CN114465731B - Battery trusted encryption management system and method based on blockchain - Google Patents

Battery trusted encryption management system and method based on blockchain Download PDF

Info

Publication number
CN114465731B
CN114465731B CN202210196789.7A CN202210196789A CN114465731B CN 114465731 B CN114465731 B CN 114465731B CN 202210196789 A CN202210196789 A CN 202210196789A CN 114465731 B CN114465731 B CN 114465731B
Authority
CN
China
Prior art keywords
battery
data
blockchain
platform
random
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210196789.7A
Other languages
Chinese (zh)
Other versions
CN114465731A (en
Inventor
蔡滨宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Wanxiang Blockchain Inc
Original Assignee
Shanghai Wanxiang Blockchain Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Wanxiang Blockchain Inc filed Critical Shanghai Wanxiang Blockchain Inc
Priority to CN202210196789.7A priority Critical patent/CN114465731B/en
Publication of CN114465731A publication Critical patent/CN114465731A/en
Application granted granted Critical
Publication of CN114465731B publication Critical patent/CN114465731B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Abstract

The invention provides a battery trusted encryption management system and method based on a blockchain, comprising the following steps: a battery: burning the public key and the blockchain SDK into a battery BMS module to encrypt uplink data; battery trusted management platform: analyzing, checking and decrypting the received data to obtain information on the block chain; battery IoT platform: establishing a mapping relation between a battery number and a battery public key, and receiving a certificate of original full data and uplink data sent by a battery; a blockchain certification platform: receiving a request of uplink data of the battery, checking a signature, and returning an uplink certificate after the signature passes; financial institutions: the battery trusted management platform is registered and logged in, and a public key is provided to the battery IoT platform and the blockchain certification platform to view plaintext data of the battery statistics class. According to the invention, the block chain SDK is embedded in the battery BMS module, so that the battery data is encrypted and uplink, and the safety and the credibility of the data are ensured from the source end.

Description

Battery trusted encryption management system and method based on blockchain
Technical Field
The invention relates to the technical field of battery trusted encryption management, in particular to a battery trusted encryption management system and method based on a blockchain.
Background
In recent years, new energy automobile industry in China rapidly develops, but more and more power batteries need to be updated as time goes on. For retired power batteries, if conventional treatment methods such as landfill, incineration and the like are adopted, harmful metals or other compounds in the waste batteries cause great environmental pollution.
Patent document CN114022162a (application number: CN202111257388. X) discloses a echelon battery traceability system based on a trusted execution environment, comprising: the block chain node is used for managing the full life cycle information of the echelon battery; the chain management system is used for storing the full life cycle information of the echelon battery and uploading the full life cycle information to the blockchain node; and the block chain connecting module is used for connecting the block chain nodes and the under-chain management system, and the block chain connecting module is configured and built in a trusted execution environment.
At present, there are still several difficulties in battery management, for example, there is a risk of tampering with battery data, and there is a problem that battery information data is not stored comprehensively in real time.
Disclosure of Invention
In view of the defects in the prior art, the invention aims to provide a battery trusted encryption management system and method based on a blockchain.
The battery trusted encryption management system based on the blockchain provided by the invention comprises the following components:
a battery: the public key pub_a and the blockchain SDK of the financial institution are burnt into a battery BMS module through burning software, uplink data are encrypted, and then the uplink data are sent to a battery trusted management platform and a battery IoT platform;
battery trusted management platform: analyzing and checking the received data, and then decrypting to obtain information on the block chain;
battery IoT platform: the method comprises the steps of importing battery numbers and battery public keys in batches, establishing a one-to-one mapping relation, and receiving a certificate of original full data and uplink data sent by a battery;
a blockchain certification platform: the method comprises the steps of importing battery numbers and battery public keys in batches, establishing a one-to-one mapping relation, receiving a uplink data request of the battery, performing signature verification, and returning an uplink certificate poeHash to the battery after the signature verification is passed;
financial institutions: registering and logging in the battery trusted management platform, generating a pair of public and private keys through a secret key generation inlet, providing the public key pub_a and the public key pub_a for the battery IoT platform and the blockchain certification platform, and checking plaintext data of the battery statistics type.
Preferably, the uplink data are subjected to hash operation, the calculated hash value is signed through a battery private key pri, then the hash value and the signature one are sent to a blockchain certification platform, and the uplink certificate poeHash is obtained after the signature verification is passed.
Preferably, a symmetric encryption key random is randomly generated, and AES symmetric encryption is performed on the battery uplink data by using the symmetric encryption key random to obtain an encryption result M1, m1=aes_enc (data, random);
ECC encrypting random using public key pub_a of the financial institution to obtain encryption result M2, m2=ecc_enc (random, pub_a);
signing the m2|m1|poehash by using a battery private key pri to obtain a signature=sign (m2|m1|poehash, pri);
the data m=m2|m1|poehash|signature is sent to the battery trusted management platform, and the original full-size data is synchronously sent to the battery IoT platform.
Preferably, after the verification of the battery trusted management platform is passed, the financial institution decrypts M2 using its own private key pri_a, to obtain a symmetric decryption key random, random=ecc_dec (M2, pri_a);
AES decrypting M1 using the symmetric decryption key random, resulting in battery data, data=aes_dec (M1, random).
Preferably, the information on the blockchain is obtained from the blockchain certification platform by taking the uplink certification poeHash as an index, wherein the information comprises the height of the block, the transaction hash and the timestamp, and the battery data are displayed in a statistical chart according to the aggregation rule.
The battery trusted encryption management method based on the blockchain provided by the invention comprises the following steps:
step 1: the public key pub_a and the blockchain SDK of the financial institution are burnt into the battery BMS module through burning software, and uplink data are encrypted;
step 2: analyzing and checking labels of the received data in a battery trusted management platform, and then decrypting to obtain information on a block chain;
step 3: importing battery numbers and battery public keys in batches on a battery internet of things (IoT) platform and a blockchain certification platform, establishing a one-to-one mapping relation, checking labels for uplink data requests, and returning an uplink certificate poeHash;
step 4: public key pub_a is provided to the battery IoT platform and the blockchain certification platform to view the plaintext data of the battery statistics class.
Preferably, the uplink data are subjected to hash operation, the calculated hash value is signed through a battery private key pri, then the hash value and the signature one are sent to a blockchain certification platform, and the uplink certificate poeHash is obtained after the signature verification is passed.
Preferably, a symmetric encryption key random is randomly generated, and AES symmetric encryption is performed on the battery uplink data by using the symmetric encryption key random to obtain an encryption result M1, m1=aes_enc (data, random);
ECC encrypting random using public key pub_a of the financial institution to obtain encryption result M2, m2=ecc_enc (random, pub_a);
signing the m2|m1|poehash by using a battery private key pri to obtain a signature=sign (m2|m1|poehash, pri);
the data m=m2|m1|poehash|signature is sent to the battery trusted management platform, and the original full-size data is synchronously sent to the battery IoT platform.
Preferably, after the verification of the battery trusted management platform is passed, the financial institution decrypts M2 using its own private key pri_a, to obtain a symmetric decryption key random, random=ecc_dec (M2, pri_a);
AES decrypting M1 using the symmetric decryption key random, resulting in battery data, data=aes_dec (M1, random).
Preferably, the information on the blockchain is obtained from the blockchain certification platform by taking the uplink certification poeHash as an index, wherein the information comprises the height of the block, the transaction hash and the timestamp, and the battery data are displayed in a statistical chart according to the aggregation rule.
Compared with the prior art, the invention has the following beneficial effects:
(1) According to the invention, by utilizing the fusion technology of 'blockchain + internet of things + privacy computation', the operation state data of the battery is encrypted and uplink by embedding the blockchain SDK in the battery BMS module, and the uplink data is simultaneously sent to the battery trusted management platform and the blockchain, so that the safety and the reliability of the data are ensured from the source end;
(2) By the method, the financial institution can provide low-cost financial service for the battery asset side, the financing availability of the battery asset side is solved, and the financial institution can obtain the permeable and active management of the asset.
Drawings
Other features, objects and advantages of the present invention will become more apparent upon reading of the detailed description of non-limiting embodiments, given with reference to the accompanying drawings in which:
FIG. 1 is a diagram of a battery trusted management platform technology architecture;
fig. 2 is a full-flow data flow timing diagram.
Detailed Description
The present invention will be described in detail with reference to specific examples. The following examples will assist those skilled in the art in further understanding the present invention, but are not intended to limit the invention in any way. It should be noted that variations and modifications could be made by those skilled in the art without departing from the inventive concept. These are all within the scope of the present invention.
Examples:
as shown in fig. 1, the present invention provides a battery trusted encryption management system based on blockchain, comprising:
1) Battery cell
A. The public key pub_a and the blockchain SDK of the financial institution are burnt into the battery BMS module through burning software;
B. the battery carries out hash operation on the uplink data, signs the calculated hash value through a battery private key pri, sends the hash value and the signature I to a block chain storage verification platform, and obtains a return value poeHash after the signature verification;
C. random numbers random (symmetric encryption keys) are randomly generated inside the battery;
D. performing AES symmetric encryption on the battery uplink data by using random to obtain an encryption result M1, namely M1=AES_ENC (data, random);
E. ECC encryption is carried out on random by using a supervision public key pub_a, so that an encryption result M2 is obtained, namely M2=ECC_ENC (random, pub_a);
F. m2| pair using battery private key pri the |m1||poehash is signed, the result is that the signature is obtained and, i.e. signature=sign (m2||m1||poehash, pri);
G. battery will data m=m2M 1 poeHash the signature is sent to a battery trusted management platform;
H. the battery synchronization sends raw data (full data) to the battery IoT platform.
2) Battery IoT platform (asset square)
A. Importing battery numbers and battery public keys in batches to establish a one-to-one mapping relation;
B. and receiving the original full data and the certification certificate of the uplink data sent by the battery.
3) Block chain evidence-storing platform
A. Importing battery numbers and battery public keys in batches to establish a one-to-one mapping relation;
B. and receiving a uplink data request of the battery, performing signature verification, and returning an uplink certificate poeHash to the battery after the signature verification passes.
4) Battery trusted management platform
A. Analyzing the received data to obtain M1, M2, poeHash and signature;
B. checking the data, and verifying whether the data is really the data sent by the monitored battery or not by using verity (M2M 1 poeHash, signature, pub);
C. the verification is successful, the financial institution decrypts M2 by using the private key pri_a to obtain a symmetric decryption key random, random=ECC_DEC (M2, pri_a);
D. AES decrypting M1 using the symmetric decryption key random to obtain battery data, data=aes_dec (M1, random);
E. acquiring information on a blockchain from a blockchain certification platform by taking the poeHash as an index, wherein the information comprises a blockheight, a transaction hash, a timestamp and the like;
F. and the battery data are displayed in a statistical chart according to the aggregation rule.
5) Financial institution
A. Registering and logging in a battery trusted management platform;
B. generating a pair of public and private keys, namely a private key pri_a and a public key pub_a, through a key generation inlet;
C. providing the public key pub_a to a battery IoT platform and a blockchain certification platform;
D. and checking plaintext data of the battery statistics.
As shown in fig. 2, the battery trusted encryption management method based on blockchain provided by the invention comprises the following steps: step 1: the public key pub_a and the blockchain SDK of the financial institution are burnt into the battery BMS module through burning software, and uplink data are encrypted; step 2: analyzing and checking labels of the received data in a battery trusted management platform, and then decrypting to obtain information on a block chain; step 3: importing battery numbers and battery public keys in batches on a battery internet of things (IoT) platform and a blockchain certification platform, establishing a one-to-one mapping relation, checking labels for uplink data requests, and returning an uplink certificate poeHash; step 4: public key pub_a is provided to the battery IoT platform and the blockchain certification platform to view the plaintext data of the battery statistics class.
Carrying out hash operation on the uplink data, signing the calculated hash value through a battery private key pri, then sending the hash value and the signature I to a blockchain certification platform, and obtaining an uplink certificate poeHash after signature verification. Randomly generating a symmetric encryption key random, and performing AES symmetric encryption on the battery uplink data by using the symmetric encryption key random to obtain an encryption result M1, wherein M1=AES_ENC (data, random); ECC encrypting random using public key pub_a of the financial institution to obtain encryption result M2, m2=ecc_enc (random, pub_a); signing the m2|m1|poehash by using a battery private key pri to obtain a signature=sign (m2|m1|poehash, pri); the data m=m2|m1|poehash|signature is sent to the battery trusted management platform, and the original full-size data is synchronously sent to the battery IoT platform. After the verification of the battery trusted management platform is passed, the financial institution decrypts the M2 by using the private key pri_a thereof to obtain a symmetric decryption key random, random=ecc_dec (M2, pri_a); AES decrypting M1 using the symmetric decryption key random, resulting in battery data, data=aes_dec (M1, random). And acquiring information on the blockchain from a blockchain certification platform by taking the uplinking certification poeHash as an index, wherein the information comprises the block height, the transaction hash and the time stamp, and displaying the statistical chart of the battery data according to the aggregation rule.
Those skilled in the art will appreciate that the systems, apparatus, and their respective modules provided herein may be implemented entirely by logic programming of method steps such that the systems, apparatus, and their respective modules are implemented as logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers, etc., in addition to the systems, apparatus, and their respective modules being implemented as pure computer readable program code. Therefore, the system, the apparatus, and the respective modules thereof provided by the present invention may be regarded as one hardware component, and the modules included therein for implementing various programs may also be regarded as structures within the hardware component; modules for implementing various functions may also be regarded as being either software programs for implementing the methods or structures within hardware components.
The foregoing describes specific embodiments of the present invention. It is to be understood that the invention is not limited to the particular embodiments described above, and that various changes or modifications may be made by those skilled in the art within the scope of the appended claims without affecting the spirit of the invention. The embodiments of the present application and features in the embodiments may be combined with each other arbitrarily without conflict.

Claims (10)

1. A battery trusted encryption management system based on a blockchain, comprising:
a battery: the public key pub_a and the blockchain SDK of the financial institution are burnt into a battery BMS module through burning software, uplink data are encrypted, and then the uplink data are sent to a battery trusted management platform and a battery IoT platform;
battery trusted management platform: analyzing and checking the received data, and then decrypting to obtain information on the block chain;
battery IoT platform: the method comprises the steps of importing battery numbers and battery public keys in batches, establishing a one-to-one mapping relation, and receiving a certificate of original full data and uplink data sent by a battery;
a blockchain certification platform: the method comprises the steps of importing battery numbers and battery public keys in batches, establishing a one-to-one mapping relation, receiving a uplink data request of the battery, performing signature verification, and returning an uplink certificate poeHash to the battery after the signature verification is passed;
financial institutions: registering and logging in the battery trusted management platform, generating a pair of public and private keys through a secret key generation inlet, providing the public key pub_a and the public key pub_a for the battery IoT platform and the blockchain certification platform, and checking plaintext data of the battery statistics type.
2. The battery trusted encryption management system based on the blockchain as in claim 1, wherein the uplink data is hashed, the calculated hash value is signed by a battery private key pri, then the hash value and the signature one are sent to the blockchain certification platform, and the uplink certificate poeHash is obtained after the signature verification is passed.
3. The battery trusted encryption management system based on blockchain as in claim 1, wherein the symmetric encryption key random is randomly generated, and AES symmetric encryption is performed on the battery uplink data using the symmetric encryption key random to obtain an encryption result M1, m1=aes_enc (data, random);
ECC encrypting random using public key pub_a of the financial institution to obtain encryption result M2, m2=ecc_enc (random, pub_a);
signing the m2|m1|poehash by using a battery private key pri to obtain a signature=sign (m2|m1|poehash, pri);
the data m=m2|m1|poehash|signature is sent to the battery trusted management platform, and the original full-size data is synchronously sent to the battery IoT platform.
4. The blockchain-based battery trusted encryption management system of claim 1, wherein after the verification of the battery trusted management platform is passed, the financial institution decrypts M2 using its own private key pri_a to obtain a symmetric decryption key random, random = ecc_dec (M2, pri_a);
AES decrypting M1 using the symmetric decryption key random, resulting in battery data, data=aes_dec (M1, random).
5. The blockchain-based battery trusted encryption management system of claim 1, wherein the information on the blockchain is obtained from the blockchain certification platform by using the uplink certificate poeHash as an index, including the block height, the transaction hash and the timestamp, and the battery data is subjected to statistical class diagram display according to the aggregation rule.
6. A battery trusted encryption management method based on a blockchain, which is characterized in that the battery trusted encryption management system based on the blockchain as described in claim 1 is adopted, comprising:
step 1: the public key pub_a and the blockchain SDK of the financial institution are burnt into the battery BMS module through burning software, and uplink data are encrypted;
step 2: analyzing and checking labels of the received data in a battery trusted management platform, and then decrypting to obtain information on a block chain;
step 3: importing battery numbers and battery public keys in batches on a battery internet of things (IoT) platform and a blockchain certification platform, establishing a one-to-one mapping relation, checking labels for uplink data requests, and returning an uplink certificate poeHash;
step 4: public key pub_a is provided to the battery IoT platform and the blockchain certification platform to view the plaintext data of the battery statistics class.
7. The method for managing the trusted encryption of the battery based on the blockchain as in claim 6, wherein the uplink data are hashed, the calculated hash value is signed by a battery private key pri, then the hash value and the signature one are sent to the blockchain certification platform together, and the uplink certificate poehsh is obtained after the signature verification is passed.
8. The battery trusted encryption management method based on blockchain as in claim 6, wherein symmetric encryption key random is randomly generated, AES symmetric encryption is performed on battery uplink data using symmetric encryption key random to obtain encryption result M1, m1=aes_enc (data, random);
ECC encrypting random using public key pub_a of the financial institution to obtain encryption result M2, m2=ecc_enc (random, pub_a);
signing the m2|m1|poehash by using a battery private key pri to obtain a signature=sign (m2|m1|poehash, pri);
the data m=m2|m1|poehash|signature is sent to the battery trusted management platform, and the original full-size data is synchronously sent to the battery IoT platform.
9. The method for trusted encryption management of a blockchain-based battery of claim 6, wherein after the verification of the trusted management platform of the battery is passed, the financial institution decrypts M2 using its own private key pri_a to obtain a symmetric decryption key random, random = ecc_dec (M2, pri_a);
AES decrypting M1 using the symmetric decryption key random, resulting in battery data, data=aes_dec (M1, random).
10. The method for managing the trusted encryption of the battery based on the blockchain as claimed in claim 6, wherein the information on the blockchain is obtained from the blockchain certification platform by using the uplink certificate poeHash as an index, wherein the information comprises the height of the block, the transaction hash and the timestamp, and the battery data are displayed in a statistical class chart according to an aggregation rule.
CN202210196789.7A 2022-03-01 2022-03-01 Battery trusted encryption management system and method based on blockchain Active CN114465731B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210196789.7A CN114465731B (en) 2022-03-01 2022-03-01 Battery trusted encryption management system and method based on blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210196789.7A CN114465731B (en) 2022-03-01 2022-03-01 Battery trusted encryption management system and method based on blockchain

Publications (2)

Publication Number Publication Date
CN114465731A CN114465731A (en) 2022-05-10
CN114465731B true CN114465731B (en) 2023-12-29

Family

ID=81415739

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210196789.7A Active CN114465731B (en) 2022-03-01 2022-03-01 Battery trusted encryption management system and method based on blockchain

Country Status (1)

Country Link
CN (1) CN114465731B (en)

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2014203719A (en) * 2013-04-08 2014-10-27 日立オートモティブシステムズ株式会社 On-vehicle battery management system
CN107743065A (en) * 2017-10-20 2018-02-27 智车优行科技(上海)有限公司 Battery uses verification method, battery system and automobile
CN109815208A (en) * 2018-12-13 2019-05-28 重庆邮电大学 A kind of battery management system based on block chain
CN110119639A (en) * 2019-05-13 2019-08-13 上海英恒电子有限公司 A kind of method for charging electric vehicles anti-counterfeiting authentication method, apparatus and system
KR20190137195A (en) * 2018-05-31 2019-12-11 (주)유씨티 Charging system for electric motors
GB202005354D0 (en) * 2020-04-10 2020-05-27 Shapiro Graham Anti-theft system for bikes
CN111598586A (en) * 2020-05-14 2020-08-28 广东汉力威技术有限公司 Electric automobile battery anti-counterfeiting system based on block chain
KR20200130534A (en) * 2019-05-08 2020-11-19 주식회사 동영산업 Block Chain Based Battery Management System
CN112217635A (en) * 2020-09-16 2021-01-12 郑州信大先进技术研究院 Information encryption transmission method and system based on block chain and high-speed password card
CN112765684A (en) * 2021-04-12 2021-05-07 腾讯科技(深圳)有限公司 Block chain node terminal management method, device, equipment and storage medium
KR20210057233A (en) * 2019-11-11 2021-05-21 주식회사 동영산업 Block Chain Based Battery Management System
CN112837071A (en) * 2020-07-26 2021-05-25 深圳市柘阳科技有限公司 Storage battery traceability system based on block chain
CN113360445A (en) * 2021-07-07 2021-09-07 上海万向区块链股份公司 Lithium ion battery data acquisition sharing device based on block chain technology
WO2021219086A1 (en) * 2020-04-29 2021-11-04 青岛海尔滚筒洗衣机有限公司 Data transmission method and system based on blockchain
CN113673893A (en) * 2021-08-27 2021-11-19 杭州协能科技股份有限公司 Retired power battery management method and system
CN113673987A (en) * 2020-05-14 2021-11-19 上海电盛科技有限公司 Retired battery management method and device based on block chain
CN114022162A (en) * 2021-10-27 2022-02-08 杭州协能科技股份有限公司 Echelon battery tracing system and method based on trusted execution environment

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018158102A1 (en) * 2017-02-28 2018-09-07 Airbus Helicopters Integrated method and device for storing and sharing data
US20190353709A1 (en) * 2018-05-15 2019-11-21 Exide Technologies Trusted battery meter and battery monitoring system
US20200084027A1 (en) * 2018-09-06 2020-03-12 Bank Of Montreal Systems and methods for encryption of data on a blockchain
KR20210041404A (en) * 2019-10-07 2021-04-15 삼성전자주식회사 Electronic device and method for blockchain address management thereof

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2014203719A (en) * 2013-04-08 2014-10-27 日立オートモティブシステムズ株式会社 On-vehicle battery management system
CN107743065A (en) * 2017-10-20 2018-02-27 智车优行科技(上海)有限公司 Battery uses verification method, battery system and automobile
KR20190137195A (en) * 2018-05-31 2019-12-11 (주)유씨티 Charging system for electric motors
CN109815208A (en) * 2018-12-13 2019-05-28 重庆邮电大学 A kind of battery management system based on block chain
KR20200130534A (en) * 2019-05-08 2020-11-19 주식회사 동영산업 Block Chain Based Battery Management System
CN110119639A (en) * 2019-05-13 2019-08-13 上海英恒电子有限公司 A kind of method for charging electric vehicles anti-counterfeiting authentication method, apparatus and system
KR20210057233A (en) * 2019-11-11 2021-05-21 주식회사 동영산업 Block Chain Based Battery Management System
GB202005354D0 (en) * 2020-04-10 2020-05-27 Shapiro Graham Anti-theft system for bikes
WO2021219086A1 (en) * 2020-04-29 2021-11-04 青岛海尔滚筒洗衣机有限公司 Data transmission method and system based on blockchain
CN111598586A (en) * 2020-05-14 2020-08-28 广东汉力威技术有限公司 Electric automobile battery anti-counterfeiting system based on block chain
CN113673987A (en) * 2020-05-14 2021-11-19 上海电盛科技有限公司 Retired battery management method and device based on block chain
CN112837071A (en) * 2020-07-26 2021-05-25 深圳市柘阳科技有限公司 Storage battery traceability system based on block chain
CN112217635A (en) * 2020-09-16 2021-01-12 郑州信大先进技术研究院 Information encryption transmission method and system based on block chain and high-speed password card
CN112765684A (en) * 2021-04-12 2021-05-07 腾讯科技(深圳)有限公司 Block chain node terminal management method, device, equipment and storage medium
CN113360445A (en) * 2021-07-07 2021-09-07 上海万向区块链股份公司 Lithium ion battery data acquisition sharing device based on block chain technology
CN113673893A (en) * 2021-08-27 2021-11-19 杭州协能科技股份有限公司 Retired power battery management method and system
CN114022162A (en) * 2021-10-27 2022-02-08 杭州协能科技股份有限公司 Echelon battery tracing system and method based on trusted execution environment

Also Published As

Publication number Publication date
CN114465731A (en) 2022-05-10

Similar Documents

Publication Publication Date Title
CN100521601C (en) System and method for updating keys used for public key cryptography
CN111464980B (en) Electronic evidence obtaining device and method based on block chain in Internet of vehicles environment
CN109088871B (en) Data transmission method and system based on block chain technology
CN107742212B (en) Asset verification method, device and system based on block chain
CN114372296B (en) Block chain-based user behavior data auditing method and system
CN112600675B (en) Electronic voting method and device based on group signature, electronic equipment and storage medium
CN114389889B (en) File full life cycle management method and device based on block chain technology
CN111695097A (en) Login checking method and device and computer readable storage medium
CN110460674A (en) A kind of information-pushing method, apparatus and system
CN113822675A (en) Block chain based message processing method, device, equipment and storage medium
CN114172659B (en) Message transmission method, device, equipment and storage medium in block chain system
CN114553532A (en) Data secure transmission method and device, electronic equipment and storage medium
CN114465731B (en) Battery trusted encryption management system and method based on blockchain
CN113162763A (en) Data encryption and storage method and device, electronic equipment and storage medium
CN104486311B (en) A kind of remote data integrity inspection method for supporting scalability
CN101159733B (en) Electronic burst event management system
AU2021103828A4 (en) A novel system and auditing technique for cloud based digital forensic readiness with integrity and privacy preservation of health care data
CN115643090A (en) Longitudinal federal analysis method, device, equipment and medium based on privacy retrieval
CN112422294B (en) Anonymous voting method and device based on ring signature, electronic equipment and storage medium
CN114238886A (en) IBE-based power grid PMU identity authentication method, device, computer equipment and medium
CN113810421A (en) Block chain-based PRE Internet of things data sharing method and system
CN105515760A (en) Information encryption method, information decryption method and information encryption and decryption system
CN116684077B (en) Carbon emission monitoring method and device based on carbon platform
Majigi et al. BLOCKCHAIN-BASED ZERO KNOWLEDGE PROOF MODEL FOR SECURE DATA SHARING SCHEME IN A DISTRIBUTED VEHICULAR NETWORKS
CN114531440B (en) Industrial edge side data sharing system based on combination of active identification and block chain technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant