CN115442063A - Charging data sending and receiving method and device, charging pile and vehicle terminal - Google Patents
Charging data sending and receiving method and device, charging pile and vehicle terminal Download PDFInfo
- Publication number
- CN115442063A CN115442063A CN202111162528.5A CN202111162528A CN115442063A CN 115442063 A CN115442063 A CN 115442063A CN 202111162528 A CN202111162528 A CN 202111162528A CN 115442063 A CN115442063 A CN 115442063A
- Authority
- CN
- China
- Prior art keywords
- charging
- data
- random number
- encrypted
- symmetric key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 70
- 230000005540 biological transmission Effects 0.000 claims description 12
- 238000012795 verification Methods 0.000 claims description 10
- 230000004044 response Effects 0.000 claims description 8
- 238000004458 analytical method Methods 0.000 claims description 3
- 238000004422 calculation algorithm Methods 0.000 abstract description 22
- 238000012545 processing Methods 0.000 abstract description 11
- 238000004364 calculation method Methods 0.000 abstract description 8
- 238000004891 communication Methods 0.000 description 28
- 238000010586 diagram Methods 0.000 description 15
- 238000004590 computer program Methods 0.000 description 11
- 230000009471 action Effects 0.000 description 7
- 230000006870 function Effects 0.000 description 6
- 230000003287 optical effect Effects 0.000 description 6
- 230000008569 process Effects 0.000 description 5
- 238000013179 statistical model Methods 0.000 description 4
- 238000009434 installation Methods 0.000 description 3
- 238000012423 maintenance Methods 0.000 description 3
- 239000013307 optical fiber Substances 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- OTZZZISTDGMMMX-UHFFFAOYSA-N 2-(3,5-dimethylpyrazol-1-yl)-n,n-bis[2-(3,5-dimethylpyrazol-1-yl)ethyl]ethanamine Chemical compound N1=C(C)C=C(C)N1CCN(CCN1C(=CC(C)=N1)C)CCN1C(C)=CC(C)=N1 OTZZZISTDGMMMX-UHFFFAOYSA-N 0.000 description 1
- 241001441724 Tetraodontidae Species 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/84—Vehicles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/062—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Charge And Discharge Circuits For Batteries Or The Like (AREA)
- Electric Propulsion And Braking For Vehicles (AREA)
Abstract
The disclosure provides a charging data sending and receiving method, a charging data sending and receiving device, a charging pile and a vehicle terminal. The charging data sending method is applied to the charging pile and comprises the following steps: acquiring first encrypted data sent by a vehicle terminal, wherein the first encrypted data is encrypted in an asymmetric mode; decrypting the first encrypted data to obtain a first random number; generating a second random number; calculating a symmetric key based on the first random number and the second random number; and encrypting the charging data based on the symmetric key to obtain encrypted charging data, and sending the encrypted charging data to the vehicle terminal. The scheme adopts a symmetrical encryption mode to encrypt the charging data, and compared with an asymmetrical encryption mode, the symmetrical encryption mode has small algorithm difficulty and high execution speed, so that the scheme disclosed by the invention can meet the encryption requirement of a large amount of charging data only by arranging a processing chip with low calculation power at the charging pile side.
Description
Technical Field
The embodiment of the disclosure relates to the technical field of vehicle charging, in particular to a charging data sending method, a charging data receiving method, a charging pile and a vehicle.
Background
The charging pile forms a large amount of charging data when charging the vehicle. The charging data reflects the working state of the charging pile, is a data asset with commercial value, and needs to be uploaded to a cloud server by an encryption method. Because a large amount of charging piles are deployed in the areas which cannot be covered by operator networks such as an underground garage, the charging pile data cannot be directly transmitted to the cloud server through the operator networks. In the existing method, when a vehicle is charged, a charging pile is sent to the vehicle in a short-distance communication mode, and then the vehicle forwards charging data to a cloud server.
In order to ensure the confidential uploading of the charging data, an asymmetric encryption method is adopted between the charging pile and the vehicle to encrypt and decrypt the charging data. And the adoption of an asymmetric encryption algorithm can meet the encryption requirement of a large amount of charging data only by requiring that a charging pile has a processing chip with large calculation power.
Disclosure of Invention
In order to solve at least one problem in the prior art, at least one embodiment of the present disclosure provides a charging data transmitting and receiving method, an apparatus, a charging pile, and a vehicle terminal.
On one hand, the embodiment of the present disclosure provides a charging data sending method, which is applied to a charging pile, and includes:
acquiring first encrypted data sent by a vehicle terminal in an asymmetric mode, wherein the first encrypted data is encrypted in the asymmetric mode;
decrypting the first encrypted data to obtain a first random number;
generating a second random number;
calculating a symmetric key based on the first random number and the second random number;
and encrypting the charging data based on the symmetric key to obtain encrypted charging data, and sending the encrypted charging data to the vehicle terminal.
Optionally, the apparatus further comprises:
and encrypting the second random number by adopting an asymmetric encryption mode to obtain second encrypted data, and sending the second encrypted data to the vehicle terminal.
Optionally, before encrypting the charging data based on the symmetric key to obtain encrypted charging data, the method further comprises:
acquiring charging code encrypted data sent by the vehicle terminal, wherein the charging code encrypted data is obtained by encrypting based on the symmetric key;
decrypting the charging code encrypted data based on the symmetric key to obtain the charging code;
in response to the verification of the charging code, starting charging of a vehicle corresponding to the vehicle terminal, and generating the charging data based on a charging state.
In another aspect, an embodiment of the present disclosure provides a charging data receiving method applied to a vehicle terminal, including:
encrypting a first random number in an asymmetric mode to obtain first encrypted data, and sending the first encrypted data to a charging pile;
acquiring second encrypted data which are sent by the charging pile and encrypted in an asymmetric mode, and decrypting the second encrypted data in the asymmetric mode to obtain a second random number;
calculating a symmetric key based on the first random number and the second random number;
and in response to receiving the encrypted charging data sent by the charging pile, decrypting the encrypted charging data by adopting the symmetric key to obtain decrypted charging data.
Optionally, before the decrypting the encrypted charging data with the symmetric key to obtain the decrypted charging data, the method further includes:
and encrypting the charging code based on the symmetric key to obtain charging code encrypted data, and sending the charging code encrypted data to the charging pile.
In another aspect, an embodiment of the present disclosure provides a charging data transmitting apparatus, including:
the device comprises a first random number acquisition unit, a second random number acquisition unit and a first encryption unit, wherein the first random number acquisition unit is used for acquiring first encrypted data sent by a vehicle terminal and decrypting the first encrypted data in an asymmetric mode to obtain a first random number, and the first encrypted data is encrypted in the asymmetric mode;
a second random number generation unit for generating a second random number;
a first symmetric key generation unit configured to calculate a symmetric key based on the first random number and the second random number;
and the charging data sending unit is used for encrypting the charging data based on the symmetric key to obtain encrypted charging data and sending the encrypted charging data to the vehicle terminal.
Optionally, the apparatus further comprises:
and the second random number sending unit is used for encrypting the second random number by adopting an asymmetric encryption mode to obtain second encrypted data and sending the second encrypted data to the vehicle terminal.
Optionally, the apparatus further comprises:
the charging code acquisition unit is used for acquiring charging code encrypted data sent by a vehicle terminal, and the charging code encrypted data is obtained by encrypting based on the symmetric key;
the charging code analysis unit is used for decrypting the charging code encrypted data based on the symmetric key to obtain the charging code;
and the charging starting unit is used for responding to the verification of the charging code, starting charging for the vehicle corresponding to the vehicle terminal, and generating the charging data based on the charging state.
In another aspect, an embodiment of the present disclosure further provides a charging data receiving apparatus, including:
the first random number sending unit is used for encrypting the first random number in an asymmetric mode to obtain first encrypted data and sending the first encrypted data to the charging pile;
the second random number acquisition unit is used for acquiring second encrypted data which are sent by the charging pile and encrypted in an asymmetric mode and decrypting the second encrypted data in the asymmetric mode to obtain a second random number, wherein the second encrypted data are encrypted in the asymmetric mode;
a second symmetric key generation unit configured to calculate a symmetric key based on the first random number and the second random number;
and the charging data receiving unit is used for responding to the received encrypted charging data sent by the charging pile and decrypting the encrypted charging data by adopting the symmetric key to obtain decrypted charging data.
Optionally, the apparatus further comprises: and the charging code sending unit is used for encrypting the charging code based on the symmetric key to obtain charging code encrypted data and sending the charging code encrypted data to the charging pile.
In another aspect, an embodiment of the present disclosure provides a charging pile, including: a processor and a memory; the memory stores programs or instructions; the processor executes a program or instructions stored in the memory to implement the charging data transmission method as described above.
In another aspect, an embodiment of the present disclosure provides a vehicle terminal, including: a processor and a memory; the memory stores programs or instructions; the processor executes a program or instructions stored in the memory to implement the charging data receiving method as described in any one of the preceding.
In still another aspect, embodiments of the present disclosure provide a storage medium, where a program or an instruction is stored, and when the program or the instruction is executed by a processor, the charging data transmitting method or the charging data receiving method as described above is implemented.
According to the scheme provided by the embodiment of the disclosure, the charging pile and the vehicle terminal exchange the first random number and the second random number in an asymmetric mode, and then the symmetric key is obtained through calculation according to the first random number and the second random number. The charging pile adopts the symmetric key to encrypt the charging data to obtain encrypted charging data and sends the encrypted charging data to the vehicle terminal, and the vehicle terminal decrypts the encrypted charging data based on the symmetric key to obtain the charging data. Compared with an asymmetric method, the symmetric encryption method has low algorithm difficulty and high execution speed, so that the encryption requirement of a large amount of charging data can be met only by arranging a processing chip with low calculation force on the charging pile side by adopting the scheme of the embodiment of the disclosure.
Drawings
To more clearly illustrate the technical solutions of the embodiments of the present disclosure, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present disclosure, and other drawings can be obtained by those skilled in the art according to the drawings.
Fig. 1 is a schematic structural diagram of a charging system provided in an embodiment of the present disclosure;
fig. 2 is a flowchart of a charging data transmission method provided by an embodiment of the present disclosure;
fig. 3 is a flowchart of a charging data receiving method according to an embodiment of the disclosure;
fig. 4 is a schematic structural diagram of a charging data transmitting apparatus according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of a charging data receiving device according to an embodiment of the present disclosure;
FIG. 6 is a schematic structural diagram of a vehicle-mounted terminal according to an embodiment of the present disclosure;
fig. 7 is a schematic structural diagram of a charging pile provided in an embodiment of the present application.
Detailed Description
In order that the above objects, features and advantages of the present disclosure can be more clearly understood, the present disclosure will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the embodiments described are only a few embodiments of the present disclosure, and not all embodiments. The specific embodiments described herein are merely illustrative of the disclosure and do not delimit the disclosure. All other embodiments derived by one of ordinary skill in the art from the described embodiments of the disclosure are intended to be within the scope of the disclosure.
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions.
The embodiment of the disclosure provides a charging data sending method and a charging data receiving method, which are based on a symmetric encryption mode to realize transmission of charging data between a charging pile and a vehicle terminal, reduce the computational cost required by encryption and decryption of the charging data, and then enable a processing chip with low computational power to be arranged on the side of the charging pile, so that the encryption requirements of a large amount of charging data can be met.
Before the method for transmitting and receiving charging data provided by the embodiments of the present disclosure is described, a vehicle charging system provided by the embodiments of the present disclosure is first described. Fig. 1 is a schematic structural diagram of a charging system provided in an embodiment of the present disclosure. As shown in fig. 1, a vehicle charging system 100 provided by the embodiment of the present disclosure includes a charging pile 101, a vehicle 102, a key system server 103, and a cloud server 104. The key system server 103 and the cloud server 104 are directly connected, and the cloud server 104 can be in communication connection with the vehicle 102 terminal in a remote communication mode. The key system server 103 is used to provide a key service and a charge code generation service. Specifically, the key system server 103 provides basic configuration data required for realizing asymmetric encrypted communication for the vehicle 102 and the charging pile 101, or provides a public and private key pair required for realizing asymmetric encrypted communication for the vehicle 102 and the charging pile 101.
In some embodiments of the disclosed embodiment, the key system server 103 centrally manages the public and private keys needed for asymmetric encryption by the vehicle 102 and charging pile 101. Specifically, after generating the keys required by the charging pile 101 and the vehicle 102, the key system server 103 sends the key of the charging pile 101 to the cloud server 104. When the charging pile 101 is installed, an installation maintenance worker may query the cloud server 104 based on a Serial Number (SN) of the charging pile 101, obtain a private key of a pile end (that is, a private key corresponding to the charging pile 101), and write the private key of the charging pile 101 into a security module of the charging pile 101. The cloud server 104 may perform secure communication with the vehicle 102, and send a vehicle-side private key (i.e., a private key corresponding to a terminal of the vehicle 102) required for the vehicle 102 to communicate with the charging pile 101 to the vehicle 102. Under the condition that the charging pile 101 is a private charging pile 1, the installation and maintenance personnel can write the public key of the vehicle end of the vehicle 102 corresponding to the charging pile 101 into the security module of the charging pile 101.
In some other embodiments of the present disclosure, the key system server 103 may further generate basic information for generating a public-private key pair, and send the basic information to the cloud server 104. When the charging pile 101 is installed, an installation maintenance worker can query the cloud server 104 to obtain basic information for generating a public and private key pair, and write the basic information into the charging pile 101, so that the charging pile 101 generates a pile end private key and a pile end public key according to the basic information and the generated random number. The cloud server 104 may communicate with the vehicle 102, and send the basic information to the terminal of the vehicle 102, so that the terminal of the vehicle 102 generates a vehicle-end private key and a pile-end public key according to the basic information and the generated random number, or according to the basic information and a numerical value input by a user.
The embodiment of the disclosure provides a charging data sending method applied to a charging pile. Fig. 2 is a flowchart of a method for transmitting charging data according to an embodiment of the present disclosure. As shown in fig. 2, a method for transmitting charging data according to an embodiment of the present disclosure includes steps S201 to S203.
Step S201: the method comprises the steps of obtaining first encrypted data sent by a vehicle terminal, wherein the first encrypted data are encrypted in an asymmetric mode.
In the embodiment of the disclosure, after a charging gun of the charging pile is inserted into a charging interface of a vehicle and basic data transmission of the charging gun and the charging interface is realized based on the charging interface, the vehicle and the charging pile are connected in close range communication. The short-distance communication connection may be various possible connection modes such as a bluetooth connection, a WIFI connection, and a Zigbee connection, and the embodiment of the present disclosure is not particularly limited, and may be specifically determined according to types of the wireless communication modules installed in the charging pile and the vehicle terminal.
In some embodiments of the present disclosure, the charging pile may transmit the product serial number to the vehicle through the charging interface after detecting that the charging gun is inserted into the charging interface of the vehicle. After receiving the product serial number of the charging pile, the vehicle generates broadcast information based on the product serial number of the charging pile and the vehicle identification mark so as to request to establish close-range communication connection with the charging pile. After the charging pile receives the broadcast information, the charging pile determines that the broadcast information is sent by the vehicle to be charged based on the product serial number in the broadcast information, and at the moment, a connection request is generated based on the vehicle identification mark and broadcasted to request for establishing communication connection with the vehicle terminal. Through aforementioned mode, fill electric pile and vehicle and establish communication connection.
In some other embodiments of the present disclosure, after the vehicle detects that the charging gun is inserted into its own charging interface, the vehicle may send a vehicle identification to the charging pile through the charging gun. After the vehicle identification mark is received, the charging pile generates broadcast information based on the product serial number of the charging pile and the vehicle identification mark so as to request for establishing close range communication connection with the vehicle. After receiving the broadcast information, the vehicle terminal determines that the broadcast information is the broadcast information sent by the charging pile based on the vehicle identification mark in the broadcast information, and at the moment, a connection request is generated based on the product serial number and is broadcasted to request for establishing communication connection with the charging pile. Through aforementioned mode, fill electric pile and vehicle and establish communication connection.
After the communication connection is established between the charging pile and the vehicle terminal, the charging pile and the vehicle terminal can be subjected to security certification and authentication based on asymmetric encryption. In one embodiment, the charging post and the vehicle terminal may perform security certification and authentication based on the private key and the public key.
In some embodiments of the present disclosure, the charging pile may query whether to locally store the vehicle end public key of the vehicle terminal based on the vehicle identification. If the public key of the vehicle end of the vehicle terminal is not stored locally, the charging pile can send a request to the vehicle terminal to request to acquire the public key of the vehicle end. Similarly, under the condition that the pile end public key of the charging pile is not stored in the vehicle terminal, the vehicle terminal can also send a request to the charging pile so as to request to acquire the pile end public key. In other embodiments of the disclosure, after the communication connection is established between the charging pile and the vehicle terminal, the charging pile and the vehicle terminal can also actively send the public key of the charging pile to the opposite-end device. After the public key of the opposite terminal is obtained, the charging pile and the vehicle terminal can realize safety certification and authentication.
After the safety certification and authentication pass, the charging pile can acquire first encrypted data sent by the vehicle terminal. The first encrypted data is encrypted by the vehicle terminal in an asymmetric mode. In some embodiments, the first encrypted data is obtained by the vehicle terminal encrypting the first random number based on the stub public key.
The vehicle terminal is provided with a first random number generator, and the first random number generator can generate a first random number by adopting a random number generation method known in the art, such as a pseudo random generation algorithm, a statistical model algorithm and the like.
After the first random number is generated, the vehicle terminal encrypts the first random number based on the pile end public key to obtain first encrypted data, and sends the first encrypted data to the charging pile, so that the charging pile obtains the first encrypted data.
Step S202: and decrypting the first encrypted data in an asymmetric mode to obtain a first random number.
After the first encrypted data are received, the charging pile decrypts the first encrypted data in an asymmetric mode to obtain a first random number. In some embodiments, the charging pile decrypts the first encrypted data based on the stub private key to obtain the first random number.
In some embodiments of the present disclosure, data identification errors caused by signal interference during transmission are avoided. When the vehicle terminal sends the first encrypted data to the charging pile, the vehicle terminal also adopts the vehicle-end private key to sign the first encrypted data to obtain a digital signature. After the charging pile receives the first encrypted data and the digital signature, firstly, the vehicle end public key is adopted to operate the first encrypted data to obtain a verification signature, and the pile end private key is adopted to decrypt the first encrypted data under the condition that the verification signature is identical to the digital signature.
Step S203: a second random is generated.
In the embodiment of the present disclosure, the charging pile is locally configured with the second random number generator. The second random number generator may generate a second random number. In a specific embodiment, the second random number generator may employ a pseudo random number generation algorithm, a statistical model algorithm, or other random number generation methods known in the art.
Step S204: a symmetric key is calculated based on the first random number and the second random number.
In some embodiments of the present disclosure, the charging pile may splice the first random number and the second random number according to a preset splicing rule to obtain a spliced random number, and use the spliced random number as the symmetric key.
In some other embodiments of the present disclosure, the charging pile may perform a hash operation based on the first random number and the second random number, and use a result of the hash operation as the symmetric key.
For example, the charging pile may splice the first random number and the second random number according to a preset splicing rule to obtain a spliced random number, and then perform hash operation on the spliced random number to obtain the symmetric key.
For another example, the charging pile may perform a hash operation based on one of the first random number or the second random number to obtain an intermediate operation result; then, splicing the intermediate operation result with another random number to obtain spliced data; and finally, carrying out Hash operation on the spliced data to obtain a symmetric key.
Step S205: and encrypting the charging data based on the symmetric key to obtain encrypted charging data, and sending the encrypted charging data to the vehicle terminal.
The charging pile adopts a pre-configured symmetric encryption algorithm, and the charging data is encrypted based on the symmetric key to obtain encrypted charging data. The preconfigured symmetric encryption algorithm may be any one of a DES algorithm, a 3DES algorithm, a TDEA algorithm, a Blowfish algorithm, an RC5 algorithm, or an IDEA algorithm, and the embodiment of the present disclosure is not particularly limited.
After the encrypted charging data are obtained, the charging pile sends the encrypted charging data to the vehicle terminal by adopting a pre-established communication channel, so that the vehicle terminal receives the encrypted charging data.
According to the charging data sending method provided by the embodiment of the disclosure, a charging pile firstly decrypts first encrypted data sent by a vehicle terminal in an asymmetric mode to obtain a first random number and generates a second random number, then a symmetric key is obtained through calculation according to the first random number and the second random number, the charging data is encrypted by using the symmetric key to obtain encrypted charging data, and the encrypted charging data is sent to the vehicle terminal.
That is to say, the charging data transmission method provided by the embodiment of the disclosure firstly agrees with a symmetric key between the charging pile and the vehicle terminal, and then encrypts the charging data based on the symmetric key. Since the vehicle terminal can also obtain the first random number and the second random number to calculate the symmetric key, after receiving the encrypted charging data, the vehicle terminal can decrypt the encrypted charging data based on the symmetric key. Compared with an asymmetric encryption mode, the symmetric encryption mode has low algorithm difficulty and high execution speed, so that the scheme of the embodiment of the disclosure can meet the encryption requirement of a large amount of charging data only by arranging a processing chip with low calculation force on the charging pile side.
In some embodiments of the present disclosure, the charging pile further performs step S206 after generating the second random number.
Step S206: and encrypting the second random number by adopting an asymmetric encryption mode to obtain second encrypted data, and sending the second encrypted data to the vehicle terminal.
In a specific application, the charging pile may encrypt the second random number by using the vehicle-side public key to obtain second encrypted data, and send the second encrypted data to the vehicle terminal.
In some embodiments of the present disclosure, in order to enable the user with the usage right to charge the vehicle, the charging pile may perform steps S207 to S209 before performing the aforementioned step S205, in addition to the aforementioned steps S201 to S205.
Step S207: and acquiring charging code encrypted data sent by the vehicle terminal, wherein the charging code encrypted data is obtained by encrypting based on a symmetric key.
Step S208: and decrypting the charging code encrypted data based on the symmetric key to obtain the charging code.
In the embodiment of the disclosure, the charging codes are transmitted in a symmetrical encryption mode before the charging pile and the vehicle terminal. And after receiving the charging code encrypted data sent by the vehicle terminal, the vehicle terminal decrypts the charging code encrypted data by adopting the symmetric key to obtain the charging code.
Step S209: in response to the verification of the charging code being passed, charging of a vehicle corresponding to the vehicle terminal is initiated, and charging data is generated based on the state of charge.
And after the charging code is obtained through decryption, the charging pile verifies the charging code according to a preset charging code verification method. After passing the verification of the charging code, it is determined that the vehicle to be charged can be charged, so charging is started, and charging data is generated based on the state of charge.
In other embodiments of the present disclosure, the charging code may be transmitted between the charging pile and the vehicle terminal by using an asymmetric encryption method to determine whether charging can be started.
The embodiment of the disclosure also provides a charging data receiving method applied to the vehicle terminal. Fig. 3 is a flowchart of a charging data receiving method according to an embodiment of the disclosure. As shown in fig. 3, the charging data receiving method provided by the embodiment of the present disclosure includes steps S301 to S305.
Step S301: and encrypting the first random number in an asymmetric mode to obtain first encrypted data, and sending the first encrypted data to the charging pile.
In the embodiment of the disclosure, after the communication connection is established between the charging pile and the vehicle terminal, the charging pile and the vehicle terminal can be subjected to safety certification and authentication based on an asymmetric mode. Specifically, the charging pile and the vehicle terminal perform security authentication based on a private key and a public key.
The vehicle terminal is provided with a first random number generator, and the first random number generator can generate a first random number by using a random number generation method known in the art, such as a pseudo random generation algorithm, a statistical model algorithm, and the like.
In some embodiments of the disclosure, after the first random number is generated, the vehicle terminal encrypts the first random number based on the pile end public key to obtain first encrypted data, and sends the first encrypted data to the charging pile, so that the charging pile obtains the first encrypted data.
Step S302: and acquiring second encrypted data which are sent by the charging pile and encrypted in an asymmetric mode, and decrypting the second encrypted data in the asymmetric mode to obtain a second random number.
In the embodiment of the present disclosure, the charging pile is configured with a second random number generator. The second random number generator may generate a second random number. In particular embodiments, the second random number generator may employ a pseudo random number generation algorithm, a statistical model algorithm, or other random number generation methods known in the art. After the second random number is generated, the charging pile encrypts the second random number by using the vehicle end public key to obtain second encrypted data, and sends the second encrypted data to the vehicle terminal.
In some embodiments of the disclosure, after receiving the second encrypted data, the vehicle terminal decrypts the second encrypted data by using the vehicle-side private key to obtain a second random number.
Step S303: a symmetric key is calculated based on the first random number and the second random number.
In the embodiment of the disclosure, the vehicle terminal calculates and obtains the symmetric key based on the first random number and the second random number by using the same algorithm as that used for charging piles. For example, the vehicle terminal may adopt a splicing rule set by a vehicle terminal to splice the first random number and the second random number to obtain a symmetric key; for another example, the vehicle terminal may perform a hash operation on the charging pile based on the first random number and the second random number, and use a result of the hash operation as the symmetric key.
Step S304: and in response to receiving the encrypted charging data sent by the charging pile, decrypting the encrypted charging data by adopting the symmetric key to obtain decrypted charging data.
In the charging data receiving method provided by the embodiment of the disclosure, the vehicle terminal decrypts the second encrypted data in an asymmetric manner to obtain the second random number, and calculates the symmetric key according to the first random number generated by the vehicle terminal and the second random number. The vehicle terminal may decrypt the encrypted charging data based on the symmetric key after receiving the encrypted charging data. Compared with an asymmetric encryption mode, the symmetric encryption mode has low algorithm difficulty and high execution speed, so that the calculation power cost paid by the vehicle terminal for decrypting the vehicle data by adopting the scheme of the embodiment of the disclosure is low. In addition, the scheme of the embodiment of the disclosure can meet the encryption requirement of a large amount of charging data only by arranging the processing chip with low calculation force on the charging pile side.
In some embodiments of the present disclosure, the vehicle terminal needs to send a charging code to the charging pile, and after the authority is verified based on the charging code, the charging pile charges the vehicle where the vehicle terminal is located. In order to enable charging of the vehicle, the vehicle terminal may further perform step S305 before performing the aforementioned step S304.
Step S305: and encrypting the charging code based on the symmetric key to obtain charging code encrypted data, and sending the charging code encrypted data to the charging pile.
In some other embodiments of the present disclosure, the vehicle terminal may further encrypt the charging code by using an asymmetric encryption mechanism to obtain charging code encrypted data, and send the charging code encrypted data to the charging pile.
The embodiment of the disclosure also provides a charging data sending device, which is a functional module in the charging pile. Fig. 4 is a schematic structural diagram of a charging data transmitting apparatus provided in an embodiment of the present disclosure, and as shown in fig. 4, a charging data transmitting apparatus 400 provided in an embodiment of the present disclosure includes a first random number obtaining unit 401, a second random number generating unit 402, a first symmetric key generating unit 403, and a charging data transmitting unit 404.
The first random number obtaining unit 401 is configured to obtain first encrypted data sent by a vehicle terminal, and decrypt the first encrypted data in an asymmetric manner to obtain a first random number, where the first encrypted data is encrypted in an asymmetric manner.
The second random number generation unit 402 is configured to generate a second random number.
The first symmetric key generation unit 403 is configured to calculate a symmetric key based on the first random number and the second random number.
The charging data transmitting unit 404 is configured to encrypt the charging data based on the symmetric key to obtain encrypted charging data, and transmit the encrypted charging data to the vehicle terminal, so that the vehicle terminal calculates a symmetric key based on the first random number and the second random number, and calculates a symmetric key based on the first random number and the second random number.
In some applications of the embodiment of the present disclosure, the charging data transmitting apparatus 400 may further include a second encryption module configured to encrypt the second random number in an asymmetric encryption manner to obtain second encrypted data, and transmit the second encrypted data to the vehicle terminal.
In some embodiments of the present disclosure, the charging data transmitting apparatus 400 may further include a charging code acquiring unit, a charging code parsing unit, and a charging start unit.
The charging code obtaining unit is used for obtaining charging code encrypted data sent by the vehicle terminal, and the charging code encrypted data is obtained through encryption based on a symmetric key.
The charging code analysis unit is used for decrypting the charging code encrypted data based on the symmetric key to obtain the charging code.
The charging starting unit is used for responding to the verification of the charging code, starting charging of the vehicle corresponding to the vehicle terminal, and generating charging data based on the charging state.
The embodiment of the disclosure further provides a charging data receiving device, and the charging receiving device is a functional module in the charging pile. Fig. 5 is a schematic structural diagram of a charging data receiving apparatus according to an embodiment of the present disclosure, and as shown in fig. 5, a charging data receiving apparatus 500 according to an embodiment of the present disclosure includes a first random number transmitting unit 501, a second random number obtaining unit 502, a second symmetric key generating unit 503, and a charging data receiving unit 504.
The first random number sending unit 501 is configured to encrypt the first random number in an asymmetric manner to obtain first encrypted data, and send the first encrypted data to the charging pile;
the second random number obtaining unit 502 is configured to obtain second encrypted data that is sent by the charging pile and encrypted in an asymmetric manner, and decrypt the second encrypted data in the asymmetric manner to obtain a second random number, where the second encrypted data is encrypted in the asymmetric manner.
The second symmetric key generation unit 503 is configured to calculate a symmetric key based on the first random number and the second random number;
the charging data receiving unit 504 is configured to decrypt the encrypted charging data with the symmetric key to obtain decrypted charging data in response to receiving the encrypted charging data sent by the charging post.
In some applications of the embodiment of the present disclosure, the charging data receiving apparatus 500 may further include a charging code transmitting unit. The charging code sending unit encrypts a charging code based on the symmetric key to obtain charging code encrypted data, and sends the charging code encrypted data to the charging pile.
The embodiment of the present disclosure further provides an in-vehicle terminal, which includes a processor and a memory, where the memory stores a computer program, and when the computer program is executed by the processor, the charging data receiving method according to any of the embodiments above may be implemented.
For example, fig. 6 is a schematic structural diagram of an in-vehicle terminal provided in an embodiment of the present disclosure. Referring now specifically to fig. 6, a schematic diagram of a structure suitable for implementing the in-vehicle terminal 600 in the disclosed embodiment is shown. The in-vehicle terminal shown in fig. 6 is only an example, and should not bring any limitation to the functions and the use range of the embodiment of the present disclosure.
As shown in fig. 6, the in-vehicle terminal 600 may include a processing device (e.g., a central processing unit, a graphic processor, etc.) 601 that can perform various appropriate actions and processes according to a program stored in a read only memory ROM602 or a program loaded from a storage device 608 into a random access memory RAM 603. In the RAM603, various programs and data necessary for the operation of the in-vehicle terminal 600 are also stored. The processing device 601, the ROM602, and the RAM603 are connected to each other via a bus 604. An input/output I/O interface 605 is also connected to bus 604.
Generally, the following devices may be connected to the I/O interface 605: input devices 606 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; output devices 607 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 608 including, for example, tape, hard disk, etc.; and a communication device 609. The communication means 609 may allow the in-vehicle terminal 600 to perform wireless or wired communication with other devices to exchange data. While fig. 6 illustrates the in-vehicle terminal 600 having various devices, it is to be understood that not all illustrated devices are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program carried on a non-transitory computer readable medium, the computer program containing program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication means 609, or may be installed from the storage means 608, or may be installed from the ROM 602. The computer program, when executed by the processing device 601, performs the above-described functions defined in the methods of the embodiments of the present disclosure.
It should be noted that the computer readable medium of the present disclosure may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
In some embodiments, the clients, servers may communicate using any currently known or future developed network Protocol, such as HTTP (HyperText Transfer Protocol), and may interconnect with any form or medium of digital data communication (e.g., a communications network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the Internet (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed network.
The computer-readable medium may be included in the in-vehicle terminal; or may exist separately without being assembled into the in-vehicle terminal.
The computer-readable medium carries one or more programs which, when executed by the in-vehicle terminal of the computer device, cause the in-vehicle terminal of the computer device to: based on an asymmetric encryption mode, sending the first random number to the charging pile, and acquiring a second random number sent by the charging pile; calculating a symmetric key based on the first random number and the second random number; and in response to receiving the encrypted charging data sent by the charging pile, decrypting the encrypted charging data by adopting the symmetric key to obtain decrypted charging data.
Computer program code for carrying out operations for aspects of the present disclosure may be written in any combination of one or more programming languages, including but not limited to an object oriented programming language such as Java, smalltalk, C + +, including conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The embodiment of the disclosure also provides a charging pile, and fig. 7 is a schematic structural diagram of the charging pile provided by the embodiment of the application. The charging pile may perform the charging data transmission method in the foregoing embodiment.
As shown in fig. 7, the charging pile 700 includes at least one processor 701, at least one memory 702, at least one communication interface 703 and a bus system 704, wherein the processor 701 and the memory 703 are coupled together by the bus system 704, and the communication interface 703 is used for realizing information transmission between each component in the charging pile and an external device.
The bus system 704 includes a power bus, a control bus, and a status signal bus in addition to a data bus. But for the sake of clarity the various busses are labeled in figure 3 as the bus system 704.
In this embodiment of the application, the processor 701 is configured to call a program or an instruction stored in the memory 702, specifically, may be a program or an instruction stored in an application program, and the processor 701 is configured to execute the steps of providing the charging data transmission method according to this embodiment of the application.
The charging data transmission method provided by the embodiment of the present application may be applied to the processor 701, or implemented by the processor 701. The processor 701 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be implemented by integrated logic circuits of hardware or instructions in the form of software in the processor 701. The processor 701 may be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic device, or discrete hardware components. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software or hardware. Where the name of an element does not in some cases constitute a limitation on the element itself.
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems on a chip (SOCs), complex Programmable Logic Devices (CPLDs), and the like.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection according to one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
An embodiment of the present disclosure further provides a computer-readable storage medium, where a computer program is stored in the storage medium, and when the computer program is executed by a processor, the method of any one of the method embodiments may be implemented, where an execution manner and beneficial effects of the method are similar, and are not described herein again.
It is noted that, in this document, relational terms such as "first" and "second," and the like, are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising one of 8230; \8230;" 8230; "does not exclude the presence of additional like elements in a process, method, article, or apparatus that comprises the element.
The previous description is only for the purpose of describing particular embodiments of the present disclosure, so as to enable those skilled in the art to understand or implement the present disclosure. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the disclosure. Thus, the present disclosure is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (13)
1. A charging data sending method is applied to a charging pile and is characterized by comprising the following steps:
acquiring first encrypted data sent by a vehicle terminal, wherein the first encrypted data is encrypted in an asymmetric mode;
decrypting the first encrypted data in an asymmetric mode to obtain a first random number;
generating a second random number;
calculating a symmetric key based on the first random number and the second random number;
and encrypting the charging data based on the symmetric key to obtain encrypted charging data, and sending the encrypted charging data to the vehicle terminal.
2. The method of claim 1, further comprising:
and encrypting the second random number by adopting an asymmetric encryption mode to obtain second encrypted data, and sending the second encrypted data to the vehicle terminal.
3. The method of claim 2, wherein prior to encrypting the charging data based on the symmetric key to obtain encrypted charging data, the method further comprises:
acquiring charging code encrypted data sent by the vehicle terminal, wherein the charging code encrypted data is obtained by encrypting based on the symmetric key;
decrypting the charging code encrypted data based on the symmetric key to obtain the charging code;
in response to the verification of the charging code, starting charging of a vehicle corresponding to the vehicle terminal, and generating the charging data based on a charging state.
4. A charging data receiving method applied to a vehicle terminal is characterized by comprising the following steps:
encrypting a first random number in an asymmetric mode to obtain first encrypted data, and sending the first encrypted data to a charging pile;
acquiring second encrypted data which is sent by the charging pile and encrypted in an asymmetric mode, and decrypting the second encrypted data in the asymmetric mode to obtain a second random number;
calculating a symmetric key based on the first random number and the second random number;
and in response to receiving the encrypted charging data sent by the charging pile, decrypting the encrypted charging data by adopting the symmetric key to obtain decrypted charging data.
5. The method of claim 4, wherein prior to said decrypting said encrypted charging data with said symmetric key to obtain decrypted charging data, further comprising:
and encrypting the charging code based on the symmetric key to obtain charging code encrypted data, and sending the charging code encrypted data to the charging pile.
6. A charging data transmitting apparatus, comprising:
the device comprises a first random number acquisition unit, a second random number acquisition unit and a first encryption unit, wherein the first random number acquisition unit is used for acquiring first encrypted data sent by a vehicle terminal and decrypting the first encrypted data in an asymmetric mode to obtain a first random number, and the first encrypted data is encrypted in the asymmetric mode;
a second random number generation unit for generating a second random number;
a first symmetric key generation unit configured to calculate a symmetric key based on the first random number and the second random number;
and the charging data sending unit is used for encrypting the charging data based on the symmetric key to obtain encrypted charging data and sending the encrypted charging data to the vehicle terminal.
7. The apparatus of claim 6, further comprising:
and the second random number sending unit is used for encrypting the second random number by adopting an asymmetric encryption mode to obtain second encrypted data and sending the second encrypted data to the vehicle terminal.
8. The apparatus of claim 6, further comprising:
the charging code acquisition unit is used for acquiring charging code encrypted data sent by a vehicle terminal, and the charging code encrypted data is obtained by encrypting based on the symmetric key;
the charging code analysis unit is used for decrypting the charging code encrypted data based on the symmetric key to obtain the charging code;
and the charging starting unit is used for responding to the verification of the charging code, starting charging for the vehicle corresponding to the vehicle terminal, and generating the charging data based on the charging state.
9. A charging data receiving apparatus, comprising:
the first random number sending unit is used for encrypting the first random number in an asymmetric mode to obtain first encrypted data and sending the first encrypted data to the charging pile;
the second random number acquisition unit is used for acquiring second encrypted data which are sent by the charging pile and encrypted in an asymmetric mode, and decrypting the second encrypted data in the asymmetric mode to obtain a second random number, wherein the second encrypted data are encrypted in the asymmetric mode;
a second symmetric key generation unit configured to calculate a symmetric key based on the first random number and the second random number;
and the charging data receiving unit is used for responding to the reception of the encrypted charging data sent by the charging pile, and decrypting the encrypted charging data by adopting the symmetric key to obtain decrypted charging data.
10. The apparatus of claim 9, further comprising:
and the charging code sending unit is used for encrypting the charging code based on the symmetric key to obtain charging code encrypted data and sending the charging code encrypted data to the charging pile.
11. A charging pile, comprising: a processor and a memory; the memory stores programs or instructions; the processor executes a program or instructions stored in the memory to implement the charging data transmission method according to any one of claims 1-3.
12. A vehicle terminal, comprising: a processor and a memory; the memory stores programs or instructions; the processor executes a program or instructions stored in the memory to implement the charging data receiving method according to any one of claims 4 to 6.
13. A storage medium, characterized in that the storage medium has stored thereon a program or instructions which, when executed by a processor, implement the charging data transmission method according to any one of claims 1 to 3, or the charging data reception method according to any one of claims 4 to 6.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111162528.5A CN115442063A (en) | 2021-09-30 | 2021-09-30 | Charging data sending and receiving method and device, charging pile and vehicle terminal |
PCT/CN2022/121376 WO2023051467A1 (en) | 2021-09-30 | 2022-09-26 | Charging data sending and receiving method, charging data sending and receiving apparatus, charging pile, and vehicle terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111162528.5A CN115442063A (en) | 2021-09-30 | 2021-09-30 | Charging data sending and receiving method and device, charging pile and vehicle terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115442063A true CN115442063A (en) | 2022-12-06 |
Family
ID=84272280
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111162528.5A Pending CN115442063A (en) | 2021-09-30 | 2021-09-30 | Charging data sending and receiving method and device, charging pile and vehicle terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN115442063A (en) |
WO (1) | WO2023051467A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116609607B (en) * | 2023-07-17 | 2023-10-27 | 北京鼎诚鸿安科技发展有限公司 | Portable calibration device for charging pile |
CN116691415B (en) * | 2023-08-07 | 2023-10-10 | 深圳航天科创泛在电气有限公司 | Charging information management method, system, equipment and medium |
CN117892155B (en) * | 2024-03-14 | 2024-05-31 | 福州一城天天出行科技有限公司 | Charging pile data processing method and system |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10137152A1 (en) * | 2001-07-30 | 2003-02-27 | Scm Microsystems Gmbh | Procedure for the transmission of confidential data |
JP5742587B2 (en) * | 2011-08-25 | 2015-07-01 | 株式会社オートネットワーク技術研究所 | Charging system, charging control device, charging device, and charging method |
CN112019326B (en) * | 2019-05-31 | 2024-04-16 | 北京车和家信息技术有限公司 | Vehicle charging safety management method and system |
CN110300110B (en) * | 2019-06-28 | 2022-08-30 | 炬星科技(深圳)有限公司 | Encryption and decryption control method, charging pile and charging equipment |
CN112565206A (en) * | 2020-11-20 | 2021-03-26 | 国网天津市电力公司 | Charging pile information safety protection method and protection system |
-
2021
- 2021-09-30 CN CN202111162528.5A patent/CN115442063A/en active Pending
-
2022
- 2022-09-26 WO PCT/CN2022/121376 patent/WO2023051467A1/en unknown
Also Published As
Publication number | Publication date |
---|---|
WO2023051467A1 (en) | 2023-04-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11985238B2 (en) | Vehicle-mounted device upgrade method and related device | |
CN115442063A (en) | Charging data sending and receiving method and device, charging pile and vehicle terminal | |
CN112913189B (en) | OTA (over the air) upgrading method and device | |
US11363011B2 (en) | Unified mobile security system and method of operation | |
CN110998527B (en) | Remote Control of Computing Devices | |
CN111327605B (en) | Method, terminal, server and system for transmitting private information | |
EP4068675A1 (en) | Method and device for certificate application | |
TWI553504B (en) | A cloud encryption system and method | |
CN112866385A (en) | Interface calling method and device, electronic equipment and storage medium | |
US11588622B2 (en) | Securing outside-vehicle communication using IBC | |
CN117061105A (en) | Data processing method and device, readable medium and electronic equipment | |
WO2023279283A1 (en) | Method for establishing secure vehicle communication, and vehicle, terminal and system | |
CN112329044A (en) | Information acquisition method and device, electronic equipment and computer readable medium | |
CN117040724A (en) | Digital key authorization method and device, electronic equipment and readable storage medium | |
CN116489621A (en) | Vehicle key sharing method, device, equipment and medium | |
CN116502189A (en) | Software authorization method, system, device and storage medium | |
CN111786955B (en) | Method and apparatus for protecting a model | |
CN113961931A (en) | Adb tool using method and device and electronic equipment | |
KR20190115489A (en) | IOT equipment certification system utilizing security technology | |
CN113365243A (en) | Communication method, device, equipment and system | |
CN111314320B (en) | Communication method, terminal, server and system based on HTTP | |
WO2018161727A1 (en) | Private key generation method, device and system | |
CN115987661B (en) | Cloud server data self-storage method, device, equipment and storage medium | |
WO2024066263A1 (en) | Data relay method and apparatus, system, storage medium, device, and vehicle | |
CN115378743B (en) | Information encryption transmission method, device, equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |