CN115442063A - Charging data sending and receiving method and device, charging pile and vehicle terminal - Google Patents

Charging data sending and receiving method and device, charging pile and vehicle terminal Download PDF

Info

Publication number
CN115442063A
CN115442063A CN202111162528.5A CN202111162528A CN115442063A CN 115442063 A CN115442063 A CN 115442063A CN 202111162528 A CN202111162528 A CN 202111162528A CN 115442063 A CN115442063 A CN 115442063A
Authority
CN
China
Prior art keywords
charging
data
random number
encrypted
symmetric key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111162528.5A
Other languages
Chinese (zh)
Inventor
刘亚方
勾晓菲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Co Wheels Technology Co Ltd
Original Assignee
Beijing Co Wheels Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Co Wheels Technology Co Ltd filed Critical Beijing Co Wheels Technology Co Ltd
Priority to CN202111162528.5A priority Critical patent/CN115442063A/en
Priority to PCT/CN2022/121376 priority patent/WO2023051467A1/en
Publication of CN115442063A publication Critical patent/CN115442063A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/84Vehicles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/062Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Charge And Discharge Circuits For Batteries Or The Like (AREA)
  • Electric Propulsion And Braking For Vehicles (AREA)

Abstract

The disclosure provides a charging data sending and receiving method, a charging data sending and receiving device, a charging pile and a vehicle terminal. The charging data sending method is applied to the charging pile and comprises the following steps: acquiring first encrypted data sent by a vehicle terminal, wherein the first encrypted data is encrypted in an asymmetric mode; decrypting the first encrypted data to obtain a first random number; generating a second random number; calculating a symmetric key based on the first random number and the second random number; and encrypting the charging data based on the symmetric key to obtain encrypted charging data, and sending the encrypted charging data to the vehicle terminal. The scheme adopts a symmetrical encryption mode to encrypt the charging data, and compared with an asymmetrical encryption mode, the symmetrical encryption mode has small algorithm difficulty and high execution speed, so that the scheme disclosed by the invention can meet the encryption requirement of a large amount of charging data only by arranging a processing chip with low calculation power at the charging pile side.

Description

Charging data sending and receiving method and device, charging pile and vehicle terminal
Technical Field
The embodiment of the disclosure relates to the technical field of vehicle charging, in particular to a charging data sending method, a charging data receiving method, a charging pile and a vehicle.
Background
The charging pile forms a large amount of charging data when charging the vehicle. The charging data reflects the working state of the charging pile, is a data asset with commercial value, and needs to be uploaded to a cloud server by an encryption method. Because a large amount of charging piles are deployed in the areas which cannot be covered by operator networks such as an underground garage, the charging pile data cannot be directly transmitted to the cloud server through the operator networks. In the existing method, when a vehicle is charged, a charging pile is sent to the vehicle in a short-distance communication mode, and then the vehicle forwards charging data to a cloud server.
In order to ensure the confidential uploading of the charging data, an asymmetric encryption method is adopted between the charging pile and the vehicle to encrypt and decrypt the charging data. And the adoption of an asymmetric encryption algorithm can meet the encryption requirement of a large amount of charging data only by requiring that a charging pile has a processing chip with large calculation power.
Disclosure of Invention
In order to solve at least one problem in the prior art, at least one embodiment of the present disclosure provides a charging data transmitting and receiving method, an apparatus, a charging pile, and a vehicle terminal.
On one hand, the embodiment of the present disclosure provides a charging data sending method, which is applied to a charging pile, and includes:
acquiring first encrypted data sent by a vehicle terminal in an asymmetric mode, wherein the first encrypted data is encrypted in the asymmetric mode;
decrypting the first encrypted data to obtain a first random number;
generating a second random number;
calculating a symmetric key based on the first random number and the second random number;
and encrypting the charging data based on the symmetric key to obtain encrypted charging data, and sending the encrypted charging data to the vehicle terminal.
Optionally, the apparatus further comprises:
and encrypting the second random number by adopting an asymmetric encryption mode to obtain second encrypted data, and sending the second encrypted data to the vehicle terminal.
Optionally, before encrypting the charging data based on the symmetric key to obtain encrypted charging data, the method further comprises:
acquiring charging code encrypted data sent by the vehicle terminal, wherein the charging code encrypted data is obtained by encrypting based on the symmetric key;
decrypting the charging code encrypted data based on the symmetric key to obtain the charging code;
in response to the verification of the charging code, starting charging of a vehicle corresponding to the vehicle terminal, and generating the charging data based on a charging state.
In another aspect, an embodiment of the present disclosure provides a charging data receiving method applied to a vehicle terminal, including:
encrypting a first random number in an asymmetric mode to obtain first encrypted data, and sending the first encrypted data to a charging pile;
acquiring second encrypted data which are sent by the charging pile and encrypted in an asymmetric mode, and decrypting the second encrypted data in the asymmetric mode to obtain a second random number;
calculating a symmetric key based on the first random number and the second random number;
and in response to receiving the encrypted charging data sent by the charging pile, decrypting the encrypted charging data by adopting the symmetric key to obtain decrypted charging data.
Optionally, before the decrypting the encrypted charging data with the symmetric key to obtain the decrypted charging data, the method further includes:
and encrypting the charging code based on the symmetric key to obtain charging code encrypted data, and sending the charging code encrypted data to the charging pile.
In another aspect, an embodiment of the present disclosure provides a charging data transmitting apparatus, including:
the device comprises a first random number acquisition unit, a second random number acquisition unit and a first encryption unit, wherein the first random number acquisition unit is used for acquiring first encrypted data sent by a vehicle terminal and decrypting the first encrypted data in an asymmetric mode to obtain a first random number, and the first encrypted data is encrypted in the asymmetric mode;
a second random number generation unit for generating a second random number;
a first symmetric key generation unit configured to calculate a symmetric key based on the first random number and the second random number;
and the charging data sending unit is used for encrypting the charging data based on the symmetric key to obtain encrypted charging data and sending the encrypted charging data to the vehicle terminal.
Optionally, the apparatus further comprises:
and the second random number sending unit is used for encrypting the second random number by adopting an asymmetric encryption mode to obtain second encrypted data and sending the second encrypted data to the vehicle terminal.
Optionally, the apparatus further comprises:
the charging code acquisition unit is used for acquiring charging code encrypted data sent by a vehicle terminal, and the charging code encrypted data is obtained by encrypting based on the symmetric key;
the charging code analysis unit is used for decrypting the charging code encrypted data based on the symmetric key to obtain the charging code;
and the charging starting unit is used for responding to the verification of the charging code, starting charging for the vehicle corresponding to the vehicle terminal, and generating the charging data based on the charging state.
In another aspect, an embodiment of the present disclosure further provides a charging data receiving apparatus, including:
the first random number sending unit is used for encrypting the first random number in an asymmetric mode to obtain first encrypted data and sending the first encrypted data to the charging pile;
the second random number acquisition unit is used for acquiring second encrypted data which are sent by the charging pile and encrypted in an asymmetric mode and decrypting the second encrypted data in the asymmetric mode to obtain a second random number, wherein the second encrypted data are encrypted in the asymmetric mode;
a second symmetric key generation unit configured to calculate a symmetric key based on the first random number and the second random number;
and the charging data receiving unit is used for responding to the received encrypted charging data sent by the charging pile and decrypting the encrypted charging data by adopting the symmetric key to obtain decrypted charging data.
Optionally, the apparatus further comprises: and the charging code sending unit is used for encrypting the charging code based on the symmetric key to obtain charging code encrypted data and sending the charging code encrypted data to the charging pile.
In another aspect, an embodiment of the present disclosure provides a charging pile, including: a processor and a memory; the memory stores programs or instructions; the processor executes a program or instructions stored in the memory to implement the charging data transmission method as described above.
In another aspect, an embodiment of the present disclosure provides a vehicle terminal, including: a processor and a memory; the memory stores programs or instructions; the processor executes a program or instructions stored in the memory to implement the charging data receiving method as described in any one of the preceding.
In still another aspect, embodiments of the present disclosure provide a storage medium, where a program or an instruction is stored, and when the program or the instruction is executed by a processor, the charging data transmitting method or the charging data receiving method as described above is implemented.
According to the scheme provided by the embodiment of the disclosure, the charging pile and the vehicle terminal exchange the first random number and the second random number in an asymmetric mode, and then the symmetric key is obtained through calculation according to the first random number and the second random number. The charging pile adopts the symmetric key to encrypt the charging data to obtain encrypted charging data and sends the encrypted charging data to the vehicle terminal, and the vehicle terminal decrypts the encrypted charging data based on the symmetric key to obtain the charging data. Compared with an asymmetric method, the symmetric encryption method has low algorithm difficulty and high execution speed, so that the encryption requirement of a large amount of charging data can be met only by arranging a processing chip with low calculation force on the charging pile side by adopting the scheme of the embodiment of the disclosure.
Drawings
To more clearly illustrate the technical solutions of the embodiments of the present disclosure, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present disclosure, and other drawings can be obtained by those skilled in the art according to the drawings.
Fig. 1 is a schematic structural diagram of a charging system provided in an embodiment of the present disclosure;
fig. 2 is a flowchart of a charging data transmission method provided by an embodiment of the present disclosure;
fig. 3 is a flowchart of a charging data receiving method according to an embodiment of the disclosure;
fig. 4 is a schematic structural diagram of a charging data transmitting apparatus according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of a charging data receiving device according to an embodiment of the present disclosure;
FIG. 6 is a schematic structural diagram of a vehicle-mounted terminal according to an embodiment of the present disclosure;
fig. 7 is a schematic structural diagram of a charging pile provided in an embodiment of the present application.
Detailed Description
In order that the above objects, features and advantages of the present disclosure can be more clearly understood, the present disclosure will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the embodiments described are only a few embodiments of the present disclosure, and not all embodiments. The specific embodiments described herein are merely illustrative of the disclosure and do not delimit the disclosure. All other embodiments derived by one of ordinary skill in the art from the described embodiments of the disclosure are intended to be within the scope of the disclosure.
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions.
The embodiment of the disclosure provides a charging data sending method and a charging data receiving method, which are based on a symmetric encryption mode to realize transmission of charging data between a charging pile and a vehicle terminal, reduce the computational cost required by encryption and decryption of the charging data, and then enable a processing chip with low computational power to be arranged on the side of the charging pile, so that the encryption requirements of a large amount of charging data can be met.
Before the method for transmitting and receiving charging data provided by the embodiments of the present disclosure is described, a vehicle charging system provided by the embodiments of the present disclosure is first described. Fig. 1 is a schematic structural diagram of a charging system provided in an embodiment of the present disclosure. As shown in fig. 1, a vehicle charging system 100 provided by the embodiment of the present disclosure includes a charging pile 101, a vehicle 102, a key system server 103, and a cloud server 104. The key system server 103 and the cloud server 104 are directly connected, and the cloud server 104 can be in communication connection with the vehicle 102 terminal in a remote communication mode. The key system server 103 is used to provide a key service and a charge code generation service. Specifically, the key system server 103 provides basic configuration data required for realizing asymmetric encrypted communication for the vehicle 102 and the charging pile 101, or provides a public and private key pair required for realizing asymmetric encrypted communication for the vehicle 102 and the charging pile 101.
In some embodiments of the disclosed embodiment, the key system server 103 centrally manages the public and private keys needed for asymmetric encryption by the vehicle 102 and charging pile 101. Specifically, after generating the keys required by the charging pile 101 and the vehicle 102, the key system server 103 sends the key of the charging pile 101 to the cloud server 104. When the charging pile 101 is installed, an installation maintenance worker may query the cloud server 104 based on a Serial Number (SN) of the charging pile 101, obtain a private key of a pile end (that is, a private key corresponding to the charging pile 101), and write the private key of the charging pile 101 into a security module of the charging pile 101. The cloud server 104 may perform secure communication with the vehicle 102, and send a vehicle-side private key (i.e., a private key corresponding to a terminal of the vehicle 102) required for the vehicle 102 to communicate with the charging pile 101 to the vehicle 102. Under the condition that the charging pile 101 is a private charging pile 1, the installation and maintenance personnel can write the public key of the vehicle end of the vehicle 102 corresponding to the charging pile 101 into the security module of the charging pile 101.
In some other embodiments of the present disclosure, the key system server 103 may further generate basic information for generating a public-private key pair, and send the basic information to the cloud server 104. When the charging pile 101 is installed, an installation maintenance worker can query the cloud server 104 to obtain basic information for generating a public and private key pair, and write the basic information into the charging pile 101, so that the charging pile 101 generates a pile end private key and a pile end public key according to the basic information and the generated random number. The cloud server 104 may communicate with the vehicle 102, and send the basic information to the terminal of the vehicle 102, so that the terminal of the vehicle 102 generates a vehicle-end private key and a pile-end public key according to the basic information and the generated random number, or according to the basic information and a numerical value input by a user.
The embodiment of the disclosure provides a charging data sending method applied to a charging pile. Fig. 2 is a flowchart of a method for transmitting charging data according to an embodiment of the present disclosure. As shown in fig. 2, a method for transmitting charging data according to an embodiment of the present disclosure includes steps S201 to S203.
Step S201: the method comprises the steps of obtaining first encrypted data sent by a vehicle terminal, wherein the first encrypted data are encrypted in an asymmetric mode.
In the embodiment of the disclosure, after a charging gun of the charging pile is inserted into a charging interface of a vehicle and basic data transmission of the charging gun and the charging interface is realized based on the charging interface, the vehicle and the charging pile are connected in close range communication. The short-distance communication connection may be various possible connection modes such as a bluetooth connection, a WIFI connection, and a Zigbee connection, and the embodiment of the present disclosure is not particularly limited, and may be specifically determined according to types of the wireless communication modules installed in the charging pile and the vehicle terminal.
In some embodiments of the present disclosure, the charging pile may transmit the product serial number to the vehicle through the charging interface after detecting that the charging gun is inserted into the charging interface of the vehicle. After receiving the product serial number of the charging pile, the vehicle generates broadcast information based on the product serial number of the charging pile and the vehicle identification mark so as to request to establish close-range communication connection with the charging pile. After the charging pile receives the broadcast information, the charging pile determines that the broadcast information is sent by the vehicle to be charged based on the product serial number in the broadcast information, and at the moment, a connection request is generated based on the vehicle identification mark and broadcasted to request for establishing communication connection with the vehicle terminal. Through aforementioned mode, fill electric pile and vehicle and establish communication connection.
In some other embodiments of the present disclosure, after the vehicle detects that the charging gun is inserted into its own charging interface, the vehicle may send a vehicle identification to the charging pile through the charging gun. After the vehicle identification mark is received, the charging pile generates broadcast information based on the product serial number of the charging pile and the vehicle identification mark so as to request for establishing close range communication connection with the vehicle. After receiving the broadcast information, the vehicle terminal determines that the broadcast information is the broadcast information sent by the charging pile based on the vehicle identification mark in the broadcast information, and at the moment, a connection request is generated based on the product serial number and is broadcasted to request for establishing communication connection with the charging pile. Through aforementioned mode, fill electric pile and vehicle and establish communication connection.
After the communication connection is established between the charging pile and the vehicle terminal, the charging pile and the vehicle terminal can be subjected to security certification and authentication based on asymmetric encryption. In one embodiment, the charging post and the vehicle terminal may perform security certification and authentication based on the private key and the public key.
In some embodiments of the present disclosure, the charging pile may query whether to locally store the vehicle end public key of the vehicle terminal based on the vehicle identification. If the public key of the vehicle end of the vehicle terminal is not stored locally, the charging pile can send a request to the vehicle terminal to request to acquire the public key of the vehicle end. Similarly, under the condition that the pile end public key of the charging pile is not stored in the vehicle terminal, the vehicle terminal can also send a request to the charging pile so as to request to acquire the pile end public key. In other embodiments of the disclosure, after the communication connection is established between the charging pile and the vehicle terminal, the charging pile and the vehicle terminal can also actively send the public key of the charging pile to the opposite-end device. After the public key of the opposite terminal is obtained, the charging pile and the vehicle terminal can realize safety certification and authentication.
After the safety certification and authentication pass, the charging pile can acquire first encrypted data sent by the vehicle terminal. The first encrypted data is encrypted by the vehicle terminal in an asymmetric mode. In some embodiments, the first encrypted data is obtained by the vehicle terminal encrypting the first random number based on the stub public key.
The vehicle terminal is provided with a first random number generator, and the first random number generator can generate a first random number by adopting a random number generation method known in the art, such as a pseudo random generation algorithm, a statistical model algorithm and the like.
After the first random number is generated, the vehicle terminal encrypts the first random number based on the pile end public key to obtain first encrypted data, and sends the first encrypted data to the charging pile, so that the charging pile obtains the first encrypted data.
Step S202: and decrypting the first encrypted data in an asymmetric mode to obtain a first random number.
After the first encrypted data are received, the charging pile decrypts the first encrypted data in an asymmetric mode to obtain a first random number. In some embodiments, the charging pile decrypts the first encrypted data based on the stub private key to obtain the first random number.
In some embodiments of the present disclosure, data identification errors caused by signal interference during transmission are avoided. When the vehicle terminal sends the first encrypted data to the charging pile, the vehicle terminal also adopts the vehicle-end private key to sign the first encrypted data to obtain a digital signature. After the charging pile receives the first encrypted data and the digital signature, firstly, the vehicle end public key is adopted to operate the first encrypted data to obtain a verification signature, and the pile end private key is adopted to decrypt the first encrypted data under the condition that the verification signature is identical to the digital signature.
Step S203: a second random is generated.
In the embodiment of the present disclosure, the charging pile is locally configured with the second random number generator. The second random number generator may generate a second random number. In a specific embodiment, the second random number generator may employ a pseudo random number generation algorithm, a statistical model algorithm, or other random number generation methods known in the art.
Step S204: a symmetric key is calculated based on the first random number and the second random number.
In some embodiments of the present disclosure, the charging pile may splice the first random number and the second random number according to a preset splicing rule to obtain a spliced random number, and use the spliced random number as the symmetric key.
In some other embodiments of the present disclosure, the charging pile may perform a hash operation based on the first random number and the second random number, and use a result of the hash operation as the symmetric key.
For example, the charging pile may splice the first random number and the second random number according to a preset splicing rule to obtain a spliced random number, and then perform hash operation on the spliced random number to obtain the symmetric key.
For another example, the charging pile may perform a hash operation based on one of the first random number or the second random number to obtain an intermediate operation result; then, splicing the intermediate operation result with another random number to obtain spliced data; and finally, carrying out Hash operation on the spliced data to obtain a symmetric key.
Step S205: and encrypting the charging data based on the symmetric key to obtain encrypted charging data, and sending the encrypted charging data to the vehicle terminal.
The charging pile adopts a pre-configured symmetric encryption algorithm, and the charging data is encrypted based on the symmetric key to obtain encrypted charging data. The preconfigured symmetric encryption algorithm may be any one of a DES algorithm, a 3DES algorithm, a TDEA algorithm, a Blowfish algorithm, an RC5 algorithm, or an IDEA algorithm, and the embodiment of the present disclosure is not particularly limited.
After the encrypted charging data are obtained, the charging pile sends the encrypted charging data to the vehicle terminal by adopting a pre-established communication channel, so that the vehicle terminal receives the encrypted charging data.
According to the charging data sending method provided by the embodiment of the disclosure, a charging pile firstly decrypts first encrypted data sent by a vehicle terminal in an asymmetric mode to obtain a first random number and generates a second random number, then a symmetric key is obtained through calculation according to the first random number and the second random number, the charging data is encrypted by using the symmetric key to obtain encrypted charging data, and the encrypted charging data is sent to the vehicle terminal.
That is to say, the charging data transmission method provided by the embodiment of the disclosure firstly agrees with a symmetric key between the charging pile and the vehicle terminal, and then encrypts the charging data based on the symmetric key. Since the vehicle terminal can also obtain the first random number and the second random number to calculate the symmetric key, after receiving the encrypted charging data, the vehicle terminal can decrypt the encrypted charging data based on the symmetric key. Compared with an asymmetric encryption mode, the symmetric encryption mode has low algorithm difficulty and high execution speed, so that the scheme of the embodiment of the disclosure can meet the encryption requirement of a large amount of charging data only by arranging a processing chip with low calculation force on the charging pile side.
In some embodiments of the present disclosure, the charging pile further performs step S206 after generating the second random number.
Step S206: and encrypting the second random number by adopting an asymmetric encryption mode to obtain second encrypted data, and sending the second encrypted data to the vehicle terminal.
In a specific application, the charging pile may encrypt the second random number by using the vehicle-side public key to obtain second encrypted data, and send the second encrypted data to the vehicle terminal.
In some embodiments of the present disclosure, in order to enable the user with the usage right to charge the vehicle, the charging pile may perform steps S207 to S209 before performing the aforementioned step S205, in addition to the aforementioned steps S201 to S205.
Step S207: and acquiring charging code encrypted data sent by the vehicle terminal, wherein the charging code encrypted data is obtained by encrypting based on a symmetric key.
Step S208: and decrypting the charging code encrypted data based on the symmetric key to obtain the charging code.
In the embodiment of the disclosure, the charging codes are transmitted in a symmetrical encryption mode before the charging pile and the vehicle terminal. And after receiving the charging code encrypted data sent by the vehicle terminal, the vehicle terminal decrypts the charging code encrypted data by adopting the symmetric key to obtain the charging code.
Step S209: in response to the verification of the charging code being passed, charging of a vehicle corresponding to the vehicle terminal is initiated, and charging data is generated based on the state of charge.
And after the charging code is obtained through decryption, the charging pile verifies the charging code according to a preset charging code verification method. After passing the verification of the charging code, it is determined that the vehicle to be charged can be charged, so charging is started, and charging data is generated based on the state of charge.
In other embodiments of the present disclosure, the charging code may be transmitted between the charging pile and the vehicle terminal by using an asymmetric encryption method to determine whether charging can be started.
The embodiment of the disclosure also provides a charging data receiving method applied to the vehicle terminal. Fig. 3 is a flowchart of a charging data receiving method according to an embodiment of the disclosure. As shown in fig. 3, the charging data receiving method provided by the embodiment of the present disclosure includes steps S301 to S305.
Step S301: and encrypting the first random number in an asymmetric mode to obtain first encrypted data, and sending the first encrypted data to the charging pile.
In the embodiment of the disclosure, after the communication connection is established between the charging pile and the vehicle terminal, the charging pile and the vehicle terminal can be subjected to safety certification and authentication based on an asymmetric mode. Specifically, the charging pile and the vehicle terminal perform security authentication based on a private key and a public key.
The vehicle terminal is provided with a first random number generator, and the first random number generator can generate a first random number by using a random number generation method known in the art, such as a pseudo random generation algorithm, a statistical model algorithm, and the like.
In some embodiments of the disclosure, after the first random number is generated, the vehicle terminal encrypts the first random number based on the pile end public key to obtain first encrypted data, and sends the first encrypted data to the charging pile, so that the charging pile obtains the first encrypted data.
Step S302: and acquiring second encrypted data which are sent by the charging pile and encrypted in an asymmetric mode, and decrypting the second encrypted data in the asymmetric mode to obtain a second random number.
In the embodiment of the present disclosure, the charging pile is configured with a second random number generator. The second random number generator may generate a second random number. In particular embodiments, the second random number generator may employ a pseudo random number generation algorithm, a statistical model algorithm, or other random number generation methods known in the art. After the second random number is generated, the charging pile encrypts the second random number by using the vehicle end public key to obtain second encrypted data, and sends the second encrypted data to the vehicle terminal.
In some embodiments of the disclosure, after receiving the second encrypted data, the vehicle terminal decrypts the second encrypted data by using the vehicle-side private key to obtain a second random number.
Step S303: a symmetric key is calculated based on the first random number and the second random number.
In the embodiment of the disclosure, the vehicle terminal calculates and obtains the symmetric key based on the first random number and the second random number by using the same algorithm as that used for charging piles. For example, the vehicle terminal may adopt a splicing rule set by a vehicle terminal to splice the first random number and the second random number to obtain a symmetric key; for another example, the vehicle terminal may perform a hash operation on the charging pile based on the first random number and the second random number, and use a result of the hash operation as the symmetric key.
Step S304: and in response to receiving the encrypted charging data sent by the charging pile, decrypting the encrypted charging data by adopting the symmetric key to obtain decrypted charging data.
In the charging data receiving method provided by the embodiment of the disclosure, the vehicle terminal decrypts the second encrypted data in an asymmetric manner to obtain the second random number, and calculates the symmetric key according to the first random number generated by the vehicle terminal and the second random number. The vehicle terminal may decrypt the encrypted charging data based on the symmetric key after receiving the encrypted charging data. Compared with an asymmetric encryption mode, the symmetric encryption mode has low algorithm difficulty and high execution speed, so that the calculation power cost paid by the vehicle terminal for decrypting the vehicle data by adopting the scheme of the embodiment of the disclosure is low. In addition, the scheme of the embodiment of the disclosure can meet the encryption requirement of a large amount of charging data only by arranging the processing chip with low calculation force on the charging pile side.
In some embodiments of the present disclosure, the vehicle terminal needs to send a charging code to the charging pile, and after the authority is verified based on the charging code, the charging pile charges the vehicle where the vehicle terminal is located. In order to enable charging of the vehicle, the vehicle terminal may further perform step S305 before performing the aforementioned step S304.
Step S305: and encrypting the charging code based on the symmetric key to obtain charging code encrypted data, and sending the charging code encrypted data to the charging pile.
In some other embodiments of the present disclosure, the vehicle terminal may further encrypt the charging code by using an asymmetric encryption mechanism to obtain charging code encrypted data, and send the charging code encrypted data to the charging pile.
The embodiment of the disclosure also provides a charging data sending device, which is a functional module in the charging pile. Fig. 4 is a schematic structural diagram of a charging data transmitting apparatus provided in an embodiment of the present disclosure, and as shown in fig. 4, a charging data transmitting apparatus 400 provided in an embodiment of the present disclosure includes a first random number obtaining unit 401, a second random number generating unit 402, a first symmetric key generating unit 403, and a charging data transmitting unit 404.
The first random number obtaining unit 401 is configured to obtain first encrypted data sent by a vehicle terminal, and decrypt the first encrypted data in an asymmetric manner to obtain a first random number, where the first encrypted data is encrypted in an asymmetric manner.
The second random number generation unit 402 is configured to generate a second random number.
The first symmetric key generation unit 403 is configured to calculate a symmetric key based on the first random number and the second random number.
The charging data transmitting unit 404 is configured to encrypt the charging data based on the symmetric key to obtain encrypted charging data, and transmit the encrypted charging data to the vehicle terminal, so that the vehicle terminal calculates a symmetric key based on the first random number and the second random number, and calculates a symmetric key based on the first random number and the second random number.
In some applications of the embodiment of the present disclosure, the charging data transmitting apparatus 400 may further include a second encryption module configured to encrypt the second random number in an asymmetric encryption manner to obtain second encrypted data, and transmit the second encrypted data to the vehicle terminal.
In some embodiments of the present disclosure, the charging data transmitting apparatus 400 may further include a charging code acquiring unit, a charging code parsing unit, and a charging start unit.
The charging code obtaining unit is used for obtaining charging code encrypted data sent by the vehicle terminal, and the charging code encrypted data is obtained through encryption based on a symmetric key.
The charging code analysis unit is used for decrypting the charging code encrypted data based on the symmetric key to obtain the charging code.
The charging starting unit is used for responding to the verification of the charging code, starting charging of the vehicle corresponding to the vehicle terminal, and generating charging data based on the charging state.
The embodiment of the disclosure further provides a charging data receiving device, and the charging receiving device is a functional module in the charging pile. Fig. 5 is a schematic structural diagram of a charging data receiving apparatus according to an embodiment of the present disclosure, and as shown in fig. 5, a charging data receiving apparatus 500 according to an embodiment of the present disclosure includes a first random number transmitting unit 501, a second random number obtaining unit 502, a second symmetric key generating unit 503, and a charging data receiving unit 504.
The first random number sending unit 501 is configured to encrypt the first random number in an asymmetric manner to obtain first encrypted data, and send the first encrypted data to the charging pile;
the second random number obtaining unit 502 is configured to obtain second encrypted data that is sent by the charging pile and encrypted in an asymmetric manner, and decrypt the second encrypted data in the asymmetric manner to obtain a second random number, where the second encrypted data is encrypted in the asymmetric manner.
The second symmetric key generation unit 503 is configured to calculate a symmetric key based on the first random number and the second random number;
the charging data receiving unit 504 is configured to decrypt the encrypted charging data with the symmetric key to obtain decrypted charging data in response to receiving the encrypted charging data sent by the charging post.
In some applications of the embodiment of the present disclosure, the charging data receiving apparatus 500 may further include a charging code transmitting unit. The charging code sending unit encrypts a charging code based on the symmetric key to obtain charging code encrypted data, and sends the charging code encrypted data to the charging pile.
The embodiment of the present disclosure further provides an in-vehicle terminal, which includes a processor and a memory, where the memory stores a computer program, and when the computer program is executed by the processor, the charging data receiving method according to any of the embodiments above may be implemented.
For example, fig. 6 is a schematic structural diagram of an in-vehicle terminal provided in an embodiment of the present disclosure. Referring now specifically to fig. 6, a schematic diagram of a structure suitable for implementing the in-vehicle terminal 600 in the disclosed embodiment is shown. The in-vehicle terminal shown in fig. 6 is only an example, and should not bring any limitation to the functions and the use range of the embodiment of the present disclosure.
As shown in fig. 6, the in-vehicle terminal 600 may include a processing device (e.g., a central processing unit, a graphic processor, etc.) 601 that can perform various appropriate actions and processes according to a program stored in a read only memory ROM602 or a program loaded from a storage device 608 into a random access memory RAM 603. In the RAM603, various programs and data necessary for the operation of the in-vehicle terminal 600 are also stored. The processing device 601, the ROM602, and the RAM603 are connected to each other via a bus 604. An input/output I/O interface 605 is also connected to bus 604.
Generally, the following devices may be connected to the I/O interface 605: input devices 606 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; output devices 607 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 608 including, for example, tape, hard disk, etc.; and a communication device 609. The communication means 609 may allow the in-vehicle terminal 600 to perform wireless or wired communication with other devices to exchange data. While fig. 6 illustrates the in-vehicle terminal 600 having various devices, it is to be understood that not all illustrated devices are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program carried on a non-transitory computer readable medium, the computer program containing program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication means 609, or may be installed from the storage means 608, or may be installed from the ROM 602. The computer program, when executed by the processing device 601, performs the above-described functions defined in the methods of the embodiments of the present disclosure.
It should be noted that the computer readable medium of the present disclosure may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
In some embodiments, the clients, servers may communicate using any currently known or future developed network Protocol, such as HTTP (HyperText Transfer Protocol), and may interconnect with any form or medium of digital data communication (e.g., a communications network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the Internet (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed network.
The computer-readable medium may be included in the in-vehicle terminal; or may exist separately without being assembled into the in-vehicle terminal.
The computer-readable medium carries one or more programs which, when executed by the in-vehicle terminal of the computer device, cause the in-vehicle terminal of the computer device to: based on an asymmetric encryption mode, sending the first random number to the charging pile, and acquiring a second random number sent by the charging pile; calculating a symmetric key based on the first random number and the second random number; and in response to receiving the encrypted charging data sent by the charging pile, decrypting the encrypted charging data by adopting the symmetric key to obtain decrypted charging data.
Computer program code for carrying out operations for aspects of the present disclosure may be written in any combination of one or more programming languages, including but not limited to an object oriented programming language such as Java, smalltalk, C + +, including conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The embodiment of the disclosure also provides a charging pile, and fig. 7 is a schematic structural diagram of the charging pile provided by the embodiment of the application. The charging pile may perform the charging data transmission method in the foregoing embodiment.
As shown in fig. 7, the charging pile 700 includes at least one processor 701, at least one memory 702, at least one communication interface 703 and a bus system 704, wherein the processor 701 and the memory 703 are coupled together by the bus system 704, and the communication interface 703 is used for realizing information transmission between each component in the charging pile and an external device.
The bus system 704 includes a power bus, a control bus, and a status signal bus in addition to a data bus. But for the sake of clarity the various busses are labeled in figure 3 as the bus system 704.
In this embodiment of the application, the processor 701 is configured to call a program or an instruction stored in the memory 702, specifically, may be a program or an instruction stored in an application program, and the processor 701 is configured to execute the steps of providing the charging data transmission method according to this embodiment of the application.
The charging data transmission method provided by the embodiment of the present application may be applied to the processor 701, or implemented by the processor 701. The processor 701 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be implemented by integrated logic circuits of hardware or instructions in the form of software in the processor 701. The processor 701 may be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic device, or discrete hardware components. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software or hardware. Where the name of an element does not in some cases constitute a limitation on the element itself.
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems on a chip (SOCs), complex Programmable Logic Devices (CPLDs), and the like.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection according to one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
An embodiment of the present disclosure further provides a computer-readable storage medium, where a computer program is stored in the storage medium, and when the computer program is executed by a processor, the method of any one of the method embodiments may be implemented, where an execution manner and beneficial effects of the method are similar, and are not described herein again.
It is noted that, in this document, relational terms such as "first" and "second," and the like, are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising one of 8230; \8230;" 8230; "does not exclude the presence of additional like elements in a process, method, article, or apparatus that comprises the element.
The previous description is only for the purpose of describing particular embodiments of the present disclosure, so as to enable those skilled in the art to understand or implement the present disclosure. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the disclosure. Thus, the present disclosure is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (13)

1. A charging data sending method is applied to a charging pile and is characterized by comprising the following steps:
acquiring first encrypted data sent by a vehicle terminal, wherein the first encrypted data is encrypted in an asymmetric mode;
decrypting the first encrypted data in an asymmetric mode to obtain a first random number;
generating a second random number;
calculating a symmetric key based on the first random number and the second random number;
and encrypting the charging data based on the symmetric key to obtain encrypted charging data, and sending the encrypted charging data to the vehicle terminal.
2. The method of claim 1, further comprising:
and encrypting the second random number by adopting an asymmetric encryption mode to obtain second encrypted data, and sending the second encrypted data to the vehicle terminal.
3. The method of claim 2, wherein prior to encrypting the charging data based on the symmetric key to obtain encrypted charging data, the method further comprises:
acquiring charging code encrypted data sent by the vehicle terminal, wherein the charging code encrypted data is obtained by encrypting based on the symmetric key;
decrypting the charging code encrypted data based on the symmetric key to obtain the charging code;
in response to the verification of the charging code, starting charging of a vehicle corresponding to the vehicle terminal, and generating the charging data based on a charging state.
4. A charging data receiving method applied to a vehicle terminal is characterized by comprising the following steps:
encrypting a first random number in an asymmetric mode to obtain first encrypted data, and sending the first encrypted data to a charging pile;
acquiring second encrypted data which is sent by the charging pile and encrypted in an asymmetric mode, and decrypting the second encrypted data in the asymmetric mode to obtain a second random number;
calculating a symmetric key based on the first random number and the second random number;
and in response to receiving the encrypted charging data sent by the charging pile, decrypting the encrypted charging data by adopting the symmetric key to obtain decrypted charging data.
5. The method of claim 4, wherein prior to said decrypting said encrypted charging data with said symmetric key to obtain decrypted charging data, further comprising:
and encrypting the charging code based on the symmetric key to obtain charging code encrypted data, and sending the charging code encrypted data to the charging pile.
6. A charging data transmitting apparatus, comprising:
the device comprises a first random number acquisition unit, a second random number acquisition unit and a first encryption unit, wherein the first random number acquisition unit is used for acquiring first encrypted data sent by a vehicle terminal and decrypting the first encrypted data in an asymmetric mode to obtain a first random number, and the first encrypted data is encrypted in the asymmetric mode;
a second random number generation unit for generating a second random number;
a first symmetric key generation unit configured to calculate a symmetric key based on the first random number and the second random number;
and the charging data sending unit is used for encrypting the charging data based on the symmetric key to obtain encrypted charging data and sending the encrypted charging data to the vehicle terminal.
7. The apparatus of claim 6, further comprising:
and the second random number sending unit is used for encrypting the second random number by adopting an asymmetric encryption mode to obtain second encrypted data and sending the second encrypted data to the vehicle terminal.
8. The apparatus of claim 6, further comprising:
the charging code acquisition unit is used for acquiring charging code encrypted data sent by a vehicle terminal, and the charging code encrypted data is obtained by encrypting based on the symmetric key;
the charging code analysis unit is used for decrypting the charging code encrypted data based on the symmetric key to obtain the charging code;
and the charging starting unit is used for responding to the verification of the charging code, starting charging for the vehicle corresponding to the vehicle terminal, and generating the charging data based on the charging state.
9. A charging data receiving apparatus, comprising:
the first random number sending unit is used for encrypting the first random number in an asymmetric mode to obtain first encrypted data and sending the first encrypted data to the charging pile;
the second random number acquisition unit is used for acquiring second encrypted data which are sent by the charging pile and encrypted in an asymmetric mode, and decrypting the second encrypted data in the asymmetric mode to obtain a second random number, wherein the second encrypted data are encrypted in the asymmetric mode;
a second symmetric key generation unit configured to calculate a symmetric key based on the first random number and the second random number;
and the charging data receiving unit is used for responding to the reception of the encrypted charging data sent by the charging pile, and decrypting the encrypted charging data by adopting the symmetric key to obtain decrypted charging data.
10. The apparatus of claim 9, further comprising:
and the charging code sending unit is used for encrypting the charging code based on the symmetric key to obtain charging code encrypted data and sending the charging code encrypted data to the charging pile.
11. A charging pile, comprising: a processor and a memory; the memory stores programs or instructions; the processor executes a program or instructions stored in the memory to implement the charging data transmission method according to any one of claims 1-3.
12. A vehicle terminal, comprising: a processor and a memory; the memory stores programs or instructions; the processor executes a program or instructions stored in the memory to implement the charging data receiving method according to any one of claims 4 to 6.
13. A storage medium, characterized in that the storage medium has stored thereon a program or instructions which, when executed by a processor, implement the charging data transmission method according to any one of claims 1 to 3, or the charging data reception method according to any one of claims 4 to 6.
CN202111162528.5A 2021-09-30 2021-09-30 Charging data sending and receiving method and device, charging pile and vehicle terminal Pending CN115442063A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202111162528.5A CN115442063A (en) 2021-09-30 2021-09-30 Charging data sending and receiving method and device, charging pile and vehicle terminal
PCT/CN2022/121376 WO2023051467A1 (en) 2021-09-30 2022-09-26 Charging data sending and receiving method, charging data sending and receiving apparatus, charging pile, and vehicle terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111162528.5A CN115442063A (en) 2021-09-30 2021-09-30 Charging data sending and receiving method and device, charging pile and vehicle terminal

Publications (1)

Publication Number Publication Date
CN115442063A true CN115442063A (en) 2022-12-06

Family

ID=84272280

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111162528.5A Pending CN115442063A (en) 2021-09-30 2021-09-30 Charging data sending and receiving method and device, charging pile and vehicle terminal

Country Status (2)

Country Link
CN (1) CN115442063A (en)
WO (1) WO2023051467A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116609607B (en) * 2023-07-17 2023-10-27 北京鼎诚鸿安科技发展有限公司 Portable calibration device for charging pile
CN116691415B (en) * 2023-08-07 2023-10-10 深圳航天科创泛在电气有限公司 Charging information management method, system, equipment and medium
CN117892155B (en) * 2024-03-14 2024-05-31 福州一城天天出行科技有限公司 Charging pile data processing method and system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10137152A1 (en) * 2001-07-30 2003-02-27 Scm Microsystems Gmbh Procedure for the transmission of confidential data
JP5742587B2 (en) * 2011-08-25 2015-07-01 株式会社オートネットワーク技術研究所 Charging system, charging control device, charging device, and charging method
CN112019326B (en) * 2019-05-31 2024-04-16 北京车和家信息技术有限公司 Vehicle charging safety management method and system
CN110300110B (en) * 2019-06-28 2022-08-30 炬星科技(深圳)有限公司 Encryption and decryption control method, charging pile and charging equipment
CN112565206A (en) * 2020-11-20 2021-03-26 国网天津市电力公司 Charging pile information safety protection method and protection system

Also Published As

Publication number Publication date
WO2023051467A1 (en) 2023-04-06

Similar Documents

Publication Publication Date Title
US11985238B2 (en) Vehicle-mounted device upgrade method and related device
CN115442063A (en) Charging data sending and receiving method and device, charging pile and vehicle terminal
CN112913189B (en) OTA (over the air) upgrading method and device
US11363011B2 (en) Unified mobile security system and method of operation
CN110998527B (en) Remote Control of Computing Devices
CN111327605B (en) Method, terminal, server and system for transmitting private information
EP4068675A1 (en) Method and device for certificate application
TWI553504B (en) A cloud encryption system and method
CN112866385A (en) Interface calling method and device, electronic equipment and storage medium
US11588622B2 (en) Securing outside-vehicle communication using IBC
CN117061105A (en) Data processing method and device, readable medium and electronic equipment
WO2023279283A1 (en) Method for establishing secure vehicle communication, and vehicle, terminal and system
CN112329044A (en) Information acquisition method and device, electronic equipment and computer readable medium
CN117040724A (en) Digital key authorization method and device, electronic equipment and readable storage medium
CN116489621A (en) Vehicle key sharing method, device, equipment and medium
CN116502189A (en) Software authorization method, system, device and storage medium
CN111786955B (en) Method and apparatus for protecting a model
CN113961931A (en) Adb tool using method and device and electronic equipment
KR20190115489A (en) IOT equipment certification system utilizing security technology
CN113365243A (en) Communication method, device, equipment and system
CN111314320B (en) Communication method, terminal, server and system based on HTTP
WO2018161727A1 (en) Private key generation method, device and system
CN115987661B (en) Cloud server data self-storage method, device, equipment and storage medium
WO2024066263A1 (en) Data relay method and apparatus, system, storage medium, device, and vehicle
CN115378743B (en) Information encryption transmission method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination