CN112019326A - Vehicle charging safety management method and system - Google Patents

Vehicle charging safety management method and system Download PDF

Info

Publication number
CN112019326A
CN112019326A CN201910473145.6A CN201910473145A CN112019326A CN 112019326 A CN112019326 A CN 112019326A CN 201910473145 A CN201910473145 A CN 201910473145A CN 112019326 A CN112019326 A CN 112019326A
Authority
CN
China
Prior art keywords
vehicle management
charging
random number
charging pile
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910473145.6A
Other languages
Chinese (zh)
Other versions
CN112019326B (en
Inventor
马东辉
李剑刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing CHJ Automotive Information Technology Co Ltd
Original Assignee
Beijing CHJ Automotive Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing CHJ Automotive Information Technology Co Ltd filed Critical Beijing CHJ Automotive Information Technology Co Ltd
Priority to CN201910473145.6A priority Critical patent/CN112019326B/en
Publication of CN112019326A publication Critical patent/CN112019326A/en
Application granted granted Critical
Publication of CN112019326B publication Critical patent/CN112019326B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0872Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T10/00Road transport of goods or passengers
    • Y02T10/60Other road transportation technologies with climate change mitigation effect
    • Y02T10/70Energy storage systems for electromobility, e.g. batteries
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T90/00Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02T90/10Technologies relating to charging of electric vehicles
    • Y02T90/12Electric charging stations

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Power Engineering (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Charge And Discharge Circuits For Batteries Or The Like (AREA)
  • Electric Propulsion And Braking For Vehicles (AREA)

Abstract

The embodiment of the disclosure discloses a vehicle charging safety management method and system, and relates to the technical field of charging. The main technical scheme of the embodiment of the disclosure comprises the following steps: receiving charging code encrypted data and key data issued by a management platform; performing interactive verification with the charging pile when the connection with the charging pile is established; generating a random number for the currently connected vehicle management equipment side in the interactive verification process, sending the random number for the vehicle management equipment side to the charging pile, and obtaining the random number for the currently connected charging pile side sent by the charging pile in the interactive verification process; when the interactive verification passes, generating first interactive verification information based on the random number at the side of the vehicle management equipment and the random data at the side of the charging pile; and sending the charging code encrypted data and the key data encrypted by the first interactive verification information to the charging pile.

Description

Vehicle charging safety management method and system
Technical Field
The embodiment of the disclosure relates to the technical field of charging, in particular to a vehicle charging safety management method and system.
Background
With the development of electric vehicles, electric vehicles are more and more widely used in daily life. The charging pile is widely applied as an energy supply device of the electric automobile, so that people can timely utilize the charging pile to supply energy for the electric automobile.
At present, when the vehicle is charged by the charging pile, a user needs to use an electric card, and the card is swiped on the charging pile by the handheld electric card. When the charging pile identifies that the electric card is effective, unlocking and charging are carried out. The electric card is easy to be maliciously copied or maliciously attacked by the charging pile when being identified, and the safety is poor.
Disclosure of Invention
In view of this, embodiments of the present disclosure provide a vehicle charging safety management method and system, which mainly aim at improving the safety of a charging pile. The embodiment of the disclosure mainly provides the following technical scheme:
in a first aspect, an embodiment of the present disclosure provides a vehicle charging safety management method, which is applied to a vehicle management device, and includes:
receiving charging code encrypted data and key data issued by a management platform;
when the connection with the charging pile is established, performing interactive verification with the charging pile; generating a random number for the currently connected vehicle management equipment side in the interactive verification process, sending the random number for the vehicle management equipment side to the charging pile, and obtaining the random number for the currently connected charging pile side sent by the charging pile in the interactive verification process;
when the interactive verification passes, generating first interactive verification information based on the vehicle management equipment side random number and the charging pile side random data;
and sending the charging code encrypted data and the key data encrypted by the first interactive verification information to the charging pile.
In a second aspect, an embodiment of the present disclosure provides a vehicle charging safety management method, where the vehicle charging safety management method is applied to a charging pile, and the method includes:
when connection with a vehicle management device is established, interactive verification is carried out with the vehicle management device; generating a random number aiming at the charging pile side connected currently in the interactive verification process, sending the random number aiming at the charging pile side to the vehicle management equipment, and obtaining the random number aiming at the vehicle management equipment connected currently sent by the vehicle management equipment in the interactive verification process;
when the interactive verification passes, generating second interactive verification information based on the random number on the charging pile side and the random number on the vehicle management equipment side;
receiving charging code encrypted data and key data which are sent by the vehicle management equipment and encrypted by using first interactive verification information;
and verifying the charging code encrypted data and the key data encrypted by using the first interactive verification information by using the second interactive verification information, and unlocking the charging pile when the verification is passed to charge the vehicle corresponding to the vehicle management equipment.
In a third aspect, an embodiment of the present disclosure provides a vehicle charging safety management method, where the vehicle charging safety management method is applied to a management platform, and the method includes:
encrypting the charging code data based on the electric pile virtual key corresponding to the vehicle management equipment to obtain charging code encrypted data; different vehicle management devices correspond to different electric pile virtual keys;
signing the charging code encrypted data by using a preset management platform private key to obtain a charging code encrypted data signature;
signing a preset management platform public key by using a preset root private key to form a management platform public key signature;
taking the management platform public key, the management platform public key signature and the charging code encrypted data signature as the key data;
and issuing the charging code encrypted data and the key data to the vehicle management equipment.
In a fourth aspect, an embodiment of the present disclosure provides a vehicle management apparatus including:
the first receiving unit is used for receiving the charging code encrypted data and the key data issued by the management platform;
the first verification unit is used for performing interactive verification with the charging pile when connection is established with the charging pile; generating a random number for the currently connected vehicle management equipment side in the interactive verification process, sending the random number for the vehicle management equipment side to the charging pile, and obtaining the random number for the currently connected charging pile side sent by the charging pile in the interactive verification process;
a first generation unit, configured to generate first interactive verification information based on the vehicle management device side random number and the charging pile side random data when interactive verification passes;
and the sending unit is used for sending the charging code encrypted data and the key data encrypted by the first interactive verification information to the charging pile.
In a fifth aspect, an embodiment of the present disclosure provides a charging pile, including:
the second verification unit is used for performing interactive verification with the vehicle management equipment when connection with the vehicle management equipment is established; generating a random number aiming at the charging pile side connected currently in the interactive verification process, sending the random number aiming at the charging pile side to the vehicle management equipment, and receiving the random number aiming at the vehicle management equipment connected currently sent by the vehicle management equipment in the interactive verification process;
a second generation unit configured to generate second mutual authentication information based on the charging pile side random number and the vehicle management device side random number when the mutual authentication passes;
a second receiving unit configured to receive charge code encrypted data encrypted using the first mutual authentication information and key data transmitted by the vehicle management apparatus; the first interactive verification information is generated by the vehicle management device based on the vehicle management device side random number and the charging pile side random number;
and the unlocking unit is used for verifying the charging code encrypted data and the key data encrypted by using the first interactive verification information by using the second interactive verification information, and unlocking the charging pile when the verification is passed so as to charge the vehicle corresponding to the vehicle management equipment.
In a sixth aspect, an embodiment of the present disclosure provides a management platform, including:
the first generation unit is used for encrypting the charging code data based on the electric pile virtual key corresponding to the vehicle management equipment to obtain charging code encrypted data; different vehicle management devices correspond to different electric pile virtual keys;
the second generation unit is used for signing the charging code encrypted data by using a preset management platform private key to obtain a charging code encrypted data signature; signing a preset management platform public key by using a preset root private key to obtain a management platform public key signature; and taking the management platform public key, the management platform public key signature and the charging code encrypted data signature as the key data.
And the issuing unit is used for issuing the charging code encrypted data and the key data to the vehicle management equipment.
In a seventh aspect, an embodiment of the present disclosure provides a vehicle charging safety management system, including:
the vehicle management device of the fourth aspect, the charging pile of the fifth aspect, and the management platform of the sixth aspect.
In an eighth aspect, an embodiment of the present disclosure provides a vehicle including the vehicle management apparatus of the fourth aspect.
In a ninth aspect, an embodiment of the present disclosure provides a storage medium including a stored program, wherein when the program runs, a device where the storage medium is located is controlled to execute the vehicle charging safety management method according to the fourth aspect, the fifth aspect, or the sixth aspect.
In a tenth aspect, embodiments of the present disclosure provide a human-computer interaction device, the device comprising a storage medium; and one or more processors, the storage medium coupled with the processors, the processors configured to execute program instructions stored in the storage medium; the program instructions when executed perform the vehicle charging safety management method of the fourth aspect or the fifth aspect or the sixth aspect.
By means of the technical scheme, the vehicle charging safety management method and the vehicle charging safety management system provided by the embodiment of the disclosure carry out interactive verification on the vehicle management equipment and the charging pile when the vehicle management equipment is connected with the charging pile. And in the interactive verification process, the vehicle management equipment and the charging pile respectively generate random numbers aiming at the current connection and transmit the random numbers to the other side. And when the interactive verification passes, the vehicle management equipment and the charging pile respectively generate interactive verification information aiming at the current connection based on the random numbers of the two parties. And the vehicle management equipment sends the charging code encrypted data and the key data encrypted by the interactive verification information to the charging pile, so that the charging pile uses the interactive verification information generated by the charging pile to verify the charging code encrypted data and the key data to perform unlocking charging. Therefore, in the embodiment of the disclosure, the mutual authentication information is obtained by respectively generating random numbers for the current connection based on the vehicle management device and the charging pile, and the transmission of the charging code encrypted data and the key data between the vehicle management device and the charging pile is also completed based on the mutual authentication information for the current connection, so that the embodiment of the disclosure can improve the safety of the charging pile.
The foregoing description is only an overview of the embodiments of the present disclosure, and in order to make the technical means of the embodiments of the present disclosure more clearly understood, the embodiments of the present disclosure may be implemented in accordance with the content of the description, and in order to make the foregoing and other objects, features, and advantages of the embodiments of the present disclosure more clearly understood, the following detailed description of the embodiments of the present disclosure is given.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the embodiments of the present disclosure. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 shows a flowchart of a vehicle charging safety management method provided by an embodiment of the disclosure;
FIG. 2 is a flow chart illustrating another vehicle charging safety management method provided by an embodiment of the disclosure;
FIG. 3 is a flow chart illustrating a further method for managing vehicle charging safety provided by an embodiment of the present disclosure;
FIG. 4 is a flowchart illustrating a method for managing vehicle charging safety provided by an embodiment of the disclosure;
fig. 5 shows a block diagram of a vehicle management apparatus provided by an embodiment of the present disclosure;
fig. 6 shows a block diagram of another vehicle management apparatus provided by an embodiment of the present disclosure;
fig. 7 shows a block diagram of a charging pile according to an embodiment of the present disclosure;
fig. 8 shows a block diagram of another charging pile provided by the embodiment of the present disclosure;
FIG. 9 illustrates a block diagram of a management platform provided by an embodiment of the present disclosure;
FIG. 10 illustrates a block diagram of another management platform provided by embodiments of the present disclosure;
fig. 11 shows a block diagram of a vehicle charging safety management system provided by an embodiment of the present disclosure;
fig. 12 shows a block diagram of a vehicle according to an embodiment of the present disclosure.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
In a first aspect, an embodiment of the present disclosure provides a vehicle charging safety management method, which is applied to a vehicle management device, and as shown in fig. 1, the vehicle charging safety management method mainly includes:
101. and receiving the charging code encrypted data and the key data issued by the management platform.
In practical applications, the management platform may be, but is not limited to, a cloud platform. N (N is an integer greater than or equal to 1) charging codes are preset in the management platform, and the N charging codes are all charging codes which can be used for unlocking and charging of the charging pile. The charge code is a character string composed of at least one character of numbers, letters and symbols and having M (M is an integer greater than or equal to 1) characters. Alternatively, the string may include, but is not limited to, a JSON formatted string.
Specifically, the charge code encrypted data is obtained by encrypting the charge code data. The charge code data may be composed of a charge code, a time, and a random number. The charging code is selected for current issuing; the time is the time of the current issue; the random number is a random number generated for the current delivery. The method of random number generation may include, but is not limited to, any one of a monte carlo method, generation of U (0,1) random numbers, random numbers from U (0,1) to other probability distributions, and generation of normal random numbers. The following describes a case where the management platform obtains the charge code encrypted data:
s (S is an integer greater than or equal to 1) electric pile virtual keys are preset in the management platform and used for encrypting charging code data. The S electric pile virtual keys are respectively in one-to-one correspondence with the S vehicle management devices, and each vehicle management device is respectively provided with a vehicle identification code, so that the one-to-one correspondence relationship between the S electric pile virtual keys and the S vehicle management devices can be set by utilizing the vehicle identification codes. When charging code encrypted data need to be issued for the vehicle management equipment, the electric pile virtual key corresponding to the vehicle management equipment is inquired, and the charging code data are encrypted by using the inquired electric pile virtual key to obtain the charging code encrypted data which need to be issued to the vehicle management equipment.
Specifically, in order to improve the security of the data, the key data issued by the management platform needs to be received while the charging code encrypted data issued by the management platform is received. The key data may include, but is not limited to, a management platform public key signature, and a charge code encrypted data signature. The management platform public key signature is obtained by the management platform by signing a preset management platform public key by using a preset root private key; the charging code encrypted data signature is obtained by the management platform by signing the charging code encrypted data by using a preset management platform private key; the charging code encryption data are obtained by encrypting the management platform based on the electric pile virtual secret keys of the vehicle management equipment, and different vehicle management equipment corresponds to different electric pile virtual secret keys.
Specifically, in order to improve the security of the data, the charge code encryption data and the key data are generated when the charge code encryption data and the key data need to be issued to the vehicle management device. The method comprises the following steps of receiving charging code encrypted data and key data issued by a management platform under at least two conditions:
firstly, receiving charging code encrypted data and key data issued by a management platform in a preset issuing period. The issuing period is a period set by the dischargeable time of the battery in the vehicle, so that when the electric quantity of the battery is exhausted quickly or the electric quantity of the battery is smaller than a set electric quantity threshold value, the vehicle management equipment can receive the charging code encrypted data and the key data in time, and charging can be performed according to the charging code encrypted data and the key data in time.
And secondly, sending a charging code encrypted data acquisition request to a management platform, and receiving charging code encrypted data and key data which are sent by the management platform and aim at the charging code data acquisition request. That is, when there is a charging requirement, the management platform is required to issue the charging code encryption data and the key data. When a vehicle driver has a charging requirement or the vehicle management equipment monitors that the electric quantity of the vehicle is lower than a set threshold value, the vehicle driver can trigger the charging code encrypted data acquisition request to be sent to the management platform, so that the charging can be flexibly carried out on the basis of business requirements in time according to the charging code encrypted data and the secret key data.
102. When the connection with the charging pile is established, performing interactive verification with the charging pile; and generating a random number for the currently connected vehicle management equipment side in the interactive verification process, sending the random number for the vehicle management equipment side to the charging pile, and obtaining the random number for the currently connected charging pile side sent by the charging pile in the interactive verification process.
In practical applications, the vehicle management apparatus is provided in a vehicle, and one vehicle management apparatus is provided in one vehicle. The vehicle management equipment has a non-inductive mode, is paired with the charging pile through the non-inductive mode, and is connected with the charging pile after the pairing is successful. The non-inductive mode of the vehicle management device may include, but is not limited to, a bluetooth mode or a radio frequency mode. In practical applications, in order to enable the vehicle management device to successfully establish a connection with the charging pile, the non-inductive mode of the vehicle management device should be consistent with the non-inductive mode of the charging pile. Illustratively, the vehicle management device is in a bluetooth mode, and the charging pile is also a charging pile with the bluetooth mode. Then vehicle management equipment when starting the bluetooth mode, fill electric pile and can detect its vehicle management equipment of setting for the within range around through the bluetooth mode of self to pair and establish connection with vehicle management equipment when detecting vehicle management equipment.
Specifically, when the vehicle management device is connected with the charging pile, the vehicle management device and the charging pile can perform interactive verification through a preset vehicle management device public key, a preset vehicle management device private key (the private key corresponds to the vehicle management device public key) and a preset charging pile public key. It should be noted that, a preset vehicle management device public key, a preset charging pile public key and a charging pile private key corresponding to the preset charging pile public key also exist in the corresponding charging pile, so that the vehicle management device and the charging pile can be successfully interactively verified by using the public keys and the private keys.
In practical applications, the vehicle management apparatus side random number includes a first vehicle management apparatus side random number and a second vehicle management apparatus side random number. The first vehicle management device side random number and the second vehicle management side random number are generated at different verification nodes in a verification process. Specifically, generating a random number for a currently connected vehicle management device side in an interactive verification process, sending the random number for the vehicle management device side to a charging pile, and receiving the random number for the currently connected charging pile side sent by the charging pile in the interactive verification process, includes the following steps a1-a 5:
and A1, generating a random number aiming at the currently connected first vehicle management equipment side when the vehicle management equipment performs interactive verification with the charging pile.
Specifically, the first vehicle management device-side random number generation method may include, but is not limited to, any one of a monte carlo method, generation of a U (0,1) random number, generation of a random number from U (0,1) to other probability distributions, and generation of a normal random number.
And A2, sending the random number of the first vehicle management device side and the public key of the vehicle management device to the charging pile.
Specifically, the first vehicle management device side random number is a character string formed by combining at least one character of numbers, letters and symbols and having a set number of characters.
A3, receiving verification information fed back by the charging pile; and the verification information carries a charging pile public key and a charging pile side random number encrypted by using the vehicle management equipment public key.
Specifically, the verification information is fed back to the vehicle management device when the charging pile verifies that the public key of the vehicle management device passes. The random number on the charging pile side is formed by combining at least one character of numbers, letters and symbols and is provided with a character string with a set number of characters.
And A4, verifying the verification information by using a private key of the vehicle management equipment, obtaining a random number of the charging pile side sent by the charging pile when the verification is passed, and generating a random number of the second vehicle management equipment side aiming at the current connection.
Specifically, the process of verifying the verification information by using the private key of the vehicle management device includes: and decrypting the charging pile public key encrypted by the vehicle management equipment public key by using the vehicle management equipment private key, and comparing the charging pile public key with a charging pile public key preset in the vehicle management equipment when the charging pile public key is obtained through decryption. When the consistency is obtained through comparison, the verification is passed; if the inconsistency is compared, the verification is not passed.
Specifically, the second vehicle management device-side random number generation method may include, but is not limited to, any one of a monte carlo method, generation of a U (0,1) random number, generation of a random number from U (0,1) to other probability distributions, and generation of a normal random number. The second vehicle management device side random number is a character string in which at least one character of a number, a letter, and a symbol is combined, and which has a set number of characters.
And A5, sending the random number of the second vehicle management equipment side encrypted by using the charging pile public key to the charging pile.
Specifically, when receiving the second vehicle management device side random number encrypted by using the charging pile public key, the charging pile verifies the second vehicle management device side random number encrypted by using the charging pile public key, and obtains the second vehicle management device side random number when the verification is passed, so that the charging pile generates second interactive verification information by using the first vehicle management device side random number, the second vehicle management device side random number and the charging pile side random number.
103. And when the interactive verification passes, generating first interactive verification information based on the vehicle management equipment side random number and the charging pile side random data.
Specifically, the method for generating the first interactive verification information at least includes the following two methods:
firstly, splicing the random number at the vehicle management equipment side and the random number at the charging pile side to obtain first interactive verification information. It should be noted that the splicing order of the vehicle management device side random number and the charging pile side random number may be determined based on business requirements, for example, the vehicle management device side random number may be located before the charging pile side random number or located after the charging pile side random number during splicing. In addition, when the vehicle management device side random number includes the first vehicle management device side random number and the second vehicle management device side random number, the first vehicle management device side random number and the second vehicle management device side random number are spliced first (the first vehicle management device side random number may be located before the second vehicle management device side random number or located after the second vehicle management device side random number at the time of splicing), and then the spliced first vehicle management device side random number and the second vehicle management device side random number are spliced with the charging post side random number. For example, if the first vehicle management device side random number is 123BCD, the second vehicle management side random number is 789YHB, and the charging post side random data 456PKL, the first mutual authentication information is "123 BCD789YHB456 PKL".
And secondly, carrying out Hash operation on the random number at the vehicle management equipment side and the random number at the charging pile side to obtain first interactive verification information. In addition, when the vehicle management device side random number includes the first vehicle management device side random number and the second vehicle management device side random number, there are at least four cases in generating the first mutual authentication information: the first method is that a first vehicle management equipment side random number and a second vehicle management equipment side random number are spliced firstly, and then the first vehicle management equipment side random number and the second vehicle management equipment side random number after splicing are subjected to hash operation with a charging pile side random number; the second method is that the hash operation is firstly carried out on the random number at the side of the first vehicle management device and the random number at the side of the second vehicle management device, and then the hash operation result and the random number at the side of the charging pile are carried out; performing hash operation on the random number on the first vehicle management equipment side and the random number on the charging pile side, and then performing hash operation on the hash operation result and the random number on the second vehicle management equipment side; and fourthly, performing hash operation on the random number on the second vehicle management equipment side and the random number on the charging pile side, and then performing hash operation on the hash operation result and the random number on the first vehicle management equipment side. In the fifth method, the hash operation is performed on the first vehicle management device side random number, the second vehicle management device side random number, and the charging post side random number. For example, the first vehicle management device-side random number is 123392, the second vehicle management device-side random number is 239848, and the charging post-side random number is 324124, and the second mutual authentication information generated using the sha256 hash function for the first vehicle management device-side random number 123392, the second vehicle management device-side random number 239848, and the charging post-side random number 324124 is:
475025F51CB88D38C3FD15FCBEBA4E33BCF8ACD5173ACBED91439FFB0FA9D8B2
it should be noted that the first mutual authentication information is generated based on the vehicle management device side random number and the charging post side random number that are currently connected, and therefore the security protection effect of encrypting the charging code encrypted data and the key data based on the first mutual authentication information is excellent.
104. And sending the charging code encrypted data and the key data encrypted by the first interactive verification information to the charging pile.
Specifically, after the charging code encrypted data and the key data encrypted by the first mutual authentication information are sent to the charging pile, the charging pile verifies the charging code encrypted data and the key data encrypted by the first mutual authentication information by the second mutual authentication information. And unlocking when the charging pile verifies that the encrypted charging code encrypted data and the encrypted key data pass through by using the second interactive verification information, and charging the vehicle corresponding to the vehicle management equipment. The second interactive verification information is generated by the charging pile based on the vehicle management equipment side random number and the charging pile side random number.
Specifically, in order to be able to successfully verify the encrypted charge code encrypted data and the key data, the method of decrypting the data using the second mutual authentication information should correspond to the method of encrypting the data using the first mutual authentication information.
It should be noted that the first interactive verification information and the second interactive verification information are generated based on the random number on the vehicle management device side and the random number on the charging pile side which are currently connected, so that the transmission of the charging code encryption data and the key data between the vehicle management device and the charging pile is completed based on the first interactive verification information and the second interactive verification information, and the security protection effect is excellent.
According to the vehicle charging safety management method provided by the embodiment of the disclosure, when the vehicle management equipment is connected with the charging pile, the vehicle management equipment and the charging pile perform interactive verification. And in the interactive verification process, the vehicle management equipment and the charging pile respectively generate random numbers aiming at the current connection and transmit the random numbers to the other side. And when the interactive verification passes, the vehicle management equipment and the charging pile respectively generate interactive verification information aiming at the current connection based on the random numbers of the two parties. And the vehicle management equipment sends the charging code encrypted data and the key data encrypted by the interactive verification information to the charging pile, so that the charging pile uses the interactive verification information generated by the charging pile to verify the charging code encrypted data and the key data to perform unlocking charging. Therefore, in the embodiment of the disclosure, the mutual authentication information is obtained by respectively generating random numbers for the current connection based on the vehicle management device and the charging pile, and the transmission of the charging code encrypted data and the key data between the vehicle management device and the charging pile is also completed based on the mutual authentication information for the current connection, so that the embodiment of the disclosure can improve the safety of the charging pile.
In a second aspect, an embodiment of the present disclosure provides a vehicle charging safety management method, where the method is applied to a charging pile, and as shown in fig. 2, the vehicle charging safety management method mainly includes:
201. when connection with a vehicle management device is established, interactive verification is carried out with the vehicle management device; and generating a random number for the charging pile side connected at present in the interactive verification process, sending the random number for the charging pile side to the vehicle management equipment, and obtaining the random number for the vehicle management equipment connected at present sent by the vehicle management equipment in the interactive verification process.
Specifically, when the charging pile is connected with the vehicle management equipment, interactive verification can be performed on the charging pile through a preset charging pile public key, a preset vehicle management equipment public key and a preset charging pile private key. It should be noted that, a preset vehicle management device public key, a preset charging pile public key, and a vehicle management device private key corresponding to the preset vehicle management device public key also exist in the corresponding vehicle management device, so that the vehicle management device and the charging pile can be successfully interactively verified by using the public key and the private key.
In practical applications, the vehicle management apparatus side random number includes a first vehicle management apparatus side random number and a second vehicle management apparatus side random number. The first vehicle management device side random number, the second vehicle management side random number and the charging post side random number are generated by different verification nodes in the verification process. Specifically, the steps of generating a random number for a charging post side currently connected in an interactive verification process, transmitting the random number for the charging post side to the vehicle management device, and receiving the random number for the vehicle management device currently connected transmitted by the vehicle management device in the interactive verification process include the following steps B1-B5:
and B1, receiving the first vehicle management device side random number and the vehicle management device public key sent by the vehicle management device when the vehicle management device is interactively verified.
Specifically, the first vehicle management device side random number is generated when the vehicle management device performs interactive verification with the charging pile.
B2, verifying the public key of the vehicle management device, and generating the random number on the charging pile side when the verification is passed.
Specifically, the process of verifying the public key of the vehicle management device may be: comparing whether the public key of the vehicle management equipment is consistent with a public key of the vehicle management equipment preset in the charging pile; if yes, the check is passed; otherwise, the check fails.
Specifically, the method for generating the random number on the charging pile side may include, but is not limited to, any one of a monte carlo method, generation of a U (0,1) random number, generation of a random number from U (0,1) to other probability distributions, and generation of a normal random number. The random number on the charging pile side is formed by combining at least one character of numbers, letters and symbols and is provided with a character string with a set number of characters.
B3, sending verification information to the vehicle management equipment; and the verification information carries a charging pile public key and a charging pile side random number encrypted by using the vehicle management equipment public key.
And B4, receiving a second vehicle management device side random number which is sent by the vehicle management device and encrypted by using the charging pile public key.
Specifically, the second vehicle management device side random number is generated when the vehicle management device verifies that the verification information passes by using a vehicle management device private key.
And B5, decrypting the second vehicle management device side random number encrypted by using the charging pile public key by using the charging pile private key to obtain the second vehicle management device side random number.
202. And when the interactive verification passes, generating second interactive verification information based on the charging pile side random number and the vehicle management equipment side random number.
Specifically, when the interactive verification passes, it is indicated that the charging pile and the vehicle management device both agree that the identity of the other party is legal, the charging pile has successfully transmitted the random number on the charging pile side to the vehicle management device, and the vehicle management device has also successfully transmitted the random number on the vehicle management device side to the charging pile. At this time, the second mutual authentication information may be generated using the charging post side random number and the vehicle management device side random number so as to authenticate the charging code encrypted data encrypted using the first mutual authentication information and the key data transmitted by the vehicle management device using the second mutual authentication information, thereby unlocking the charging.
Specifically, the method for generating the second interactive verification information at least includes the following two methods:
first, splicing the random number at the vehicle management equipment side and the random number at the charging pile side to obtain second interactive verification information. It should be noted that the splicing order of the vehicle management device side random number and the charging pile side random number may be determined based on business requirements, for example, the vehicle management device side random number may be located before the charging pile side random number or located after the charging pile side random number during splicing. In addition, when the vehicle management device side random number includes the first vehicle management device side random number and the second vehicle management device side random number, the first vehicle management device side random number and the second vehicle management device side random number are spliced first (the first vehicle management device side random number may be located before the second vehicle management device side random number or located after the second vehicle management device side random number at the time of splicing), and then the spliced first vehicle management device side random number and the second vehicle management device side random number are spliced with the charging post side random number. For example, if the first vehicle management device side random number is 123BCD, the second vehicle management side random number is 789YHB, and the charging post side random data 456PKL is "456 PKL123BCD789 YHB".
And secondly, performing Hash operation on the random number at the vehicle management equipment side and the random number at the charging pile side to obtain second interactive verification information. In addition, when the vehicle management device side random number includes the first vehicle management device side random number and the second vehicle management device side random number, at least the following five cases exist when the second mutual authentication information is generated: the first method is that a first vehicle management equipment side random number and a second vehicle management equipment side random number are spliced firstly, and then the first vehicle management equipment side random number and the second vehicle management equipment side random number after splicing are subjected to hash operation with a charging pile side random number; the second method is that the hash operation is firstly carried out on the random number at the side of the first vehicle management device and the random number at the side of the second vehicle management device, and then the hash operation result and the random number at the side of the charging pile are carried out; performing hash operation on the random number on the first vehicle management equipment side and the random number on the charging pile side, and then performing hash operation on the hash operation result and the random number on the second vehicle management equipment side; and fourthly, performing hash operation on the random number on the second vehicle management equipment side and the random number on the charging pile side, and then performing hash operation on the hash operation result and the random number on the first vehicle management equipment side. In the fifth method, the hash operation is performed on the first vehicle management device side random number, the second vehicle management device side random number, and the charging post side random number. For example, the first vehicle management device-side random number is 123392, the second vehicle management device-side random number is 239848, and the charging post-side random number is 324124, and the second mutual authentication information generated by using the sha256 hash function for the first vehicle management device-side random number 123392, the second vehicle management device-side random number 239848, and the charging post-side random number 324124 is:
475025F51CB88D38C3FD15FCBEBA4E33BCF8ACD5173ACBED91439FFB0FA9D8B2
203. and receiving charging code encrypted data and key data which are sent by the vehicle management equipment and encrypted by using first mutual authentication information.
Specifically, the first interactive verification information is generated by the vehicle management device based on the random number on the side of the currently connected vehicle management device and the random number on the side of the charging pile, the charging code encrypted data and the key data encrypted by the first interactive verification information have excellent safety protection effect, and the probability of being stolen or maliciously modified in the process of sending data to the charging pile by the vehicle management device is low.
204. And verifying the charging code encrypted data and the key data encrypted by using the first interactive verification information by using the second interactive verification information, and unlocking the charging pile when the verification is passed to charge the vehicle corresponding to the vehicle management equipment.
Specifically, in order to be able to successfully verify the encrypted charge code encrypted data and the key data, the method of decrypting the data using the second mutual authentication information should correspond to the method of encrypting the data using the first mutual authentication information.
Specifically, the second interactive verification information is used for verifying encrypted charging code encryption data and key data, and the charging pile is unlocked when the verification is passed, so as to charge the vehicle corresponding to the vehicle management device, and the method includes the following steps C1-C2:
and C1, verifying the charging code encrypted data encrypted by the first interactive verification information and the key data by the second interactive verification information to obtain charging code encrypted data and key data.
C2, verifying the charge code encrypted data with the key data. And obtaining charging code data.
Specifically, the key data comprises a management platform public key, a management platform public key signature and a charging code encrypted data signature; the management platform public key signature is obtained by the management platform by signing a preset management platform public key by using a preset root private key; the charging code encrypted data signature is obtained by the management platform by signing the charging code encrypted data by using a preset management platform private key. The charging code encrypted data is obtained by encrypting the management platform based on the electric pile virtual secret key, and different vehicle management equipment corresponds to different electric pile virtual secret keys.
Specifically, verifying the charging code encrypted data by using the key data to obtain the charging code data includes: checking the management platform public key by using a preset root public key corresponding to the root private key, and checking the charging code encrypted data signature by using the management platform public key; and when the signature passes the verification, decrypting the charging code encrypted data by using the electric pile virtual key to obtain charging code data.
Specifically, the process of checking the public key of the management platform by using the preset root public key corresponding to the root private key comprises the following steps: and decrypting by using the root public key to obtain the abstract corresponding to the management platform public key, thereby proving that the charging code encrypted data is sent by the management platform. And obtaining the digest to be confirmed by using a Hash function on the management platform public key obtained by decryption. And comparing the decrypted abstract with the to-be-confirmed abstract, and if the two are the same, passing the verification.
Specifically, the process of verifying the signature of the encrypted data signature of the charging code by using the public key of the management platform comprises the following steps: and decrypting by using the public key of the management platform to obtain the digest corresponding to the charging code encrypted data, thereby proving that the charging code encrypted data is sent by the management platform, and obtaining the digest to be confirmed by using a Hash function on the charging code encrypted data obtained by decryption. And comparing the decrypted abstract with the to-be-confirmed abstract, and if the decrypted abstract and the to-be-confirmed abstract are the same, indicating that the charging code encrypted data is not modified, and passing the verification.
It should be noted that unlocking and charging can be performed only after the management platform public key signature and the charging code encrypted data signature are subjected to double verification. Therefore, multiple safety protection is carried out by adopting the multiple signature verification mode, so that the safety of data transmission is improved.
And C3, unlocking the charging pile based on the charging code data, and charging the vehicle corresponding to the vehicle management equipment.
According to the vehicle charging safety management method provided by the embodiment of the disclosure, when the vehicle management equipment is connected with the charging pile, the vehicle management equipment and the charging pile perform interactive verification. And in the interactive verification process, the vehicle management equipment and the charging pile respectively generate random numbers aiming at the current connection and transmit the random numbers to the other side. And when the interactive verification passes, the vehicle management equipment and the charging pile respectively generate interactive verification information aiming at the current connection based on the random numbers of the two parties. And the vehicle management equipment sends the charging code encrypted data and the key data encrypted by the interactive verification information to the charging pile, so that the charging pile uses the interactive verification information generated by the charging pile to verify the charging code encrypted data and the key data to perform unlocking charging. Therefore, in the embodiment of the disclosure, the mutual authentication information is obtained by respectively generating random numbers for the current connection based on the vehicle management device and the charging pile, and the transmission of the charging code encrypted data and the key data between the vehicle management device and the charging pile is also completed based on the mutual authentication information for the current connection, so that the embodiment of the disclosure can improve the safety of the charging pile.
In a third aspect, an embodiment of the present disclosure provides a vehicle charging safety management method, where the method is applied to a management platform, and as shown in fig. 3, the vehicle charging safety management method mainly includes:
301. encrypting the charging code data based on the electric pile virtual key corresponding to the vehicle management equipment to obtain charging code encrypted data; wherein, different vehicle management equipment correspond different electric pile virtual secret keys.
Specifically, the charge code data may be composed of a charge code, a time, and a random number. The charging code is selected for current issuing; the time is the time of the current issue; the random number is a random number generated for the current delivery. S electric pile virtual keys are preset in the management platform and used for encrypting charging code encrypted data. The S electric pile virtual keys are respectively in one-to-one correspondence with the S vehicle management devices, and each vehicle management device is respectively provided with a vehicle identification code, so that the one-to-one correspondence relationship between the S electric pile virtual keys and the S vehicle management devices can be set by utilizing the vehicle identification codes. When charging code encrypted data need to be issued for the vehicle management equipment, the electric pile virtual key corresponding to the vehicle management equipment is determined, and the charging code data are encrypted by using the determined electric pile virtual key to obtain the charging code encrypted data which need to be issued to the vehicle management equipment. It should be noted that, because the electric pile virtual keys corresponding to each vehicle management device are different, a malicious party needs to separately crack one by one during an attack, so that a large-scale attack of the malicious party can be prevented.
Specifically, the encryption of the electric pile virtual key encrypted charging code data based on the vehicle management device can be determined based on business requirements. Illustratively, the charging code data is encrypted by using a hash algorithm through a corresponding electric pile virtual key of the vehicle management device.
302. And signing the charging code encrypted data by using a preset management platform private key to obtain a charging code encrypted data signature.
Specifically, the process of signing the charging code encrypted data by using the preset management platform private key to form the charging code encrypted data signature may include, but is not limited to: generating an abstract of the charging code encrypted data by using a preset hash function; and encrypting the generated abstract by using a private key of the management platform to obtain a charging code encrypted data signature.
303. And signing the preset management platform public key by using the preset root private key to form a management platform public key signature.
Specifically, the process of signing the preset management platform public key by using the preset root private key to form the management platform public key signature may include, but is not limited to: generating an abstract of a management platform public key by using a preset hash function; and encrypting the generated abstract by using the root private key to obtain the public key signature of the management platform.
304. And taking the management platform public key, the management platform public key signature and the charging code encrypted data signature as the key data.
Specifically, after the charging code encrypted data signature and the management platform public key signature are obtained, the management platform public key signature and the charging code encrypted data signature are used as key data, so that when the charging pile receives the charging code encrypted data and the key data, the charging pile can perform unlocking and charging only after the management platform public key signature and the charging code encrypted data signature are subjected to double verification. Therefore, multiple safety protection is carried out by adopting the multiple signature verification mode, so that the safety of data transmission is improved.
305. And issuing the charging code encrypted data and the key data to the vehicle management equipment.
Specifically, the method for issuing the charge code encrypted data and the key data to the vehicle management device at least includes the following two methods:
first, the charging code encryption data and the key data are issued to the vehicle management device in a preset issuing cycle. When the method is adopted, the period is set according to the dischargeable time of the battery in the vehicle, so that the vehicle management equipment can timely receive the charging code encrypted data and the key data when the electric quantity of the battery is exhausted or is lower than a certain threshold value, and the charging is carried out according to the charging code encrypted data and the key data.
And secondly, when a charge code data acquisition request sent by the vehicle management equipment is received, the charge code encrypted data and the key data are issued to the vehicle management equipment. When the method is adopted, a vehicle driver can utilize a charging code acquisition request sent to a management platform by a vehicle management device when charging requirements exist or the vehicle management device monitors that the electric quantity of a vehicle battery is lower than a set threshold value, so that charging can be performed flexibly and timely according to charging code encryption data and secret key data based on business requirements.
It should be noted that, when the second method is adopted, in order to ensure that the charging code encrypted data and the key data are not stolen by a malicious party, when the charging code data acquisition request is received, at least the following three processes may be performed:
first, the identity of the vehicle management device is verified. And when the identity of the vehicle management equipment is verified to be legal, issuing charging code encrypted data and the key data to the vehicle management equipment.
Secondly, verifying the authority of the vehicle management device; and when the vehicle management equipment is verified to have the charging code encrypted data acquisition right, issuing the charging code encrypted data and the key data to the vehicle management equipment.
And thirdly, verifying the identity and the authority of the vehicle management equipment, and issuing the charging code encrypted data and the key data to the vehicle management equipment when the identity of the vehicle management equipment is verified to be legal and has the charging code encrypted data acquisition authority.
Specifically, the process of verifying the identity of the vehicle management device may include, but is not limited to: acquiring identity information of the vehicle management equipment, and judging whether the vehicle management equipment is registered in the management platform or not based on the identity information; and if the vehicle management equipment is judged to be registered, determining that the identity of the vehicle management equipment is legal. Alternatively, the identity information may be a vehicle identification code of the vehicle in which the vehicle management apparatus is located.
Specifically, the process of verifying the authority of the vehicle management device may include, but is not limited to, the following two:
firstly, determining the current time for receiving a charging code data acquisition request; inquiring whether a corresponding relation covering the current time and the current vehicle management equipment exists in the corresponding relation between the preset K time intervals and the P vehicle management equipment; if yes, verifying that the vehicle management equipment has the charging code encrypted data acquisition authority; if the charging code encryption data does not exist, the fact that the vehicle management equipment does not have the authority of obtaining the charging code encryption data currently is verified, and the management platform does not issue the charging code encryption data and the secret key data.
Secondly, the charging amount corresponding to the vehicle management device is inquired in the corresponding relation between the T charging amounts (which will change along with the change of the charging times of the vehicle in which the vehicle management device is located, and/or the charging amount will change along with the recharging amount corresponding to the vehicle in which the vehicle management device is located) and the P vehicle management devices. Judging whether the inquired charging amount is larger than a set amount threshold value or not; if so, verifying that the vehicle management equipment has the charging code encrypted data acquisition authority; and if not, sending a reminder of insufficient money to the vehicle management equipment so that the vehicle management equipment prompts a vehicle driver to recharge based on the reminder.
In the vehicle charging safety management method provided by the embodiment of the disclosure, the charging code encrypted data issued by the management platform to the vehicle management device is obtained by using the electric pile virtual key corresponding to the vehicle management device, and the key data issued by the management platform to the vehicle management device comprises a management platform public key, a management platform public key signature and a charging code encrypted data signature. Therefore, the security of the charging code encrypted data and the security of the key data are high, and therefore the security of the charging pile can be improved.
In a fourth aspect, an embodiment of the present disclosure provides a vehicle charging safety management method, where the method is applied to a vehicle charging safety management system including a vehicle management device, a charging pile, and a management platform, and the vehicle charging safety management method is described below with reference to fig. 4:
when the charging pile 12 establishes connection with the vehicle management device 11, the vehicle management device generates a first vehicle management device side random number for the current connection by using a preset random number generation method, and executes step 401 to send the first vehicle management device side random number (denoted by random number a in fig. 4) and a vehicle management device public key (denoted by SE _ pub in fig. 4) to the charging pile.
When the charging pile receives the random number A and the SE _ pub, executing a step 402 of checking the SE _ pub, wherein the checking process is to compare the SE _ pub preset by the charging pile with the received SE _ pub, and if the SE _ pub and the received SE _ pub are different, the checking is not passed, and the interactive verification process is ended; if the two are the same, the check is passed, and step 403 is executed to generate a random number (indicated as random number B in fig. 4) on the charging pile side. When the charging-pile-side random number is generated, step 404 is executed to encrypt the charging-pile-side random number and the charging-pile public key (denoted by Charge _ pub in fig. 4) using SE _ pub, and transmit the encrypted charging-pile-side random number and the encrypted charging-pile public key to the vehicle management device.
After the vehicle management device receives the encrypted random number of the charging pile side and the charging pile public key, step 405 is executed to verify the charging pile public key. The process of verifying the charging pile public key may include, but is not limited to: decrypting the encrypted random number on the charging pile side and the encrypted public key of the charging pile by using a private key of the vehicle management equipment to obtain the random number on the charging pile side and the public key of the charging pile; comparing the decrypted charging pile public key with a charging pile public key preset in the vehicle management equipment; and when the comparison result is different, the result shows that the attack by a malicious party is possible in the transmission process, and the interactive verification process is ended. If the comparison is the same, the verification is passed. When the verification passes, step 406 is executed to generate a second vehicle management device side random number (denoted by pre _ master _ key in fig. 4), and step 408 is executed to encrypt the pre _ master _ key using Charge _ pub and send the encrypted pre _ master _ key to the charging pile. And executing step 407 to generate first interactive verification information based on the first vehicle management device side random number, the second vehicle management device side random number and the charging pile side random number by using a preset interactive information generation method. It should be noted that the preset interactive information generation method needs to be the same as the charging pile generation method, so that the first interactive verification information is the same as the second verification information. Optionally, the interaction information generation method may include, but is not limited to, a hash algorithm.
And when the charging pile receives the second vehicle management equipment side random number encrypted by using the charging pile public key, the charging pile private key is used for decrypting to obtain the second vehicle management side random number. Then, step 409 is executed to generate second interactive verification information based on the first vehicle management device side random number, the second vehicle management device side random number, and the charging pile side random number by using a preset interactive information generation method. It should be noted that the preset mutual information generation method needs to be the same as the generation method used in the vehicle management apparatus in order to make the first mutual authentication information the same as the second authentication information. Optionally, the interaction information generation method may include, but is not limited to, a hash algorithm.
When the vehicle management device generates the first mutual authentication information, the vehicle management device executes step 410 to encrypt the charging code encryption data and the key data by using the first mutual authentication information, and sends the data to the charging pile. And when receiving the charging code encrypted data and the key data encrypted by the first interactive verification information, the charging pile verifies by using the second interactive verification information and carries out decryption charging when the verification is passed. Therefore, the first interactive verification information and the second interactive verification information are generated aiming at the current connection, so that the challenge to the attack of a malicious party is larger, and the security of data transmission is improved.
In a fifth aspect, an embodiment of the present disclosure provides a vehicle management apparatus, as illustrated in fig. 5, including:
a first receiving unit 51, configured to receive charging code encrypted data and key data sent by the management platform;
the first verification unit 52 is configured to perform interactive verification with the charging pile when a connection is established with the charging pile; generating a random number for the currently connected vehicle management equipment side in the interactive verification process, sending the random number for the vehicle management equipment side to the charging pile, and obtaining the random number for the currently connected charging pile side sent by the charging pile in the interactive verification process;
a first generating unit 53, configured to generate first mutual verification information based on the vehicle management device-side random number and the charging pile-side random data when mutual verification passes;
a sending unit 54, configured to send charging code encrypted data encrypted by using the first mutual authentication information and key data to the charging pile.
In some embodiments, as shown in fig. 6, the first verification unit 52 is configured to perform interactive verification with the charging pile based on a preset vehicle management device public key, a preset vehicle management device private key, and a preset charging pile public key.
In some embodiments, as shown in fig. 6, the vehicle management device side random number includes a first vehicle management device side random number and a second vehicle management device side random number; the first authentication unit 52 includes:
the first generation module 521 is configured to generate a random number for a currently connected first vehicle management device side when performing interactive verification with the charging pile;
a first sending module 522, configured to send the first vehicle management device side random number and the vehicle management device public key to the charging pile;
a first receiving module 523, configured to receive verification information fed back by the charging pile; the verification information carries a charging pile public key and a charging pile side random number encrypted by using the vehicle management equipment public key;
the second generating module 524 is configured to verify the verification information by using the vehicle management device private key, obtain a charging pile side random number sent by the charging pile when the verification is passed, and generate a second vehicle management device side random number for the current connection;
and a second sending module 525, configured to send charging code encrypted data and key data encrypted by using the first interactive verification information to the charging pile.
According to the vehicle management device provided by the embodiment of the disclosure, the mutual verification information is obtained by respectively generating random numbers for current connection based on the vehicle management device and the charging pile, and the transmission of the charging code encrypted data and the key data between the vehicle management device and the charging pile is also completed based on the mutual verification information for the current connection, so that the safety of the charging pile can be improved by the embodiment of the disclosure.
In some embodiments, the first interactive verification information is spliced by the vehicle management device side random number and the charging pile side random data;
or the first interactive verification information is obtained by performing hash operation on the vehicle management equipment side random number and the charging pile side random data.
In some embodiments, the charge code encryption data is obtained by encrypting charge code data; the charging code data comprises a charging code, time and a random number.
In some embodiments, the key data includes a management platform public key, a management platform public key signature, and a charge code encrypted data signature;
the management platform public key signature is obtained by the management platform by signing a preset management platform public key by using a preset root private key; the charging code encrypted data signature is obtained by the management platform by signing the charging code encrypted data by using a preset management platform private key; the charging code encryption data are obtained by encrypting the management platform based on the electric pile virtual secret key of the vehicle management equipment, and different vehicle management equipment corresponds to different electric pile virtual secret keys.
The vehicle management device provided by the embodiment of the fifth aspect may be configured to execute the vehicle charging safety management method provided by the embodiment of the first aspect, and the meanings and specific implementations of the related devices may be referred to in the description of the embodiment of the first aspect, and are not described in detail here.
In a sixth aspect, an embodiment of the present disclosure provides a charging pile, as shown in fig. 7, including:
a second authentication unit 61 configured to perform interactive authentication with a vehicle management apparatus when a connection is established with the vehicle management apparatus; generating a random number aiming at the charging pile side connected currently in the interactive verification process, sending the random number aiming at the charging pile side to the vehicle management equipment, and receiving the random number aiming at the vehicle management equipment connected currently sent by the vehicle management equipment in the interactive verification process;
a second generation unit 62 configured to generate second mutual authentication information based on the charging pile side random number and the vehicle management device side random number when the mutual authentication passes;
a second receiving unit 63 configured to receive the charge code encrypted data encrypted using the first mutual authentication information and the key data transmitted by the vehicle management apparatus; the first interactive verification information is generated by the vehicle management device based on the vehicle management device side random number and the charging pile side random number;
and an unlocking unit 64, configured to verify the charging code encrypted data and the key data encrypted by using the first interactive verification information by using the second interactive verification information, and unlock the charging pile when the verification passes, so as to charge the vehicle corresponding to the vehicle management device.
According to the charging pile provided by the embodiment of the disclosure, the mutual verification information is obtained by respectively generating random numbers for current connection based on the vehicle management equipment and the charging pile, and the transmission of the charging code encrypted data and the key data between the vehicle management equipment and the charging pile is also completed based on the mutual verification information for the current connection, so that the safety of the charging pile can be improved.
In some embodiments, as shown in fig. 8, the second verification unit 61 is configured to perform interactive verification with the vehicle management device based on a preset charging pile public key, a preset vehicle management device public key, and a preset charging pile private key.
In some embodiments, as shown in fig. 8, the vehicle management device side random number includes a first vehicle management device side random number and a second vehicle management device side random number; the second authentication unit 61 includes:
a fourth receiving module 611, configured to receive the first vehicle management device side random number and the vehicle management device public key sent by the vehicle management device when performing mutual authentication with the vehicle management device;
a third generating module 612, configured to verify the public key of the vehicle management device, and generate the random number at the charging pile side when the verification passes;
a third sending module 613, configured to send verification information to the vehicle management device; the verification information carries a charging pile public key and a charging pile side random number encrypted by using a vehicle management equipment public key;
a fifth receiving module 614, configured to receive a second vehicle management device side random number that is sent by the vehicle management device and encrypted by using the charging pile public key;
the decryption module 615 is configured to decrypt the second vehicle management device side random number encrypted by using the charging pile public key using the charging pile private key, so as to obtain the second vehicle management device side random number.
In some embodiments, as shown in fig. 8, the unlocking unit 64 includes:
a first verification module 641, configured to verify, by using the second mutual verification information, the charging code encrypted data and the key data encrypted by using the first mutual verification information, to obtain the charging code encrypted data and the key data;
the second verification module 642 is configured to verify the charging code encrypted data by using the key data to obtain charging code data;
an unlocking module 643, configured to unlock the charging pile based on the charging code data, and charge a vehicle corresponding to the vehicle management device.
In some embodiments, as shown in fig. 8, the key data includes a management platform public key, a management platform public key signature, and a charge code encrypted data signature;
the second verification module 642 is configured to verify the public key of the management platform by using a preset root public key, and verify the encrypted data signature of the charging code by using the public key of the management platform; and when the signature passes, decrypting the charging code encrypted data by using the electric pile virtual key corresponding to the vehicle management equipment to obtain the charging code data.
In some embodiments, the second interactive verification information is spliced by the vehicle management device side random number and the charging pile side random data;
or the second interactive verification information is obtained by performing hash operation on the vehicle management equipment side random number and the charging pile side random data.
The charging pile provided by the embodiment of the sixth aspect can be used to execute the vehicle charging safety management method provided by the embodiment of the second aspect, and the related meanings and specific implementation manners of the related applications can be referred to the related descriptions in the embodiment of the second aspect, and are not described in detail here.
In a seventh aspect, an embodiment of the present disclosure provides a management platform, as shown in fig. 9, the management platform includes:
the first generating unit 71 is configured to encrypt the charging code data based on the electric pile virtual key corresponding to the vehicle management device to obtain charging code encrypted data; different vehicle management devices correspond to different electric pile virtual keys;
a third generating unit 72, configured to sign the charging code encrypted data by using a preset management platform private key, so as to obtain a charging code encrypted data signature; signing a preset management platform public key by using a preset root private key to obtain a management platform public key signature; and taking the management platform public key, the management platform public key signature and the charging code encrypted data signature as the key data.
And an issuing unit 73 configured to issue the charge code encrypted data and the key data to the vehicle management apparatus.
In the management platform provided by the embodiment of the disclosure, the charging code encrypted data issued by the management platform to the vehicle management device is obtained by using the electric pile virtual key corresponding to the vehicle management device, and the key data issued by the management platform to the vehicle management device includes a management platform public key, a management platform public key signature and a charging code encrypted data signature. Therefore, the security of the charging code encrypted data and the security of the key data are high, and therefore the security of the charging pile can be improved.
In some embodiments, as shown in fig. 10, the issuing unit 73 includes:
a first issuing module 731, configured to issue the charge code encrypted data and the key data to the vehicle management device in a preset issuing cycle.
In some embodiments, as shown in fig. 10, the issuing unit 73 includes:
the second issuing module 732 is configured to issue the charge code encrypted data and the key data to the vehicle management device when receiving a charge code encrypted data acquisition request sent by the vehicle management device.
In some embodiments, as shown in figure 10,
the second issuing module 732 is further configured to verify the identity of the vehicle management device when the charge code data acquiring request is received; and when the identity of the vehicle management equipment is verified to be legal, the charging code encrypted data and the key data are issued to the vehicle management equipment.
Or the like, or, alternatively,
the second issuing module 732 is further configured to verify the authority of the vehicle management device when the charge code data acquisition request is received; when the vehicle management equipment is verified to have the charge code encrypted data acquisition right, issuing the charge code encrypted data and the key data to the vehicle management equipment;
or the like, or, alternatively,
a second issuing module 732, configured to verify the identity and authority of the vehicle management device; and when the identity of the vehicle management equipment is verified to be legal and the vehicle management equipment has the charge code encrypted data acquisition right, issuing the charge code encrypted data and the secret key data to the vehicle management equipment.
The charging pile provided by the embodiment of the seventh aspect may be used to execute the vehicle charging safety management method provided by the embodiment of the third aspect, and the related meanings and specific implementation manners of the related applications may be referred to in the description of the embodiment of the third aspect, and are not described in detail here.
In an eighth aspect, an embodiment of the present disclosure provides a vehicle charging safety management system, as shown in fig. 11, including:
a vehicle management apparatus 81 according to the fifth aspect, a charging pile 82 according to the sixth aspect, and a management platform 83 according to the seventh aspect.
The vehicle charging safety management system provided by the embodiment of the disclosure carries out interactive verification on the vehicle management equipment and the charging pile when the vehicle management equipment is connected with the charging pile. And in the interactive verification process, the vehicle management equipment and the charging pile respectively generate random numbers aiming at the current connection and transmit the random numbers to the other side. And when the interactive verification passes, the vehicle management equipment and the charging pile respectively generate interactive verification information aiming at the current connection based on the random numbers of the two parties. And the vehicle management equipment sends the charging code encrypted data and the key data encrypted by the interactive verification information to the charging pile, so that the charging pile uses the interactive verification information generated by the charging pile to verify the charging code encrypted data and the key data to perform unlocking charging. Therefore, in the embodiment of the disclosure, the mutual authentication information is obtained by respectively generating random numbers for the current connection based on the vehicle management device and the charging pile, and the transmission of the charging code encrypted data and the key data between the vehicle management device and the charging pile is also completed based on the mutual authentication information for the current connection, so that the embodiment of the disclosure can improve the safety of the charging pile.
In some embodiments, the management platform 83 is configured to issue charge code encryption data and key data to the vehicle management device 81;
the vehicle management device 81 is configured to perform interactive verification with the charging pile 82 when connection is established with the charging pile 82, and generate first interactive verification information for current connection when the interactive verification is passed; sending charging code encrypted data and key data encrypted by the first interactive verification information to the charging pile 82;
the charging pile 82 is configured to perform interactive verification with the vehicle management device 81 when the connection with the vehicle management device 81 is established, and generate second interactive verification information for the current connection when the interactive verification is passed; and verifying the encrypted charging code encrypted data and the key data sent by the vehicle management device 81 by using the second interactive verification information, and unlocking the vehicle management device 81 when the verification is passed, so as to charge the vehicle corresponding to the vehicle management device 81.
The vehicle charging safety management system provided by the embodiment of the eighth aspect may be configured to execute the vehicle charging safety management methods provided by the embodiments of the first aspect, the second aspect and the third aspect, and the meanings and specific implementations related to the vehicle charging safety management system may be referred to in the description of the embodiments of the first aspect, the second aspect and the third aspect, and will not be described in detail herein.
In a ninth aspect, embodiments of the present disclosure provide a vehicle including: the vehicle management apparatus 91 according to the fifth aspect described above.
In some embodiments, as shown in fig. 12, the vehicle further comprises a reminder unit 92;
the vehicle management device 91 is further configured to receive a decryption charging notification fed back by a charging pile, where the decryption charging notification is fed back when the charging pile succeeds in decryption and charging of the encrypted charging code encrypted data and the key data sent by the vehicle management device 91;
the reminding unit 92 is configured to issue a chargeable reminder for the charging pile based on the decrypted charging notification.
Specifically, the reminding unit may be a display device having characters or pictures displayed thereon or a playing device having sounds played thereon. When the reminding unit sends the chargeable reminding aiming at the charging pile, a driver of the vehicle can establish charging connection according to the charging pile corresponding to the vehicle and the chargeable reminding so as to charge the vehicle.
The mutual verification information in the vehicle is generated according to the current connection, and the charging code encrypted data and the key data are transmitted between the vehicle management device and the charging pile based on the mutual verification information according to the current connection, so that the safety of the charging pile can be improved according to the embodiment of the disclosure.
The vehicle provided by the embodiment of the ninth aspect may be used to execute the vehicle charging safety management method provided by the embodiment of the first aspect, and the related meanings and specific implementation manners may be referred to in the description of the embodiment of the first aspect, and will not be described in detail herein.
In a tenth aspect, an embodiment of the present disclosure provides a storage medium, where the storage medium includes a stored program, where, when the program runs, a device where the storage medium is located is controlled to execute the vehicle charging safety management method according to the first aspect, the second aspect, or the third aspect.
The storage medium may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip.
In an eleventh aspect, embodiments of the present disclosure provide a human-computer interaction device, which includes a storage medium; and one or more processors, the storage medium coupled with the processors, the processors configured to execute program instructions stored in the storage medium; the program instructions when executed perform the vehicle charging safety management method of the first aspect, the second aspect, or the third aspect.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, embodiments of the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the disclosure. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, embodiments of the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (25)

1. A vehicle charging safety management method is applied to a vehicle management device, and comprises the following steps:
receiving charging code encrypted data and key data issued by a management platform;
when the connection with the charging pile is established, performing interactive verification with the charging pile; generating a random number for the currently connected vehicle management equipment side in the interactive verification process, sending the random number for the vehicle management equipment side to the charging pile, and obtaining the random number for the currently connected charging pile side sent by the charging pile in the interactive verification process;
when the interactive verification passes, generating first interactive verification information based on the vehicle management equipment side random number and the charging pile side random data;
and sending the charging code encrypted data and the key data encrypted by the first interactive verification information to the charging pile.
2. The method of claim 1, wherein the interactively verifying with the charging post comprises:
and performing interactive verification with the charging pile based on a preset vehicle management equipment public key, a preset vehicle management equipment private key and a preset charging pile public key.
3. The method according to claim 2, wherein the vehicle management device-side random number includes a first vehicle management device-side random number and a second vehicle management device-side random number;
the steps of generating a random number for a vehicle management device side connected at present in the interactive verification process, sending the random number for the vehicle management device side to a charging pile, and obtaining the random number for a charging pile side connected at present sent by the charging pile in the interactive verification process include:
generating a random number for a first vehicle management device side which is connected currently when the vehicle management device is interactively verified with the charging pile;
sending the random number of the first vehicle management equipment side and the public key of the vehicle management equipment to the charging pile;
receiving verification information fed back by the charging pile; the verification information carries a charging pile public key and a charging pile side random number encrypted by using the vehicle management equipment public key;
verifying the verification information by using the private key of the vehicle management equipment, obtaining a random number on the charging pile side sent by the charging pile when the verification is passed, and generating a random number on the second vehicle management equipment side aiming at the current connection;
and sending the random number of the second vehicle management equipment side encrypted by using the charging pile public key to the charging pile.
4. The method according to any one of claims 1 to 3, wherein the first mutual authentication information is spliced by the vehicle management device side random number and the charging pile side random data;
or the first interactive verification information is obtained by performing hash operation on the vehicle management equipment side random number and the charging pile side random data.
5. The method according to any one of claims 1-3, wherein the charge code encryption data is obtained by encrypting charge code data; the charging code data comprises a charging code, time and a random number.
6. The method according to any one of claims 1-3, wherein the key data comprises a management platform public key, a management platform public key signature, and a charging code encrypted data signature.
7. A vehicle charging safety management method is applied to a charging pile, and comprises the following steps:
when connection with a vehicle management device is established, interactive verification is carried out with the vehicle management device; generating a random number aiming at the charging pile side connected currently in the interactive verification process, sending the random number aiming at the charging pile side to the vehicle management equipment, and obtaining the random number aiming at the vehicle management equipment connected currently sent by the vehicle management equipment in the interactive verification process;
when the interactive verification passes, generating second interactive verification information based on the random number on the charging pile side and the random number on the vehicle management equipment side;
receiving charging code encrypted data and key data which are sent by the vehicle management equipment and encrypted by using first interactive verification information;
and verifying the charging code encrypted data and the key data encrypted by using the first interactive verification information by using the second interactive verification information, and unlocking the charging pile when the verification is passed to charge the vehicle corresponding to the vehicle management equipment.
8. The method of claim 7, wherein the interactively verifying with the vehicle management device comprises:
and performing interactive verification with the vehicle management equipment based on a preset charging pile public key, a preset vehicle management equipment public key and a preset charging pile private key.
9. The method according to claim 8, wherein the vehicle management device-side random number includes a first vehicle management device-side random number and a second vehicle management device-side random number;
the generating a random number for a charging pile side connected at present in the interactive verification process, sending the random number for the charging pile side to the vehicle management device, and obtaining the random number for the vehicle management device connected at present sent by the vehicle management device in the interactive verification process include:
receiving a first vehicle management device side random number and a vehicle management device public key which are sent by the vehicle management device when the vehicle management device is interactively verified;
verifying the public key of the vehicle management equipment, and generating a random number at the charging pile side when the verification is passed;
sending verification information to the vehicle management equipment; the verification information carries a charging pile public key and a charging pile side random number encrypted by using a vehicle management equipment public key;
receiving a second vehicle management equipment side random number which is sent by the vehicle management equipment and encrypted by using a charging pile public key;
and decrypting the second vehicle management equipment side random number encrypted by using the charging pile public key by using the charging pile private key to obtain the second vehicle management equipment side random number.
10. The method of claim 7, wherein the verifying the charging code encrypted data and the key data encrypted by using the first interactive verification information by using the second interactive verification information, and unlocking the charging post to charge the vehicle corresponding to the vehicle management device when the verification is passed comprises:
verifying the charging code encrypted data and the key data encrypted by using the first interactive verification information by using the second interactive verification information to obtain the charging code encrypted data and the key data;
verifying the charging code encrypted data by using the key data to obtain charging code data;
and unlocking the charging pile based on the charging code data to charge the vehicle corresponding to the vehicle management equipment.
11. The method of claim 10, wherein the key data comprises a management platform public key, a management platform public key signature, and a charge code encrypted data signature; the verifying the charging code encrypted data by using the key data to obtain charging code data comprises:
verifying the management platform public key by using a preset root public key, and verifying the charging code encrypted data signature by using the management platform public key;
and when the signature passes, decrypting the charging code encrypted data by using the electric pile virtual key corresponding to the vehicle management equipment to obtain the charging code data.
12. The method according to any one of claims 7 to 11, wherein the second mutual authentication information is spliced by the vehicle management device-side random number and the charging post-side random data;
or the second interactive verification information is obtained by performing hash operation on the vehicle management equipment side random number and the charging pile side random data.
13. A vehicle charging safety management method is applied to a management platform and comprises the following steps:
based on the electric pile virtual key corresponding to the vehicle management equipment, the charging code data are encrypted to obtain charging code encrypted data; different vehicle management devices correspond to different electric pile virtual keys;
signing the charging code encrypted data by using a preset management platform private key to obtain a charging code encrypted data signature;
signing a preset management platform public key by using a preset root private key to obtain a management platform public key signature;
taking the management platform public key, the management platform public key signature and the charging code encrypted data signature as the key data;
and issuing the charging code encrypted data and the key data to the vehicle management equipment.
14. The method of claim 13, wherein the issuing the charge code encryption data and the key data to the vehicle management device comprises:
and issuing the charging code encrypted data and the key data to the vehicle management equipment in a preset issuing period.
15. The method of claim 13, wherein the issuing the charge code encryption data and the key data to the vehicle management device comprises:
and when a charging code encrypted data acquisition request sent by the vehicle management equipment is received, issuing the charging code encrypted data and the key data to the vehicle management equipment.
16. The method of claim 15, further comprising:
verifying an identity of the vehicle management device;
when the identity of the vehicle management equipment is verified to be legal, the charging code encrypted data and the key data are issued to the vehicle management equipment;
alternatively, the first and second electrodes may be,
verifying the authority of the vehicle management device;
when the vehicle management equipment is verified to have the charge code encrypted data acquisition right, issuing the charge code encrypted data and the key data to the vehicle management equipment;
alternatively, the first and second electrodes may be,
verifying the identity and authority of the vehicle management device;
and when the identity of the vehicle management equipment is verified to be legal and the vehicle management equipment has the charge code encrypted data acquisition right, issuing the charge code encrypted data and the secret key data to the vehicle management equipment.
17. A vehicle management apparatus characterized by comprising:
the first receiving unit is used for receiving the charging code encrypted data and the key data issued by the management platform;
the first verification unit is used for performing interactive verification with the charging pile when connection is established with the charging pile; generating a random number for the currently connected vehicle management equipment side in the interactive verification process, sending the random number for the vehicle management equipment side to the charging pile, and obtaining the random number for the currently connected charging pile side sent by the charging pile in the interactive verification process;
a first generation unit, configured to generate first interactive verification information based on the vehicle management device side random number and the charging pile side random data when interactive verification passes;
and the sending unit is used for sending the charging code encrypted data and the key data encrypted by the first interactive verification information to the charging pile.
18. A charging pile, characterized in that, should fill electric pile and include:
the second verification unit is used for performing interactive verification with the vehicle management equipment when connection with the vehicle management equipment is established; generating a random number aiming at the charging pile side connected currently in the interactive verification process, sending the random number aiming at the charging pile side to the vehicle management equipment, and receiving the random number aiming at the vehicle management equipment connected currently sent by the vehicle management equipment in the interactive verification process;
a second generation unit configured to generate second mutual authentication information based on the charging pile side random number and the vehicle management device side random number when the mutual authentication passes;
a second receiving unit configured to receive charge code encrypted data encrypted using the first mutual authentication information and key data transmitted by the vehicle management apparatus;
and the unlocking unit is used for verifying the charging code encrypted data and the key data encrypted by using the first interactive verification information by using the second interactive verification information, and unlocking the charging pile when the verification is passed so as to charge the vehicle corresponding to the vehicle management equipment.
19. A management platform, comprising:
the first generation unit is used for encrypting the charging code data based on the electric pile virtual key corresponding to the vehicle management equipment to obtain charging code encrypted data; different vehicle management devices correspond to different electric pile virtual keys;
the second generation unit is used for signing the charging code encrypted data by using a preset management platform private key to obtain a charging code encrypted data signature; signing a preset management platform public key by using a preset root private key to obtain a management platform public key signature; taking the management platform public key, the management platform public key signature and the charging code encrypted data signature as the key data;
and the issuing unit is used for issuing the charging code encrypted data and the key data to the vehicle management equipment.
20. A vehicle charging safety management system, characterized by comprising: the vehicle management device of claim 17, the charging post of claim 18, and the management platform of claim 19.
21. The vehicle charging security management system of claim 20,
the management platform is used for issuing charging code encrypted data and key data to the vehicle management equipment;
the vehicle management equipment is used for performing interactive verification with a charging pile when the vehicle management equipment is connected with the charging pile, and generating first interactive verification information aiming at the current connection when the interactive verification is passed; sending charging code encrypted data and key data encrypted by the first interactive verification information to the charging pile;
the charging pile is used for performing interactive verification with the vehicle management equipment when the charging pile is connected with the vehicle management equipment, and generating second interactive verification information aiming at the current connection when the interactive verification is passed; and verifying the encrypted charging code encrypted data and the key data sent by the vehicle management equipment by using the second interactive verification information, and unlocking when the verification is passed to charge the vehicle corresponding to the vehicle management equipment.
22. A vehicle, characterized in that the vehicle comprises: the vehicle management apparatus of claim 17.
23. The vehicle of claim 22, further comprising a reminder unit;
the vehicle management equipment is further used for receiving a decryption charging notification fed back by a charging pile, wherein the decryption charging notification is fed back when the charging pile successfully decrypts and charges the encrypted charging code encrypted data and the key data sent by the vehicle management equipment;
and the reminding unit is used for sending a chargeable reminding aiming at the charging pile based on the decrypted charging notice.
24. A storage medium characterized by comprising a stored program, wherein a device on which the storage medium is located is controlled to execute the vehicle charging safety management method according to any one of claims 1 to 6, claims 7 to 12, and claims 13 to 16 when the program is executed.
25. A human-computer interaction device, characterized in that the device comprises a storage medium; and one or more processors, the storage medium coupled with the processors, the processors configured to execute program instructions stored in the storage medium; the program instructions when executed perform the vehicle charging safety management method of any of claims 1-6, claims 7-12, and claims 13-16.
CN201910473145.6A 2019-05-31 2019-05-31 Vehicle charging safety management method and system Active CN112019326B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910473145.6A CN112019326B (en) 2019-05-31 2019-05-31 Vehicle charging safety management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910473145.6A CN112019326B (en) 2019-05-31 2019-05-31 Vehicle charging safety management method and system

Publications (2)

Publication Number Publication Date
CN112019326A true CN112019326A (en) 2020-12-01
CN112019326B CN112019326B (en) 2024-04-16

Family

ID=73507186

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910473145.6A Active CN112019326B (en) 2019-05-31 2019-05-31 Vehicle charging safety management method and system

Country Status (1)

Country Link
CN (1) CN112019326B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113492705A (en) * 2021-07-14 2021-10-12 福建星云电子股份有限公司 Noninductive charging method for charging pile
CN114173329A (en) * 2021-12-13 2022-03-11 国网河北省电力有限公司电力科学研究院 Charging pile control method
CN114394026A (en) * 2021-12-21 2022-04-26 中汽创智科技有限公司 Electric vehicle charging method, system and device, charging pile and storage medium
WO2023051467A1 (en) * 2021-09-30 2023-04-06 北京罗克维尔斯科技有限公司 Charging data sending and receiving method, charging data sending and receiving apparatus, charging pile, and vehicle terminal
CN117349812A (en) * 2023-10-20 2024-01-05 国网湖北省电力有限公司 Charging management method, system and storage medium based on edge calculation

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104519488A (en) * 2013-09-27 2015-04-15 中兴通讯股份有限公司 Vehicle charging equipment and service network interaction method and corresponding equipment
CN105186605A (en) * 2015-08-25 2015-12-23 国网北京市电力公司 Charging system for electric car
CN106330444A (en) * 2015-06-19 2017-01-11 中兴新能源汽车有限责任公司 Electric vehicle authentication method and device
CN106375287A (en) * 2016-08-30 2017-02-01 上海电享信息科技有限公司 Charging method for new energy automobile
CN106652182A (en) * 2016-12-28 2017-05-10 深圳市盛弘电气股份有限公司 Charging card management system and method
CN106785146A (en) * 2017-02-09 2017-05-31 山东鲁能智能技术有限公司 The charging method and system of the electric automobile charging pile with bluetooth
CN108540479A (en) * 2018-04-17 2018-09-14 泰州市艾瑞克新型材料有限公司 Intelligent charging spot management system based on Cloud Server and its working method
CN108933659A (en) * 2017-05-26 2018-12-04 全球能源互联网研究院 A kind of authentication system and verification method of smart grid
US20180345810A1 (en) * 2017-06-02 2018-12-06 United Arab Emirates University Secure charging method for electric vehicles
CN109795359A (en) * 2019-01-11 2019-05-24 广州小鹏汽车科技有限公司 A kind of charging method for authenticating, device, system and charging system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104519488A (en) * 2013-09-27 2015-04-15 中兴通讯股份有限公司 Vehicle charging equipment and service network interaction method and corresponding equipment
CN106330444A (en) * 2015-06-19 2017-01-11 中兴新能源汽车有限责任公司 Electric vehicle authentication method and device
CN105186605A (en) * 2015-08-25 2015-12-23 国网北京市电力公司 Charging system for electric car
CN106375287A (en) * 2016-08-30 2017-02-01 上海电享信息科技有限公司 Charging method for new energy automobile
CN106652182A (en) * 2016-12-28 2017-05-10 深圳市盛弘电气股份有限公司 Charging card management system and method
CN106785146A (en) * 2017-02-09 2017-05-31 山东鲁能智能技术有限公司 The charging method and system of the electric automobile charging pile with bluetooth
CN108933659A (en) * 2017-05-26 2018-12-04 全球能源互联网研究院 A kind of authentication system and verification method of smart grid
US20180345810A1 (en) * 2017-06-02 2018-12-06 United Arab Emirates University Secure charging method for electric vehicles
CN108540479A (en) * 2018-04-17 2018-09-14 泰州市艾瑞克新型材料有限公司 Intelligent charging spot management system based on Cloud Server and its working method
CN109795359A (en) * 2019-01-11 2019-05-24 广州小鹏汽车科技有限公司 A kind of charging method for authenticating, device, system and charging system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王东军;林晓焕;郑心心;: "充电桩状态实时监控系统与C/S框架设计", 电脑知识与技术, no. 33 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113492705A (en) * 2021-07-14 2021-10-12 福建星云电子股份有限公司 Noninductive charging method for charging pile
CN113492705B (en) * 2021-07-14 2023-01-10 福建星云电子股份有限公司 Noninductive charging method for charging pile
WO2023051467A1 (en) * 2021-09-30 2023-04-06 北京罗克维尔斯科技有限公司 Charging data sending and receiving method, charging data sending and receiving apparatus, charging pile, and vehicle terminal
CN114173329A (en) * 2021-12-13 2022-03-11 国网河北省电力有限公司电力科学研究院 Charging pile control method
CN114173329B (en) * 2021-12-13 2024-01-23 国网河北省电力有限公司电力科学研究院 Charging pile control method
CN114394026A (en) * 2021-12-21 2022-04-26 中汽创智科技有限公司 Electric vehicle charging method, system and device, charging pile and storage medium
CN117349812A (en) * 2023-10-20 2024-01-05 国网湖北省电力有限公司 Charging management method, system and storage medium based on edge calculation

Also Published As

Publication number Publication date
CN112019326B (en) 2024-04-16

Similar Documents

Publication Publication Date Title
CN112019326B (en) Vehicle charging safety management method and system
EP2291787B1 (en) Techniques for ensuring authentication and integrity of communications
US20190007215A1 (en) In-vehicle information communication system and authentication method
US9742565B2 (en) Method and system for backing up private key of electronic signature token
CN103095456A (en) Method and system for processing transaction messages
CN103078742B (en) Generation method and system of digital certificate
US20140089670A1 (en) Unique code in message for signature generation in asymmetric cryptographic device
CN103503366A (en) Managing data for authentication devices
EP3001599B1 (en) Method and system for backing up private key of electronic signature token
CN103067160A (en) Method and system of generation of dynamic encrypt key of encryption secure digital memory card (SD)
CN109918888B (en) Anti-quantum certificate issuing method and issuing system based on public key pool
CN109711841B (en) Data transaction method and system, platform and storage medium
CN103905204A (en) Data transmission method and transmission system
CN112241527B (en) Secret key generation method and system of terminal equipment of Internet of things and electronic equipment
CN101944170A (en) Method, system and device for issuing software version
CN101771680B (en) Method for writing data to smart card, system and remote writing-card terminal
CN111814132B (en) Security authentication method and device, security authentication chip and storage medium
CN113378119B (en) Software authorization method, device, equipment and storage medium
CN110912864A (en) Electric equipment, charging equipment and identity authentication method thereof
CN104868998A (en) System, Device, And Method Of Provisioning Cryptographic Data To Electronic Devices
CN104579659A (en) Device for safety information interaction
CN112583595B (en) Vehicle charging safety management method
CN116506134B (en) Digital certificate management method, device, equipment, system and readable storage medium
CN103592927A (en) Method for binding product server and service function through license
CN111934862B (en) Server access method and device, readable medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant