CN112035856A - V2G charging and discharging information processing method based on block chain technology - Google Patents
V2G charging and discharging information processing method based on block chain technology Download PDFInfo
- Publication number
- CN112035856A CN112035856A CN202010845491.5A CN202010845491A CN112035856A CN 112035856 A CN112035856 A CN 112035856A CN 202010845491 A CN202010845491 A CN 202010845491A CN 112035856 A CN112035856 A CN 112035856A
- Authority
- CN
- China
- Prior art keywords
- information
- charging
- vehicle
- discharging
- block
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W56/00—Synchronisation arrangements
- H04W56/001—Synchronization between nodes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2151—Time stamp
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Computing Systems (AREA)
- Data Mining & Analysis (AREA)
- Devices For Checking Fares Or Tickets At Control Points (AREA)
- Traffic Control Systems (AREA)
Abstract
The invention discloses a V2G charge-discharge information processing method based on a block chain technology, which comprises the following steps: designing a vehicle charging and discharging information block chain, wherein the vehicle charging and discharging information block chain comprises a message header of a license plate in a database, a last charging and discharging information hash value, a current charging and discharging information hash value, a random number ciphertext and a timestamp ciphertext; vehicle charging and discharging information authentication design; and vehicle charge and discharge information block chain design. The method improves the accuracy and the reliability of the charging and discharging information.
Description
Technical Field
The invention relates to the technical field of information, in particular to a V2G charging and discharging information processing method based on a block chain technology.
Background
With the promotion of national policies in the field of electric vehicles, electric vehicles become widely used vehicles for people. The appearance of the technology of electric Vehicle-to-Grid (V2G) aims to solve the safety problem caused by the network access of a large number of electric vehicles to the power Grid, and guides users to implement the ordered charging and discharging of the electric vehicles by combining the relevant policies of the time-of-use electricity price, and the maximization of energy-saving economic benefits is realized.
The application of the V2G technology needs to provide accurate and reliable vehicle charging and discharging information for the operator side and the user side. The vehicle information and the charging and discharging information are combined with the block chain technology, so that real-time authentication and close combination of the vehicle and the charging and discharging information can be realized, and related benefits can be retrieved and verified.
Disclosure of Invention
The invention aims at the market mechanism of electric Vehicle and power Grid interaction (V2G), combines the information monitored and collected by electric Vehicle charging and discharging equipment, ensures the accuracy and reliability of V2G charging and discharging information through a block chain technology, improves the data deduplication rate and reduces the storage cost.
The invention provides a V2G charge-discharge information processing method based on a block chain technology, which comprises the following steps:
designing a vehicle charging and discharging information block chain, wherein the vehicle charging and discharging information block chain comprises a message header of a license plate in a database, a last charging and discharging information hash value, a current charging and discharging information hash value, a random number ciphertext and a timestamp ciphertext;
vehicle charge-discharge information authentication design includes:
the power monitoring equipment acquires vehicle information and charging and discharging times and uploads the vehicle information and the charging and discharging times to the server node;
the server node which receives the vehicle information and the charging and discharging frequency information for the first time seeks authentication in the whole network;
other nodes in the whole network analyze own database information according to authentication requirements, and match vehicle information and charging and discharging frequency information;
each authentication node feeds back the matching result to the first node, the first node analyzes the information authenticity feedback result, if the vehicle information and the charging and discharging frequency information are judged to be true, the information is judged to be true, and block chain information generation is executed; otherwise, judging that the vehicle charging and discharging information is in doubt, starting warning and powering off;
vehicle charge-discharge information blockchain design, comprising:
applying for N times of V2G charging and discharging on the basis of the true vehicle charging and discharging information authentication result, and executing block information N generation;
taking the license plate information and the charging and discharging marking code information as message headers (Head messages), taking the vehicle characteristic information and the charging and discharging information as information plaintext, and taking random numbers, node numbers and timestamps as random plaintext;
encrypting the vehicle characteristic information and the charging and discharging information plaintext through an RSA public key to obtain a vehicle information ciphertext;
encrypting a random plaintext by an AES key to obtain a random ciphertext;
generating a hash value by performing hash operation on the message header, the vehicle information plaintext and the random plaintext;
combining the message header, the vehicle information ciphertext, the random ciphertext and the hash value according to a block structure to generate a block of the piece of information, wherein the block comprises the message header, the vehicle information ciphertext, the random ciphertext, a last block hash value, a block hash value of the block and a next block hash value;
the first node takes a vehicle license plate as a retrieval object, block chain information of the license plate is retrieved at each node of the whole network, the length and identification code sequence information of the block chain to which the license plate belongs in the node are sent to the first node together with the node number by each node, the first node compares and judges feedback information of each node, and longest chain information with accurate sequence is selected; if the obtained longest chain length is 0, the information is the starting point of the vehicle charging and discharging information block chain, so that whether the block sequence number is 1 or not is verified, and if the block sequence number is 1, the first node is a chain generation node; if not, a warning is given; if the length of the longest chain is not 0, the information is a non-starting point of the vehicle charging and discharging information block chain, so that whether the serial number of the block is N or not is verified, and if the serial number of the block is N, the next step is executed; if not, a warning is given;
the first node sends the generated block information to the chain and generates a node;
after receiving the block information, the head node decrypts the random number ciphertext and the time stamp ciphertext in the block through an AES (advanced encryption standard) key to obtain the plain text of the random number ciphertext and the time stamp ciphertext, and performs hash operation on the information of the previous license plate, the current license plate and the next license plate together with the serial number of the license plate to obtain a decrypted hash value;
comparing the decrypted hash value with the license plate hash value, verifying, and if the decrypted hash value is consistent with the license plate hash value, judging that the information is accurate and has no tampering, and executing the next operation; if the information is inconsistent, the information distortion is tampered, and a warning is given out;
and directly linking the verified block with the block chain, and synchronizing the information of the whole network nodes of the linked block chain.
In the above method for processing V2G charge and discharge information based on the blockchain technique, the matching of the vehicle information and the charge and discharge frequency information includes:
matching vehicle information, verifying whether a license plate, a vehicle type, a battery model and the like are matched with vehicle registration information, and if so, judging that the information is true; otherwise, it is false;
matching the charging and discharging times, verifying whether the charging times and the discharging times are consistent with historical monitoring data, and if so, determining the times to be true; otherwise, it is false.
The method improves the accuracy and the reliability of the charging and discharging information.
Drawings
Fig. 1 shows a schematic diagram of a charge and discharge information block chain according to an embodiment of the present invention.
Fig. 2 is a schematic diagram illustrating a process of generating a charging and discharging information block according to an embodiment of the present invention.
FIG. 3 illustrates a block verification diagram according to an embodiment of the present invention.
Detailed Description
The following examples are presented to enable those skilled in the art to more fully understand the present invention and are not intended to limit the invention in any way.
The charging and discharging information storage of the same vehicle has the problems of difficult authentication and retrieval delay in consideration of the characteristics of time-space factors, dynamic distribution and the like of driving the vehicle; and each piece of data lacks mutual correlation authentication processing, so that the safety problem of data loss or tampering can occur under the conditions of network delay or artificial damage and the like, and the accuracy and the reliability of the charging and discharging information are further reduced. Therefore, the invention designs the block chain for the charge and discharge information of V2G.
Vehicle charge and discharge information block chain design
As shown in fig. 1, the block chain mainly includes six parts, namely, a message header of the license plate in the database, a last charge and discharge information hash value, a current charge and discharge information hash value, a random number ciphertext and a timestamp ciphertext, wherein the message header includes a current charge and discharge information identification code of the vehicle, a sequential code and a license plate, wherein the sequential code is the number of the block generated by the server for the current charge and discharge of the vehicle, and the license plate number is added for quick retrieval and confirmation; the hash values corresponding to the charge and discharge information of the two times are used for determining the incidence relation of the vehicle storage information and further identifying lost or tampered data; in order to ensure the uniqueness of the block chain, the random ciphertext comprises a random number and a time stamp.
Vehicle charging and discharging information authentication design
In order to ensure the accuracy of matching between the vehicle charging and discharging information and the vehicle information in the block chain and prevent the discharging benefit from being stolen by man-made malice, the vehicle charging and discharging information needs to be authenticated when the vehicle is connected to a power grid every time, so that the accuracy of the block chain information is ensured.
Because the charging and discharging of the vehicle belong to two behavior modes, the electric power grid transmits electric energy to the electric automobile during charging, and the electric automobile transmits electric energy to the electric power grid during discharging. Under the V2G mode, each automobile has different charging and discharging times, and the reliability and the safety of the charging and discharging information can be ensured only by binding and updating the charging and discharging times and the automobile information in real time, and the occurrence of the behavior of stealing the user automobile information to charge and discharge is avoided.
The system authentication design mainly comprises vehicle information authentication and charging and discharging frequency authentication, and the specific judging process is as follows:
the first step is as follows: the power monitoring equipment acquires vehicle information and charging and discharging times and uploads the vehicle information and the charging and discharging times to the server node;
the second step is that: the server node which receives the vehicle information and the charging and discharging frequency information for the first time seeks authentication in the whole network;
the third step: other nodes in the whole network analyze own database information according to authentication requirements, and match vehicle information and charging and discharging frequency information;
1) and vehicle information matching, namely mainly verifying whether a license plate, a vehicle type, a battery model and the like are matched with vehicle registration information. If both match, the message is true; otherwise, it is false.
2) And (4) matching the charging and discharging times, and mainly verifying whether the charging times and the discharging times are consistent with historical monitoring data. If the times are consistent, the times are true; otherwise, it is false.
The fourth step: the respective authentication node feeds back the matching result to the first node, the first node analyzes the information authenticity feedback result, if the two types of (vehicle information + charging and discharging times) information are judged to be true, the information is judged to be true, and block chain information generation is executed; otherwise, judging that the charging and discharging information of the vehicle is in doubt, starting warning and powering off.
Note: the default vehicle charging and discharging total times exist at the vehicle end and can be read by the charging and discharging monitoring equipment.
For example, a vehicle with a license plate A is charged for c times and discharged for d times, and when a charge-discharge behavior of the (c + 1) th or (d + 1) th time is applied, the charge-discharge equipment acquires vehicle information and time information and uploads the vehicle information and the time information to the whole network; searching stored data of the node A by other nodes in the network, wherein the frequency information is obtained by simple addition operation of an identification code in a block chain message header, and then performing matching authentication; at least one node determines that the vehicle A information is true, and judges that the information passes the authentication and applies for passing when the information is fed back to the first node; if all other node authentication information is false, judging that the information authentication is in doubt when the information authentication is fed back to the first node, starting warning and powering off.
The design of the vehicle charge and discharge information block chain comprises the following steps:
the first step is as follows: applying for N times of V2G charging and discharging on the basis of the true vehicle charging and discharging information authentication result, and executing block information N generation;
the second step is that: taking the license plate information and the charging and discharging marking code information as message headers (Head messages), taking the vehicle characteristic information and the charging and discharging information as information plaintext, and taking random numbers, node numbers and timestamps as random plaintext;
the third step: encrypting the vehicle characteristic information and the charging and discharging information plaintext through an RSA public key to obtain a vehicle information ciphertext;
the fourth step: encrypting a random plaintext by an AES key to obtain a random ciphertext;
the fifth step: generating a hash value by performing hash operation on the message header, the vehicle information plaintext and the random plaintext;
and a sixth step: and combining the message header, the vehicle information ciphertext, the random ciphertext and the hash value according to the block structure shown in fig. 2 to generate the block of the piece of information. The block mainly comprises six parts of information, namely a message header, a vehicle information ciphertext, a random ciphertext, a last block hash value, a local block hash value, a next block hash value and the like.
The seventh step: the first node takes a vehicle license plate as a retrieval object, block chain information of the license plate is retrieved at each node of the whole network, the length and identification code sequence information of the block chain to which the license plate belongs in the node are sent to the first node together with the node number by each node, the first node compares and judges feedback information of each node, and longest chain information with accurate sequence is selected;
if the obtained longest chain length is 0, the information is the starting point of the vehicle charging and discharging information block chain, so that whether the block sequence number is 1 or not is verified, and if the block sequence number is 1, the first node is a chain generation node; if not, a warning is given;
if the length of the longest chain is not 0, the information is a non-initial point of the vehicle charging and discharging information block chain, so that whether the block sequence number is N or not is verified, and if the block sequence number is N, the next step is executed; if not, a warning is given;
eighth step: the first node sends the block information generated in the seventh step to the chain and generates a node;
the ninth step: after receiving the block information, the head node decrypts the random number ciphertext and the time stamp ciphertext in the block through an AES (advanced encryption standard) key to obtain the plain text of the random number ciphertext and the time stamp ciphertext, and performs hash operation on the information of the previous license plate, the current license plate and the next license plate together with the serial number of the license plate to obtain a decrypted hash value;
the tenth step: comparing the decrypted hash value with the license plate hash value, verifying, and if the decrypted hash value is consistent with the license plate hash value, judging that the information is accurate and has no tampering, and executing the next operation; if the information is inconsistent with the information, the information distortion is tampered, and a warning is given. The verification process is shown in fig. 3.
The eleventh step: and directly linking the verified block with the block chain, and synchronizing the information of the whole network nodes of the linked block chain.
Those skilled in the art will appreciate that the above embodiments are merely exemplary embodiments and that various changes, substitutions, and alterations can be made without departing from the spirit and scope of the application.
Claims (2)
1. A V2G charging and discharging information processing method based on a block chain technology comprises the following steps:
designing a vehicle charging and discharging information block chain, wherein the vehicle charging and discharging information block chain comprises a message header of a license plate in a database, a last charging and discharging information hash value, a current charging and discharging information hash value, a random number ciphertext and a timestamp ciphertext;
vehicle charge-discharge information authentication design includes:
the power monitoring equipment acquires vehicle information and charging and discharging times and uploads the vehicle information and the charging and discharging times to the server node;
the server node which receives the vehicle information and the charging and discharging frequency information for the first time seeks authentication in the whole network;
other nodes in the whole network analyze own database information according to authentication requirements, and match vehicle information and charging and discharging frequency information;
each authentication node feeds back the matching result to the first node, the first node analyzes the information authenticity feedback result, if the vehicle information and the charging and discharging frequency information are judged to be true, the information is judged to be true, and block chain information generation is executed; otherwise, judging that the vehicle charging and discharging information is in doubt, starting warning and powering off;
vehicle charge-discharge information blockchain design, comprising:
applying for N times of V2G charging and discharging on the basis of the true vehicle charging and discharging information authentication result, and executing block information N generation;
taking the license plate information and the charging and discharging marking code information as message headers (Head messages), taking the vehicle characteristic information and the charging and discharging information as information plaintext, and taking random numbers, node numbers and timestamps as random plaintext;
encrypting the vehicle characteristic information and the charging and discharging information plaintext through an RSA public key to obtain a vehicle information ciphertext;
encrypting a random plaintext by an AES key to obtain a random ciphertext;
generating a hash value by performing hash operation on the message header, the vehicle information plaintext and the random plaintext;
combining the message header, the vehicle information ciphertext, the random ciphertext and the hash value according to a block structure to generate a block of the piece of information, wherein the block comprises the message header, the vehicle information ciphertext, the random ciphertext, a last block hash value, a block hash value of the block and a next block hash value;
the first node takes a vehicle license plate as a retrieval object, block chain information of the license plate is retrieved at each node of the whole network, the length and identification code sequence information of the block chain to which the license plate belongs in the node are sent to the first node together with the node number by each node, the first node compares and judges feedback information of each node, and longest chain information with accurate sequence is selected; if the obtained longest chain length is 0, the information is the starting point of the vehicle charging and discharging information block chain, so that whether the block sequence number is 1 or not is verified, and if the block sequence number is 1, the first node is a chain generation node; if not, a warning is given; if the length of the longest chain is not 0, the information is a non-starting point of the vehicle charging and discharging information block chain, so that whether the serial number of the block is N or not is verified, and if the serial number of the block is N, the next step is executed; if not, a warning is given;
the first node sends the generated block information to the chain and generates a node;
after receiving the block information, the head node decrypts the random number ciphertext and the time stamp ciphertext in the block through an AES (advanced encryption standard) key to obtain the plain text of the random number ciphertext and the time stamp ciphertext, and performs hash operation on the information of the previous license plate, the current license plate and the next license plate together with the serial number of the license plate to obtain a decrypted hash value;
comparing the decrypted hash value with the license plate hash value, verifying, and if the decrypted hash value is consistent with the license plate hash value, judging that the information is accurate and has no tampering, and executing the next operation; if the information is inconsistent, the information distortion is tampered, and a warning is given out;
and directly linking the verified block with the block chain, and synchronizing the information of the whole network nodes of the linked block chain.
2. The block chain technology-based V2G charge and discharge information processing method according to claim 1, wherein matching the vehicle information and the charge and discharge number information includes:
matching vehicle information, verifying whether a license plate, a vehicle type, a battery model and the like are matched with vehicle registration information, and if so, judging that the information is true; otherwise, it is false;
matching the charging and discharging times, verifying whether the charging times and the discharging times are consistent with historical monitoring data, and if so, determining the times to be true; otherwise, it is false.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010845491.5A CN112035856B (en) | 2020-08-20 | 2020-08-20 | V2G charge and discharge information processing method based on block chain technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010845491.5A CN112035856B (en) | 2020-08-20 | 2020-08-20 | V2G charge and discharge information processing method based on block chain technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112035856A true CN112035856A (en) | 2020-12-04 |
CN112035856B CN112035856B (en) | 2023-05-30 |
Family
ID=73581707
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010845491.5A Active CN112035856B (en) | 2020-08-20 | 2020-08-20 | V2G charge and discharge information processing method based on block chain technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112035856B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112706681A (en) * | 2020-12-23 | 2021-04-27 | 尚廉智能科技(上海)有限公司 | Vehicle and system for rapidly supplementing power supply at high speed |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107092988A (en) * | 2017-04-21 | 2017-08-25 | 北方工业大学 | Method for predicting station-parking time of bus on special lane |
CN108230109A (en) * | 2018-01-02 | 2018-06-29 | 罗梅琴 | A kind of shared system and method based on block chain technology |
CN108900507A (en) * | 2018-06-29 | 2018-11-27 | 全链通有限公司 | Block chain real name identification method and system |
CN109472594A (en) * | 2018-10-11 | 2019-03-15 | 平安科技(深圳)有限公司 | Car data sharing method, device, equipment and storage medium based on block chain |
CN109743172A (en) * | 2018-12-06 | 2019-05-10 | 国网山东省电力公司电力科学研究院 | Based on alliance's block chain V2G network cross-domain authentication method, information data processing terminal |
CN110147409A (en) * | 2019-04-02 | 2019-08-20 | 爱驰汽车有限公司 | Method, equipment and the medium of battery information for enquiring vehicle |
CN110381145A (en) * | 2019-07-22 | 2019-10-25 | 长沙理工大学 | Exchange method and system between electric car and power grid |
CN110428351A (en) * | 2019-07-29 | 2019-11-08 | 电子科技大学 | Semi vehicle violation based on block chain reports method |
CN110602249A (en) * | 2019-09-29 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Resource allocation method and related device |
CN110599261A (en) * | 2019-09-21 | 2019-12-20 | 江西理工大学 | Electric automobile safety electric power transaction and excitation system based on energy source block chain |
CN111106620A (en) * | 2019-09-10 | 2020-05-05 | 浙江大学 | Electric automobile charging distributed management scheme based on block chain |
CN111160784A (en) * | 2019-12-30 | 2020-05-15 | 北京工业大学 | Product management method based on block chain |
-
2020
- 2020-08-20 CN CN202010845491.5A patent/CN112035856B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107092988A (en) * | 2017-04-21 | 2017-08-25 | 北方工业大学 | Method for predicting station-parking time of bus on special lane |
CN108230109A (en) * | 2018-01-02 | 2018-06-29 | 罗梅琴 | A kind of shared system and method based on block chain technology |
CN108900507A (en) * | 2018-06-29 | 2018-11-27 | 全链通有限公司 | Block chain real name identification method and system |
CN109472594A (en) * | 2018-10-11 | 2019-03-15 | 平安科技(深圳)有限公司 | Car data sharing method, device, equipment and storage medium based on block chain |
CN109743172A (en) * | 2018-12-06 | 2019-05-10 | 国网山东省电力公司电力科学研究院 | Based on alliance's block chain V2G network cross-domain authentication method, information data processing terminal |
CN110147409A (en) * | 2019-04-02 | 2019-08-20 | 爱驰汽车有限公司 | Method, equipment and the medium of battery information for enquiring vehicle |
CN110381145A (en) * | 2019-07-22 | 2019-10-25 | 长沙理工大学 | Exchange method and system between electric car and power grid |
CN110428351A (en) * | 2019-07-29 | 2019-11-08 | 电子科技大学 | Semi vehicle violation based on block chain reports method |
CN111106620A (en) * | 2019-09-10 | 2020-05-05 | 浙江大学 | Electric automobile charging distributed management scheme based on block chain |
CN110599261A (en) * | 2019-09-21 | 2019-12-20 | 江西理工大学 | Electric automobile safety electric power transaction and excitation system based on energy source block chain |
CN110602249A (en) * | 2019-09-29 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Resource allocation method and related device |
CN111160784A (en) * | 2019-12-30 | 2020-05-15 | 北京工业大学 | Product management method based on block chain |
Non-Patent Citations (4)
Title |
---|
刘冬兰;刘新;陈剑飞;于灏;张昊;: "基于联盟区块链的V2G网络跨域认证技术研究" * |
张富宝;李国;王滔滔;: "基于区块链技术的电动汽车充电链" * |
朱桂清: "基于并联谐振的高压直流电源研究" * |
王浩然等: "基于区块链的电动汽车充电站充电权交易:机制、模型和方法" * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112706681A (en) * | 2020-12-23 | 2021-04-27 | 尚廉智能科技(上海)有限公司 | Vehicle and system for rapidly supplementing power supply at high speed |
Also Published As
Publication number | Publication date |
---|---|
CN112035856B (en) | 2023-05-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109274498B (en) | Intelligent power grid data aggregation and monitoring method based on alliance chain | |
CN106375287B (en) | Charging method of new energy automobile | |
CN112199649A (en) | Anonymous identity verification method under moving edge calculation based on block chain | |
CN109194641A (en) | A kind of transmission method of business datum, device, equipment and storage medium | |
CN101340289B (en) | Replay attack preventing method and system thereof | |
DE102009030091A1 (en) | Method for providing communication between charging station and electric vehicle i.e. car, involves generating signature of data packet by private measuring key, and transmitting data packet and signature to electric vehicle | |
CN102916809B (en) | Dynamic authentication method for intelligent power network control command based on state estimation | |
CN114372296A (en) | Block chain-based user behavior data auditing method and system | |
CN110826109A (en) | Penetrating signature method suitable for PDF document | |
CN112035856B (en) | V2G charge and discharge information processing method based on block chain technology | |
CN115001775B (en) | Data processing method, device, electronic equipment and computer readable storage medium | |
CN113078993A (en) | Smart grid third-party privacy protection method based on improved homomorphic encryption algorithm | |
CN104579659A (en) | Device for safety information interaction | |
CN110968892A (en) | Data encryption system based on electric quantity data query | |
CN112260275B (en) | Non-invasive load decomposition method and system based on blockchain technology | |
CN110570197B (en) | Data processing method and device based on block chain | |
CN104463267A (en) | RFID comprehensive encryption method for electric vehicle charging station | |
CN113886884A (en) | Demand side response user identity authentication management method | |
CN114548677A (en) | New energy automobile battery sharing model method based on block chain | |
CN113391161A (en) | Distribution line fault point positioning method and system based on fault indicator | |
CN113315778A (en) | Double-encryption information security transmission method applied to hidden danger positioning | |
Xu et al. | Security Analysis and protection for charging protocol of smart charging pile | |
Jiang et al. | A secure communication protocol with privacy-preserving monitoring and controllable linkability for V2G | |
Lv et al. | A highly reliable lightweight distribution network communication encryption scheme | |
CN110417548A (en) | A kind of bus or train route contract network method for security protection based on digital certificates |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |