CN113905374A - Charging control method and device for electric automobile - Google Patents

Charging control method and device for electric automobile Download PDF

Info

Publication number
CN113905374A
CN113905374A CN202010560471.3A CN202010560471A CN113905374A CN 113905374 A CN113905374 A CN 113905374A CN 202010560471 A CN202010560471 A CN 202010560471A CN 113905374 A CN113905374 A CN 113905374A
Authority
CN
China
Prior art keywords
charging
current
charged
vehicle
fingerprint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010560471.3A
Other languages
Chinese (zh)
Inventor
王圣慧
宋正宇
王石峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Anji Zhidian Holding Co Ltd
Original Assignee
Chezhubang Beijing Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chezhubang Beijing Technology Co Ltd filed Critical Chezhubang Beijing Technology Co Ltd
Priority to CN202010560471.3A priority Critical patent/CN113905374A/en
Publication of CN113905374A publication Critical patent/CN113905374A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Biomedical Technology (AREA)
  • Medical Informatics (AREA)
  • Electric Propulsion And Braking For Vehicles (AREA)
  • Charge And Discharge Circuits For Batteries Or The Like (AREA)

Abstract

The invention relates to the technical field of electric vehicle charging control, in particular to a method and a device for controlling electric vehicle charging. The method comprises the following steps: authenticating the fingerprint of the current charging personnel acquired by the charging equipment; if the fingerprint authentication of the current charging personnel is not the fingerprint of the owner of the current vehicle to be charged, sending a first authentication abnormal notification to a terminal device bound with the owner; receiving a first return instruction sent by the terminal equipment; if the owner agrees to charge the current vehicle to be charged according to the first return instruction, issuing a first charging instruction to the charging equipment to charge the current vehicle to be charged; and if the current vehicle to be charged is determined to be illegally used by others according to the first return instruction, performing alarm operation. According to the invention, the fingerprint authentication of the current charging personnel and the timely notification to the vehicle owner when the abnormal condition occurs are carried out, so that the vehicle using safety of the electric vehicle is improved.

Description

Charging control method and device for electric automobile
Technical Field
The invention relates to the technical field of electric vehicle charging control, in particular to a method and a device for controlling electric vehicle charging.
Background
Nowadays, the technology of the electric automobile is developed vigorously, and the electric automobile becomes a great choice for people to use because of the characteristics of environmental protection, low vehicle using cost, stable starting and the like. Along with the increase of the reserved quantity of electric automobiles, the safety problem of the electric automobiles is also more and more concerned.
Therefore, how to improve the safety of the electric vehicle is a technical problem which needs to be solved urgently at present.
Disclosure of Invention
The invention aims to provide a charging control method and a charging control device for an electric automobile, so as to improve the safety of the electric automobile.
The embodiment of the invention provides the following scheme:
in a first aspect, an embodiment of the present invention provides an electric vehicle charging control method, which is applied to a pile cloud platform, and the method includes:
authenticating the fingerprint of the current charging personnel acquired by the charging equipment;
if the fingerprint authentication of the current charging personnel is not the fingerprint of the owner of the current vehicle to be charged, sending a first authentication abnormal notification to a terminal device bound with the owner;
receiving a first return instruction sent by the terminal equipment;
if the owner agrees to charge the current vehicle to be charged according to the first return instruction, issuing a first charging instruction to the charging equipment to charge the current vehicle to be charged;
and if the current vehicle to be charged is determined to be illegally used by others according to the first return instruction, performing alarm operation.
In a possible embodiment, after the fingerprint of the current charging person collected by the charging device is authenticated, the method further includes:
if the fingerprint of the current charging personnel is authenticated as the fingerprint of the owner of the current vehicle to be charged, issuing a sound acquisition instruction to the charging equipment to control the charging equipment to acquire the sound information of the current charging personnel;
receiving sound information of the current charging personnel collected by the charging equipment;
judging whether the sound information of the current charger is legal or not;
if so, issuing a second charging instruction to the charging equipment to charge the current vehicle to be charged;
if not, sending a second authentication abnormal notification to the terminal equipment;
receiving a second return instruction sent by the terminal equipment;
if the owner agrees to charge the current vehicle to be charged according to the second return instruction, issuing a third charging instruction to the charging equipment to charge the current vehicle to be charged;
and if the current vehicle to be charged is determined to be illegally used by others according to the second return instruction, performing alarm operation.
In a possible embodiment, the determining whether the sound information of the current charger is legal includes:
judging whether the voiceprint characteristics corresponding to the voice information of the current charging personnel are consistent with the voiceprint characteristics of the vehicle owner;
if yes, judging whether a charging password exists in the sound information of the current charging personnel;
and if so, determining that the sound information of the current charging personnel is legal.
In a second aspect, an embodiment of the present invention provides an electric vehicle charging control device, which is applied to a pile cloud platform, and the device includes:
the fingerprint acquisition module is used for authenticating the fingerprint of the current charging personnel acquired by the charging equipment;
the first authentication abnormity notification sending module is used for sending a first authentication abnormity notification to the terminal equipment bound with the owner of the current vehicle to be charged when the fingerprint authentication of the current charging personnel is not the fingerprint of the owner of the current vehicle to be charged;
the first return instruction receiving module is used for receiving a first return instruction sent by the terminal equipment;
the first charging instruction issuing module is used for issuing a first charging instruction to the charging equipment to charge the current vehicle to be charged when the owner agrees to charge the current vehicle to be charged according to the first return instruction;
and the first alarm module is used for carrying out alarm operation when the current vehicle to be charged is determined to be illegally used by others according to the first return instruction.
In a possible embodiment, the apparatus further comprises:
the voice acquisition instruction issuing module is used for issuing a voice acquisition instruction to the charging equipment when the fingerprint of the current charging personnel is authenticated as the fingerprint of the owner of the current vehicle to be charged, so as to control the charging equipment to acquire the voice information of the current charging personnel;
the sound information receiving module is used for receiving the sound information of the current charging personnel, which is acquired by the charging equipment;
the first judgment module is used for judging whether the sound information of the current charger is legal or not;
the second charging instruction issuing module is used for issuing a second charging instruction to the charging equipment when the sound information of the current charging personnel is legal so as to charge the current vehicle to be charged;
the second authentication abnormity notification sending module is used for sending a second authentication abnormity notification to the terminal equipment when the sound information of the current charging personnel is illegal;
the second return instruction receiving module is used for receiving a second return instruction sent by the terminal equipment;
the third charging instruction issuing module is used for issuing a third charging instruction to the charging equipment to charge the current vehicle to be charged when the owner agrees to charge the current vehicle to be charged according to the second return instruction;
and the second alarm module is used for carrying out alarm operation when the current vehicle to be charged is determined to be illegally used by others according to the second return instruction.
In a possible embodiment, the first determining module includes:
the second judgment module is used for judging whether the voiceprint characteristics corresponding to the voice information of the current charging personnel are consistent with the voiceprint characteristics of the vehicle owner;
the third judging module is used for judging whether a charging password word exists in the voice information of the current charging staff when the voiceprint feature corresponding to the voice information of the current charging staff is consistent with the voiceprint feature of the vehicle owner;
and the legality identifying module is used for identifying that the sound information of the current charging personnel is legal when the charging password exists in the sound information of the current charging personnel.
In a third aspect, an embodiment of the present invention provides an electric vehicle charging control method, which is applied to a terminal device, and the method includes:
receiving a first authentication abnormity notification sent by the stub cloud platform; the first authentication abnormity notification is used for authenticating the fingerprint of the current charging person acquired by the charging equipment by the pile cloud platform and is generated when the fingerprint of the current charging person is authenticated to be not the fingerprint of the owner of the current vehicle to be charged;
generating a first return instruction and sending the first return instruction to the pile cloud platform; the first return instruction is used for informing the pile cloud platform that the vehicle owner agrees to charge the current vehicle to be charged or the current vehicle to be charged is illegally used by others.
In a possible embodiment, before the receiving the first authentication exception notification sent by the charging device, the method further includes:
receiving a second authentication abnormity notification sent by the stub cloud platform; the second authentication abnormity notification is used for authenticating the fingerprint of the current charging personnel acquired by the charging equipment by the pile cloud platform and is generated when the fingerprint of the current charging personnel is authenticated to be not the fingerprint of the owner of the current vehicle to be charged and the sound information of the current charging personnel is illegal;
generating a second return instruction and sending the second return instruction to the pile cloud platform; the second return instruction is used for informing the pile cloud platform that the vehicle owner agrees to charge the current vehicle to be charged or the current vehicle to be charged is illegally used by others.
In a possible embodiment, after the generating and sending the first return instruction to the pile cloud platform, the method further includes:
receiving an alarm notification sent by the pile cloud platform; wherein the alarm notification is generated by the pile cloud platform when the current vehicle to be charged is illegally used by others;
generating a third return instruction and sending the third return instruction to the pile cloud platform; and the third return instruction is used for limiting the current vehicle to be charged to move through the pile cloud platform when the vehicle owner agrees to lock the vehicle.
In a fourth aspect, an embodiment of the present invention provides an electric vehicle charging control apparatus, which is applied to a terminal device, and the apparatus includes:
the first authentication abnormity notification receiving module is used for receiving a first authentication abnormity notification sent by the stub cloud platform; the first authentication abnormity notification is used for authenticating the fingerprint of the current charging person acquired by the charging equipment by the pile cloud platform and is generated when the fingerprint of the current charging person is authenticated to be not the fingerprint of the owner of the current vehicle to be charged;
the first return instruction generating module is used for generating a first return instruction and sending the first return instruction to the pile cloud platform; the first return instruction is used for informing the pile cloud platform that the vehicle owner agrees to charge the current vehicle to be charged or the current vehicle to be charged is illegally used by others.
In a possible embodiment, the apparatus further comprises:
the second authentication abnormity notification receiving module is used for receiving a second authentication abnormity notification sent by the stub cloud platform; the second authentication abnormity notification is used for authenticating the fingerprint of the current charging personnel acquired by the charging equipment by the pile cloud platform and is generated when the fingerprint of the current charging personnel is authenticated to be not the fingerprint of the owner of the current vehicle to be charged and the sound information of the current charging personnel is illegal;
the second return instruction generating module is used for generating a second return instruction and sending the second return instruction to the pile cloud platform; the second return instruction is used for informing the pile cloud platform that the vehicle owner agrees to charge the current vehicle to be charged or the current vehicle to be charged is illegally used by others.
In a possible embodiment, the apparatus further comprises:
the alarm notification receiving module is used for receiving an alarm notification sent by the pile cloud platform; wherein the alarm notification is generated by the pile cloud platform when the current vehicle to be charged is illegally used by others;
the third return instruction generating module is used for generating a third return instruction and sending the third return instruction to the pile cloud platform; and the third return instruction is used for limiting the current vehicle to be charged to move through the pile cloud platform when the vehicle owner agrees to lock the vehicle.
In a fifth aspect, an embodiment of the present invention provides an electric vehicle charging control apparatus, including:
a memory for storing a computer program;
a processor configured to execute the computer program to implement the steps of the electric vehicle charging control method according to any one of the first and third aspects.
In a sixth aspect, the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to implement the steps of the electric vehicle charging control method according to any one of the first and third aspects.
Compared with the prior art, the invention has the following advantages and beneficial effects:
when a current charging person charges a current vehicle to be charged, the fingerprint of the charging person acquired by the charging equipment is acquired and authenticated with the fingerprint of the owner of the current vehicle to be charged, if the fingerprint of the charging person is inconsistent with the fingerprint of the owner of the current vehicle to be charged, a first authentication abnormity notification is sent to the owner, and finally the current vehicle to be charged is charged or an alarm operation is carried out according to an instruction of the owner.
According to the invention, the fingerprint authentication of the current charging personnel and the timely notification to the vehicle owner when the abnormal condition occurs are carried out, so that the vehicle using safety of the electric vehicle is improved.
Drawings
In order to more clearly illustrate the embodiments of the present specification or the technical solutions in the prior art, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present specification, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of a charging control method for an electric vehicle according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of an electric vehicle charging control device according to an embodiment of the present invention;
fig. 3 is a flowchart of a charging control method for an electric vehicle according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an electric vehicle charging control device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be described clearly and completely with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, rather than all embodiments, and all other embodiments obtained by those skilled in the art based on the embodiments of the present invention belong to the scope of protection of the embodiments of the present invention.
Referring to fig. 1, fig. 1 is a flowchart of a charging control method for an electric vehicle according to an embodiment of the present invention, where the embodiment of the method is applied to a stub cloud platform, and the stub cloud platform belongs to a background server and is responsible for information interaction and control interaction between a charging device, a user terminal device, and a vehicle, and specifically includes steps 11 to 15.
And 11, authenticating the fingerprint of the current charging personnel acquired by the charging equipment.
Specifically, this battery charging outfit can be the direct current that has the rifle that charges and fill electric pile or alternating-current charging stake. Before the step, the current vehicle to be charged needs to travel to the charging equipment, and a charging gun of the charging equipment is used for charging.
Specifically, in this embodiment, battery charging outfit's the rifle that charges has the fingerprint collection module, and this step is when the personnel that charge uses the rifle that charges and contact this fingerprint collection module at present, and battery charging outfit can accomplish the personnel's that charge fingerprint collection work at present.
The specific authentication process is as follows:
1. the current vehicle to be charged is provided with a unique VIN code, and the fingerprint of the current vehicle to be charged is bound with the VIN code of the current vehicle to be charged through terminal equipment and uploaded to a cloud platform for storage;
2. when a charging person uses charging equipment to charge a current vehicle to be charged, a charging gun firstly reads a VIN code of the vehicle, then a fingerprint acquisition module on the charging gun is used for acquiring a fingerprint, and the fingerprint is immediately uploaded to a pile cloud platform;
3. the pile cloud platform compares the fingerprint of the charging personnel uploaded by the charging equipment with the fingerprint of the pre-stored vehicle owner, and if the similarity between the fingerprint of the charging equipment and the fingerprint of the charging personnel exceeds 95%, the fingerprint of the current charging personnel is authenticated as the fingerprint of the vehicle owner of the current vehicle to be charged. Of course, the similarity comparison method is used here, and other existing authentication methods can be used to complete the fingerprint authentication in this step.
Specifically, the pile cloud platform and the charging device can be in communication connection through communication technologies such as the internet, GRPS, 4G or 5G.
And step 12, if the fingerprint of the current charging personnel is authenticated to be not the fingerprint of the owner of the current vehicle to be charged, sending a first authentication abnormity notification to the terminal equipment bound with the owner.
Specifically, the terminal device may be a mobile phone, a computer, or an electronic device such as a wearable device of a vehicle owner.
Specifically, the pile cloud platform and the terminal device can be in communication connection through communication technologies such as the internet, GRPS, 4G or 5G, and the like, so that messages and instructions between the pile cloud platform and the terminal device can be transmitted.
Specifically, after the stake cloud platform received the current personnel's that charge fingerprint, can carry out the authentication according to the current car owner's of waiting to charge vehicle fingerprint that the car owner uploaded in advance, specific authentication process exists differently according to the difference of fingerprint collection technique.
If fingerprint collection module on the rifle that charges is capacitanc, then the fingerprint of the personnel that charge at present and the fingerprint of the owner of the vehicle that waits to charge at present all are electric field distribution, stake cloud platform is through the similarity and the difference of two sets of electric field distributions of comparison, the fingerprint that obtains the personnel that charge at present and the fingerprint of the owner of the vehicle that waits to charge at present all are the similarity between the electric field distribution, when this similarity is greater than the settlement threshold value, can confirm the fingerprint of the personnel that charge at present for the fingerprint of the owner of the vehicle that waits to charge at present, vice versa, then the fingerprint of the personnel that charge at present is not the fingerprint of the owner of the vehicle that waits to charge at present.
Specifically, the content of the first authentication abnormal notification includes notification transmission time, VIN code of the vehicle to be charged currently, name of the charging station corresponding to the charging device, and location of the charging station corresponding to the charging device, so as to notify the content. As shown in table 1, which is a possible formatted text of the first authentication exception notification.
TABLE 1
Figure BDA0002545902120000101
And step 13, receiving a first return instruction sent by the terminal equipment.
Specifically, the first return instruction is generated according to feedback of the vehicle owner after the terminal device shows the first authentication exception notification to the vehicle owner, so as to inform the charging device whether the vehicle owner knows that the vehicle to be charged is used by another person currently, whether the vehicle agrees to be charged, whether an alarm is required, and the like.
And step 14, if the owner agrees to charge the current vehicle to be charged according to the first return instruction, issuing a first charging instruction to the charging equipment to charge the current vehicle to be charged.
Specifically, if the owner chooses to agree to charge the current vehicle to be charged on the terminal device of the owner, the corresponding instruction code exists in the first return instruction, so that the pile cloud platform knows the real meaning of the owner and controls the charging device to charge the current vehicle to be charged according to the real meaning of the owner.
And step 15, if the current vehicle to be charged is determined to be illegally used by others according to the first return instruction, performing alarm operation.
Specifically, if the owner selects to be unaware that the current vehicle to be charged is used by others, disagrees with charging the current vehicle to be charged or directly gives an alarm to the police on the terminal device of the owner, a corresponding instruction code exists in the first return instruction, so that the pile cloud platform knows that the current vehicle to be charged has the risk of being stolen, and the alarm operation is performed according to the real meaning of the owner.
Specifically, when the pile cloud platform performs the alarm operation, the pile cloud platform can not only alarm to police, but also alarm to security maintenance personnel of a charging station where the charging equipment is located, so that the current vehicle to be charged can be controlled as soon as possible. When an alarm is given, the pile cloud platform can provide information such as the current charging station position, vehicle owner information, the current vehicle parking position to be charged, license plate information, vehicle model, vehicle body color and current abnormal reasons, and assists related personnel in handling current emergency.
Considering that if the fingerprint of the owner is leaked, the current charger may forge the fingerprint of the owner, so as to pass the fingerprint authentication, thereby affecting the safety of the vehicle, the invention provides the following scheme to improve the safety of the identity authentication of the current charger. The specific scheme is as follows:
after the fingerprint of the current charging person collected by the charging device is authenticated, the method further includes steps 21 to 28.
And step 21, if the fingerprint of the current charging personnel is identified as the fingerprint of the owner of the current vehicle to be charged, issuing a sound acquisition instruction to the charging equipment to control the charging equipment to acquire the sound information of the current charging personnel.
Specifically, in this embodiment, the charging gun is provided with a microphone to collect the sound information of the current charging personnel.
Specifically, before collecting the sound information of the current charging personnel, the speaker on the charging equipment can remind the current charging personnel to speak, so that the collection of the sound information is facilitated.
And step 22, receiving the sound information of the current charging personnel collected by the charging equipment.
Specifically, after the sound information of the current charging personnel is collected, the charging equipment sends the sound information to the pile cloud platform for further identity authentication.
And step 23, judging whether the sound information of the current charger is legal.
Specifically, whether the sound information of the current charging personnel is legal or not can be determined by judging whether the sound characteristics of the current charging personnel are the same as those of the vehicle owner or not. If the sound characteristics of the current charging personnel are the same as those of the vehicle owner, the sound information of the current charging personnel is legal.
Here, the present invention also provides a better scheme for judging whether the sound information is legal, and the specific scheme is as follows:
the step of determining whether the sound information of the current charger is legal includes steps 231 to 233.
And 231, judging whether the voiceprint feature corresponding to the sound information of the current charging personnel is consistent with the voiceprint feature of the vehicle owner.
Specifically, the voiceprint feature is a sound wave spectrum carrying speech information displayed by an electro-acoustic instrument. After one person becomes adult, the voiceprint characteristics of the person are not only specific, but also relatively stable and unchanged for a long time. Therefore, the voiceprint characteristics can be used for judging whether the current charging personnel is the owner.
Specifically, a method for determining whether a voiceprint feature corresponding to the sound information of the current charging staff is consistent with a voiceprint feature of the vehicle owner is provided, which specifically includes:
1. the method comprises the steps that a vehicle owner records voiceprint characteristics of the vehicle owner in advance through terminal equipment, binds the voiceprint characteristics with a vehicle VIN code and uploads the bound voiceprint characteristics to a pile cloud platform;
2. the charging equipment acquires sound information of a current charging worker when the current charging worker uses the charging gun, and then uploads the sound information of the current charging worker to the pile cloud platform;
3. the sound information of the current personnel that charge of stake cloud platform analysis acquires the voiceprint characteristic that the current personnel that charge correspond, then carries out the spectrum with the voiceprint characteristic of the car owner that prestores and compares, when the similarity between the two surpasses 95%, the affirmation the voiceprint characteristic that the sound information of the current personnel that charge corresponds with the voiceprint characteristic of car owner is unanimous.
And step 232, if the charging password words are consistent with the charging password words, judging whether the charging password words exist in the voice information of the current charging personnel.
Specifically, when the voiceprint feature corresponding to the current voice information of the charging person is consistent with the voiceprint feature of the vehicle owner, semantic analysis is performed on the current voice information of the charging person, text data corresponding to the current voice information of the charging person is obtained by splitting the morpheme feature in the voice information, and finally the text data is traversed, so that whether the charging password word exists in the current voice information of the charging person can be judged.
Specifically, the charging password word is a phrase word preset by the vehicle owner through the terminal device, such as "love vehicle charging" and the like.
And step 233, if yes, determining that the sound information of the current charger is legal.
Specifically, the voice print authentication and the charging password authentication are performed in the step, so that the consistency between the voice information of the current charging person and the voice information of the vehicle owner can be reliably determined.
And 24, if so, issuing a second charging instruction to the charging equipment so as to charge the current vehicle to be charged.
Specifically, the identity of the current charging personnel can be reliably verified under the double protection of fingerprint authentication and sound authentication, so that the safety of the vehicle is improved.
And step 25, if not, sending a second authentication abnormity notification to the terminal equipment.
Specifically, the content of the second authentication abnormal notification includes notification transmission time, VIN code of the vehicle to be charged currently, name of the charging station corresponding to the charging device, and location of the charging station corresponding to the charging device, so as to notify the content. As shown in table 2, which is a format text of a possible second authentication exception notification.
TABLE 2
Figure BDA0002545902120000131
Specifically, when the charging person passes fingerprint authentication but fails voice authentication, the following two reasons may occur:
(1) the current charging personnel are the owner, but the voice authentication fails due to factors such as external interference and the like;
(2) the current charging personnel is not the owner himself, and the current vehicle to be charged is not controlled by the owner.
The following steps 26 to 28 are processing operations for these two reasons.
And step 26, receiving a second return instruction sent by the terminal device.
Specifically, the second return instruction is generated according to feedback of the vehicle owner after the terminal device shows the second authentication exception notification to the vehicle owner, so as to inform the charging device that the current charging personnel of the vehicle owner only passes fingerprint authentication but not sound authentication, whether the vehicle owner agrees to charge the vehicle, whether an alarm is needed, and the like.
And 27, if the owner agrees to charge the current vehicle to be charged according to the second return instruction, issuing a third charging instruction to the charging equipment to charge the current vehicle to be charged.
Specifically, if the owner chooses to agree to charge the current vehicle to be charged on the terminal device of the owner, the corresponding instruction code exists in the second return instruction, so that the charging device knows the real meaning of the owner and charges the current vehicle to be charged according to the real meaning of the owner.
In this case, it is assumed that the current charging person is the owner, but the voice authentication fails due to factors such as external interference.
Of course, in order to further improve the safety of the vehicle, the step may further collect the sound information of the current charging personnel again, and detect whether the current charging personnel can pass the sound authentication.
And step 28, if the current vehicle to be charged is determined to be illegally used by others according to the second return instruction, performing alarm operation.
Specifically, if the owner selects to be unaware that the current vehicle to be charged is used by others, disagrees with charging the current vehicle to be charged or directly gives an alarm to the police on the terminal device of the owner, a corresponding instruction code exists in the first return instruction, so that the pile cloud platform knows that the current vehicle to be charged has the risk of being stolen, and the alarm operation is performed according to the real meaning of the owner.
Specifically, when the pile cloud platform performs the alarm operation, the alarm is given to the police, and the alarm can be given to security maintenance personnel of the charging station where the charging equipment is located, so that the current vehicle to be charged can be controlled as soon as possible.
In a possible embodiment, in order to further ensure the safety of the current vehicle to be charged in an emergency, the invention further provides the following scheme, specifically:
after the alarm operation, the method further comprises steps 31 to 34. Specifically, the "alarm operation" may be the "alarm operation" in step 15 and/or step 28.
Step 31, generating an alarm notification.
Specifically, the content of the alarm notification includes notification sending time, VIN code of the vehicle to be charged currently, name of the charging station corresponding to the charging device, and location of the charging station corresponding to the charging device to notify content. As shown in table 3, which is a possible formatted text of the alert notification.
TABLE 3
Figure BDA0002545902120000151
And step 32, sending the alarm notification to the terminal equipment.
And step 33, receiving a third return instruction returned by the terminal equipment.
Specifically, the third return instruction includes an indication of whether the owner needs to lock the vehicle.
And step 34, if the owner agrees to lock the current vehicle to be charged according to the third return instruction, sending a vehicle locking instruction to the current vehicle to be charged so as to limit the current vehicle to be charged to move.
Specifically, the pile cloud platform is in communication connection with a current vehicle to be charged through the internet of vehicles, and after the vehicle locking authority given by a vehicle owner is obtained, the current vehicle to be charged is limited to move by means of locking a steering wheel, an accelerator or forbidding a battery pack to provide energy for a motor and the like.
Based on the same inventive concept as the method, an embodiment of the present invention further provides an electric vehicle charging control apparatus, as shown in fig. 2, which is a schematic structural diagram of the embodiment of the apparatus, and the apparatus includes:
the fingerprint acquisition module 41 is configured to authenticate a fingerprint of a current charging person acquired by the charging device;
a first authentication exception notification sending module 42, configured to send a first authentication exception notification to a terminal device bound to an owner of the current vehicle to be charged when the fingerprint of the current charging person is authenticated as not being the fingerprint of the owner of the current vehicle to be charged;
a first return instruction receiving module 43, configured to receive a first return instruction sent by the terminal device;
the first charging instruction issuing module 44 is configured to issue a first charging instruction to the charging device to charge the current vehicle to be charged when the owner agrees to charge the current vehicle to be charged according to the first return instruction;
and the first alarm module 45 is used for performing alarm operation when the current vehicle to be charged is determined to be illegally used by others according to the first return instruction.
In a possible embodiment, the apparatus further comprises:
the voice acquisition instruction issuing module is used for issuing a voice acquisition instruction to the charging equipment when the fingerprint of the current charging personnel is authenticated as the fingerprint of the owner of the current vehicle to be charged, so as to control the charging equipment to acquire the voice information of the current charging personnel;
the sound information receiving module is used for receiving the sound information of the current charging personnel, which is acquired by the charging equipment;
the first judgment module is used for judging whether the sound information of the current charger is legal or not;
the second charging instruction issuing module is used for issuing a second charging instruction to the charging equipment when the sound information of the current charging personnel is legal so as to charge the current vehicle to be charged;
the second authentication abnormity notification sending module is used for sending a second authentication abnormity notification to the terminal equipment when the sound information of the current charging personnel is illegal;
the second return instruction receiving module is used for receiving a second return instruction sent by the terminal equipment;
the third charging instruction issuing module is used for issuing a third charging instruction to the charging equipment to charge the current vehicle to be charged when the owner agrees to charge the current vehicle to be charged according to the second return instruction;
and the second alarm module is used for carrying out alarm operation when the current vehicle to be charged is determined to be illegally used by others according to the second return instruction.
In a possible embodiment, the first determining module includes:
the second judgment module is used for judging whether the voiceprint characteristics corresponding to the voice information of the current charging personnel are consistent with the voiceprint characteristics of the vehicle owner;
the third judging module is used for judging whether a charging password word exists in the voice information of the current charging staff when the voiceprint feature corresponding to the voice information of the current charging staff is consistent with the voiceprint feature of the vehicle owner;
and the legality identifying module is used for identifying that the sound information of the current charging personnel is legal when the charging password exists in the sound information of the current charging personnel.
In a possible embodiment, the apparatus further comprises:
the alarm notification generating module is used for generating an alarm notification;
the alarm notification sending module is used for sending the alarm notification to the terminal equipment;
a third return instruction receiving module, configured to receive a third return instruction returned by the terminal device;
and the vehicle locking instruction sending module is used for sending a vehicle locking instruction to the current vehicle to be charged when the vehicle owner agrees to perform vehicle locking operation on the current vehicle to be charged according to the third return instruction, so as to limit the movement of the current vehicle to be charged.
Based on the same inventive concept as the method, an embodiment of the present invention further provides a method for controlling charging of an electric vehicle, and as shown in fig. 3, is a flowchart of the embodiment of the method, and the embodiment of the method is applied to a terminal device such as a mobile phone, a computer, and the like, and the method includes steps 51 to 52.
And step 51, receiving a first authentication exception notification sent by the stub cloud platform.
The first authentication abnormity notification is used for authenticating the fingerprint of the current charging personnel acquired by the charging equipment through the pile cloud platform, and is generated when the fingerprint of the current charging personnel is authenticated to be not the fingerprint of the owner of the current vehicle to be charged.
And step 52, generating a first return instruction and sending the first return instruction to the pile cloud platform.
The first return instruction is used for informing the pile cloud platform that the vehicle owner agrees to charge the current vehicle to be charged or the current vehicle to be charged is illegally used by others.
Specifically, a process for generating a first return instruction is provided, which specifically includes:
1. and displaying the first authentication abnormity notification to the vehicle owner.
Specifically, the step can be displayed to the vehicle owner in a visual mode on a display screen of the terminal device, and can also be displayed in a voice playing mode.
2. And receiving a first processing instruction of the owner.
Wherein the first processing instruction comprises consent to charging or alerting.
Specifically, after the first authentication exception notification is displayed on the display screen of the terminal device, some interaction options appear on the display screen to inquire whether the owner knows the current situation, whether the owner agrees to charge the vehicle, whether the alarm is needed, and the like.
3. Based on the first processing instruction, a first return instruction is generated.
The first return instruction is used for informing the pile cloud platform that the vehicle owner agrees to charge the current vehicle to be charged or the current vehicle to be charged is illegally used by others.
In a possible embodiment, before the receiving of the first authentication exception notification sent by the charging device, the method further includes steps 61 to 62.
And step 61, receiving a second authentication exception notification sent by the stub cloud platform.
And the second authentication abnormal notification is generated when the fingerprint of the current charging personnel is authenticated to be not the fingerprint of the owner of the current vehicle to be charged and the sound information of the current charging personnel is illegal.
And 62, generating a second return instruction and sending the second return instruction to the pile cloud platform.
The second return instruction is used for informing the pile cloud platform that the vehicle owner agrees to charge the current vehicle to be charged or the current vehicle to be charged is illegally used by others.
Specifically, a flow for generating the second return instruction is provided, and specifically, the flow includes:
1. and displaying the second authentication abnormity notification to the vehicle owner.
2. And receiving a second processing instruction of the owner. Wherein the second processing instruction comprises consent to charging or alerting.
3. Generating a second return instruction based on the second processing instruction.
The second return instruction is used for informing the pile cloud platform that the vehicle owner agrees to charge the current vehicle to be charged or the current vehicle to be charged is illegally used by others.
In a possible embodiment, in order to improve the safety of the current vehicle to be charged in an emergency, when the first processing instruction or the second processing instruction is to give an alarm, the terminal device immediately inquires the vehicle owner whether the vehicle needs to be locked so as to limit the mobility of the current vehicle to be charged, and if the vehicle owner agrees, the vehicle networking platform directly locks the current vehicle to be charged. The specific scheme is as follows:
after the first return instruction is generated and sent to the pile cloud platform, the method further includes steps 71 to 72.
And step 71, receiving an alarm notification sent by the pile cloud platform.
Wherein the alarm notification is generated by the pile cloud platform when the current vehicle to be charged is illegally used by others.
And 72, generating a third return instruction and sending the third return instruction to the pile cloud platform.
And the third return instruction is used for limiting the current vehicle to be charged to move through the pile cloud platform when the vehicle owner agrees to lock the vehicle.
Specifically, a flow for generating the third return instruction is provided, and specifically, the flow includes:
1. and displaying the alarm notice to the vehicle owner.
2. And receiving a third processing instruction of the owner. Wherein the third processing instruction comprises agreement or disagreement to lock the vehicle.
3. Generating a third return instruction based on the third processing instruction.
And the third return instruction is used for limiting the current vehicle to be charged to move through the pile cloud platform when the vehicle owner agrees to lock the vehicle.
Based on the same inventive concept as the method, an embodiment of the present invention further provides an electric vehicle charging control apparatus, as shown in fig. 4, which is a schematic structural diagram of the embodiment of the apparatus, and the apparatus includes:
a first authentication exception notification receiving module 81, configured to receive a first authentication exception notification sent by the stub cloud platform; the first authentication abnormity notification is used for authenticating the fingerprint of the current charging person acquired by the charging equipment by the pile cloud platform and is generated when the fingerprint of the current charging person is authenticated to be not the fingerprint of the owner of the current vehicle to be charged;
a first return instruction generating module 82, configured to generate a first return instruction and send the first return instruction to the pile cloud platform; the first return instruction is used for informing the pile cloud platform that the vehicle owner agrees to charge the current vehicle to be charged or the current vehicle to be charged is illegally used by others.
In a possible embodiment, the apparatus further comprises:
the second authentication abnormity notification receiving module is used for receiving a second authentication abnormity notification sent by the stub cloud platform; the second authentication abnormity notification is used for authenticating the fingerprint of the current charging personnel acquired by the charging equipment by the pile cloud platform and is generated when the fingerprint of the current charging personnel is authenticated to be not the fingerprint of the owner of the current vehicle to be charged and the sound information of the current charging personnel is illegal;
the second return instruction generating module is used for generating a second return instruction and sending the second return instruction to the pile cloud platform; the second return instruction is used for informing the pile cloud platform that the vehicle owner agrees to charge the current vehicle to be charged or the current vehicle to be charged is illegally used by others.
In a possible embodiment, the apparatus further comprises:
the alarm notification receiving module is used for receiving an alarm notification sent by the pile cloud platform; wherein the alarm notification is generated by the pile cloud platform when the current vehicle to be charged is illegally used by others;
the third return instruction generating module is used for generating a third return instruction and sending the third return instruction to the pile cloud platform; and the third return instruction is used for limiting the current vehicle to be charged to move through the pile cloud platform when the vehicle owner agrees to lock the vehicle.
Based on the same inventive concept as the foregoing embodiment, an embodiment of the present invention further provides an electric vehicle charging control apparatus, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor implements the steps of any one of the foregoing methods when executing the program.
Based on the same inventive concept as in the previous embodiments, embodiments of the present invention further provide a computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the steps of any of the methods described above.
The technical scheme provided in the embodiment of the application at least has the following technical effects or advantages:
according to the embodiment of the invention, when the current charging personnel charges the current vehicle to be charged, the fingerprint of the charging personnel collected by the charging equipment is obtained and is authenticated with the fingerprint of the owner of the current vehicle to be charged, if the fingerprint of the charging personnel is inconsistent with the fingerprint of the owner of the current vehicle to be charged, a first authentication abnormity notification is sent to the owner, and finally, the current vehicle to be charged is charged or an alarm operation is carried out according to the instruction of the owner.
According to the embodiment of the invention, the fingerprint authentication of the current charging personnel is carried out, and the vehicle owner is informed in time when an abnormal condition occurs, so that the vehicle using safety of the electric vehicle is improved.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (modules, systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1. The electric vehicle charging control method is applied to a pile cloud platform, and is characterized by comprising the following steps:
authenticating the fingerprint of the current charging personnel acquired by the charging equipment;
if the fingerprint authentication of the current charging personnel is not the fingerprint of the owner of the current vehicle to be charged, sending a first authentication abnormal notification to a terminal device bound with the owner;
receiving a first return instruction sent by the terminal equipment;
if the owner agrees to charge the current vehicle to be charged according to the first return instruction, issuing a first charging instruction to the charging equipment to charge the current vehicle to be charged;
and if the current vehicle to be charged is determined to be illegally used by others according to the first return instruction, performing alarm operation.
2. The electric vehicle charging control method according to claim 1, wherein after the fingerprint of the current charger collected by the charging device is authenticated, the method further comprises:
if the fingerprint of the current charging personnel is authenticated as the fingerprint of the owner of the current vehicle to be charged, issuing a sound acquisition instruction to the charging equipment to control the charging equipment to acquire the sound information of the current charging personnel;
receiving sound information of the current charging personnel collected by the charging equipment;
judging whether the sound information of the current charger is legal or not;
if so, issuing a second charging instruction to the charging equipment to charge the current vehicle to be charged;
if not, sending a second authentication abnormal notification to the terminal equipment;
receiving a second return instruction sent by the terminal equipment;
if the owner agrees to charge the current vehicle to be charged according to the second return instruction, issuing a third charging instruction to the charging equipment to charge the current vehicle to be charged;
and if the current vehicle to be charged is determined to be illegally used by others according to the second return instruction, performing alarm operation.
3. The electric vehicle charging control method according to claim 2, wherein the determining whether the sound information of the current charger is legal comprises:
judging whether the voiceprint characteristics corresponding to the voice information of the current charging personnel are consistent with the voiceprint characteristics of the vehicle owner;
if yes, judging whether a charging password exists in the sound information of the current charging personnel;
and if so, determining that the sound information of the current charging personnel is legal.
4. The utility model provides an electric automobile charge control device, is applied to stake cloud platform which characterized in that, the device includes:
the fingerprint acquisition module is used for authenticating the fingerprint of the current charging personnel acquired by the charging equipment;
the first authentication abnormity notification sending module is used for sending a first authentication abnormity notification to the terminal equipment bound with the owner of the current vehicle to be charged when the fingerprint authentication of the current charging personnel is not the fingerprint of the owner of the current vehicle to be charged;
the first return instruction receiving module is used for receiving a first return instruction sent by the terminal equipment;
the first charging instruction issuing module is used for issuing a first charging instruction to the charging equipment to charge the current vehicle to be charged when the owner agrees to charge the current vehicle to be charged according to the first return instruction;
and the first alarm module is used for carrying out alarm operation when the current vehicle to be charged is determined to be illegally used by others according to the first return instruction.
5. The electric vehicle charging control method is applied to terminal equipment and is characterized by comprising the following steps:
receiving a first authentication abnormity notification sent by the stub cloud platform; the first authentication abnormity notification is used for authenticating the fingerprint of the current charging person acquired by the charging equipment by the pile cloud platform and is generated when the fingerprint of the current charging person is authenticated to be not the fingerprint of the owner of the current vehicle to be charged;
generating a first return instruction and sending the first return instruction to the pile cloud platform; the first return instruction is used for informing the pile cloud platform that the vehicle owner agrees to charge the current vehicle to be charged or the current vehicle to be charged is illegally used by others.
6. The electric vehicle charging control method according to claim 5, wherein before receiving the first authentication abnormality notification sent by the charging device, the method further comprises:
receiving a second authentication abnormity notification sent by the stub cloud platform; the second authentication abnormity notification is used for authenticating the fingerprint of the current charging personnel acquired by the charging equipment by the pile cloud platform and is generated when the fingerprint of the current charging personnel is authenticated to be not the fingerprint of the owner of the current vehicle to be charged and the sound information of the current charging personnel is illegal;
generating a second return instruction and sending the second return instruction to the pile cloud platform; the second return instruction is used for informing the pile cloud platform that the vehicle owner agrees to charge the current vehicle to be charged or the current vehicle to be charged is illegally used by others.
7. The electric vehicle charging control method of claim 5, wherein after generating and sending the first return instruction to the pile cloud platform, the method further comprises:
receiving an alarm notification sent by the pile cloud platform; wherein the alarm notification is generated by the pile cloud platform when the current vehicle to be charged is illegally used by others;
generating a third return instruction and sending the third return instruction to the pile cloud platform; and the third return instruction is used for limiting the current vehicle to be charged to move through the pile cloud platform when the vehicle owner agrees to lock the vehicle.
8. The utility model provides an electric automobile charge control device, is applied to terminal equipment, its characterized in that, the device includes:
the first authentication abnormity notification receiving module is used for receiving a first authentication abnormity notification sent by the stub cloud platform; the first authentication abnormity notification is used for authenticating the fingerprint of the current charging person acquired by the charging equipment by the pile cloud platform and is generated when the fingerprint of the current charging person is authenticated to be not the fingerprint of the owner of the current vehicle to be charged;
the first return instruction generating module is used for generating a first return instruction and sending the first return instruction to the pile cloud platform; the first return instruction is used for informing the pile cloud platform that the vehicle owner agrees to charge the current vehicle to be charged or the current vehicle to be charged is illegally used by others.
9. An electric vehicle charging control apparatus, comprising:
a memory for storing a computer program;
a processor for executing the computer program to carry out the steps of the method of claim 1, 2, 3, 5, 6 or 7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, is adapted to carry out the steps of the method of claim 1, 2, 3, 5, 6 or 7.
CN202010560471.3A 2020-06-18 2020-06-18 Charging control method and device for electric automobile Pending CN113905374A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010560471.3A CN113905374A (en) 2020-06-18 2020-06-18 Charging control method and device for electric automobile

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010560471.3A CN113905374A (en) 2020-06-18 2020-06-18 Charging control method and device for electric automobile

Publications (1)

Publication Number Publication Date
CN113905374A true CN113905374A (en) 2022-01-07

Family

ID=79186079

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010560471.3A Pending CN113905374A (en) 2020-06-18 2020-06-18 Charging control method and device for electric automobile

Country Status (1)

Country Link
CN (1) CN113905374A (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104869148A (en) * 2014-02-24 2015-08-26 通用汽车环球科技运作有限责任公司 Methods, Systems And Apparatus For Authorizing Operation Of An Electric Vehicle That Is Being Charged At A Charging Station
CN204741316U (en) * 2015-07-14 2015-11-04 仇登伟 Electric automobile's flow protection system that charges
CN105429200A (en) * 2015-11-12 2016-03-23 桂林众捷新能源科技有限公司 Electric automobile intelligent charging method based on mobile intelligent terminal
CN107221973A (en) * 2017-05-11 2017-09-29 上海蔚来汽车有限公司 Object to be charged, the method for authenticating of charging equipment and system
CN107323278A (en) * 2017-06-20 2017-11-07 广州汽车集团股份有限公司 Automobile charging gun locking system and its control method
CN109204018A (en) * 2018-09-17 2019-01-15 江苏万帮德和新能源科技股份有限公司 Intelligent charging system and its working method for electric car
CN109866648A (en) * 2019-04-25 2019-06-11 上汽大众汽车有限公司 Intelligent charging method for electromobile and system
CN110143151A (en) * 2019-04-23 2019-08-20 北京智充科技有限公司 A kind of method and system for reducing electric car charging identity documents and being stolen risk
CN110588428A (en) * 2019-09-29 2019-12-20 华人运通(上海)新能源驱动技术有限公司 Charging identification method and device, electric vehicle, charging pile and system
CN110660166A (en) * 2019-09-26 2020-01-07 广州小鹏汽车科技有限公司 Charging pile sharing method and device, storage medium and computer equipment
CN110782588A (en) * 2019-10-11 2020-02-11 深圳巴斯巴科技发展有限公司 Information prompting method, server and readable storage medium
CN110861528A (en) * 2019-11-29 2020-03-06 浙江智充电力科技有限公司 Charging system based on voice interaction and working method thereof
CN111071094A (en) * 2019-12-27 2020-04-28 特瓦特能源科技有限公司 Charging method and device

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104869148A (en) * 2014-02-24 2015-08-26 通用汽车环球科技运作有限责任公司 Methods, Systems And Apparatus For Authorizing Operation Of An Electric Vehicle That Is Being Charged At A Charging Station
CN204741316U (en) * 2015-07-14 2015-11-04 仇登伟 Electric automobile's flow protection system that charges
CN105429200A (en) * 2015-11-12 2016-03-23 桂林众捷新能源科技有限公司 Electric automobile intelligent charging method based on mobile intelligent terminal
CN107221973A (en) * 2017-05-11 2017-09-29 上海蔚来汽车有限公司 Object to be charged, the method for authenticating of charging equipment and system
CN107323278A (en) * 2017-06-20 2017-11-07 广州汽车集团股份有限公司 Automobile charging gun locking system and its control method
CN109204018A (en) * 2018-09-17 2019-01-15 江苏万帮德和新能源科技股份有限公司 Intelligent charging system and its working method for electric car
CN110143151A (en) * 2019-04-23 2019-08-20 北京智充科技有限公司 A kind of method and system for reducing electric car charging identity documents and being stolen risk
CN109866648A (en) * 2019-04-25 2019-06-11 上汽大众汽车有限公司 Intelligent charging method for electromobile and system
CN110660166A (en) * 2019-09-26 2020-01-07 广州小鹏汽车科技有限公司 Charging pile sharing method and device, storage medium and computer equipment
CN110588428A (en) * 2019-09-29 2019-12-20 华人运通(上海)新能源驱动技术有限公司 Charging identification method and device, electric vehicle, charging pile and system
CN110782588A (en) * 2019-10-11 2020-02-11 深圳巴斯巴科技发展有限公司 Information prompting method, server and readable storage medium
CN110861528A (en) * 2019-11-29 2020-03-06 浙江智充电力科技有限公司 Charging system based on voice interaction and working method thereof
CN111071094A (en) * 2019-12-27 2020-04-28 特瓦特能源科技有限公司 Charging method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
晏雷;: "分布式电动汽车充电桩信息安全防护技术研究与实现", 中小企业管理与科技(下旬刊), no. 02, 25 February 2020 (2020-02-25) *
窦洋洋;陈恒;代严满;胡宗华;: "家庭智能交流充电桩系统设计", 汽车实用技术, no. 13, 15 July 2017 (2017-07-15) *

Similar Documents

Publication Publication Date Title
Enev et al. Automobile driver fingerprinting
CN108540579B (en) Driver identity online monitoring method and device and storage medium
CN103738296B (en) Automobile safety management system and method
CN110758322B (en) Vehicle starting method, device, equipment and storage medium
CN105791388B (en) The long-range Activiation method of the vehicle device of car networking system
CN107139868A (en) The system that a kind of autonomous driving vehicle judges passenger identity
CN106714168B (en) Automatic authentication method and system based on distance activation
EP2454701B1 (en) Communication method, computer program product and communication system
JP2019524562A (en) System and method for ensuring vehicle safety
EP3144904A2 (en) System and method for accessing a vehicle
CN110570597A (en) identity recognition method, system and storage medium
CN112584309B (en) Car locking method, server, system, storage medium and computer equipment
US10762734B2 (en) Automatically generating a commercial driver logbook based on vehicular data
CN110001656A (en) A kind of motor vehicle driving detection method and system
CN112712614A (en) Bluetooth key authorization system and method for new energy automobile
CN105227555B (en) Equipment starting method and system
CN113905374A (en) Charging control method and device for electric automobile
CN102704764A (en) Door lock system for cab, door lock unlocking control method and device
DE102010003887A1 (en) Method for generating information signal e.g. short message service for hybrid car to charge car, involves producing signal to signalize charging possibility, when vehicle charging station is found within predetermined area
CN206962863U (en) Car owner's authentication system based on OBD interfaces
CN108248547A (en) Anti-stealing method for vehicles, platform and system
CN113103987A (en) Vehicle emergency unlocking control system and method
CN107703941B (en) Method and device for automatically controlling speed of vehicle
CN207449842U (en) VATS Vehicle Anti-Theft System based on OBD interfaces
CN112839064A (en) Intelligent control method and device for vehicle

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20220704

Address after: 313300 room 101-27, building 1, No. 236, Lingyan Road, Lingfeng street, Anji County, Huzhou City, Zhejiang Province (self declaration)

Applicant after: Zhejiang Anji Zhidian Holding Co.,Ltd.

Address before: 100020 unit 3805-3815, 38 / F, building 8, 91 Jianguo Road, Chaoyang District, Beijing

Applicant before: CHEZHUBANG (BEIJING) TECHNOLOGY Co.,Ltd.