CN114465731B - Battery trusted encryption management system and method based on blockchain - Google Patents
Battery trusted encryption management system and method based on blockchain Download PDFInfo
- Publication number
- CN114465731B CN114465731B CN202210196789.7A CN202210196789A CN114465731B CN 114465731 B CN114465731 B CN 114465731B CN 202210196789 A CN202210196789 A CN 202210196789A CN 114465731 B CN114465731 B CN 114465731B
- Authority
- CN
- China
- Prior art keywords
- battery
- data
- blockchain
- platform
- random
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 16
- 238000013507 mapping Methods 0.000 claims abstract description 10
- 238000007726 management method Methods 0.000 claims description 45
- 238000012795 verification Methods 0.000 claims description 19
- 230000002776 aggregation Effects 0.000 claims description 6
- 238000004220 aggregation Methods 0.000 claims description 6
- 238000010586 diagram Methods 0.000 claims description 3
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 150000001875 compounds Chemical class 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000003912 environmental pollution Methods 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
- 229910052751 metal Inorganic materials 0.000 description 1
- 239000002184 metal Substances 0.000 description 1
- 150000002739 metals Chemical class 0.000 description 1
- 239000010926 waste battery Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
Abstract
The invention provides a battery trusted encryption management system and method based on a blockchain, comprising the following steps: a battery: burning the public key and the blockchain SDK into a battery BMS module to encrypt uplink data; battery trusted management platform: analyzing, checking and decrypting the received data to obtain information on the block chain; battery IoT platform: establishing a mapping relation between a battery number and a battery public key, and receiving a certificate of original full data and uplink data sent by a battery; a blockchain certification platform: receiving a request of uplink data of the battery, checking a signature, and returning an uplink certificate after the signature passes; financial institutions: the battery trusted management platform is registered and logged in, and a public key is provided to the battery IoT platform and the blockchain certification platform to view plaintext data of the battery statistics class. According to the invention, the block chain SDK is embedded in the battery BMS module, so that the battery data is encrypted and uplink, and the safety and the credibility of the data are ensured from the source end.
Description
Technical Field
The invention relates to the technical field of battery trusted encryption management, in particular to a battery trusted encryption management system and method based on a blockchain.
Background
In recent years, new energy automobile industry in China rapidly develops, but more and more power batteries need to be updated as time goes on. For retired power batteries, if conventional treatment methods such as landfill, incineration and the like are adopted, harmful metals or other compounds in the waste batteries cause great environmental pollution.
Patent document CN114022162a (application number: CN202111257388. X) discloses a echelon battery traceability system based on a trusted execution environment, comprising: the block chain node is used for managing the full life cycle information of the echelon battery; the chain management system is used for storing the full life cycle information of the echelon battery and uploading the full life cycle information to the blockchain node; and the block chain connecting module is used for connecting the block chain nodes and the under-chain management system, and the block chain connecting module is configured and built in a trusted execution environment.
At present, there are still several difficulties in battery management, for example, there is a risk of tampering with battery data, and there is a problem that battery information data is not stored comprehensively in real time.
Disclosure of Invention
In view of the defects in the prior art, the invention aims to provide a battery trusted encryption management system and method based on a blockchain.
The battery trusted encryption management system based on the blockchain provided by the invention comprises the following components:
a battery: the public key pub_a and the blockchain SDK of the financial institution are burnt into a battery BMS module through burning software, uplink data are encrypted, and then the uplink data are sent to a battery trusted management platform and a battery IoT platform;
battery trusted management platform: analyzing and checking the received data, and then decrypting to obtain information on the block chain;
battery IoT platform: the method comprises the steps of importing battery numbers and battery public keys in batches, establishing a one-to-one mapping relation, and receiving a certificate of original full data and uplink data sent by a battery;
a blockchain certification platform: the method comprises the steps of importing battery numbers and battery public keys in batches, establishing a one-to-one mapping relation, receiving a uplink data request of the battery, performing signature verification, and returning an uplink certificate poeHash to the battery after the signature verification is passed;
financial institutions: registering and logging in the battery trusted management platform, generating a pair of public and private keys through a secret key generation inlet, providing the public key pub_a and the public key pub_a for the battery IoT platform and the blockchain certification platform, and checking plaintext data of the battery statistics type.
Preferably, the uplink data are subjected to hash operation, the calculated hash value is signed through a battery private key pri, then the hash value and the signature one are sent to a blockchain certification platform, and the uplink certificate poeHash is obtained after the signature verification is passed.
Preferably, a symmetric encryption key random is randomly generated, and AES symmetric encryption is performed on the battery uplink data by using the symmetric encryption key random to obtain an encryption result M1, m1=aes_enc (data, random);
ECC encrypting random using public key pub_a of the financial institution to obtain encryption result M2, m2=ecc_enc (random, pub_a);
signing the m2|m1|poehash by using a battery private key pri to obtain a signature=sign (m2|m1|poehash, pri);
the data m=m2|m1|poehash|signature is sent to the battery trusted management platform, and the original full-size data is synchronously sent to the battery IoT platform.
Preferably, after the verification of the battery trusted management platform is passed, the financial institution decrypts M2 using its own private key pri_a, to obtain a symmetric decryption key random, random=ecc_dec (M2, pri_a);
AES decrypting M1 using the symmetric decryption key random, resulting in battery data, data=aes_dec (M1, random).
Preferably, the information on the blockchain is obtained from the blockchain certification platform by taking the uplink certification poeHash as an index, wherein the information comprises the height of the block, the transaction hash and the timestamp, and the battery data are displayed in a statistical chart according to the aggregation rule.
The battery trusted encryption management method based on the blockchain provided by the invention comprises the following steps:
step 1: the public key pub_a and the blockchain SDK of the financial institution are burnt into the battery BMS module through burning software, and uplink data are encrypted;
step 2: analyzing and checking labels of the received data in a battery trusted management platform, and then decrypting to obtain information on a block chain;
step 3: importing battery numbers and battery public keys in batches on a battery internet of things (IoT) platform and a blockchain certification platform, establishing a one-to-one mapping relation, checking labels for uplink data requests, and returning an uplink certificate poeHash;
step 4: public key pub_a is provided to the battery IoT platform and the blockchain certification platform to view the plaintext data of the battery statistics class.
Preferably, the uplink data are subjected to hash operation, the calculated hash value is signed through a battery private key pri, then the hash value and the signature one are sent to a blockchain certification platform, and the uplink certificate poeHash is obtained after the signature verification is passed.
Preferably, a symmetric encryption key random is randomly generated, and AES symmetric encryption is performed on the battery uplink data by using the symmetric encryption key random to obtain an encryption result M1, m1=aes_enc (data, random);
ECC encrypting random using public key pub_a of the financial institution to obtain encryption result M2, m2=ecc_enc (random, pub_a);
signing the m2|m1|poehash by using a battery private key pri to obtain a signature=sign (m2|m1|poehash, pri);
the data m=m2|m1|poehash|signature is sent to the battery trusted management platform, and the original full-size data is synchronously sent to the battery IoT platform.
Preferably, after the verification of the battery trusted management platform is passed, the financial institution decrypts M2 using its own private key pri_a, to obtain a symmetric decryption key random, random=ecc_dec (M2, pri_a);
AES decrypting M1 using the symmetric decryption key random, resulting in battery data, data=aes_dec (M1, random).
Preferably, the information on the blockchain is obtained from the blockchain certification platform by taking the uplink certification poeHash as an index, wherein the information comprises the height of the block, the transaction hash and the timestamp, and the battery data are displayed in a statistical chart according to the aggregation rule.
Compared with the prior art, the invention has the following beneficial effects:
(1) According to the invention, by utilizing the fusion technology of 'blockchain + internet of things + privacy computation', the operation state data of the battery is encrypted and uplink by embedding the blockchain SDK in the battery BMS module, and the uplink data is simultaneously sent to the battery trusted management platform and the blockchain, so that the safety and the reliability of the data are ensured from the source end;
(2) By the method, the financial institution can provide low-cost financial service for the battery asset side, the financing availability of the battery asset side is solved, and the financial institution can obtain the permeable and active management of the asset.
Drawings
Other features, objects and advantages of the present invention will become more apparent upon reading of the detailed description of non-limiting embodiments, given with reference to the accompanying drawings in which:
FIG. 1 is a diagram of a battery trusted management platform technology architecture;
fig. 2 is a full-flow data flow timing diagram.
Detailed Description
The present invention will be described in detail with reference to specific examples. The following examples will assist those skilled in the art in further understanding the present invention, but are not intended to limit the invention in any way. It should be noted that variations and modifications could be made by those skilled in the art without departing from the inventive concept. These are all within the scope of the present invention.
Examples:
as shown in fig. 1, the present invention provides a battery trusted encryption management system based on blockchain, comprising:
1) Battery cell
A. The public key pub_a and the blockchain SDK of the financial institution are burnt into the battery BMS module through burning software;
B. the battery carries out hash operation on the uplink data, signs the calculated hash value through a battery private key pri, sends the hash value and the signature I to a block chain storage verification platform, and obtains a return value poeHash after the signature verification;
C. random numbers random (symmetric encryption keys) are randomly generated inside the battery;
D. performing AES symmetric encryption on the battery uplink data by using random to obtain an encryption result M1, namely M1=AES_ENC (data, random);
E. ECC encryption is carried out on random by using a supervision public key pub_a, so that an encryption result M2 is obtained, namely M2=ECC_ENC (random, pub_a);
F. m2| pair using battery private key pri the |m1||poehash is signed, the result is that the signature is obtained and, i.e. signature=sign (m2||m1||poehash, pri);
G. battery will data m=m2M 1 poeHash the signature is sent to a battery trusted management platform;
H. the battery synchronization sends raw data (full data) to the battery IoT platform.
2) Battery IoT platform (asset square)
A. Importing battery numbers and battery public keys in batches to establish a one-to-one mapping relation;
B. and receiving the original full data and the certification certificate of the uplink data sent by the battery.
3) Block chain evidence-storing platform
A. Importing battery numbers and battery public keys in batches to establish a one-to-one mapping relation;
B. and receiving a uplink data request of the battery, performing signature verification, and returning an uplink certificate poeHash to the battery after the signature verification passes.
4) Battery trusted management platform
A. Analyzing the received data to obtain M1, M2, poeHash and signature;
B. checking the data, and verifying whether the data is really the data sent by the monitored battery or not by using verity (M2M 1 poeHash, signature, pub);
C. the verification is successful, the financial institution decrypts M2 by using the private key pri_a to obtain a symmetric decryption key random, random=ECC_DEC (M2, pri_a);
D. AES decrypting M1 using the symmetric decryption key random to obtain battery data, data=aes_dec (M1, random);
E. acquiring information on a blockchain from a blockchain certification platform by taking the poeHash as an index, wherein the information comprises a blockheight, a transaction hash, a timestamp and the like;
F. and the battery data are displayed in a statistical chart according to the aggregation rule.
5) Financial institution
A. Registering and logging in a battery trusted management platform;
B. generating a pair of public and private keys, namely a private key pri_a and a public key pub_a, through a key generation inlet;
C. providing the public key pub_a to a battery IoT platform and a blockchain certification platform;
D. and checking plaintext data of the battery statistics.
As shown in fig. 2, the battery trusted encryption management method based on blockchain provided by the invention comprises the following steps: step 1: the public key pub_a and the blockchain SDK of the financial institution are burnt into the battery BMS module through burning software, and uplink data are encrypted; step 2: analyzing and checking labels of the received data in a battery trusted management platform, and then decrypting to obtain information on a block chain; step 3: importing battery numbers and battery public keys in batches on a battery internet of things (IoT) platform and a blockchain certification platform, establishing a one-to-one mapping relation, checking labels for uplink data requests, and returning an uplink certificate poeHash; step 4: public key pub_a is provided to the battery IoT platform and the blockchain certification platform to view the plaintext data of the battery statistics class.
Carrying out hash operation on the uplink data, signing the calculated hash value through a battery private key pri, then sending the hash value and the signature I to a blockchain certification platform, and obtaining an uplink certificate poeHash after signature verification. Randomly generating a symmetric encryption key random, and performing AES symmetric encryption on the battery uplink data by using the symmetric encryption key random to obtain an encryption result M1, wherein M1=AES_ENC (data, random); ECC encrypting random using public key pub_a of the financial institution to obtain encryption result M2, m2=ecc_enc (random, pub_a); signing the m2|m1|poehash by using a battery private key pri to obtain a signature=sign (m2|m1|poehash, pri); the data m=m2|m1|poehash|signature is sent to the battery trusted management platform, and the original full-size data is synchronously sent to the battery IoT platform. After the verification of the battery trusted management platform is passed, the financial institution decrypts the M2 by using the private key pri_a thereof to obtain a symmetric decryption key random, random=ecc_dec (M2, pri_a); AES decrypting M1 using the symmetric decryption key random, resulting in battery data, data=aes_dec (M1, random). And acquiring information on the blockchain from a blockchain certification platform by taking the uplinking certification poeHash as an index, wherein the information comprises the block height, the transaction hash and the time stamp, and displaying the statistical chart of the battery data according to the aggregation rule.
Those skilled in the art will appreciate that the systems, apparatus, and their respective modules provided herein may be implemented entirely by logic programming of method steps such that the systems, apparatus, and their respective modules are implemented as logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers, etc., in addition to the systems, apparatus, and their respective modules being implemented as pure computer readable program code. Therefore, the system, the apparatus, and the respective modules thereof provided by the present invention may be regarded as one hardware component, and the modules included therein for implementing various programs may also be regarded as structures within the hardware component; modules for implementing various functions may also be regarded as being either software programs for implementing the methods or structures within hardware components.
The foregoing describes specific embodiments of the present invention. It is to be understood that the invention is not limited to the particular embodiments described above, and that various changes or modifications may be made by those skilled in the art within the scope of the appended claims without affecting the spirit of the invention. The embodiments of the present application and features in the embodiments may be combined with each other arbitrarily without conflict.
Claims (10)
1. A battery trusted encryption management system based on a blockchain, comprising:
a battery: the public key pub_a and the blockchain SDK of the financial institution are burnt into a battery BMS module through burning software, uplink data are encrypted, and then the uplink data are sent to a battery trusted management platform and a battery IoT platform;
battery trusted management platform: analyzing and checking the received data, and then decrypting to obtain information on the block chain;
battery IoT platform: the method comprises the steps of importing battery numbers and battery public keys in batches, establishing a one-to-one mapping relation, and receiving a certificate of original full data and uplink data sent by a battery;
a blockchain certification platform: the method comprises the steps of importing battery numbers and battery public keys in batches, establishing a one-to-one mapping relation, receiving a uplink data request of the battery, performing signature verification, and returning an uplink certificate poeHash to the battery after the signature verification is passed;
financial institutions: registering and logging in the battery trusted management platform, generating a pair of public and private keys through a secret key generation inlet, providing the public key pub_a and the public key pub_a for the battery IoT platform and the blockchain certification platform, and checking plaintext data of the battery statistics type.
2. The battery trusted encryption management system based on the blockchain as in claim 1, wherein the uplink data is hashed, the calculated hash value is signed by a battery private key pri, then the hash value and the signature one are sent to the blockchain certification platform, and the uplink certificate poeHash is obtained after the signature verification is passed.
3. The battery trusted encryption management system based on blockchain as in claim 1, wherein the symmetric encryption key random is randomly generated, and AES symmetric encryption is performed on the battery uplink data using the symmetric encryption key random to obtain an encryption result M1, m1=aes_enc (data, random);
ECC encrypting random using public key pub_a of the financial institution to obtain encryption result M2, m2=ecc_enc (random, pub_a);
signing the m2|m1|poehash by using a battery private key pri to obtain a signature=sign (m2|m1|poehash, pri);
the data m=m2|m1|poehash|signature is sent to the battery trusted management platform, and the original full-size data is synchronously sent to the battery IoT platform.
4. The blockchain-based battery trusted encryption management system of claim 1, wherein after the verification of the battery trusted management platform is passed, the financial institution decrypts M2 using its own private key pri_a to obtain a symmetric decryption key random, random = ecc_dec (M2, pri_a);
AES decrypting M1 using the symmetric decryption key random, resulting in battery data, data=aes_dec (M1, random).
5. The blockchain-based battery trusted encryption management system of claim 1, wherein the information on the blockchain is obtained from the blockchain certification platform by using the uplink certificate poeHash as an index, including the block height, the transaction hash and the timestamp, and the battery data is subjected to statistical class diagram display according to the aggregation rule.
6. A battery trusted encryption management method based on a blockchain, which is characterized in that the battery trusted encryption management system based on the blockchain as described in claim 1 is adopted, comprising:
step 1: the public key pub_a and the blockchain SDK of the financial institution are burnt into the battery BMS module through burning software, and uplink data are encrypted;
step 2: analyzing and checking labels of the received data in a battery trusted management platform, and then decrypting to obtain information on a block chain;
step 3: importing battery numbers and battery public keys in batches on a battery internet of things (IoT) platform and a blockchain certification platform, establishing a one-to-one mapping relation, checking labels for uplink data requests, and returning an uplink certificate poeHash;
step 4: public key pub_a is provided to the battery IoT platform and the blockchain certification platform to view the plaintext data of the battery statistics class.
7. The method for managing the trusted encryption of the battery based on the blockchain as in claim 6, wherein the uplink data are hashed, the calculated hash value is signed by a battery private key pri, then the hash value and the signature one are sent to the blockchain certification platform together, and the uplink certificate poehsh is obtained after the signature verification is passed.
8. The battery trusted encryption management method based on blockchain as in claim 6, wherein symmetric encryption key random is randomly generated, AES symmetric encryption is performed on battery uplink data using symmetric encryption key random to obtain encryption result M1, m1=aes_enc (data, random);
ECC encrypting random using public key pub_a of the financial institution to obtain encryption result M2, m2=ecc_enc (random, pub_a);
signing the m2|m1|poehash by using a battery private key pri to obtain a signature=sign (m2|m1|poehash, pri);
the data m=m2|m1|poehash|signature is sent to the battery trusted management platform, and the original full-size data is synchronously sent to the battery IoT platform.
9. The method for trusted encryption management of a blockchain-based battery of claim 6, wherein after the verification of the trusted management platform of the battery is passed, the financial institution decrypts M2 using its own private key pri_a to obtain a symmetric decryption key random, random = ecc_dec (M2, pri_a);
AES decrypting M1 using the symmetric decryption key random, resulting in battery data, data=aes_dec (M1, random).
10. The method for managing the trusted encryption of the battery based on the blockchain as claimed in claim 6, wherein the information on the blockchain is obtained from the blockchain certification platform by using the uplink certificate poeHash as an index, wherein the information comprises the height of the block, the transaction hash and the timestamp, and the battery data are displayed in a statistical class chart according to an aggregation rule.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210196789.7A CN114465731B (en) | 2022-03-01 | 2022-03-01 | Battery trusted encryption management system and method based on blockchain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210196789.7A CN114465731B (en) | 2022-03-01 | 2022-03-01 | Battery trusted encryption management system and method based on blockchain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114465731A CN114465731A (en) | 2022-05-10 |
CN114465731B true CN114465731B (en) | 2023-12-29 |
Family
ID=81415739
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210196789.7A Active CN114465731B (en) | 2022-03-01 | 2022-03-01 | Battery trusted encryption management system and method based on blockchain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114465731B (en) |
Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2014203719A (en) * | 2013-04-08 | 2014-10-27 | 日立オートモティブシステムズ株式会社 | On-vehicle battery management system |
CN107743065A (en) * | 2017-10-20 | 2018-02-27 | 智车优行科技(上海)有限公司 | Battery uses verification method, battery system and automobile |
CN109815208A (en) * | 2018-12-13 | 2019-05-28 | 重庆邮电大学 | A kind of battery management system based on block chain |
CN110119639A (en) * | 2019-05-13 | 2019-08-13 | 上海英恒电子有限公司 | A kind of method for charging electric vehicles anti-counterfeiting authentication method, apparatus and system |
KR20190137195A (en) * | 2018-05-31 | 2019-12-11 | (주)유씨티 | Charging system for electric motors |
GB202005354D0 (en) * | 2020-04-10 | 2020-05-27 | Shapiro Graham | Anti-theft system for bikes |
CN111598586A (en) * | 2020-05-14 | 2020-08-28 | 广东汉力威技术有限公司 | Electric automobile battery anti-counterfeiting system based on block chain |
KR20200130534A (en) * | 2019-05-08 | 2020-11-19 | 주식회사 동영산업 | Block Chain Based Battery Management System |
CN112217635A (en) * | 2020-09-16 | 2021-01-12 | 郑州信大先进技术研究院 | Information encryption transmission method and system based on block chain and high-speed password card |
CN112765684A (en) * | 2021-04-12 | 2021-05-07 | 腾讯科技(深圳)有限公司 | Block chain node terminal management method, device, equipment and storage medium |
KR20210057233A (en) * | 2019-11-11 | 2021-05-21 | 주식회사 동영산업 | Block Chain Based Battery Management System |
CN112837071A (en) * | 2020-07-26 | 2021-05-25 | 深圳市柘阳科技有限公司 | Storage battery traceability system based on block chain |
CN113360445A (en) * | 2021-07-07 | 2021-09-07 | 上海万向区块链股份公司 | Lithium ion battery data acquisition sharing device based on block chain technology |
WO2021219086A1 (en) * | 2020-04-29 | 2021-11-04 | 青岛海尔滚筒洗衣机有限公司 | Data transmission method and system based on blockchain |
CN113673893A (en) * | 2021-08-27 | 2021-11-19 | 杭州协能科技股份有限公司 | Retired power battery management method and system |
CN113673987A (en) * | 2020-05-14 | 2021-11-19 | 上海电盛科技有限公司 | Retired battery management method and device based on block chain |
CN114022162A (en) * | 2021-10-27 | 2022-02-08 | 杭州协能科技股份有限公司 | Echelon battery tracing system and method based on trusted execution environment |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018158102A1 (en) * | 2017-02-28 | 2018-09-07 | Airbus Helicopters | Integrated method and device for storing and sharing data |
US20190353709A1 (en) * | 2018-05-15 | 2019-11-21 | Exide Technologies | Trusted battery meter and battery monitoring system |
US20200084027A1 (en) * | 2018-09-06 | 2020-03-12 | Bank Of Montreal | Systems and methods for encryption of data on a blockchain |
KR20210041404A (en) * | 2019-10-07 | 2021-04-15 | 삼성전자주식회사 | Electronic device and method for blockchain address management thereof |
-
2022
- 2022-03-01 CN CN202210196789.7A patent/CN114465731B/en active Active
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2014203719A (en) * | 2013-04-08 | 2014-10-27 | 日立オートモティブシステムズ株式会社 | On-vehicle battery management system |
CN107743065A (en) * | 2017-10-20 | 2018-02-27 | 智车优行科技(上海)有限公司 | Battery uses verification method, battery system and automobile |
KR20190137195A (en) * | 2018-05-31 | 2019-12-11 | (주)유씨티 | Charging system for electric motors |
CN109815208A (en) * | 2018-12-13 | 2019-05-28 | 重庆邮电大学 | A kind of battery management system based on block chain |
KR20200130534A (en) * | 2019-05-08 | 2020-11-19 | 주식회사 동영산업 | Block Chain Based Battery Management System |
CN110119639A (en) * | 2019-05-13 | 2019-08-13 | 上海英恒电子有限公司 | A kind of method for charging electric vehicles anti-counterfeiting authentication method, apparatus and system |
KR20210057233A (en) * | 2019-11-11 | 2021-05-21 | 주식회사 동영산업 | Block Chain Based Battery Management System |
GB202005354D0 (en) * | 2020-04-10 | 2020-05-27 | Shapiro Graham | Anti-theft system for bikes |
WO2021219086A1 (en) * | 2020-04-29 | 2021-11-04 | 青岛海尔滚筒洗衣机有限公司 | Data transmission method and system based on blockchain |
CN111598586A (en) * | 2020-05-14 | 2020-08-28 | 广东汉力威技术有限公司 | Electric automobile battery anti-counterfeiting system based on block chain |
CN113673987A (en) * | 2020-05-14 | 2021-11-19 | 上海电盛科技有限公司 | Retired battery management method and device based on block chain |
CN112837071A (en) * | 2020-07-26 | 2021-05-25 | 深圳市柘阳科技有限公司 | Storage battery traceability system based on block chain |
CN112217635A (en) * | 2020-09-16 | 2021-01-12 | 郑州信大先进技术研究院 | Information encryption transmission method and system based on block chain and high-speed password card |
CN112765684A (en) * | 2021-04-12 | 2021-05-07 | 腾讯科技(深圳)有限公司 | Block chain node terminal management method, device, equipment and storage medium |
CN113360445A (en) * | 2021-07-07 | 2021-09-07 | 上海万向区块链股份公司 | Lithium ion battery data acquisition sharing device based on block chain technology |
CN113673893A (en) * | 2021-08-27 | 2021-11-19 | 杭州协能科技股份有限公司 | Retired power battery management method and system |
CN114022162A (en) * | 2021-10-27 | 2022-02-08 | 杭州协能科技股份有限公司 | Echelon battery tracing system and method based on trusted execution environment |
Also Published As
Publication number | Publication date |
---|---|
CN114465731A (en) | 2022-05-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100521601C (en) | System and method for updating keys used for public key cryptography | |
CN111464980B (en) | Electronic evidence obtaining device and method based on block chain in Internet of vehicles environment | |
CN109088871B (en) | Data transmission method and system based on block chain technology | |
CN107742212B (en) | Asset verification method, device and system based on block chain | |
CN114372296B (en) | Block chain-based user behavior data auditing method and system | |
CN112600675B (en) | Electronic voting method and device based on group signature, electronic equipment and storage medium | |
CN114389889B (en) | File full life cycle management method and device based on block chain technology | |
CN111695097A (en) | Login checking method and device and computer readable storage medium | |
CN110460674A (en) | A kind of information-pushing method, apparatus and system | |
CN113822675A (en) | Block chain based message processing method, device, equipment and storage medium | |
CN114172659B (en) | Message transmission method, device, equipment and storage medium in block chain system | |
CN114553532A (en) | Data secure transmission method and device, electronic equipment and storage medium | |
CN114465731B (en) | Battery trusted encryption management system and method based on blockchain | |
CN113162763A (en) | Data encryption and storage method and device, electronic equipment and storage medium | |
CN104486311B (en) | A kind of remote data integrity inspection method for supporting scalability | |
CN101159733B (en) | Electronic burst event management system | |
AU2021103828A4 (en) | A novel system and auditing technique for cloud based digital forensic readiness with integrity and privacy preservation of health care data | |
CN115643090A (en) | Longitudinal federal analysis method, device, equipment and medium based on privacy retrieval | |
CN112422294B (en) | Anonymous voting method and device based on ring signature, electronic equipment and storage medium | |
CN114238886A (en) | IBE-based power grid PMU identity authentication method, device, computer equipment and medium | |
CN113810421A (en) | Block chain-based PRE Internet of things data sharing method and system | |
CN105515760A (en) | Information encryption method, information decryption method and information encryption and decryption system | |
CN116684077B (en) | Carbon emission monitoring method and device based on carbon platform | |
Majigi et al. | BLOCKCHAIN-BASED ZERO KNOWLEDGE PROOF MODEL FOR SECURE DATA SHARING SCHEME IN A DISTRIBUTED VEHICULAR NETWORKS | |
CN114531440B (en) | Industrial edge side data sharing system based on combination of active identification and block chain technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |