CN114056170A - Charging authentication method and charging system - Google Patents

Charging authentication method and charging system Download PDF

Info

Publication number
CN114056170A
CN114056170A CN202111221622.3A CN202111221622A CN114056170A CN 114056170 A CN114056170 A CN 114056170A CN 202111221622 A CN202111221622 A CN 202111221622A CN 114056170 A CN114056170 A CN 114056170A
Authority
CN
China
Prior art keywords
charging
authentication
information
vehicle
charging pile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111221622.3A
Other languages
Chinese (zh)
Inventor
张宇航
许青松
陈锐
祖连兴
皮志武
罗光盛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CYG Sunri Co Ltd
Original Assignee
CYG Sunri Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CYG Sunri Co Ltd filed Critical CYG Sunri Co Ltd
Priority to CN202111221622.3A priority Critical patent/CN114056170A/en
Publication of CN114056170A publication Critical patent/CN114056170A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60LPROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
    • B60L53/00Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles
    • B60L53/60Monitoring or controlling charging stations
    • B60L53/65Monitoring or controlling charging stations involving identification of vehicles or their battery types
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60LPROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
    • B60L53/00Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles
    • B60L53/60Monitoring or controlling charging stations
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T10/00Road transport of goods or passengers
    • Y02T10/60Other road transportation technologies with climate change mitigation effect
    • Y02T10/70Energy storage systems for electromobility, e.g. batteries
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T10/00Road transport of goods or passengers
    • Y02T10/60Other road transportation technologies with climate change mitigation effect
    • Y02T10/7072Electromobility specific charging systems or methods for batteries, ultracapacitors, supercapacitors or double-layer capacitors
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T90/00Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02T90/10Technologies relating to charging of electric vehicles
    • Y02T90/12Electric charging stations
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T90/00Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02T90/10Technologies relating to charging of electric vehicles
    • Y02T90/16Information or communication technologies improving the operation of electric vehicles
    • Y02T90/167Systems integrating technologies related to power network operation and communication or information technologies for supporting the interoperability of electric or hybrid vehicles, i.e. smartgrids as interface for battery charging of electric vehicles [EV] or hybrid vehicles [HEV]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S30/00Systems supporting specific end-user applications in the sector of transportation
    • Y04S30/10Systems supporting the interoperability of electric or hybrid vehicles
    • Y04S30/14Details associated with the interoperability, e.g. vehicle recognition, authentication, identification or billing

Landscapes

  • Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Transportation (AREA)
  • Mechanical Engineering (AREA)
  • Charge And Discharge Circuits For Batteries Or The Like (AREA)

Abstract

The application is applicable to the technical field of charging, and provides a charging authentication method and a charging system, wherein the charging authentication method comprises the following steps: when the charging operation is detected, acquiring charging authentication information; the charging authentication information comprises the biological characteristic information of the target user and the vehicle identification of the vehicle to be charged; generating authentication information according to the biological characteristic information and the vehicle identification, and sending the authentication information to a server in communication connection with the charging pile; receiving an authentication result; the authentication result is returned to the charging pile after the server authenticates the authentication information; when the authentication result is detected to be a first preset result, charging the vehicle to be charged; the first preset result is used for describing the success of authentication. According to the charging authentication method, the charging pile can charge the vehicle to be charged only when the biometric information of the target user and the vehicle identification of the vehicle to be charged are authenticated successfully, and therefore safety and reliability of the charging pile are improved.

Description

Charging authentication method and charging system
Technical Field
The application belongs to the technical field of charging, and particularly relates to a charging authentication method and a charging system.
Background
At present, before charging the electric vehicle through charging pile, the authentication of the charging identity is usually required to be carried out, and the electric vehicle can be charged after the authentication of the charging identity passes.
In the prior art, generally, an acquired Vehicle Identification Number (VIN) of an electric Vehicle to be charged is authenticated, and after the VIN is authenticated, the electric Vehicle is charged. In the prior art, charging authentication is only carried out through the VIN code, and the VIN code is easy to obtain, so that the safety and reliability of the charging authentication are reduced.
Disclosure of Invention
The embodiment of the application provides a charging authentication method and a charging system, which can solve the problems that in the prior art, charging authentication is only carried out through a VIN code, the VIN code is easy to obtain, and the safety and reliability of the charging authentication are further reduced.
In a first aspect, an embodiment of the present application provides a charging authentication method, which is applied to a charging pile, and includes:
when the charging operation is detected, acquiring charging authentication information; the charging authentication information comprises biological characteristic information of a target user and a vehicle identification of a vehicle to be charged;
generating authentication information according to the biological characteristic information and the vehicle identification, and sending the authentication information to a server in communication connection with the charging pile;
receiving an authentication result; the authentication result is returned to the charging pile after the server authenticates the authentication information;
when the authentication result is detected to be a first preset result, charging the vehicle to be charged; the first preset result is used for describing the success of authentication.
Optionally, when the charging operation is detected, acquiring charging authentication information includes:
acquiring biological characteristic information of the target user through information acquisition equipment;
and pre-charging the vehicle to be charged to acquire the vehicle identification.
Optionally, the pre-charging the vehicle to be charged to obtain the vehicle identifier includes:
when the vehicle identification is not acquired within a first preset time period, stopping precharging the vehicle to be charged and outputting first prompt information; the first prompt message is used for describing that the vehicle identifier is not acquired within the first preset time period.
Optionally, after the biometric information of the target user is acquired by the information acquisition device, the method further includes:
responding to the charging mode information input by the target user, and determining a target charging strategy according to the charging mode information;
correspondingly, the generating authentication information according to the biological characteristic information and the vehicle identification, and sending the authentication information to a server in communication connection with the charging pile includes:
and generating the authentication information according to the target charging strategy, the biological characteristic information and the vehicle identification.
Optionally, when it is detected that the authentication result is a first preset result, charging the vehicle to be charged includes:
and charging the vehicle to be charged according to the target charging strategy.
Optionally, after generating authentication information according to the biometric information and the vehicle identifier and sending the authentication information to a server in communication connection with the charging pile, the method further includes:
when the authentication result is not received within a second preset time period, stopping precharging the vehicle to be charged and outputting second prompt information; the second prompt message is used for describing authentication timeout.
Optionally, after generating authentication information according to the biometric information and the vehicle identifier and sending the authentication information to a server in communication connection with the charging pile, the method further includes:
when the authentication result is detected to be a second preset result, stopping precharging the vehicle to be charged and outputting third prompt information; the second preset result is used for describing authentication failure; the third prompt message is used for describing the reason of authentication failure.
In a second aspect, an embodiment of the present application provides a charging authentication method, which is applied to a server of a charging pile, and includes:
receiving authentication information sent by the charging pile; the authentication information comprises biological characteristic information of a target user and a vehicle identification of a vehicle to be charged;
and carrying out authentication processing on the authentication information to obtain an authentication result, and sending the authentication result to the charging pile.
Optionally, the authenticating information includes a target charging policy, and the authenticating information is authenticated to obtain an authentication result, and the authenticating result is sent to the charging pile, including:
generating order information according to the target charging strategy;
and performing authentication processing according to the order information, the biological characteristic information and the vehicle identification to obtain the authentication result.
In a third aspect, an embodiment of the present application provides a charging pile, including:
a charging authentication information acquisition unit configured to acquire charging authentication information when a charging operation is detected; the charging authentication information comprises biological characteristic information of a target user and a vehicle identification of a vehicle to be charged;
the authentication information generating unit is used for generating authentication information according to the biological characteristic information and the vehicle identification and sending the authentication information to a server in communication connection with the charging pile;
an authentication result receiving unit for receiving an authentication result; the authentication result is returned to the charging pile after the server authenticates the authentication information;
the charging unit is used for charging the vehicle to be charged when the authentication result is detected to be a first preset result; the first preset result is used for describing the success of authentication.
In a fourth aspect, an embodiment of the present application provides a server for charging a pile, including:
the receiving unit is used for receiving the authentication information sent by the charging pile; the authentication information comprises biological characteristic information of a target user and a vehicle identification of a vehicle to be charged;
and the first processing unit is used for carrying out authentication processing on the authentication information to obtain an authentication result and sending the authentication result to the charging pile.
In a fifth aspect, an embodiment of the present application provides a charging pile, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the steps of the charging authentication method according to any one of the first aspect when executing the computer program.
In a sixth aspect, an embodiment of the present application provides a server for charging piles, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the steps of the charging authentication method according to any one of the second aspects when executing the computer program.
In a seventh aspect, an embodiment of the present application provides a charging system, including: the charging post is used for executing the steps of the charging authentication method according to any one of the first aspect, and the server is used for executing the steps of the charging authentication method according to any one of the second aspect.
In an eighth aspect, the present application provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor in a charging pile, the computer program implements the steps of the charging authentication method according to any one of the above first aspects.
In a ninth aspect, the present application provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor in a server of a charging pile, the computer program implements the steps of the charging authentication method according to any one of the second aspects.
In a tenth aspect, an embodiment of the present application provides a computer program product, when the computer program product runs on a charging pile, enabling the charging pile to execute the charging authentication method according to any one of the first aspect.
In an eleventh aspect, the present application provides a computer program product, when the computer program product runs on a server of a charging pile, the server of the charging pile may execute the charging authentication method according to any one of the second aspects.
Compared with the prior art, the embodiment of the application has the advantages that:
according to the charging authentication method provided by the embodiment of the application, when a charging operation is detected by a charging pile, charging authentication information comprising biological characteristic information of a target user and a vehicle identifier of a vehicle to be charged can be obtained, authentication information is generated according to the biological characteristic information and the vehicle identifier and is sent to a server in communication connection with the charging pile, so that the server can authenticate the biological characteristic information of the target user and the vehicle identifier of the vehicle to be charged at the same time and send an authentication result to the charging pile, after the charging pile receives the authentication result, whether the authentication result is a first preset result needs to be judged, and when the authentication result is determined to be the first preset result, the charging authentication is successful, and the vehicle to be charged is started. And the first preset result is used for describing the success of authentication. According to the charging authentication method, the charging pile can charge the vehicle to be charged only when the biometric information of the target user and the vehicle identification of the vehicle to be charged are authenticated successfully, and therefore safety and reliability of the charging pile are improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a charging system according to an embodiment of the present application;
fig. 2 is a flowchart illustrating an implementation of a charging authentication method according to an embodiment of the present application;
fig. 3 is a flowchart illustrating a specific implementation of S101 in a charging authentication method according to an embodiment of the present application;
fig. 4 is a flowchart of an implementation of a charging authentication method according to another embodiment of the present application;
fig. 5 is a schematic structural diagram of a charging pile according to an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of a charging pile according to another embodiment of the present application;
fig. 7 is a schematic structural diagram of a server of a charging pile according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a server of a charging pile according to another embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to" determining "or" in response to detecting ". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
Furthermore, in the description of the present application and the appended claims, the terms "first," "second," "third," and the like are used for distinguishing between descriptions and not necessarily for describing or implying relative importance.
Reference throughout this specification to "one embodiment" or "some embodiments," or the like, means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," or the like, in various places throughout this specification are not necessarily all referring to the same embodiment, but rather "one or more but not all embodiments" unless specifically stated otherwise. The terms "comprising," "including," "having," and variations thereof mean "including, but not limited to," unless expressly specified otherwise.
Referring to fig. 1, fig. 1 is a schematic structural diagram of a charging system according to an embodiment of the present disclosure. As shown in fig. 1, the battery swapping system provided in the embodiment of the present application includes: charging pile 10 and server 20 connected with charging pile in wireless communication.
In practical applications, the charging pile 10 is an unattended device that can be fixed on the ground or on a wall, installed in public buildings (such as public buildings, shopping malls, public parking lots, etc.), residential parking lots or charging stations, and can charge various types of electric vehicles according to different voltage levels.
The charging pile server 20 is a terminal device having a data processing function and capable of communicating with the charging pile, and includes but is not limited to a desktop computer, a cloud server, and the like.
Referring to fig. 2, fig. 2 is a flowchart illustrating an implementation of a charging authentication method according to an embodiment of the present application. As shown in fig. 2, the charging authentication method provided in an embodiment of the present application may include steps S101 to S108, which are detailed as follows:
in S101, when the charging pile detects a charging operation, charging authentication information is acquired; the charging authentication information includes biometric information of a target user and a vehicle identification of a vehicle to be charged.
In the embodiment of the application, the charging pile detects that the charging operation can be: the charging pile detects that a target user clicks a preset control on a human-computer interaction interface of the charging pile. The preset control can be set according to actual needs, and is not limited here.
In an embodiment of the present application, fill electric pile including being used for treating the vehicle that charges rifle that charges, consequently, fill electric pile and detect the operation of charging and can also be: fill electric pile and detect the rifle that charges and wait to charge vehicle wired connection, the rifle that charges inserts the socket that charges of waiting to charge the vehicle promptly.
In the embodiment of the application, when the charging pile detects the charging operation, the biological characteristic information of a target user triggering the charging operation and the vehicle identification of a vehicle to be charged can be acquired. The biometric information may be fingerprint information of the target user or face information of the target user. The Vehicle Identification may be a Vehicle Identification Number (VIN) of the Vehicle to be charged.
In an embodiment of the present application, the charging pile may specifically acquire the charging authentication information through steps S1011 to S1012 as shown in fig. 3, which are detailed as follows:
in S1011, biometric information of the target user is acquired by the information acquisition device.
In this embodiment, the biometric information may be fingerprint information or face information.
In an implementation manner of this embodiment, the information acquisition device may be a camera device, and therefore, the charging pile may obtain the face information of the target user in real time through the camera device. Specifically, the image pickup device can record a human face within a shooting range of the image pickup device to obtain a video containing human face information. Or, the image pickup device may photograph the face within the photographing range thereof based on a preset time interval, so as to obtain multiple frames of video images including face information.
Based on this, charging pile can obtain the video that contains the face information that camera equipment shot to frame processing is carried out to this video, obtains multiframe video image. Or, fill electric pile and can directly acquire the multiframe video image that camera equipment shot.
After the charging pile acquires the multiple frames of video images, the face information of the target user can be acquired from the video images with the most complete faces in the multiple video images.
In another implementation manner of this embodiment, the information acquisition device may be a fingerprint acquirer, and therefore the charging pile may acquire the fingerprint information of the target user in real time through the fingerprint acquirer.
Specifically, fill electric pile and can control fingerprint sampler output fingerprint collection prompt information, this fingerprint collection prompt information is used for reminding the target user to put into the collection position with the finger. The fingerprint collection prompt information may specifically be: the charging pile controls the acquisition interface of the fingerprint acquisition device to be always bright or to flicker. At this time, the acquisition position is the position range of the normally bright or flashing acquisition interface.
When the fingerprint collector detects that a finger is placed at the collection position, the fingerprint collector can collect fingerprint information of the finger.
The charging pile can determine the fingerprint information of the finger collected by the fingerprint collector as the fingerprint information of the target user.
In S1012, the vehicle to be charged is precharged, and the vehicle identifier is acquired.
In this embodiment, the pre-charging finger charging pile supplies power to a Battery Management System (BMS) of the vehicle to be charged through the auxiliary power supply.
Because the battery management system stores the vehicle identification of the vehicle to be charged, the charging pile can acquire the vehicle identification of the vehicle to be charged, which is sent by the battery management system, when the charging pile supplies power to the battery management system of the vehicle to be charged through the auxiliary power supply.
In an embodiment of the application, in order to improve the work efficiency of the charging pile and avoid that the charging pile is always in a state of acquiring the vehicle identifier of the vehicle to be charged, the charging pile may set a first preset time period as the time for acquiring the vehicle identifier of the vehicle to be charged, and if the charging pile does not acquire the vehicle identifier within the first preset time period, it indicates that the charging pile cannot acquire the vehicle identifier, and therefore, the charging pile may stop precharging the vehicle to be charged and output first prompt information. The first prompt information is used for describing that the charging pile does not acquire the vehicle identifier within a first preset time period. The first preset time period may be set according to actual needs, and is not limited herein. The first preset time period may be set to 2 minutes in consideration of the influence of network quality.
In S102, the charging pile generates authentication information according to the biological characteristic information and the vehicle identification.
In the embodiment of the application, in order to avoid charging the electric pile by illegal use, the safety and the reliability of the charging pile are improved, and the charging pile can generate the authentication information according to the biological characteristic information of the target user and the vehicle identification of the vehicle to be charged.
In one implementation manner of this embodiment, in order to ensure the security of the biometric information of the target user and the vehicle identifier of the vehicle to be charged during the transmission process, the biometric information and the vehicle identifier may be encrypted based on a preset encryption algorithm, and the encrypted biometric information and the vehicle identifier may be determined as the authentication information.
The preset encryption algorithm may be a symmetric encryption algorithm or an asymmetric encryption algorithm, and is not limited herein.
In S103, the charging pile sends the authentication information to a server in communication connection with the charging pile.
In S104, the server of the charging pile receives the authentication information sent by the charging pile.
In S105, the server of the charging pile performs authentication processing on the authentication information to obtain an authentication result.
In the embodiment of the application, the server of the charging pile can pre-store the corresponding relation between the preset biological characteristic information of each user and the preset vehicle identification of the vehicle to be charged.
In some embodiments, the preset biometric information of each user may correspond to a preset vehicle identification of one or more vehicles to be charged.
In other embodiments, the preset biometric information of multiple users may also correspond to the same preset vehicle identifier.
In practical application, the corresponding relationship may be obtained and stored by the server of the charging pile when each user registers in the relevant application program.
In the embodiment of the application, after receiving the authentication information, the server of the charging pile can acquire the biological characteristic information of the target user and the vehicle identification of the vehicle to be charged from the authentication information.
In an embodiment of the application, in combination with S102, the authentication information is encrypted biometric information and a vehicle identifier, so that the server of the charging pile may decrypt the authentication information based on a preset decryption algorithm corresponding to a preset encryption algorithm to obtain the biometric information and the vehicle identifier.
And after the server of the charging pile obtains the biological characteristic information and the vehicle identification of the target user, the server can perform authentication processing on the biological characteristic information and the vehicle identification.
It should be noted that, the server of the charging pile may authenticate the biometric information of the target user first, and then authenticate the vehicle identifier of the vehicle to be charged; or the vehicle identification of the vehicle to be charged can be authenticated first, and then the biological characteristic information of the target user can be authenticated; the biometric information of the target user and the vehicle identifier of the vehicle to be charged may also be authenticated at the same time, which is not limited herein.
The following description will be made in detail by taking an example in which a server of a charging pile authenticates biometric information of a target user first, and then authenticates a vehicle identifier of a vehicle to be charged.
Specifically, the charging pile server may compare the biometric information with pre-stored preset biometric information of each user one by one, and obtain a first comparison result. The first comparison result is used for indicating whether the server of the charging pile stores the biological feature information of the target user in advance. If first biological characteristic information which is the same as the biological characteristic information of the target user exists in the pre-stored preset biological characteristic information of each user, the first comparison result is that the biological characteristic information of the target user exists, at least one preset vehicle identification corresponding to the first biological characteristic information is obtained, and the vehicle identification of the vehicle to be charged and the at least one preset vehicle identification are compared one by one to obtain a second comparison result. The second comparison result is used for indicating whether the server of the charging pile has the corresponding relation between the first biological characteristic information and the vehicle identification of the vehicle to be charged. If the first vehicle identifier identical to the vehicle identifier of the vehicle to be charged exists in at least one preset vehicle identifier stored in advance, the second comparison result is that the biological characteristic information of the target user and the vehicle identifier of the vehicle to be charged have a corresponding relation, and at this time, the server of the charging pile can determine the target authentication code according to the first comparison result and the second comparison result and determine the target authentication code as an authentication result.
In the embodiment of the application, the server of the charging pile stores corresponding relations between different comparison results and the preset authentication codes in advance. Illustratively, the predetermined authentication code may be a number, including but not limited to 1, 2, and 3. The number 1 is used for representing that the authentication is successful, namely, a server of the charging pile stores the corresponding relation between the biological characteristic information of the target user and the vehicle identification of the vehicle to be charged in advance; the number 2 is used for representing authentication failure, and the failure reason is that the server of the charging pile does not have the biological characteristic information of the target user, namely the biological characteristic information is illegal biological characteristic information; the number 3 is used for representing authentication failure, and the failure reason is that although the server of the charging pile stores the biometric information of the target user, the biometric information of the target user does not have a corresponding relationship with the vehicle identifier of the vehicle to be charged, that is, the vehicle identifier of the vehicle to be charged is an illegal vehicle identifier.
Based on this, when the server of the charging pile determines that the first comparison result is that the biological characteristic information of the target user exists, and the second comparison result is that the biological characteristic information of the target user and the vehicle identification of the vehicle to be charged have a corresponding relationship, the server of the charging pile can determine that the corresponding target authentication code is the number 1, and determine the number 1 as the authentication result.
If the pre-stored preset biometric information of each user does not have the biometric information which is the same as the biometric information of the target user, the first comparison result is that the biometric information of the target user does not exist, and at this time, the server of the charging pile can determine that the corresponding target authentication code is number 2 according to the first comparison result and determine the number 2 as the authentication result.
When the first comparison result indicates that the biometric information of the target user exists, if at least one pre-stored preset vehicle identifier does not have a vehicle identifier which is the same as the vehicle identifier of the vehicle to be charged, the second comparison result indicates that the biometric information of the target user does not exist in the vehicle identifier of the vehicle to be charged, and at this time, the server of the charging pile can determine that the corresponding target authentication code is the number 3 according to the first comparison result and the second comparison result, and determine the number 3 as the authentication result.
In S106, the server of the charging pile sends the authentication result to the charging pile.
In S107, the charging pile receives the authentication result.
In S108, when detecting that the authentication result is a first preset result, the charging pile charges the vehicle to be charged; the first preset result is used for describing the success of authentication.
In the embodiment of the application, after receiving the authentication result sent by the server of the charging pile, when detecting that the target authentication code is the number 1, the charging pile can determine that the authentication result is a first preset result, that is, the authentication is successful, and therefore, the charging pile can start to charge the vehicle to be charged.
In an embodiment of the application, in order to improve the work efficiency of the charging pile, if the charging pile does not receive the authentication result sent by the server of the charging pile within a second preset time period, it may be determined that the authentication of the server of the charging pile is overtime, and therefore, the charging pile may immediately stop the pre-charging of the vehicle to be charged and output second prompt information. The second prompt information is used for describing that the server authentication of the charging pile is overtime, so that the target user can send a charging authentication request to the charging pile again, namely the target user can click the preset control on the human-computer interaction interface of the charging pile again.
In another embodiment of the application, after receiving the authentication result sent by the server of the charging pile, when detecting that the target authentication code is not the number 1, the charging pile may determine that the authentication result is a second preset result, that is, the authentication fails, and therefore, the charging pile may stop precharging the vehicle to be charged and output a third prompt message. The third prompt message is used for describing the reason of authentication failure.
Specifically, when detecting that the target authentication code is the number 2, the charging pile may determine that the authentication result is a second preset result, that is, the authentication fails, and meanwhile, may determine that the reason for the authentication failure is: the server of the charging pile does not have the biological characteristic information of the target user, namely the biological characteristic information in the charging authentication information acquired by the charging pile is illegal biological characteristic information, so that the charging pile can stop the pre-charging of the vehicle to be charged and output third prompt information containing the biological characteristic information of the target user as the illegal characteristic information.
When detecting that the target authentication code is the number 3, the charging pile may determine that the authentication result is a second preset result, that is, the authentication fails, and meanwhile, may determine that the reason for the authentication failure is: the server of the charging pile does not have the corresponding relation between the biological characteristic information of the target user and the vehicle identification of the vehicle to be charged, namely the vehicle identification in the charging authentication information acquired by the charging pile is an illegal vehicle identification, so that the charging pile can stop the pre-charging of the vehicle to be charged and output third prompt information containing the vehicle identification of the vehicle to be charged as the illegal vehicle identification.
It can be seen from the above that, according to the charging authentication method provided in this embodiment of the application, when a charging operation is detected, a charging pile may obtain charging authentication information including biometric information of a target user and a vehicle identifier of a vehicle to be charged, generate authentication information according to the biometric information and the vehicle identifier, and send the authentication information to a server in communication connection with the charging pile, so that the server may authenticate the biometric information of the target user and the vehicle identifier of the vehicle to be charged at the same time, and send an authentication result to the charging pile. And the first preset result is used for describing the success of authentication. According to the charging authentication method, the charging pile can charge the vehicle to be charged only when the biometric information of the target user and the vehicle identification of the vehicle to be charged are authenticated successfully, and therefore safety and reliability of the charging pile are improved.
In an embodiment of the present application, please refer to fig. 4 for improving the service efficiency of the charging pile, and fig. 4 is a flowchart illustrating an implementation of a charging authentication method according to another embodiment of the present application. With respect to the embodiments corresponding to fig. 2 and fig. 3, the charging authentication method provided in this embodiment may include steps S201 to S2011, which are detailed as follows:
in S201, when the charging pile detects a charging operation, the information acquisition device acquires biometric information of the target user.
S201 in this embodiment is the same as S1011 in the embodiment corresponding to fig. 3, and please refer to the related description in S1011, which is not repeated herein.
In S202, the charging pile responds to the charging mode information input by the target user, and determines a target charging policy according to the charging mode information.
In an implementation manner of this embodiment, a plurality of preset keys may be disposed on a display interface of the charging pile, and each preset key may correspond to a preset charging mode. For example, assuming that a preset key a1, a preset key a2, a preset key A3, and a preset key a4 are provided on a display interface of the charging pile, and the preset charging mode includes a natural charging mode, a time charging mode, a money charging mode, and an electric quantity charging mode, the charging pile may set the charging mode corresponding to the preset key a1 as the natural charging mode, the charging mode corresponding to the preset key a2 as the time charging mode, the charging mode corresponding to the preset key A3 as the money charging mode, and the charging mode corresponding to the preset key a4 as the electric quantity charging mode. The natural charging mode refers to a charging mode in which a charging pile can randomly select one of a time charging mode and an electric quantity charging mode and charges a vehicle to be charged until the vehicle to be charged is full of electric quantity. The time charging mode refers to a charging mode in which the charging pile charges the vehicle to be charged within the target charging time according to the target charging time set by the target user until the ending time of the target charging time is reached. The amount charging mode refers to a charging mode in which the charging pile charges the vehicle to be charged according to the target charging amount set by the target user. The electric quantity charging mode refers to that the charging pile charges the vehicle to be charged according to the target electric quantity set by the target user until the electric quantity of the vehicle to be charged reaches the target electric quantity.
It should be noted that each preset charging mode corresponds to one preset charging strategy. For example, the preset charging strategy corresponding to the natural charging mode is a natural charging strategy, and the preset charging strategy corresponding to the time charging mode is: and charging the vehicle to be charged according to the target charging time. The target charging time is set by the target user. The preset charging strategy corresponding to the amount charging mode is as follows: and charging the vehicle to be charged according to the target charging amount. The target charge amount is set by the target user. The preset charging strategy corresponding to the electric quantity charging mode is as follows: and charging the vehicle to be charged according to the target electric quantity. The target amount of power is set by the target user.
Based on this, after the charging pile detects that the target user clicks a preset button of a display interface of the charging pile, that is, the charging pile acquires the charging mode information, the target charging strategy can be determined according to the corresponding relation between the preset charging mode and the charging strategy.
In another implementation manner of this embodiment, the charging pile may be in communication connection with a user terminal of the target user, so that the target user may input charging mode information through the user terminal. Specifically, the target user can click the charging APP related to the charging pile on the user terminal, and perform charging mode selection operation on a display interface of the charging APP, that is, input charging mode information.
After detecting the charging mode selection operation, the user terminal can acquire charging mode information and send the charging mode information to the charging pile, and at the moment, the charging pile can determine a target charging strategy according to the charging mode information.
In S203, the charging pile precharges the vehicle to be charged, and acquires the vehicle identifier.
S203 in this embodiment is the same as S1012 in the embodiment corresponding to fig. 3, and please refer to the related description in S1012, which is not repeated herein.
In S204, the charging pile generates the authentication information according to the target charging policy, the biometric information, and the vehicle identifier.
In an implementation manner of this embodiment, in order to ensure the security of the biometric information of the target user, the vehicle identifier of the vehicle to be charged, and the target charging policy during the transmission process, the biometric information and the vehicle identifier may be encrypted based on a preset encryption algorithm, and the encrypted biometric information, the vehicle identifier, and the target charging policy may be determined as the authentication information.
The preset encryption algorithm may be a symmetric encryption algorithm or an asymmetric encryption algorithm, and is not limited herein.
In S205, the charging pile sends the authentication information to a server in communication connection with the charging pile.
In S206, the server of the charging pile receives the authentication information sent by the charging pile.
In S207, the server of the charging pile generates order information according to the target charging policy.
In this embodiment, after receiving the authentication information, the server of the charging pile may obtain the target charging policy from the authentication information.
In an embodiment of the application, in combination with S204, the authentication information is encrypted biometric information, a vehicle identifier, and a target charging policy, so that the server of the charging pile may decrypt the authentication information based on a preset decryption algorithm corresponding to a preset encryption algorithm to obtain the biometric information, the vehicle identifier, and the target charging policy.
After the server of the charging pile obtains the target charging strategy, the charging price can be determined according to the target charging strategy selected by the target user.
Specifically, when the target charging policy is a natural charging policy, in some possible embodiments, the server of the charging pile may determine a full-charge time for charging the vehicle to be charged to a full charge amount according to the current electric quantity of the vehicle to be charged and the charging speed of the charging pile, calculate a charging time of the vehicle to be charged according to the current time and the full-charge time, and determine a charging price according to the charging time and a first preset rule. The first preset rule may be: the charge price is calculated according to the charge charging standard per unit time (per hour). When the current electric quantity indicates that the charging pile acquires the vehicle identification of the vehicle to be charged, the electric quantity of the vehicle to be charged, and the current time indicates the moment when the charging pile acquires the vehicle identification of the vehicle to be charged.
In other possible embodiments, the server of the charging pile may further calculate the charging capacity of the vehicle to be charged according to the current capacity and the full capacity of the vehicle to be charged, and determine the charging price according to the charging capacity and a second preset rule. The second preset rule may be: and calculating the charging price according to the charging standard of the unit electric quantity.
When the target charging strategy is an electric quantity charging strategy, the server of the charging pile can calculate the charging electric quantity of the vehicle to be charged according to the current electric quantity of the vehicle to be charged and the target electric quantity, and determine the charging price according to the charging electric quantity and a second preset rule.
When the target charging policy is a time charging policy, the server of the charging pile may determine the charging price according to the target charging time and a first preset rule.
When the target charging policy is a money charging policy, the server of the charging pile can directly determine the target charging money set by the target user as the charging price.
After the server of the charging pile obtains the charging price, order information can be generated according to the charging price. The order information may include, but is not limited to: the charging method comprises the steps of user number, vehicle identification of a vehicle to be charged, charging mode, charging price, and starting time and ending time of charging. The user number may be randomly generated by the server of the charging pile in real time when generating order information, or may be a serial number corresponding to the user number generated by the server of the charging pile according to the pre-stored biometric information of each user.
In S208, the server of the charging pile performs authentication processing according to the order information, the biometric information, and the vehicle identifier, so as to obtain the authentication result.
It should be noted that, the server of the charging pile may authenticate the biometric information of the target user, authenticate the vehicle identifier of the vehicle to be charged, and authenticate the order information; or the vehicle identification of the vehicle to be charged is authenticated, then the biological characteristic information of the target user is authenticated, and finally the order information is authenticated; the biometric information of the target user, the vehicle identification of the vehicle to be charged, and the order information may also be authenticated at the same time, which is not limited herein.
The following description will be made in detail by taking an example in which a server of a charging pile authenticates biometric information of a target user, authenticates a vehicle identifier of a vehicle to be charged, and authenticates order information.
In the prior art, after the server of the charging pile generates order information, money deduction can be directly performed through a bank card number, a WeChat account number or a Payment account number bound with a target user, so that the server of the charging pile can compare the biological characteristic information of the target user with pre-stored preset biological characteristic information of each user one by one to obtain a first comparison result. The first comparison result is used for indicating whether the server of the charging pile stores the biological feature information of the target user in advance. If first biological characteristic information which is the same as the biological characteristic information of the target user exists in the pre-stored preset biological characteristic information of each user, the first comparison result is that the biological characteristic information of the target user exists, at least one preset vehicle identification corresponding to the first biological characteristic information is obtained, and the vehicle identification of the vehicle to be charged and the at least one preset vehicle identification are compared one by one to obtain a second comparison result. The second comparison result is used for indicating whether the server of the charging pile has the corresponding relation between the first biological characteristic information and the vehicle identification of the vehicle to be charged. If the first vehicle identification identical to the vehicle identification of the vehicle to be charged exists in the at least one pre-stored preset vehicle identification, the second comparison result is that the biological characteristic information of the target user and the vehicle identification of the vehicle to be charged have a corresponding relation, and at the moment, the server of the charging pile can deduct money according to the order information to obtain a money deduction result. The deduction result is used for indicating whether the server of the charging pile deducts money successfully or not. If the deduction result is that the deduction is successful, the server of the charging pile can generate a target authentication code according to the first comparison result and the second comparison result, namely the deduction result, and the authentication code is determined as an authentication result.
In this embodiment, the server of the charging pile stores in advance the corresponding relationship between the different comparison results and the preset authentication code. The predetermined authentication code may be a number including, but not limited to, 1, 2, 3, and 4. The number 1 is used for representing that the authentication is successful, namely, the server of the charging pile stores the corresponding relation between the biological characteristic information of the target user and the vehicle identification of the vehicle to be charged in advance, and the deduction is successful; the number 2 is used for representing authentication failure, and the failure reason is that the server of the charging pile does not have the biological characteristic information of the target user, namely the biological characteristic information is illegal biological characteristic information; the number 3 is used for representing authentication failure, and the failure reason is that although the server of the charging pile stores the biological characteristic information of the target user, the biological characteristic information of the target user does not have a corresponding relationship with the vehicle identification of the vehicle to be charged, namely the vehicle identification of the vehicle to be charged is illegal; the number 4 is used for representing authentication failure, and the failure reason is that although the server of the charging pile stores the biological characteristic information of the target user and the vehicle identification of the vehicle to be charged have a corresponding relationship, the deduction failure is caused, that is, the amount of money of the target user is insufficient.
Based on this, when the server of the charging pile determines that the first comparison result is that the biological characteristic information of the target user exists, the second comparison result is that the corresponding relationship exists between the biological characteristic information of the target user and the vehicle identification of the vehicle to be charged, and the deduction result is successful, the server of the charging pile can determine that the corresponding target authentication code is number 1, and determines the number 1 as the authentication result.
If the server of the charging pile detects that first biometric information which is the same as the biometric information of the target user does not exist in the pre-stored preset biometric information of each user, the first comparison result is that the biometric information of the target user does not exist, at this time, the server of the charging pile can determine that the corresponding target authentication code is number 2 according to the first comparison result, and determine the number 2 as the authentication result.
When the server of the charging pile detects that the first comparison result is that the biometric information of the target user exists, if the first vehicle identifier which is the same as the vehicle identifier of the vehicle to be charged does not exist in at least one pre-stored preset vehicle identifier, the second comparison result is that the biometric information of the target user does not exist in the vehicle identifier of the vehicle to be charged, at this time, the server of the charging pile can directly determine that the corresponding target authentication code is the number 3 according to the first comparison result and the second comparison result, and determine the number 3 as the authentication result.
When the server of the charging pile detects that the first comparison result is that the biological characteristic information of the target user exists, the second comparison result is that the corresponding relationship exists between the biological characteristic information of the target user and the vehicle identification of the vehicle to be charged, and the deduction result is that the deduction fails, the server of the charging pile can determine that the corresponding target authentication code is number 4 according to the first comparison result, the second comparison result and the deduction result, and determine the number 4 as the authentication result.
In S209, the server of the charging pile sends the authentication result to the charging pile.
In S2010, the charging pile receives the authentication result.
In S2011, when detecting that the authentication result is the first preset result, the charging pile charges the vehicle to be charged according to the target charging policy.
In the embodiment of the application, after receiving the authentication result sent by the server of the charging pile, when detecting that the target authentication code is the number 1, the charging pile can determine that the authentication result is a first preset result, that is, the authentication is successful, and therefore, the charging pile can start to charge the vehicle to be charged according to the target charging strategy.
In an embodiment of the application, in order to improve the work efficiency of the charging pile, if the charging pile does not receive the authentication result sent by the server of the charging pile within a second preset time period, it may be determined that the authentication of the server of the charging pile is overtime, and therefore, the charging pile may immediately stop the pre-charging of the vehicle to be charged and output second prompt information. The second prompt message is used for describing that the server authentication of the charging pile is overtime, so that the target user can send a charging authentication request to the charging pile again, namely, the charging operation is triggered.
In another embodiment of the application, after receiving the authentication result sent by the server of the charging pile, when detecting that the target authentication code is not the number 1, the charging pile may determine that the authentication result is a second preset result, that is, the authentication fails, and therefore, the charging pile may stop precharging the vehicle to be charged and output a third prompt message. The third prompt message is used for describing the reason of authentication failure.
Specifically, when detecting that the target authentication code is the number 2, the charging pile may determine that the authentication result is a second preset result, that is, the authentication fails, and meanwhile, may determine that the reason for the authentication failure is: the server of the charging pile does not have the biological characteristic information of the target user, namely the biological characteristic information in the charging authentication information acquired by the charging pile is illegal biological characteristic information, so that the charging pile can stop the pre-charging of the vehicle to be charged and output third prompt information containing the biological characteristic information of the target user as the illegal characteristic information.
When detecting that the target authentication code is the number 3, the charging pile may determine that the authentication result is a second preset result, that is, the authentication fails, and meanwhile, may determine that the reason for the authentication failure is: the server of the charging pile does not have the corresponding relation between the biological characteristic information of the target user and the vehicle identification of the vehicle to be charged, namely the vehicle identification in the charging authentication information acquired by the charging pile is an illegal vehicle identification, so that the charging pile can stop the pre-charging of the vehicle to be charged and output third prompt information containing the vehicle identification of the vehicle to be charged as the illegal vehicle identification.
When detecting that the target authentication code is the number 4, the charging pile may determine that the authentication result is a second preset result, that is, the authentication fails, and meanwhile, may determine that the reason for the authentication failure is: the server of the charging pile is in money deduction failure, namely the sum of the target user is insufficient, so that the charging pile can stop pre-charging the vehicle to be charged and output third prompt information containing the insufficient sum of the target user.
As can be seen from the above, according to the charging authentication method provided in the embodiment of the application, the charging pile can determine the specific target charging policy selected by the target user through the charging mode information output by the target user, and then the server of the charging pile can authenticate the order information generated according to the target charging policy, the biometric information of the target user, and the vehicle identifier of the vehicle to be charged at the same time, so that when the charging pile determines that the authentication is successful, the vehicle to be charged can be charged according to the target charging policy, and the service efficiency of the charging pile is improved.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
Corresponding to the charging authentication method described in the foregoing embodiment, fig. 5 shows a structural block diagram of the charging pile provided in an embodiment of the present application, and for convenience of description, only a part related to the embodiment of the present application is shown. Referring to fig. 5, the charging pile 500 includes: a charging authentication information acquisition unit 51, an authentication information generation unit 52, an authentication result receiving unit 53, and a first charging unit 54. Wherein:
the charging authentication information acquisition unit 51 is configured to acquire charging authentication information when a charging operation is detected; the charging authentication information includes biometric information of a target user and a vehicle identification of a vehicle to be charged.
And generating authentication information according to the biological characteristic information and the vehicle identification, and sending the authentication information to a server in communication connection with the charging pile.
Receiving an authentication result; and the authentication result is returned to the charging pile after the server authenticates the authentication information.
When the authentication result is detected to be a first preset result, charging the vehicle to be charged; the first preset result is used for describing the success of authentication.
In an embodiment of the present application, the charging authentication information obtaining unit 51 specifically includes: a biometric information acquisition unit and a vehicle identification acquisition unit. Wherein:
the biological characteristic information acquisition unit is used for acquiring the biological characteristic information of the target user through information acquisition equipment.
The vehicle identification obtaining unit is used for pre-charging the vehicle to be charged and obtaining the vehicle identification.
In an embodiment of the present application, the vehicle identifier obtaining unit is specifically configured to: when the vehicle identification is not acquired within a first preset time period, stopping precharging the vehicle to be charged and outputting first prompt information; the first prompt message is used for describing that the vehicle identifier is not acquired within the first preset time period.
In one embodiment of the present application, the charging authentication information acquisition unit 51 further includes: a policy determination unit.
The strategy determining unit is used for responding to the charging mode information input by the target user and determining a target charging strategy according to the charging mode information.
Correspondingly, the authentication information generating unit 52 is specifically configured to: and generating the authentication information according to the target charging strategy, the biological characteristic information and the vehicle identification.
In an embodiment of the present application, the first charging unit 54 is specifically configured to: and charging the vehicle to be charged according to the target charging strategy.
In one embodiment of the present application, charging pile 500 further includes: a first output unit.
The first output unit is used for stopping precharging the vehicle to be charged and outputting second prompt information when the authentication result is not received in a second preset time period; the second prompt message is used for describing authentication timeout.
In one embodiment of the present application, charging pile 500 further includes: and a second output unit.
The second output unit is used for stopping precharging the vehicle to be charged and outputting third prompt information when the authentication result is detected to be a second preset result; the second preset result is used for describing authentication failure; the third prompt message is used for describing the reason of authentication failure.
Fig. 6 is a schematic structural diagram of a charging pile according to an embodiment of the present application. As shown in fig. 6, the charging pile 6 of this embodiment includes: at least one processor 60 (only one shown in fig. 6), a memory 61, and a computer program 62 stored in the memory 61 and executable on the at least one processor 60, the processor 60 implementing the steps in any of the above embodiments of the charging authentication method when executing the computer program 62.
Those skilled in the art will appreciate that fig. 6 is merely an example of the charging post 6, and does not constitute a limitation on the charging post 6, and may include more or less components than those shown, or some components in combination, or different components, such as input and output devices, network access devices, etc.
The Processor 60 may be a Central Processing Unit (CPU), and the Processor 60 may be other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 61 may in some embodiments be an internal storage unit of the charging post 6, such as a hard disk or a memory of the charging post 6. In other embodiments, the memory 61 may also be an external storage device of the charging post 6, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are equipped on the charging post 6. Further, the memory 61 may also include both an internal storage unit of the charging post 6 and an external storage device. The memory 61 is used for storing an operating system, an application program, a BootLoader (BootLoader), data, and other programs, such as program codes of the computer program. The memory 61 may also be used to temporarily store data that has been output or is to be output.
An embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the steps in any one of the above embodiments of the charging authentication method may be implemented.
The embodiment of the application provides a computer program product, and when the computer program product runs on a charging pile, the steps in any one of the embodiments of the charging authentication method can be realized when the charging pile is executed.
It should be noted that, for the information interaction, execution process, and other contents between the above-mentioned devices/units, the specific functions and technical effects thereof are based on the same concept as those of the embodiment of the method of the present application, and specific reference may be made to the part of the embodiment of the method, which is not described herein again.
Referring to fig. 7, fig. 7 is a schematic structural diagram illustrating a server of a charging pile according to an embodiment of the present application, and as shown in fig. 7, a server 700 of a charging pile according to the embodiment may include: a receiving unit 71 and a first processing unit 72. Wherein:
the receiving unit 71 is configured to receive authentication information sent by the charging pile; the authentication information comprises the biological characteristic information of the target user and the vehicle identification of the vehicle to be charged.
The first processing unit 72 is configured to perform authentication processing on the authentication information to obtain an authentication result, and send the authentication result to the charging pile.
In one embodiment of the present application, the authentication information includes a target charging policy; the first processing unit 72 specifically includes: an information generating unit and a second processing unit. Wherein:
the information generating unit is used for generating order information according to the target charging strategy.
The second processing unit is used for carrying out authentication processing according to the order information, the biological characteristic information and the vehicle identification to obtain the authentication result.
Fig. 8 is a schematic structural diagram of a server of a charging pile according to an embodiment of the present application. As shown in fig. 8, the server 8 of the charging pile of this embodiment includes: at least one processor 80 (only one is shown in fig. 8), a memory 81, and a computer program 82 stored in the memory 81 and executable on the at least one processor 80, wherein the processor 80 executes the computer program 82 to implement the steps in any of the above-mentioned method embodiments for using a power swapping device.
The server 8 of the charging pile can be a desktop computer, a notebook, a palm computer and other computing equipment. The server of the charging post may include, but is not limited to, a processor 80 and a memory 81. It will be understood by those skilled in the art that fig. 8 is merely an example of the server 8 of the charging post, and does not constitute a limitation of the server 8 of the charging post, and may include more or less components than those shown, or some components in combination, or different components, such as input and output devices, network access devices, etc.
The Processor 80 may be a Central Processing Unit (CPU), and the Processor 80 may be other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 81 may in some embodiments be an internal storage unit of the charging post server 8, such as a hard disk or a memory of the user terminal 8. In other embodiments, the memory 81 may also be an external storage device of the server 8 of the charging pile, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are equipped on the server 8 of the charging pile. The memory 81 is used for storing an operating system, an application program, a BootLoader (BootLoader), data, and other programs, such as program codes of the computer program. The memory 81 may also be used to temporarily store data that has been output or is to be output.
An embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the steps in any one of the above embodiments of the charging authentication method may be implemented.
The embodiment of the application provides a computer program product, and when the computer program product runs on a server of a charging pile, the server of the charging pile can realize the steps of any one of the charging authentication methods when executed.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (10)

1. A charging authentication method is applied to a charging pile and is characterized by comprising the following steps:
when the charging operation is detected, acquiring charging authentication information; the charging authentication information comprises biological characteristic information of a target user and a vehicle identification of a vehicle to be charged;
generating authentication information according to the biological characteristic information and the vehicle identification, and sending the authentication information to a server in communication connection with the charging pile;
receiving an authentication result; the authentication result is returned to the charging pile after the server authenticates the authentication information;
when the authentication result is detected to be a first preset result, charging the vehicle to be charged; the first preset result is used for describing the success of authentication.
2. The charging authentication method of claim 1, wherein the obtaining of the charging authentication information when the charging operation is detected comprises:
acquiring biological characteristic information of the target user through information acquisition equipment;
and pre-charging the vehicle to be charged to acquire the vehicle identification.
3. The charge authentication method according to claim 2, wherein the precharging the vehicle to be charged and acquiring the vehicle identification comprises:
when the vehicle identification is not acquired within a first preset time period, stopping precharging the vehicle to be charged and outputting first prompt information; the first prompt message is used for describing that the vehicle identifier is not acquired within the first preset time period.
4. The charging authentication method of claim 2, wherein after the obtaining of the biometric information of the target user by the information collecting device, further comprising:
responding to the charging mode information input by the target user, and determining a target charging strategy according to the charging mode information;
correspondingly, the generating authentication information according to the biological characteristic information and the vehicle identification, and sending the authentication information to a server in communication connection with the charging pile includes:
and generating the authentication information according to the target charging strategy, the biological characteristic information and the vehicle identification.
5. The charging authentication method of claim 4, wherein the charging the vehicle to be charged when detecting that the authentication result is a first preset result comprises:
and charging the vehicle to be charged according to the target charging strategy.
6. The charging authentication method of claim 2, wherein after generating authentication information according to the biometric information and the vehicle identifier and sending the authentication information to a server in communication connection with the charging post, the method further comprises:
when the authentication result is not received within a second preset time period, stopping precharging the vehicle to be charged and outputting second prompt information; the second prompt message is used for describing authentication timeout.
7. The charging authentication method of claim 2, wherein after generating authentication information according to the biometric information and the vehicle identifier and sending the authentication information to a server in communication connection with the charging post, the method further comprises:
when the authentication result is detected to be a second preset result, stopping precharging the vehicle to be charged and outputting third prompt information; the second preset result is used for describing authentication failure; the third prompt message is used for describing the reason of authentication failure.
8. A charging authentication method is applied to a server of a charging pile, and is characterized by comprising the following steps:
receiving authentication information sent by the charging pile; the authentication information comprises biological characteristic information of a target user and a vehicle identification of a vehicle to be charged;
and carrying out authentication processing on the authentication information to obtain an authentication result, and sending the authentication result to the charging pile.
9. The charging authentication method of claim 8, wherein the authentication information includes a target charging policy, and the authenticating the authentication information to obtain an authentication result and sending the authentication result to the charging pile comprises:
generating order information according to the target charging strategy;
and performing authentication processing according to the order information, the biological characteristic information and the vehicle identification to obtain the authentication result.
10. A charging system comprising a charging pile for performing the steps of the charge authentication method according to any one of claims 1 to 7 and a server for the charging pile for performing the steps of the charge authentication method according to any one of claims 8 to 9.
CN202111221622.3A 2021-10-20 2021-10-20 Charging authentication method and charging system Pending CN114056170A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111221622.3A CN114056170A (en) 2021-10-20 2021-10-20 Charging authentication method and charging system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111221622.3A CN114056170A (en) 2021-10-20 2021-10-20 Charging authentication method and charging system

Publications (1)

Publication Number Publication Date
CN114056170A true CN114056170A (en) 2022-02-18

Family

ID=80235005

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111221622.3A Pending CN114056170A (en) 2021-10-20 2021-10-20 Charging authentication method and charging system

Country Status (1)

Country Link
CN (1) CN114056170A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115431814A (en) * 2022-09-21 2022-12-06 重庆长安汽车股份有限公司 Vehicle charging method and device
CN115499188A (en) * 2022-09-13 2022-12-20 协鑫电港云科技(海南)有限公司 Vehicle authentication method and device, electronic equipment and storage medium
CN117400755A (en) * 2023-11-01 2024-01-16 中国矿业大学 Battery charging management method and system based on cloud big data

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120268247A1 (en) * 2011-04-20 2012-10-25 General Electric Company Method and system for authorizing the charging of an electric vehicle's batteries based on biometric identity information
CN106878279A (en) * 2017-01-09 2017-06-20 上海蔚来汽车有限公司 Charging and conversion electric facility and the automatic right-discriminating method and system for treating charging and conversion electric object
CN106882069A (en) * 2017-03-08 2017-06-23 广州车电网新能源有限公司 A kind of electric automobile identification system and method
CN106912001A (en) * 2017-01-09 2017-06-30 上海蔚来汽车有限公司 Automatic right-discriminating method and system based on WIFI broadcast
CN110481381A (en) * 2019-08-29 2019-11-22 重庆长安新能源汽车科技有限公司 A kind of electric car charging method, charging pile, server and charging system
CN110588428A (en) * 2019-09-29 2019-12-20 华人运通(上海)新能源驱动技术有限公司 Charging identification method and device, electric vehicle, charging pile and system
CN112584309A (en) * 2020-12-11 2021-03-30 车主邦(北京)科技有限公司 Car locking method, server, system, storage medium and computer equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120268247A1 (en) * 2011-04-20 2012-10-25 General Electric Company Method and system for authorizing the charging of an electric vehicle's batteries based on biometric identity information
CN106878279A (en) * 2017-01-09 2017-06-20 上海蔚来汽车有限公司 Charging and conversion electric facility and the automatic right-discriminating method and system for treating charging and conversion electric object
CN106912001A (en) * 2017-01-09 2017-06-30 上海蔚来汽车有限公司 Automatic right-discriminating method and system based on WIFI broadcast
CN106882069A (en) * 2017-03-08 2017-06-23 广州车电网新能源有限公司 A kind of electric automobile identification system and method
CN110481381A (en) * 2019-08-29 2019-11-22 重庆长安新能源汽车科技有限公司 A kind of electric car charging method, charging pile, server and charging system
CN110588428A (en) * 2019-09-29 2019-12-20 华人运通(上海)新能源驱动技术有限公司 Charging identification method and device, electric vehicle, charging pile and system
CN112584309A (en) * 2020-12-11 2021-03-30 车主邦(北京)科技有限公司 Car locking method, server, system, storage medium and computer equipment

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115499188A (en) * 2022-09-13 2022-12-20 协鑫电港云科技(海南)有限公司 Vehicle authentication method and device, electronic equipment and storage medium
CN115431814A (en) * 2022-09-21 2022-12-06 重庆长安汽车股份有限公司 Vehicle charging method and device
CN115431814B (en) * 2022-09-21 2024-05-17 重庆长安汽车股份有限公司 Vehicle charging method and device
CN117400755A (en) * 2023-11-01 2024-01-16 中国矿业大学 Battery charging management method and system based on cloud big data

Similar Documents

Publication Publication Date Title
CN114056170A (en) Charging authentication method and charging system
CN108335421B (en) Charging method and charging device for charging pile, charging pile and readable storage medium
CN108346042B (en) Vehicle fee payment method, device, terminal and computer readable storage medium
US6115601A (en) Payment scheme for a mobile communication service
CN112977116A (en) Charging control system and method and electric automobile
CN106300534B (en) A kind of method and device of mobile phone charging
CN111071094A (en) Charging method and device
WO2023078255A1 (en) Charging system, charging method, and integrated device
CN110769410B (en) Method, application module, system and terminal for activating a vehicle-mounted unit device
CN111340969B (en) Non-card ETC offline processing method and device, computer equipment and storage medium
WO2019062964A1 (en) Charging method and device for electric vehicle, storage medium and electric vehicle
CN110852851B (en) Block chain-based vehicle sharing method, device and readable storage medium
US8931080B2 (en) Method and system for controlling the execution of a function protected by authentification of a user, in particular for the access to a resource
CN111626726A (en) Life payment method, device, equipment and storage medium
CN112669112A (en) Method and system for automatically charging parking monthly card
CN113306437B (en) Charging method, charging device, electronic equipment and storage medium
KR102324912B1 (en) Method, device and system for strengthening authentication security of members using electric vehicle charger using the balance of the rechargeable card
US9096136B2 (en) System for facilitating the electrical recharging of a vehicle
CN111277961B (en) Method and device for guiding user to use riding certificate
CN117912121A (en) Self-service vehicle authorization and parking rights and interests self-service redemption method, device and equipment
CN112693360A (en) Electric automobile electric quantity management method and related device
WO2023125634A1 (en) Charging method and apparatus for battery swapping vehicle, electronic device, and storage medium
CN107734204B (en) Rechargeable card recharging method and device
CN118656875A (en) Electronic signature stamping method, device, equipment, storage medium and product
TW202242781A (en) Management methods and systems for electric vehicle charging platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination