CN117093982B - Data interaction method and system for modularized battery-changing cabinet - Google Patents

Data interaction method and system for modularized battery-changing cabinet Download PDF

Info

Publication number
CN117093982B
CN117093982B CN202311345697.1A CN202311345697A CN117093982B CN 117093982 B CN117093982 B CN 117093982B CN 202311345697 A CN202311345697 A CN 202311345697A CN 117093982 B CN117093982 B CN 117093982B
Authority
CN
China
Prior art keywords
target
cabinet
character
battery
identification code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311345697.1A
Other languages
Chinese (zh)
Other versions
CN117093982A (en
Inventor
李晶
李斌
郭长寿
郑旭升
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Phoenix Technology Co ltd
Original Assignee
Shenzhen Phoenix Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Phoenix Technology Co ltd filed Critical Shenzhen Phoenix Technology Co ltd
Priority to CN202311345697.1A priority Critical patent/CN117093982B/en
Publication of CN117093982A publication Critical patent/CN117093982A/en
Application granted granted Critical
Publication of CN117093982B publication Critical patent/CN117093982B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60LPROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
    • B60L53/00Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles
    • B60L53/80Exchanging energy storage elements, e.g. removable batteries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/73Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers

Abstract

The method comprises the steps that a background server responds to a power conversion request of a user, verifies identification codes of equipment to be converted based on the power conversion request, and when verification passes, generates a cabinet opening password of the modularized power conversion cabinet based on the identification codes of the equipment to be converted and the identification codes of the background server, and sends the cabinet opening password to terminal equipment of the user, and the modularized power conversion cabinet responds to input of the cabinet opening password by the user, verifies the cabinet opening password, and when verification passes, matches a target power conversion cabinet module for the equipment to be converted based on the cabinet opening password. The method realizes that the user can perform the power change operation when the modularized power change cabinet is in an offline state.

Description

Data interaction method and system for modularized battery-changing cabinet
Technical Field
The application relates to the technical field of power conversion, in particular to a data interaction method and system of a modularized power conversion cabinet.
Background
With the development of the internet of things technology, the modularized power conversion cabinet is widely applied as a convenient battery replacement device, and under the normal condition, when the modularized power conversion cabinet is in an on-line state, a user can perform power conversion operation by scanning a two-dimensional code on the modularized power conversion cabinet, but when the modularized power conversion cabinet is in an off-line state, the user cannot smoothly complete the power conversion operation, under the condition, the user needs to search other modularized power conversion cabinets to perform the power conversion operation, or waits for the modularized power conversion cabinet to perform the power conversion operation in the on-line state, so that the time of the user is wasted, and bad use experience is brought to the user. Thus, a method is needed to solve this problem.
Disclosure of Invention
The application provides a data interaction method and system of a modularized battery-changing cabinet, which are used for solving the problems in the background technology.
In a first aspect, the present application provides a data interaction method of a modular power conversion cabinet, where the method is used for a data interaction system of the modular power conversion cabinet, the data interaction system includes a background server and the modular power conversion cabinet, the modular power conversion cabinet includes a plurality of power conversion cabinet modules, and when the modular power conversion cabinet is in an offline state, the method includes:
the background server responds to a power-changing request of a user, acquires a first identification code based on the power-changing request, and refers to whether a first preset power-changing authorization list comprises the first identification code or not; the first identification code is an identification code of equipment to be replaced;
if the first preset power change authorization list comprises the first identification code, the background server generates a cabinet opening password of the modularized power change cabinet based on the first identification code and the second identification code, and sends the cabinet opening password to terminal equipment of the user; the second identification code is the identification code of the background server;
The modularized power-changing cabinet responds to the input of the cabinet opening password by the user and verifies the cabinet opening password;
and if the verification is passed, the modularized power changing cabinet matches the target power changing cabinet module for the equipment to be changed based on the cabinet opening password.
In a second aspect, the present application provides a data interaction system of a modular battery-changing cabinet, the system including a background server and the modular battery-changing cabinet, wherein the background server includes:
the power conversion module is used for responding to a power conversion request of a user, obtaining a first identification code based on the power conversion request, and consulting whether a first preset power conversion authorization list comprises the first identification code or not; the first identification code is an identification code of equipment to be replaced;
the generation module is used for generating a cabinet opening password of the modularized power conversion cabinet based on the first identification code and the second identification code and sending the cabinet opening password to the terminal equipment of the user if the first identification code is included in the first preset power conversion authorization list; the second identification code is the identification code of the background server;
the modular battery replacement cabinet comprises:
the verification module is used for responding to the input of the cabinet opening password by the user and verifying the cabinet opening password;
And the matching module is used for matching the to-be-replaced equipment with the target power conversion cabinet module based on the cabinet opening password if the verification is passed.
The utility model provides a data interaction method and system of modularization trading cabinet, wherein, on the one hand, when modularization trading cabinet is in offline state, the backstage server responds to the user to trade the electric request, based on trade the electric request and acquire first identification code to consult whether including in the first preset trading authorization list first identification code, if including in the first preset trading authorization list when first identification code, the backstage server is based on first identification code and second identification code generate the switch cabinet password of modularization trading cabinet to send to user's terminal equipment, the modularization trading cabinet responds to the user to open the input of cabinet password, to open the cabinet password, if verify to pass, the modularization trading cabinet is based on open the cabinet password is for wait to trade electric equipment matches the target trading module, this has realized when modularization trading cabinet is in offline state also can make the user carry out the switch cabinet operation when modularization trading cabinet is in the first identification code, and will open the cabinet is in the electric cabinet, if the modularization is in the electric cabinet is in offline state, the user's input of modularization password has been compared, this has guaranteed that the modularization is in the switch cabinet is the battery is in the switch cabinet, the user's input to the modularization is difficult to open the cabinet.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flow chart of a data interaction method of a modular battery-changing cabinet provided in an embodiment of the present application;
fig. 2 is a schematic block diagram of a data interaction system of a modular battery-changing cabinet according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The flow diagrams depicted in the figures are merely illustrative and not necessarily all of the elements and operations/steps are included or performed in the order described. For example, some operations/steps may be further divided, combined, or partially combined, so that the order of actual execution may be changed according to actual situations.
It is also to be understood that the terminology used in the description of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations.
With the development of the internet of things technology, the modularized power conversion cabinet is widely applied as a convenient battery replacement device, and under the normal condition, when the modularized power conversion cabinet is in an on-line state, a user can perform power conversion operation by scanning a two-dimensional code on the modularized power conversion cabinet, but when the modularized power conversion cabinet is in an off-line state, the user cannot smoothly complete the power conversion operation, under the condition, the user needs to search other modularized power conversion cabinets to perform the power conversion operation, or waits for the modularized power conversion cabinet to perform the power conversion operation in the on-line state, so that the time of the user is wasted, and bad use experience is brought to the user. Therefore, the embodiment of the application provides a data interaction method and system of a modularized power conversion cabinet, so as to solve the problems.
Some embodiments of the present application are described in detail below with reference to the accompanying drawings. The following embodiments and features of the embodiments may be combined with each other without conflict.
Referring to fig. 1, fig. 1 is a flowchart of a data interaction method of a modular power conversion cabinet provided by an embodiment of the present application, where the method is used for a data interaction system of the modular power conversion cabinet, the data interaction system includes a background server and the modular power conversion cabinet, and the modular power conversion cabinet includes a plurality of power conversion cabinet modules, as shown in fig. 1, when the modular power conversion cabinet is in an offline state, the data interaction method of the modular power conversion cabinet provided by the embodiment of the present application includes steps S100 to S400.
Step S100, the background server responds to a power-changing request of a user, acquires a first identification code based on the power-changing request, and refers to whether a first preset power-changing authorization list comprises the first identification code or not; the first identification code is an identification code of the equipment to be replaced.
The equipment to be replaced can be equipment which needs to be powered by a battery, such as electric bicycles, electric automobiles, various electronic equipment and the like.
It can be understood that the device corresponding to each identification code in the first preset power conversion authorization list has the power conversion authority of the modular power conversion cabinet, a user can scan the registration two-dimensional code on the modular power conversion cabinet through terminal equipment (such as a mobile phone, a tablet and the like) to register for the self device so as to acquire the power conversion authority of the modular power conversion cabinet, when registering for the self device, the user needs to input the identification code of the device, and the server can acquire the identification code of the device and store the identification code of the device into the first preset power conversion authorization list.
Step 200, if the first preset power-changing authorization list includes the first identification code, the background server generates a cabinet opening password of the modularized power-changing cabinet based on the first identification code and the second identification code, and sends the cabinet opening password to the terminal equipment of the user; the second identification code is the identification code of the background server.
It will be appreciated that the terminal device includes mobile electronic devices such as smart phones, tablets and wearable devices.
After the background server sends the cabinet opening password to the terminal equipment of the user, the user inputs the cabinet opening password through an input keyboard of the modularized power conversion cabinet.
And step 300, the modularized power conversion cabinet responds to the input of the cabinet opening password by the user, and the cabinet opening password is verified.
It can be understood that the modular battery changing cabinet verifies the cabinet opening password to verify whether the to-be-changed equipment has the battery changing authority for the second time so as to ensure the safety of the modular battery changing equipment and prevent the battery in the modular battery changing equipment from being stolen.
And step 400, if the verification is passed, the modularized power conversion cabinet matches a target power conversion cabinet module for the equipment to be converted based on the cabinet opening password.
It can be appreciated that, in order to meet the power conversion requirements of various to-be-converted devices, the modular power conversion cabinet comprises multiple types of power conversion cabinet modules, and a type of battery is installed in each type of power conversion cabinet module.
According to the method provided by the embodiment, on one hand, when the modularized power changing cabinet is in an offline state, the background server responds to a power changing request of a user, obtains a first identification code based on the power changing request, and refers to whether a first preset power changing authorization list comprises the first identification code, when the first preset power changing authorization list comprises the first identification code, the background server generates a cabinet opening password of the modularized power changing cabinet based on the first identification code and a second identification code, and sends the cabinet opening password to terminal equipment of the user, the modularized power changing cabinet responds to input of the cabinet opening password, verifies the cabinet opening password, and if verification is passed, the modularized power changing cabinet is based on the cabinet opening password as a target power changing module, so that when the modularized power changing cabinet is in the offline state, a user can perform power changing operation, the modularized power changing cabinet is in the offline state, the modularized power changing cabinet is prevented from being stolen, and the battery is prevented from being replaced by the modularized power changing cabinet opening password, and if the modularized power changing password is passed, the modularized power changing cabinet opening password is prevented from being input.
In some embodiments, the backend server generates a cabinet opening password of the modular battery-changing cabinet based on the first identification code and the second identification code, including steps S210 to S240.
Step S210, a first standard coding table and a second standard coding table are obtained, and a first target coding table and a second target coding table are generated based on the first identification code, the second identification code, the first standard coding table and the second standard coding table.
It should be noted that, the first standard code table includes a first digit column and a first character column, the second standard code table includes a second digit column and a second character column, the first digit column and the second digit column are the same, the characters in the first character column are english letters, the characters in the second character column are greek letters, and the first target code table and the second target code table are generated based on the first identification code, the second identification code, the first standard code table and the second standard code table, including the following steps S211 to S215.
Step S211, acquiring a first number based on the first identification code and acquiring a second number based on the second identification code; the first number is the number of the numbers included in the first identification code, and the second number is the number of the numbers included in the second identification code.
Step S212, calculating the product of the first number and the second number, and comparing whether the unit number and the ten number of the product are equal.
Step S213, if not, acquiring a first target character and a second target character from the first standard coding table and the second standard coding table respectively based on the product; the first target character is a character corresponding to a tens digit of the product in the second standard coding table, and the second target character is a character corresponding to a bit digit of the product in the first standard coding table.
Step S214, moving each character before the last character of the first character string backwards by one position to obtain a first character space, inserting the last character of the first character string into the first character space to obtain a first intermediate target coding table, and replacing the character of the first target coding table at the designated position with the first target character to obtain the first target coding table.
Step S215, moving each character before the last character of the second character string backwards by one position to obtain a second character space, inserting the last character of the second character string into the second character space to obtain a second intermediate target coding table, and replacing the character of the second target coding table at the designated position with the second target character to obtain the second target coding table.
For example, if the first identification code is 159273852 and the second identification code is 37682457, the first number is 9, the second number is 8, the product is 72, if the first standard code table is shown in table 1, the second standard code table is shown in table 2, the first target character is θ, the second target character is C, if the designated position of the first standard code table is a character corresponding to number 5, and the designated position of the second standard code table is a character corresponding to number 2, the first target code table is shown in table 3, and the second target code table is shown in table 4.
Table 1 first standard code table
Table 2 second standard code table
TABLE 3 first target encoding table
Table 4 second target encoding table
Step S220, encoding the first identification code based on the first target encoding table to obtain a first character string, and encoding the second identification code based on the second target encoding table to obtain a second character string.
Illustratively, the example in the following step S210 is based on the first character sequence obtained by encoding the first identification code 159273852 in table 3 being aθibgchθb, and the second character sequence obtained by encoding the second identification code 37682457 in table 4 being γηζθcδεη.
Step S230, acquiring first time information, and inputting the first time information into a preset quantum number generator to generate a quantum array; the first moment information is moment information when the background server responds to a power-changing request of a user.
And step 240, generating a target matrix based on the first character column, the second character column and the quantum array, and taking the target matrix as the cabinet password.
It should be noted that, the target matrix includes a first row vector, a second row vector, and a third row vector, where the first row vector, the second row vector, and the third row vector are sequentially arranged from top to bottom, the first row vector includes all characters in the first character column, the second row vector includes all characters in the second character column, and the third row vector includes all numbers in the quantum array.
As can be appreciated, when the user inputs the target matrix into the modular power conversion cabinet, the modular power conversion cabinet can acquire the first identification code, the second identification code and the first time information through the cabinet opening code, so as to verify the cabinet opening code.
According to the method provided by the embodiment, on one hand, the background server generates the cabinet opening password based on the first identification code, the second identification code, the first standard encoding table, the second standard encoding table and the first time information, so that the cabinet opening password can be associated with the first identification code, the second identification code and the first time information, convenience is provided for verifying the cabinet opening password by the modularized power exchange cabinet, on the other hand, the background server generates the first target encoding table and the second target encoding table based on the first identification code, the second identification code, the first standard encoding table and the second standard encoding table, the flexibility of the first target encoding table and the second target encoding table is improved, the first target encoding table and the second target encoding table obtained by different equipment to be exchanged are different in the process of exchanging power, the difficulty of decoding the cabinet opening password is improved, and the modularized power exchange safety is further ensured.
In some embodiments, the modular battery-changing cabinet responds to the input of the cabinet-opening password by the user to verify the cabinet-opening password, and the method comprises steps S310 to S340.
Step S310, resolving the cabinet password based on a preset password resolving algorithm to obtain the first identification code, the second identification code and the first time information.
It can be appreciated that the password parsing algorithm is a parsing rule of the cabinet password.
It should be noted that, the modular battery-changing cabinet analyzes the cabinet-opening password based on a preset password analysis algorithm, and the obtaining the first identification code, the second identification code and the first time information includes steps S311 to S318.
Step S311, acquiring the first character column based on the first row vector of the target matrix, acquiring the second character column based on the second row vector of the target matrix, and acquiring the quantum array based on the third row vector of the target matrix.
Step S312, acquiring the first number based on the first character string, and acquiring the second number based on the second character string.
It will be appreciated that the number of characters in the first character string is the same as the number of digits in the first identification code and the number of characters in the second character string is the same as the number of digits in the second identification code.
Step S313, calculating the product of the first number and the second number, comparing whether the digits of the product are equal to the tens digits, and obtaining the first standard encoding table and the second labeling encoding table.
Step S314, if not, acquiring a first target character and a second target character from the first standard coding table and the second standard coding table respectively based on the product; the first target character is a character corresponding to a tens digit of the product in the second standard coding table, and the second target character is a character corresponding to a bit digit of the product in the first standard coding table.
Step 315, each character before the last character of the first character string is moved backwards by one position to obtain a first character space, the last character of the first character string is inserted into the first character space to obtain a first intermediate target coding table, and the first target character is used for replacing the character of the first target coding table at the designated position to obtain the first target coding table.
Step S316, each character before the last character of the second character string is moved backwards by one position to obtain a second character space, the last character of the second character string is inserted into the second character space to obtain a second intermediate target coding table, and the second target character is used for replacing the character of the second target coding table at the appointed position to obtain the second target coding table.
Step S317, resolving the first character string based on the first target encoding table to obtain the first identification code, and resolving the second character string based on the second target encoding table to obtain the second identification code.
And step S318, analyzing the quantum array based on a preset quantum array analysis function to obtain the first moment information.
Step S320, obtaining second time information, calculating a time difference between the first time information and the second time information, and comparing the time difference with a preset time difference; the second time information is time information when the user inputs the cabinet opening password on the modularized power conversion cabinet.
Step S330, if the time difference is not greater than the preset time difference, referring to whether the second preset power conversion authorization list includes the first identification code and the second identification code.
It can be appreciated that if the time difference is greater than the preset time difference, it may happen that the user has completed the corresponding power change operation, and the cabinet opening password is stolen, so that the situation that the battery in the target power change cabinet module is stolen occurs, and by comparing the time difference with the preset time difference and verifying the first identification code and the second identification code when the time difference is not greater than the preset time difference, the safety of the modular power change cabinet can be further ensured.
Step S340, if the second preset power-change authorization list includes the first identification code and the second identification code, the verification is passed.
It can be appreciated that the second preset power change authorization list includes an identification code of a device having the power change authority of the modular power change cabinet and an identification code of a server of the modular power change cabinet.
According to the method provided by the embodiment, the modularized power conversion cabinet analyzes the cabinet opening password based on a preset password analysis algorithm to obtain the first identification code, the second identification code and the first time information, then obtains the second time information, calculates the time difference between the first time information and the second time information, compares the time difference with the preset time difference, and finally refers to whether the first identification code and the second identification code are included in a second preset power conversion authorization list or not when the time difference is not larger than the preset time difference, and determines that verification is passed when the first identification code and the second identification code are included in the second preset power conversion authorization list, so that the safety of the modularized power conversion cabinet is further ensured, and the battery in the modularized power conversion cabinet can be prevented from being stolen.
In some embodiments, the modular power conversion cabinet matches a target power conversion cabinet module for the to-be-converted equipment based on the cabinet opening password, and the method includes steps S410 to S430.
Step S410, acquiring battery information of the device to be replaced based on the first identification code.
The battery information includes at least a power supply voltage of the battery.
Step S420, selecting an initial target power conversion cabinet module from a plurality of power conversion cabinet modules based on the battery information; the initial target battery changing cabinet module comprises at least one.
It should be noted that, the power supply voltage of the battery in the initial target power conversion cabinet module is the same as the power supply voltage of the battery of the to-be-converted device.
And step S430, determining a target power conversion cabinet module based on the initial target power conversion cabinet module.
It should be noted that, the determining, by the modular power conversion cabinet, the target power conversion cabinet based on the initial target power conversion cabinet module includes the following steps:
and step S431, acquiring the charge quantity of the battery in each initial target battery changing cabinet module, and determining the initial target battery changing cabinet module corresponding to the battery with the largest charge quantity as an intermediate target battery changing cabinet module.
And step 432, if the number of the intermediate target power conversion cabinet modules is greater than 1, acquiring the use times of the batteries in each intermediate target power conversion cabinet module, and determining the intermediate target power conversion cabinet module corresponding to the battery with the least use times as the target power conversion cabinet module.
It can be understood that, the fewer the number of uses of the battery, the better the performance of the battery is indicated, and the steps S431 to S432 can be adopted to select the battery with the best performance from the batteries in each intermediate target battery-changing cabinet module for the user, so as to improve the use experience of the user.
In some embodiments, after obtaining the number of use times of the battery in each intermediate target battery closet module if the number of intermediate target battery closet modules is greater than 1 and determining the intermediate target battery closet module corresponding to the battery with the smallest number of use times as the target battery closet module, the method further includes steps S433 to S435.
And S433, the modularized power conversion cabinet acquires the position information of the user through the camera device, and judges whether the user is in a safety area after the target power conversion cabinet module is opened or not based on the position information.
And step 434, if the user is in the safety area after the target power conversion cabinet module is opened, the modularized power conversion cabinet opens the target power conversion cabinet module.
And step 435, if the user is not in the safety area after the target power conversion cabinet module is opened, reminding the user to move into the safety area, and opening the target power conversion cabinet module after the user moves into the safety area.
It can be appreciated that the method of the embodiment can prevent the target battery-changing cabinet from causing injury to a user when the target battery-changing cabinet is opened.
In some embodiments, the target battery cabinet module includes a plurality of charging modules, and the method further includes steps S500 to S900.
Step S500, after the user takes out the battery in the target battery changing cabinet and puts the battery to be charged into the target battery changing cabinet, the modularized battery changing cabinet acquires historical charging parameter information of the battery to be charged, predicts the residual life of the battery to be charged based on the historical charging parameter information, and acquires the residual charge quantity of the battery to be charged; the battery to be charged is a battery on the equipment to be charged.
It should be noted that, when the modular battery replacement cabinet predicts the remaining life of the battery to be charged based on the historical charging parameter information, the historical charging parameter information is input into a preset remaining life prediction model to obtain the remaining life of the battery to be charged, the remaining life prediction model is obtained through training of a neural network model, the remaining life prediction model comprises an input layer, a hidden layer, a convolution layer and an output layer, the input layer is used for receiving the historical charging parameter information, the hidden layer is used for carrying out feature extraction on the historical charging parameter information, the convolution layer is used for calculating the remaining life of the battery to be charged according to the feature extracted by the hidden layer, and the output layer is used for outputting the remaining life of the battery to be charged.
And step S600, the modular battery changing cabinet generates a charging control scheme of the battery to be charged based on the residual charge quantity and the residual service life.
When the modular battery changing cabinet generates the charging control scheme of the battery to be charged based on the residual charge amount and the residual service life, the residual service life is input into a preset charging rate generation model to obtain a charging rate change curve of the battery to be charged, then the charging rate change curve is corrected through the residual charge amount, so that a target charging rate change curve is obtained, and finally the charging control scheme of the battery to be charged is generated based on the target charging rate change curve.
And step S700, selecting a target charging module matched with the battery to be charged by the modularized power exchange cabinet based on the charging control scheme, and reminding the user of accessing the battery to be charged into the target charging module.
Step S800, in the process that the target charging module charges the battery to be charged, the modular battery-changing cabinet acquires charging parameter information of the battery to be charged in real time, and judges whether the battery to be charged has a fault based on the charging parameter information.
It should be noted that the charging parameter information includes, but is not limited to, a voltage value, a current value, a temperature value, an internal resistance value, and the like of the battery to be charged in the charging process.
And step 900, if the battery to be charged has a fault, the modular battery changing cabinet controls the target charging module to stop charging the battery to be charged, and informs operation and maintenance personnel of the fault of the battery to be charged.
It should be noted that, when the modular battery replacement cabinet informs the operation and maintenance personnel that the battery to be charged has a fault, the message that the battery to be charged has the fault is sent to the terminal equipment of the operation and maintenance personnel so as to remind the operation and maintenance personnel to maintain the equipment to be charged.
The method provided by the embodiment can improve the safety of the battery to be charged in the charging process, and can prolong the service life of the battery to be charged.
Referring to fig. 2, fig. 2 is a schematic block diagram of a data interaction system 100 of a modular power conversion cabinet provided in an embodiment of the present application, and as shown in fig. 2, the data interaction system 100 of the modular power conversion cabinet includes a background server 110 and a modular power conversion cabinet 120, where the background server 110 includes:
the power conversion module is used for responding to a power conversion request of a user, obtaining a first identification code based on the power conversion request, and consulting whether a first preset power conversion authorization list comprises the first identification code or not; the first identification code is an identification code of the equipment to be replaced.
The generation module is used for generating a cabinet opening password of the modularized power conversion cabinet based on the first identification code and the second identification code and sending the cabinet opening password to the terminal equipment of the user if the first identification code is included in the first preset power conversion authorization list; the second identification code is the identification code of the background server.
The modular battery exchange cabinet 120 includes:
And the verification module is used for responding to the input of the cabinet opening password by the user and verifying the cabinet opening password.
And the matching module is used for matching the to-be-replaced equipment with the target power conversion cabinet module based on the cabinet opening password if the verification is passed.
It should be noted that, for convenience and brevity of description, specific working processes of the above-described system and each module may refer to corresponding processes in the foregoing embodiment of the data interaction method of the modular battery-changing cabinet, which are not described herein again.
While the invention has been described with reference to certain preferred embodiments, it will be understood by those skilled in the art that various changes and substitutions of equivalents may be made and equivalents will be apparent to those skilled in the art without departing from the scope of the invention. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (8)

1. The data interaction method of the modularized power conversion cabinet is characterized by comprising a data interaction system for the modularized power conversion cabinet, wherein the data interaction system comprises a background server and the modularized power conversion cabinet, the modularized power conversion cabinet comprises a plurality of power conversion cabinet modules, and when the modularized power conversion cabinet is in an offline state, the method comprises the following steps:
The background server responds to a power-changing request of a user, acquires a first identification code based on the power-changing request, and refers to whether a first preset power-changing authorization list comprises the first identification code or not; the first identification code is an identification code of equipment to be replaced;
if the first preset power change authorization list comprises the first identification code, the background server generates a cabinet opening password of the modularized power change cabinet based on the first identification code and the second identification code, and sends the cabinet opening password to terminal equipment of the user; the second identification code is the identification code of the background server;
the modularized power-changing cabinet responds to the input of the cabinet opening password by the user and verifies the cabinet opening password;
if the verification is passed, the modularized power changing cabinet matches a target power changing cabinet module for the equipment to be changed based on the cabinet opening password;
the background server generates a cabinet opening password of the modularized battery-changing cabinet based on the first identification code and the second identification code, and the cabinet opening password comprises the following components:
acquiring a first standard coding table and a second standard coding table, and generating a first target coding table and a second target coding table based on the first identification code, the second identification code, the first standard coding table and the second standard coding table;
Encoding the first identification code based on the first target encoding table to obtain a first character string, and encoding the second identification code based on the second target encoding table to obtain a second character string;
acquiring first time information, and inputting the first time information into a preset quantum number generator to generate a quantum array; the first moment information is moment information when the background server responds to a power-changing request of a user;
generating a target matrix based on the first character column, the second character column and the quantum array, and taking the target matrix as the cabinet password;
the first standard code table includes a first digit column and a first character column, the second standard code table includes a second digit column and a second character column, the first digit column and the second digit column are the same, characters in the first character column are english letters, characters in the second character column are greek letters, and the first target code table and the second target code table are generated based on the first identification code, the second identification code, the first standard code table and the second standard code table, and the first target code table includes:
Acquiring a first number based on the first identification code and acquiring a second number based on the second identification code; the first number is the number of the numbers included in the first identification code, and the second number is the number of the numbers included in the second identification code;
calculating the product of the first number and the second number, and comparing whether the unit number and the ten number of the product are equal;
if the first target character and the second target character are not equal, respectively acquiring a first target character and a second target character from the first standard coding table and the second standard coding table based on the product; the first target character is a character corresponding to a tens digit of the product in the second standard coding table, and the second target character is a character corresponding to a bit digit of the product in the first standard coding table;
each character before the last character of the first character column is moved backwards by one position to obtain a first character space, the last character of the first character column is inserted into the first character space to obtain a first intermediate target coding table, and the first target character is used for replacing the character of the first target coding table at the appointed position to obtain the first target coding table;
And moving each character before the last character of the second character column backwards by one position to obtain a second character space, inserting the last character of the second character column into the second character space to obtain a second intermediate target coding table, and replacing the character of the second target coding table at the appointed position by using the second target character to obtain the second target coding table.
2. The method of claim 1, wherein the step of verifying the cabinet password in response to the user inputting the cabinet password comprises:
analyzing the cabinet password based on a preset password analysis algorithm to obtain the first identification code, the second identification code and the first time information;
acquiring second time information, calculating a time difference between the first time information and the second time information, and comparing the time difference with a preset time difference; the second time information is time information when the user inputs the cabinet opening password on the modularized power conversion cabinet;
if the time difference is not greater than the preset time difference, referring to whether a second preset power-changing authorization list comprises the first identification code and the second identification code;
And if the second preset power-changing authorization list comprises the first identification code and the second identification code, the verification is passed.
3. The data interaction method of the modular battery exchange cabinet according to claim 2, wherein the modular battery exchange cabinet matches a target battery exchange cabinet module for the to-be-exchanged equipment based on the cabinet opening password, and the method comprises the following steps:
acquiring battery information of the equipment to be replaced based on the first identification code;
selecting an initial target power conversion cabinet module from a plurality of power conversion cabinet modules based on the battery information; the initial target battery changing cabinet module comprises at least one battery changing cabinet module;
and determining a target power changing cabinet module based on the initial target power changing cabinet module.
4. A method of data interaction for a modular battery closet according to claim 3, wherein said determining a target battery closet module based on said initial target battery closet module comprises:
acquiring the charge quantity of the battery in each initial target battery changing cabinet module, and determining the initial target battery changing cabinet module corresponding to the battery with the largest charge quantity as an intermediate target battery changing cabinet module;
if the number of the middle target battery changing cabinet modules is larger than 1, the using times of the batteries in each middle target battery changing cabinet module are obtained, and the middle target battery changing cabinet module corresponding to the battery with the least using times is determined to be the target battery changing cabinet module.
5. The method according to claim 4, wherein after obtaining the number of uses of the battery in each of the intermediate target battery closet modules and determining the intermediate target battery closet module corresponding to the battery having the smallest number of uses as the target battery closet module if the number of intermediate target battery closet modules is greater than 1, the method further comprises:
the modularized power conversion cabinet acquires the position information of the user through a camera device, and judges whether the user is in a safety area after the target power conversion cabinet module is opened or not based on the position information;
and if the user is in the safety area after the target power conversion cabinet module is opened, the modularized power conversion cabinet opens the target power conversion cabinet module.
6. The method for data interaction of a modular battery closet according to claim 5, wherein the modular battery closet obtains location information of the user through a camera device, and judges whether the user is in a safe area after the target battery closet module is opened based on the location information, the method further comprising:
and if the user is not in the safety area after the target power conversion cabinet module is opened, reminding the user to move into the safety area, and opening the target power conversion cabinet module after the user moves into the safety area.
7. The method of claim 1, wherein the target battery closet module comprises a plurality of charging modules, the method further comprising:
after the user takes out the battery in the target battery changing cabinet and puts the battery to be charged into the target battery changing cabinet, the modularized battery changing cabinet acquires historical charging parameter information of the battery to be charged, predicts the residual life of the battery to be charged based on the historical charging parameter information, and acquires the residual charge quantity of the battery to be charged; the battery to be charged is a battery on the equipment to be charged;
the modularized power conversion cabinet generates a charging control scheme of the battery to be charged based on the residual charge quantity and the residual service life;
the modularized power conversion cabinet selects a target charging module matched with the battery to be charged based on the charging control scheme, and reminds the user to access the battery to be charged into the target charging module;
in the process that the target charging module charges the battery to be charged, the modularized power changing cabinet acquires charging parameter information of the battery to be charged in real time, and judges whether the battery to be charged has a fault or not based on the charging parameter information;
If the battery to be charged has a fault, the modularized battery changing cabinet controls the target charging module to stop charging the battery to be charged, and informs operation and maintenance personnel of the fault of the battery to be charged.
8. The utility model provides a data interaction system of modularization trading cabinet which characterized in that, includes background server and modularization trading cabinet, wherein, the background server includes:
the power conversion module is used for responding to a power conversion request of a user, obtaining a first identification code based on the power conversion request, and consulting whether a first preset power conversion authorization list comprises the first identification code or not; the first identification code is an identification code of equipment to be replaced;
the generation module is used for generating a cabinet opening password of the modularized power conversion cabinet based on the first identification code and the second identification code and sending the cabinet opening password to the terminal equipment of the user if the first identification code is included in the first preset power conversion authorization list; the second identification code is the identification code of the background server;
the modular battery replacement cabinet comprises:
the verification module is used for responding to the input of the cabinet opening password by the user and verifying the cabinet opening password;
The matching module is used for matching the target power conversion cabinet module for the to-be-converted equipment based on the cabinet opening password if verification is passed;
the background server generates a cabinet opening password of the modularized battery-changing cabinet based on the first identification code and the second identification code, and the cabinet opening password comprises the following components:
acquiring a first standard coding table and a second standard coding table, and generating a first target coding table and a second target coding table based on the first identification code, the second identification code, the first standard coding table and the second standard coding table;
encoding the first identification code based on the first target encoding table to obtain a first character string, and encoding the second identification code based on the second target encoding table to obtain a second character string;
acquiring first time information, and inputting the first time information into a preset quantum number generator to generate a quantum array; the first moment information is moment information when the background server responds to a power-changing request of a user;
generating a target matrix based on the first character column, the second character column and the quantum array, and taking the target matrix as the cabinet password;
The first standard code table includes a first digit column and a first character column, the second standard code table includes a second digit column and a second character column, the first digit column and the second digit column are the same, characters in the first character column are english letters, characters in the second character column are greek letters, and the first target code table and the second target code table are generated based on the first identification code, the second identification code, the first standard code table and the second standard code table, and the first target code table includes:
acquiring a first number based on the first identification code and acquiring a second number based on the second identification code; the first number is the number of the numbers included in the first identification code, and the second number is the number of the numbers included in the second identification code;
calculating the product of the first number and the second number, and comparing whether the unit number and the ten number of the product are equal;
if the first target character and the second target character are not equal, respectively acquiring a first target character and a second target character from the first standard coding table and the second standard coding table based on the product; the first target character is a character corresponding to a tens digit of the product in the second standard coding table, and the second target character is a character corresponding to a bit digit of the product in the first standard coding table;
Each character before the last character of the first character column is moved backwards by one position to obtain a first character space, the last character of the first character column is inserted into the first character space to obtain a first intermediate target coding table, and the first target character is used for replacing the character of the first target coding table at the appointed position to obtain the first target coding table;
and moving each character before the last character of the second character column backwards by one position to obtain a second character space, inserting the last character of the second character column into the second character space to obtain a second intermediate target coding table, and replacing the character of the second target coding table at the appointed position by using the second target character to obtain the second target coding table.
CN202311345697.1A 2023-10-18 2023-10-18 Data interaction method and system for modularized battery-changing cabinet Active CN117093982B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311345697.1A CN117093982B (en) 2023-10-18 2023-10-18 Data interaction method and system for modularized battery-changing cabinet

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311345697.1A CN117093982B (en) 2023-10-18 2023-10-18 Data interaction method and system for modularized battery-changing cabinet

Publications (2)

Publication Number Publication Date
CN117093982A CN117093982A (en) 2023-11-21
CN117093982B true CN117093982B (en) 2024-01-30

Family

ID=88777619

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311345697.1A Active CN117093982B (en) 2023-10-18 2023-10-18 Data interaction method and system for modularized battery-changing cabinet

Country Status (1)

Country Link
CN (1) CN117093982B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114067497A (en) * 2021-11-06 2022-02-18 威胜电气有限公司 Offline power swapping method based on dynamic password
CN116543486A (en) * 2023-07-05 2023-08-04 深圳市旭子科技有限公司 Offline control method of coded lock and coded lock system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114067497A (en) * 2021-11-06 2022-02-18 威胜电气有限公司 Offline power swapping method based on dynamic password
CN116543486A (en) * 2023-07-05 2023-08-04 深圳市旭子科技有限公司 Offline control method of coded lock and coded lock system

Also Published As

Publication number Publication date
CN117093982A (en) 2023-11-21

Similar Documents

Publication Publication Date Title
Fei et al. Fault diagnosis of power transformer based on support vector machine with genetic algorithm
CN110598213A (en) Keyword extraction method, device, equipment and storage medium
Lee et al. Name Nationality Classification with Recurrent Neural Networks.
CN112597984B (en) Image data processing method, image data processing device, computer equipment and storage medium
CN117093982B (en) Data interaction method and system for modularized battery-changing cabinet
CN111814482B (en) Text key data extraction method and system and computer equipment
CN116579339A (en) Task execution method and optimization task execution method
CN116151892B (en) Item recommendation method, system, device and storage medium
CN110222743A (en) The method for generating plan of power grid accident
CN109857829A (en) A kind of geographic information data fusion system
Lu et al. Gear: Augmenting language models with generalizable and efficient tool resolution
CN107342857A (en) Group technology and device
CN111460113A (en) Data interaction method and related equipment
CN117081941A (en) Flow prediction method and device based on attention mechanism and electronic equipment
CN111488519A (en) Method and device for identifying gender of user, electronic equipment and storage medium
CN116087789A (en) Battery cycle life prediction method and system based on end cloud collaborative data driving
Tao et al. Deep learning-based modeling of 5G core control plane for 5G network digital twin
CN115271877A (en) Charging station recommendation model training method, device, equipment and storage medium
Maragoudakis et al. Improving SMS usability using Bayesian networks
CN114417251A (en) Retrieval method, device, equipment and storage medium based on hash code
CN114138709A (en) Librarian room integrated management realized based on cloud archive integrated platform
Zaretalab et al. An extended simulated annealing based on the memory structure to solve redundancy allocation problem
CN100581105C (en) Digital certificate safety protection method
CN100367215C (en) Method for controlling data interchange
CN115713099B (en) Model design method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant