of the electric vehicle for the equipment number and the super key of the power supply equipment;
and if the authentication is successful, modifying the local user key through the super key of the power supply equipment so as to communicate with the electric vehicle through the modified user key to finish the binding with the electric vehicle.
Storage medium-any of various types of memory devices or storage devices. The term "storage medium" is intended to include: mounting media such as CD-ROM, floppy disk, or tape devices; computer system memory or random access memory such as DRAM, DDR RAM, SRAM, EDO RAM, Lanbas (Rambus) RAM, etc.; non-volatile memory such as flash memory, magnetic media (e.g., hard disk or optical storage); registers or other similar types of memory elements, etc. The storage medium may also include other types of memory or combinations thereof. In addition, the storage medium may be located in the computer system in which the program is executed, or may be located in a different second computer system connected to the computer system through a network (such as the internet). The second computer system may provide the program instructions to the computer for execution. The term "storage medium" may include two or more storage media that may reside in different locations, such as in different computer systems that are connected by a network. The storage medium may store program instructions (e.g., embodied as a computer program) that are executable by one or more processors.
Of course, the storage medium containing the computer-executable instructions provided in the embodiments of the present application is not limited to the operations of the power supply device binding method described above, and may also perform related operations in the power supply device binding method provided in any embodiments of the present application.
Fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application. Referring now to FIG. 5, shown is a schematic diagram of an electronic device 500 suitable for use in implementing embodiments of the present application. The electronic device in the embodiment of the present application may be an electronic device for providing an information presentation function. The electronic device shown in fig. 5 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
As shown in fig. 5, electronic device 500 may include a processing means (e.g., central processing unit, graphics processor, etc.) 501 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)502 or a program loaded from a storage means 508 into a Random Access Memory (RAM) 503. In the RAM 503, various programs and data necessary for the operation of the electronic apparatus 500 are also stored. The processing device 501, the ROM 502, and the RAM 503 are connected to each other through a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
In general, input devices 506 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc., output devices 507 including, for example, a liquid crystal display (L CD), speaker, vibrator, etc., storage devices 508 including, for example, magnetic tape, hard disk, etc., and communication devices 509. the communication devices 509 may allow the electronic device 500 to communicate wirelessly or wiredly with other devices to exchange data.
In particular, according to embodiments of the application, the processes described above with reference to the flow diagrams may be implemented as computer software programs. For example, embodiments of the present application include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication means 509, or installed from the storage means 508, or installed from the ROM 502. The computer program performs the above-described functions defined in the methods of the embodiments of the present application when executed by the processing device 501.
It should be noted that the computer readable medium mentioned above in the present application may be a computer readable signal medium or a computer readable medium or any combination of the two. A computer readable medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In this application, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to perform: receiving the equipment number and the super key of the target power supply equipment from the server side; if the power supply equipment to be authenticated is detected to be accessed within the preset validity period, authenticating the equipment number and the super key of the power supply equipment to be authenticated; and if the authentication is successful, generating a user key through the super key of the target power supply equipment, and communicating with the target power supply equipment through the generated user key to finish the binding of the power supply equipment.
Or performing:
the equipment number and the super key of the power supply equipment are sent to the electric vehicle through the server side;
if the electric vehicle is detected to be accessed within the preset validity period, receiving an authentication request of the electric vehicle for the equipment number and the super key of the power supply equipment;
and if the authentication is successful, modifying the local user key through the super key of the power supply equipment so as to communicate with the electric vehicle through the modified user key to finish the binding with the electric vehicle.
Computer program code for carrying out operations of the present application may be written in any combination of one or more programming languages, including AN object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present application may be implemented by software or hardware. The names of the modules and units do not limit the modules and units in some cases.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the disclosure herein is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the disclosure. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.
The foregoing embodiments are merely illustrative of the principles and utilities of the present invention and are not intended to limit the invention. Any person skilled in the art can modify or change the above-mentioned embodiments without departing from the spirit and scope of the present invention. Accordingly, it is intended that all equivalent modifications or changes which can be made by those skilled in the art without departing from the spirit and technical spirit of the present invention be covered by the claims of the present invention.

Claims (11)

1. A method of binding a power supply device, the method being performed by an electric vehicle, the method comprising:
receiving the equipment number and the super key of the target power supply equipment from the server side;
if the power supply equipment to be authenticated is detected to be accessed within the preset validity period, authenticating the equipment number and the super key of the power supply equipment to be authenticated;
and if the authentication is successful, generating a user key through the super key of the target power supply equipment, and communicating with the target power supply equipment through the generated user key to finish the binding of the power supply equipment.
2. The method of claim 1, wherein the authenticating the device number and the super key of the power supply device to be authenticated comprises:
acquiring the equipment number of the power supply equipment to be authenticated, and if the equipment number of the power supply equipment to be authenticated is detected to be consistent with the equipment number of the target power supply equipment, successfully authenticating the equipment number of the power supply equipment to be authenticated;
encrypting an authentication message through the obtained super key of the target power supply equipment, and sending the authentication message to the power supply equipment to be authenticated;
and if the information that the power supply equipment to be authenticated successfully decrypts the authentication message through the super key of the power supply equipment to be authenticated is received, the super key of the power supply equipment to be authenticated is authenticated successfully.
3. The method of claim 1, wherein prior to generating a user key by the super key of the target power sourcing device, the method further comprises:
if the fact that the user key of the target power supply equipment is received is detected, generating the user key through the super key of the target power supply equipment, wherein the method comprises the following steps:
and generating user key modification information through the super key of the target power supply equipment, and modifying the received user key of the target power supply equipment.
4. The method of claim 3, wherein after modifying the user key that has received the target power supply device, the method further comprises:
and reporting the modified information to the server.
5. The method of claim 2, wherein the method further comprises:
and if the equipment number of the power supply equipment to be authenticated is not consistent with the equipment number of the target power supply equipment, or the power supply equipment to be authenticated does not successfully decrypt the authentication message through a super key, the power supply equipment to be authenticated fails to be authenticated.
6. A method of binding a power supply device, the method being performed by a power supply device, the method comprising:
sending the equipment number and the super key of the power supply equipment to the electric vehicle through a server side;
if the electric vehicle is detected to be accessed within a preset validity period, receiving an authentication request of the electric vehicle for the equipment number and the super key of the power supply equipment;
and if the authentication is successful, modifying the local user key through the super key of the power supply equipment so as to communicate with the electric vehicle through the modified user key to finish the binding with the electric vehicle.
7. The method of claim 6, wherein the receiving the request for authentication of the device number and the super key of the power supply device by the electric vehicle comprises:
acquiring an equipment number authentication request, and sending an equipment number to the electric vehicle for the electric vehicle to authenticate whether the equipment numbers are consistent, wherein if so, the equipment number authentication is successful;
and acquiring a super key authentication request, receiving an authentication message encrypted by the electric vehicle through the super key, and if decryption is completed through a local super key, sending information of successful decryption to the electric vehicle for the electric vehicle to determine that super key authentication is successful.
8. A binding apparatus for a power supply device, the apparatus being configured for an electric vehicle, the apparatus comprising:
the information acquisition module is used for receiving the equipment number and the super key of the target power supply equipment from the server side;
the power supply equipment authentication module is used for authenticating the equipment number and the super key of the power supply equipment to be authenticated if the power supply equipment to be authenticated is detected to be accessed within the preset validity period;
and the user key binding module is used for generating a user key through the super key of the target power supply equipment if the authentication is successful, so as to communicate with the target power supply equipment through the generated user key and finish the binding of the power supply equipment.
9. An apparatus for binding a power supply device, the apparatus being configured to the power supply device, the apparatus comprising:
the information sending module is used for sending the equipment number and the super key of the power supply equipment to the electric vehicle through the server side;
the authentication request receiving module is used for receiving an authentication request of the electric vehicle for the equipment number and the super key of the power supply equipment if the electric vehicle is detected to be accessed within a preset validity period;
and the user key modification module is used for modifying a local user key through the super key of the power supply equipment if the authentication is successful so as to communicate with the electric vehicle through the modified user key to finish the binding with the electric vehicle.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the binding method of the power supply apparatus according to any one of claims 1 to 5 or claims 6 to 7.
11. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the binding method of the power supply device according to any one of claims 1-5 or 6-7 when executing the computer program.
CN202010118700.6A 2020-02-26 2020-02-26 Binding method and device of power supply equipment, storage medium and equipment Pending CN111460427A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010118700.6A CN111460427A (en) 2020-02-26 2020-02-26 Binding method and device of power supply equipment, storage medium and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010118700.6A CN111460427A (en) 2020-02-26 2020-02-26 Binding method and device of power supply equipment, storage medium and equipment

Publications (1)

Publication Number Publication Date
CN111460427A true CN111460427A (en) 2020-07-28

Family

ID=71684170

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010118700.6A Pending CN111460427A (en) 2020-02-26 2020-02-26 Binding method and device of power supply equipment, storage medium and equipment

Country Status (1)

Country Link
CN (1) CN111460427A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113393115A (en) * 2021-06-10 2021-09-14 北京牛电信息技术有限责任公司 Method and device for determining battery theft, battery management system and storage medium
EP4340423A1 (en) * 2022-09-16 2024-03-20 STMicroelectronics (Rousset) SAS Pairing method between a host device and a peripheral device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150113599A1 (en) * 2013-10-17 2015-04-23 Arm Ip Limited Registry apparatus, agent device, application providing apparatus and corresponding methods
CN106060079A (en) * 2016-07-11 2016-10-26 顺丰科技有限公司 Unmanned aerial vehicle authentication system and method
CN107172074A (en) * 2017-06-26 2017-09-15 联动优势科技有限公司 A kind of method for sending information, processing method and processing device
CN109493488A (en) * 2018-11-23 2019-03-19 北京小米移动软件有限公司 Smart card authentication method, smart lock, smart card, system and device
WO2019134138A1 (en) * 2018-01-05 2019-07-11 深圳市大疆创新科技有限公司 Non-smart battery authentication method, device and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150113599A1 (en) * 2013-10-17 2015-04-23 Arm Ip Limited Registry apparatus, agent device, application providing apparatus and corresponding methods
CN106060079A (en) * 2016-07-11 2016-10-26 顺丰科技有限公司 Unmanned aerial vehicle authentication system and method
CN107172074A (en) * 2017-06-26 2017-09-15 联动优势科技有限公司 A kind of method for sending information, processing method and processing device
WO2019134138A1 (en) * 2018-01-05 2019-07-11 深圳市大疆创新科技有限公司 Non-smart battery authentication method, device and storage medium
CN109493488A (en) * 2018-11-23 2019-03-19 北京小米移动软件有限公司 Smart card authentication method, smart lock, smart card, system and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113393115A (en) * 2021-06-10 2021-09-14 北京牛电信息技术有限责任公司 Method and device for determining battery theft, battery management system and storage medium
EP4340423A1 (en) * 2022-09-16 2024-03-20 STMicroelectronics (Rousset) SAS Pairing method between a host device and a peripheral device
FR3139920A1 (en) * 2022-09-16 2024-03-22 Stmicroelectronics (Rousset) Sas Pairing method between a host device and a peripheral device

Similar Documents

Publication Publication Date Title
TWI779139B (en) Vehicle virtual key generation and use method, system and user terminal
CN105847282B (en) Vehicle control method, server and system
CN109895734B (en) Authorized Bluetooth key activation method and system, storage medium and T-BOX
WO2019212403A1 (en) Method for upgrading vehicle-mounted device, and related device
CN111325917B (en) Using method and device of sharing equipment, storage medium and equipment
CN109874125A (en) The car owner's authorization method and system of bluetooth key, storage medium and vehicle Cloud Server
JP5879451B1 (en) System and method for managing vehicles
CN111553667A (en) Transaction method, gateway device, payment platform, merchant device and transaction system
CN114299667B (en) Charging payment method and device for electric automobile
CN114710521B (en) Vehicle cloud platform architecture system and method for realizing vehicle-mounted software payment authorization
JP2002300152A (en) Communication security keeping method, its execution device, and its processing program
CN112597447A (en) Vehicle-mounted service authorization activation method and device and vehicle
CN111460427A (en) Binding method and device of power supply equipment, storage medium and equipment
CN115484025A (en) Vehicle encrypted communication method and device
CN111325879A (en) Vehicle remote control method and device, storage medium and equipment
JP2016208494A (en) System and method for managing vehicle
JP2013258491A (en) Car sharing system and car sharing provisioning method
CN113442870B (en) Method and device for deactivating vehicle-mounted unit, storage medium and terminal
CN113453223B (en) Key updating method, system, device, storage medium and terminal
CN108399544B (en) Method and device for auxiliary signing of block chain contract based on Internet of things
CN113194139A (en) Vehicle remote control method, device and system, electronic equipment and storage medium
CN111491272B (en) Vehicle unlocking method and system
CN112105000B (en) Method, apparatus and computer storage medium for authorizing a vehicle based on bluetooth
US20220289068A1 (en) Management device, management system, management method, and recording medium
CN117040724A (en) Digital key authorization method and device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination