CN117118635B - Anonymous authentication method and device for electric automobile, storage medium and computer equipment - Google Patents

Anonymous authentication method and device for electric automobile, storage medium and computer equipment Download PDF

Info

Publication number
CN117118635B
CN117118635B CN202311330801.XA CN202311330801A CN117118635B CN 117118635 B CN117118635 B CN 117118635B CN 202311330801 A CN202311330801 A CN 202311330801A CN 117118635 B CN117118635 B CN 117118635B
Authority
CN
China
Prior art keywords
public key
key
generating
electric automobile
random number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311330801.XA
Other languages
Chinese (zh)
Other versions
CN117118635A (en
Inventor
王浩林
何山
赵云
赵宇明
林晓明
李艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CSG Electric Power Research Institute
Shenzhen Power Supply Bureau Co Ltd
Original Assignee
CSG Electric Power Research Institute
Shenzhen Power Supply Bureau Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CSG Electric Power Research Institute, Shenzhen Power Supply Bureau Co Ltd filed Critical CSG Electric Power Research Institute
Priority to CN202311330801.XA priority Critical patent/CN117118635B/en
Publication of CN117118635A publication Critical patent/CN117118635A/en
Application granted granted Critical
Publication of CN117118635B publication Critical patent/CN117118635B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3255Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3257Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using blind signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/42Anonymization, e.g. involving pseudonyms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/84Vehicles

Abstract

The application provides an electric automobile anonymous authentication method, an electric automobile anonymous authentication device, a storage medium and computer equipment. The electric automobile uses the license certificate generated based on the restricted partial blind signature algorithm to carry out subsequent verification, so that a verifier cannot directly associate the license certificate with the real identity of the electric automobile when carrying out verification, a group joining request is created based on the license certificate and a dynamically generated temporary key, an identity is calculated according to a dynamically generated second random number for the verifier to carry out anonymous verification, the verification can be distributed with a group member certificate to join in a group member through the rear part, the group management based on the revocable group signature is realized, the confidentiality and the authentication security are high, and the verifier is easy to manage. According to the method and the device, anonymous authentication can be achieved, and the risk of privacy disclosure when the state monitoring is carried out is reduced.

Description

Anonymous authentication method and device for electric automobile, storage medium and computer equipment
Technical Field
The application relates to the technical field of power grids of vehicles, in particular to an electric automobile anonymous authentication method, an electric automobile anonymous authentication device, a storage medium and computer equipment.
Background
The vehicle-to-grid (V2G) technology is a technology for supplying power to a power grid by using electric vehicles, and the core idea is to use a large amount of energy storage sources of the electric vehicles as buffers of the power grid and renewable energy sources. When the load of the power grid is too high, the electric automobile energy storage source feeds power to the power grid; and when the load of the power grid is low, the power grid is used for storing the surplus power generation amount of the power grid, so that the waste is avoided. By the method, the electric automobile user can buy electricity from the power grid when the electricity price is low, and sell electricity to the power grid when the electricity price of the power grid is high, so that certain benefits are obtained. The V2G network constructed based on the technology is an important component part in a Smart Grid (SG), and provides charging service for large-scale electric vehicles, so that the vehicles become mobile and distributed storage units connected to the smart grid. In order to guarantee reliable and efficient auxiliary services of the grid, operators of V2G networks need to monitor the latest state of each electric car and evaluate the total storage capacity currently available.
However, the electric vehicle cannot be connected to the power grid randomly and without management, so that the authentication protocol is an indispensable part of the V2G network, which ensures that only the electric vehicle meeting the conditions can access the V2G network. Since the status of an electric vehicle may include some sensitive information, such as the location of the electric vehicle, trip data, payment information, battery status, user preferences, and the like, close monitoring often causes privacy concerns to the electric vehicle owner about its identity and other related information leakage.
Disclosure of Invention
The application provides an electric automobile anonymous authentication method, an electric automobile anonymous authentication device, a storage medium and computer equipment, which can realize anonymous authentication and reduce privacy leakage risk when being monitored by a state.
In a first aspect, the present application provides an electric vehicle anonymous authentication method, applied to an electric vehicle, the method including:
obtaining license certificatesThe method comprises the steps of carrying out a first treatment on the surface of the Said license credential->Identity information of the electric automobile based on a restricted partial blind signature algorithm for a central aggregator>The electric motorLong-term public key of motor vehicle>Generating a signature; said long term public key->Identity information based on the electric vehicle issued for trusted authorities>A generated public key;
generating a first random numberAnd a second random number->
Based on the first random numberAnd said identity information->Generating a temporary public key->And temporary private key->
Long-term public key according to local aggregatorAnd said temporary private key->Generating a first shared key->The method comprises the steps of carrying out a first treatment on the surface of the The local aggregator is configured to +_based on the first shared key>Long-term private key->Obtaining said temporary public key->
By means of the long-term public keyFor said temporary public key->Said license->Permission time limit and said first shared key->Performing encryption to generate a group joining request;
sending the group join request to a local aggregator; the local aggregator verifies the license credentialValid and said temporary public key +.>Feeding back a group joining notice after the group joining notice is correct;
upon receiving the group join notification, based on the second random numberCalculating an identity identifier;
sending the identity identifier to the local aggregator; the local aggregator is configured to generate a group membership certificate from the identity identifier after the identity identifier is verifiedAnd sending the target access power station and the electric automobile;
obtaining the group membership certificateAnd storing;
the second random numberStored as a group private key.
In one embodiment, the method further comprises:
long term public key for accessing power station according to the targetAnd said temporary private key->Generating a second shared key->The method comprises the steps of carrying out a first treatment on the surface of the Said target access power station being arranged to rely on said second shared key +.>And said long term public key->Determining the temporary public keyThe method comprises the steps of carrying out a first treatment on the surface of the Said long term public key->Identity information issued for the trusted authority based on the target access power station +.>A generated public key;
based on the identity identifier and the temporary public keyAnd the group membership certificate->Generating an access request;
sending the access request to the target access power station; and the target access power station is used for distributing an access port for the electric automobile to complete access after passing the verification according to the access request.
In one embodiment, the method further comprises:
sending a leave request to the target access power station; the target access power station is used for generating a settlement certificate of the electric automobile when receiving a leaving request, and encrypting the settlement certificate based on a limited part blind signature algorithm;
acquiring the encrypted settlement certificate;
and carrying out settlement on the target access power station based on the settlement certificate.
In one embodiment, if the electric vehicle is charged during access to the target access power station, the settlement credential is a bill for payment of the electric vehicle;
if the electric automobile is charged during the process of accessing the target access power station, the settlement certificate is a rewarding certificate of the target access power station; and the target access power station is used for issuing rewards to the electric automobile based on the settlement certificate.
In one embodiment, the method further comprises:
generating qualification duration certification based on a subset difference method and a vector commitment method; the qualification life proof is used for proving to the local aggregator and the target access power station that the electric vehicle is not revoked group membership.
In one embodiment, the first random number is based onAnd said identity information->Generating a temporary public key->And temporary private key->Comprising:
generating the temporary public key based on the following expression
Wherein,is a hash function;
generating the temporary private key based on the following expression
Wherein,identity information based on the electric vehicle issued to the trusted authority +.>The generated private key is then used to generate a key,,/>a random number generated for the trusted authority that is known only to the trusted authority.
In one embodiment, the long-term public key according to the local aggregatorAnd said temporary private key->Generating a first shared key->Comprising:
generating the first shared key based on the following expression
The e function is an encryption algorithm function which is determined by negotiation with the local aggregator; the local aggregator is configured to be based onObtaining said temporary public key->,/>Identity information based on the local aggregator issued for the trusted authority +.>The generated long-term private key.
In a second aspect, the present application provides an electric automobile anonymous authentication device, applied to an electric automobile, the device includes:
a first acquisition module for acquiring a license credentialThe method comprises the steps of carrying out a first treatment on the surface of the Said license credential->Identity information of the electric automobile based on a restricted partial blind signature algorithm for a central aggregator>And the long-term public key of the electric automobile>Generating a signature; said long term public key->Identity information based on the electric vehicle issued for trusted authorities>A generated public key;
a random number generation module for generating a first random numberAnd a second random number->
A first key generation module for generating a first random number based on the first random numberAnd said identity information->Generating a temporary public keyAnd temporary private key->
A second key generation module for generating a long-term public key according to the local aggregatorAnd said temporary private key->Generating a first shared key->The method comprises the steps of carrying out a first treatment on the surface of the The local aggregator is configured to, based on the first shared key/>Long-term private key->Obtaining said temporary public key->
A first request generation module for generating a long-term public keyFor said temporary public key->Said license->Permission time limit and said first shared key->Performing encryption to generate a group joining request;
the first request sending module is used for sending the group joining request to a local aggregator; the local aggregator verifies the license credentialValid and said temporary public key +.>Feeding back a group joining notice after the group joining notice is correct;
a calculation module for, when receiving the group join notification, based on the second random numberCalculating an identity identifier;
the identity identification sending module is used for sending the identity identification to the local aggregator; the local aggregator is used for verifying the identity identifier and then according to the identity identifierSymbol generation group membership certificateAnd sending the target access power station and the electric automobile;
a second acquisition module for acquiring the group membership certificateAnd storing;
a group private key storage module for storing the second random numberStored as a group private key.
In a third aspect, the present application provides a storage medium having stored therein computer readable instructions which, when executed by one or more processors, cause the one or more processors to perform the steps of the electric vehicle anonymous authentication method as described in any one of the preceding claims.
In a fourth aspect, the present application provides a computer device comprising: one or more processors, and memory;
the memory has stored therein computer readable instructions that, when executed by the one or more processors, perform the steps of the electric vehicle anonymous authentication method as described in any of the preceding claims.
From the above technical solutions, the embodiments of the present application have the following advantages:
according to the anonymous authentication method, the device, the storage medium and the computer equipment for the electric automobile, the electric automobile uses the license certificate generated based on the restricted partial blind signature algorithm to carry out subsequent authentication, so that the verifier cannot directly associate the license certificate with the real identity of the electric automobile when carrying out authentication, a group joining request is created based on the license certificate and the dynamically generated temporary key, an identity is calculated according to the dynamically generated second random number to carry out anonymous authentication by the verifier, the authentication can be distributed with the group member certificate to join in the group member through the rear part, the group management based on the revocable group signature is realized, and the method has strong confidentiality and authentication security and is easy for the verifier to manage.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive faculty for a person skilled in the art.
Fig. 1 is an application environment diagram of an electric vehicle anonymous authentication method in one embodiment;
fig. 2 is a flow chart of an anonymous authentication method of an electric vehicle in one embodiment;
fig. 3 is a block diagram of an electric vehicle anonymous authentication device according to an embodiment;
FIG. 4 is an internal block diagram of a computer device, in one embodiment.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
The embodiment of the application provides an electric vehicle anonymous authentication method which is applied to an Electric Vehicle (EV) in a V2G network architecture, wherein the V2G network architecture comprises a Central Aggregator (CAG), a Local Aggregator (LAG), a power Station (ST), a single Electric Vehicle (EV), a Service Provider (SP) and a Trusted Authority (TA) as shown in fig. 1. ST can monitor and communicate directly with each electric car and send the collected monitoring data to the local aggregator in a batch manner. A local aggregator is an entity that can communicate directly with the central aggregator on behalf of these geographically dispersed electric vehicles. Trusted authorities belong to some independent organizations, such as Regional Transport Organization (RTO) or Independent System Operators (ISO), which are used for system startup, such as generating common system parameters, assigning keys to each entity, etc.
Each electric car, local aggregator, central aggregator and power station obtains a key pair from the trusted authority. Each user of the electric vehicle registers the electric vehicle at a Service Provider (SP). Service provider issues an identity information for corresponding electric car. Smart grids may release recent service offerings, and the power station evaluates the current total storage capacity of the electric vehicles within its coverage area by collecting reports from the electric vehicles. Based on the total capacity and service requirements from the grid, the power station bid on the electric market for providing a portion of the service. Depending on the services provided by the power station, the Service Provider (SP) of the smart grid pays a corresponding payment to the power station or charges a corresponding fee to the power station. Similar situations exist between power stations and electric vehicles. The electric vehicle may redeem rewards paid by the utility at a central aggregator or other local aggregator. Each participating electric car periodically reports its current status to the power station. Then, the power station transmits the collected monitoring data of the electric automobile to the local aggregator in a batch mode.
Each entity a (including all EV, ST, LAG and CAG) submits its identity information to the TA. The TA then distributes the public/private key pair corresponding to each entity x +.>Wherein->,/>H is a hash function and s is a random number known only to TA.
Suppose that there are m STs serving the EV, each ST being indexed as ST j (j=1, ⋯, m), all of ST j All EVs providing services form one EV group, denoted EVG j (j=1, ⋯, m). LAG is for each ST j Giving a security parameterAt the same time, the LAG gives the allowed number of accesses to the EV according to the scale of the charging station>
The system is initialized for each ST and EVG:
1. selecting order as prime numberBilinear group (G, G) T ) There is a generator->
2. Definition of the definition,/>. Generating two key pairs->And->For AHO signature to respectively +.>And->The group element information is signed and these two key pairs will be used to sign messages consisting of 2 and 5 group elements, respectively.
3. A public key is generated for a vector of dimension l in the vector commitment plan.
4. Selection vector,/>And->Wherein->,/>And->,/>,/>. Definition vector->
5. According to the generator,/>,/>Select public key +.>
6. Selecting a strong non-counterfeitable one-time signature
7. Definition of the definitionIs a group private key,/->Is a private key used to open the group signature and reveal the true identity of the signer, which is known only to the LAG. The public key of EVG is +.>
As shown in fig. 2, an embodiment of the present application provides an electric vehicle anonymous authentication method, which is applied to an Electric Vehicle (EV) in fig. 1, and includes:
step S201, obtaining license certificates
Wherein the license certificateIdentity information of electric automobile based on restricted partial blind signature algorithm for central aggregator +.>And the long-term public key of the electric automobile>Generating a signature; long term public Key->Electric vehicle-based identity information issued to trusted authorities +.>The generated public key.
Step S202, generating a first random numberAnd a second random number->
Step S203, based on the first random numberAnd identity information->Generating a temporary public key->And temporary private key->
Wherein the first random numberCan be regenerated according to the preset period dynamic change for the identification information +.>Encryption is performed to generate a temporary public key +.>And temporary private key->The generated temporary +.>Temporary private keyThe method is characterized in that information interaction is carried out between the true identity information and the local aggregator instead of the true identity information, so that the local aggregator cannot acquire the relation between the true identity and the license, and when the identity tracing is required, the LAG can request the CAG to recover the true identity of the electric automobile through a restrictive partial blind signature technology.
Step S204, according to the long-term public key of the local aggregatorAnd temporary private key->Generating a first shared key->
Wherein the local aggregator is configured to rely on the first shared keyLong-term private key->Obtaining a temporary public key->. First shared key->The generated secret key is negotiated for the electric automobile and the local aggregator and is used for encryption when the electric automobile and the local aggregator interact.
Step S205, by long term public keyFor temporary public key->License credential->Permission time limit and first shared key->An encryption generation group join request is made.
Wherein the license time limit is a license certificateIs that the central aggregator issues license certificatesFor which a defined expiration date is defined.
Step S206, the group joining request is sent to the local aggregator.
Wherein the local aggregator verifies the license credentialEffective and temporary public key->And feeding back the group joining notification after the group joining notification is correct. Verifying license certificate->The validity includes aging validity and license credential +.>A legally granted certificate.
Step S207, when receiving the group joining notification, based on the second random numberAn identity identifier is calculated.
Step S208, the identity identifier is sent to the local aggregator.
Wherein the local aggregator is configured to generate a group membership certificate from the identity identifier after the identity identifier is verifiedAnd sending the target access power station and the electric automobile.
Second random numberCalculating +.>,/>Is an identity identifier, and->. If->Having been occupied by other members in the group EVG, the local aggregator LAG asks the electric car to re-offer +.>I.e. electric vehicle regenerates the second random number calculation +.>To the local aggregator until the provided identity identifier +.>Unoccupied. The LAG assigns an available leaf v to the electric car, which is the identifier ID (v) in the tree T. Is provided with->Is a slave->Root to T->Path of->Is the corresponding identifier vector. LAG calculation->Compression coding of->. Then LAG passes->At->Generate an AHO signature>. Coding Path->Identity identifier for electric automobileXBinding. LAG sends +.>And->. If it isOr find->Incorrect, the protocol is stopped. Otherwise, the electric car will sign +.>To the LAG. If signature->Can be verified by LAG, which signs AHO +.>Returns to the electric car and will +.>Database stored in EVG group +.>Is a kind of medium. Group membership certificate is->
Step S209, obtaining group membership certificateAnd stored.
Step S210, the second random numberStored as a group private key.
In the embodiment, the electric automobile uses the license certificate generated based on the restricted partial blind signature algorithm to carry out subsequent verification, so that the local aggregator cannot directly associate the license certificate with the real identity of the electric automobile when carrying out verification, creates a group joining request based on the license certificate and the dynamically generated temporary key, calculates an identity label according to the dynamically generated second random number for the local aggregator to carry out anonymous verification, and joins the group member by the group member certificate distributed at the rear part after verification, thereby realizing group management based on the revocable group signature, having stronger confidentiality and authentication security, and being easy to manage by the local aggregator.
In one embodiment, the method further comprises:
long term public key for accessing power station according to targetTemporary private Key->Generating a second shared key->The method comprises the steps of carrying out a first treatment on the surface of the The target access station is adapted to receive the second shared key +.>Long term public key->Determining a temporary public key->The method comprises the steps of carrying out a first treatment on the surface of the Long term public Key->Identity information based on the target access station issued to the trusted authorities>A generated public key;
based on an identity identifier, a temporary public keyGroup membership certificate->Generating an access request;
sending an access request to a target access power station; and the target access power station is used for distributing an access port for the electric automobile to complete access after passing the verification according to the access request.
In one embodiment, the method further comprises:
generating qualification duration certification based on a subset difference method and a vector commitment method; the qualification duration certification is used to certify to the local aggregator and the target access power station that the electric vehicle is not revoked group membership.
In this embodiment, the second shared key is a key generated by negotiating the electric automobile with the target access power station, and is used for encrypting information when the two parties interact with the information. According to the method, the electric automobile is managed by adopting the revocable group signature algorithm, when the electric automobile is connected to the V2G network, the electric automobile is required to be authenticated through the target access power station, and when the target access power station verifies that the electric automobile is an unremoved member of the LAG, the electric automobile is allowed to be connected to the V2G network by itself. The target access power station does not know the real identity of the electric automobile and only knowsXIs an identity identifier of the electric automobile. In one revocation round t, the electric car sends a message M with its group signature. According to the group signature algorithm, the AHO signature is calculated in the group signature calculation process by the power stationIs randomly changed to +.>. The electric car uses a subset coverage framework, a vector commitment scheme, and a non-interactive witness indifference (NIWI) to anonymously prove itself to be a legitimate user and not revoked.
In an update round, the local aggregator LAG maintains, together with the station ST, a revocation list Rt in the form of a commitment, so that each electric car can only know its own information and the number of panelists. Therefore, the scheme realizes anonymity when the electric automobile joins the V2G network and is revoked. When some legal electric vehicles find themselves in the revocation list Rt, they can make vector commitments through a Subset Difference (SD) method, proving that they are not revoked, realizing that electric vehicles can anonymously prove that they are not revoked.
In one embodiment, the method further comprises:
sending a leaving request to a target access power station; the target access power station is used for generating a settlement certificate of the electric automobile when receiving the leaving request, and encrypting the settlement certificate based on a limited part blind signature algorithm;
acquiring an encrypted settlement certificate;
and carrying out settlement on the target access power station based on the settlement certificate.
In one embodiment, if the electric vehicle is charged during the access to the target access power station, the settlement credential is a bill for payment of the electric vehicle;
if the electric automobile is charged during the process of accessing the target access power station, the settlement certificate is a rewarding certificate of the target access power station; the target access power station is used for issuing rewards to the electric automobile based on the settlement certificates.
In one embodiment, the first random number is based onAnd identity information->Generating a temporary public key->And temporary private key->Comprising:
generating a temporary public key based on the following expression
Wherein,is a hash function;
generating a temporary private key based on the following expression
Wherein,electric vehicle-based identity information issued to trusted authorities +.>The generated private key is then used to generate a key,,/>a random number generated for the trusted authority that is known only to the trusted authority.
In one embodiment, the long-term public key according to the local aggregatorAnd temporary private key->Generating a first shared key->Comprising:
generating a first shared key based on the following expression
The e function is an encryption algorithm function which is determined by negotiation with the local aggregator; the local aggregator is configured to be based onObtaining a temporary public key->,/>Identity information based on local aggregator issued for trusted authorities +.>The generated long-term private key.
It should be understood that, although the steps in the flowcharts related to the embodiments described above are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
The following describes an electric automobile anonymous authentication device provided in the embodiment of the present application, and the electric automobile anonymous authentication device described below and the electric automobile anonymous authentication method described above may be referred to correspondingly.
As shown in fig. 3, an embodiment of the present application provides an electric automobile anonymous authentication device 300, which is applied to an electric automobile, and includes:
a first acquisition module 301 for acquiring a license credentialThe method comprises the steps of carrying out a first treatment on the surface of the Said license credential->Identity information of the electric automobile based on a restricted partial blind signature algorithm for a central aggregator>And the long-term public key of the electric automobile>Generating a signature; said long term public key->Identity information based on the electric vehicle issued for trusted authorities>A generated public key;
a random number generation module 302 for generating a first random numberAnd a second random number->
A first key generation module 303, configured to base on the first random numberAnd said identity information->Generating a temporary public key->And temporary private key->
A second key generation module 304 for long-term public key according to the local aggregatorAnd said temporary private key->Generating a first shared key->The method comprises the steps of carrying out a first treatment on the surface of the The local aggregator is configured to +_based on the first shared key>Long-term private key->Obtaining said temporary public key->
A first request generation module 305 for generating a long-term public key by means of said long-term public keyFor said temporary public key->Said license->Permission time limit and said first shared key->Performing encryption to generate a group joining request;
a first request sending module 306, configured to send the group join request to a local aggregator; the local aggregator verifies the license credentialValid and said temporary public key +.>Feeding back a group joining notice after the group joining notice is correct;
a calculation module 307 for, when receiving the group join notification, based on the second random numberCalculating an identity identifier;
an identity sending module 308, configured to send the identity identifier to the local aggregator; the local aggregator is configured to generate a group membership certificate from the identity identifier after the identity identifier is verifiedAnd sending the target access power station and the electric automobile;
a second obtaining module 309, configured to obtain the group member certificateAnd storing;
a group private key storage module 310 for storing the second random numberStored as a group private key.
In one embodiment, the electric automobile anonymous authentication device further includes:
a third key process module for accessing the long-term public key of the power station according to the targetThe temporary private keyGenerating a second shared key->The method comprises the steps of carrying out a first treatment on the surface of the The saidThe target access station is arranged to rely on said second shared key +.>And said long term public key->Determining said temporary public key->The method comprises the steps of carrying out a first treatment on the surface of the Said long term public key->Identity information issued for the trusted authority based on the target access power station +.>A generated public key;
a second request generation module for generating a temporary public key based on the identity identifierAnd the group membership certificate->Generating an access request;
the second request sending module is used for sending the access request to the target access power station; and the target access power station is used for distributing an access port for the electric automobile to complete access after passing the verification according to the access request.
In one embodiment, the electric automobile anonymous authentication device further includes:
a third request sending module, configured to send a leave request to the target access power station; the target access power station is used for generating a settlement certificate of the electric automobile when receiving a leaving request, and encrypting the settlement certificate based on a limited part blind signature algorithm;
the second acquisition module is used for acquiring the encrypted settlement certificate;
and the settlement module is used for performing settlement on the target access power station based on the settlement certificate.
In one embodiment, the electric automobile anonymous authentication device further includes:
the certification generation module is used for generating qualification survival certification based on a subset difference method and a vector commitment method; the qualification life proof is used for proving to the local aggregator and the target access power station that the electric vehicle is not revoked group membership.
In one embodiment, the first key generation module is configured to perform the steps of:
generating the temporary public key based on the following expression
Wherein,is a hash function;
generating the temporary private key based on the following expression
Wherein,identity information based on the electric vehicle issued to the trusted authority +.>The generated private key is then used to generate a key,,/>a random number generated for the trusted authority that is known only to the trusted authority.
In one embodiment, the second key generation module is configured to perform the steps of:
generating the first shared key based on the following expression
The e function is an encryption algorithm function which is determined by negotiation with the local aggregator; the local aggregator is configured to be based onObtaining said temporary public key->,/>Identity information based on the local aggregator issued for the trusted authority +.>The generated long-term private key.
The above-mentioned division of each module in the electric automobile anonymous authentication device is only used for illustration, and in other embodiments, the electric automobile anonymous authentication device may be divided into different modules according to the need, so as to complete all or part of the functions of the electric automobile anonymous authentication device. All or part of each module in the electric automobile anonymous authentication device can be realized by software, hardware and a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, the present application also provides a storage medium having stored therein computer readable instructions which, when executed by one or more processors, cause the one or more processors to perform the steps of the method of any of the embodiments above.
In one embodiment, the present application further provides a computer device having computer readable instructions stored therein, which when executed by the one or more processors, perform the steps of the method of any of the embodiments above.
In one embodiment, a computer device is provided, which may be a terminal, and the internal structure of which may be as shown in fig. 4. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless mode can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program when executed by the processor is used for realizing an electric automobile anonymous authentication method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be keys, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the structures shown in FIG. 4 are block diagrams only and do not constitute a limitation of the computer device on which the present aspects apply, and that a particular computer device may include more or less components than those shown, or may combine some of the components, or have a different arrangement of components.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in the various embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the various embodiments provided herein may include at least one of relational databases and non-relational databases. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processors referred to in the embodiments provided herein may be general purpose processors, central processing units, graphics processors, digital signal processors, programmable logic units, quantum computing-based data processing logic units, etc., without being limited thereto.
Finally, it is further noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In the description of the present application, the meaning of "plurality" is at least two, such as two, three, etc., unless explicitly defined otherwise.
In the present specification, each embodiment is described in a progressive manner, and each embodiment focuses on the difference from other embodiments, and may be combined according to needs, and the same similar parts may be referred to each other.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. An electric automobile anonymous authentication method, which is characterized by being applied to an electric automobile, comprises the following steps:
obtaining license certificatesThe method comprises the steps of carrying out a first treatment on the surface of the Said license credential->Identity information of the electric automobile based on a restricted partial blind signature algorithm for a central aggregator>And the long-term public key of the electric automobile>Generating a signature; the long term public keyIdentity information based on the electric vehicle issued for trusted authorities>A generated public key;
generating a first random numberAnd a second random number->The method comprises the steps of carrying out a first treatment on the surface of the Wherein the first random number +.>Regenerating according to a preset period;
based on the first random numberAnd said identity information->Generating a temporary public key->And temporary private key->;
Long-term public key according to local aggregatorAnd said temporary private key->Generating a first shared key->The method comprises the steps of carrying out a first treatment on the surface of the The local aggregator is configured to +_based on the first shared key>Long-term private key->Obtaining said temporary public key->
By means of the long-term public keyFor said temporary public key->Said license->Permission time limit and said first shared key->Performing encryption to generate a group joining request;
sending the group join request to a local aggregator; the local aggregator verifies the license credentialValid and said temporary public key +.>Feeding back a group joining notice after the group joining notice is correct;
upon receiving the group join notification, based on the second random numberCalculating an identity identifier;
sending the identity identifier to the local aggregator; the local aggregator is configured to generate a group membership certificate from the identity identifier after the identity identifier is verifiedThe new identity identifier is sent to a target access power station and the electric automobile, and is also used for notifying the electric automobile to provide a new identity identifier again when the identity identifier is occupied;
obtaining the group membership certificateAnd storing;
the second random numberStored as a group private key.
2. The method of anonymous authentication of an electric vehicle of claim 1, further comprising:
long term public key for accessing power station according to the targetAnd said temporary private key->GeneratingSecond shared key->The method comprises the steps of carrying out a first treatment on the surface of the Said target access power station being arranged to rely on said second shared key +.>And said long term public key->Determining said temporary public key->The method comprises the steps of carrying out a first treatment on the surface of the Said long term public key->Identity information issued for the trusted authority based on the target access power station +.>A generated public key;
based on the identity identifier and the temporary public keyAnd the group membership certificate->Generating an access request;
sending the access request to the target access power station; and the target access power station is used for distributing an access port for the electric automobile to complete access after passing the verification according to the access request.
3. The electric vehicle anonymous authentication method of claim 2, further comprising:
sending a leave request to the target access power station; the target access power station is used for generating a settlement certificate of the electric automobile when receiving a leaving request, and encrypting the settlement certificate based on a limited part blind signature algorithm;
acquiring the encrypted settlement certificate;
and carrying out settlement on the target access power station based on the settlement certificate.
4. The electric vehicle anonymous authentication method of claim 3, wherein the settlement credential is a bill for payment of the electric vehicle if the electric vehicle is charged during access to the target access power station;
if the electric automobile is charged during the process of accessing the target access power station, the settlement certificate is a rewarding certificate of the target access power station; and the target access power station is used for issuing rewards to the electric automobile based on the settlement certificate when the settlement certificate is a rewards certificate.
5. The electric vehicle anonymous authentication method of claim 2, further comprising:
generating qualification duration certification based on a subset difference method and a vector commitment method; the qualification life proof is used for proving to the local aggregator and the target access power station that the electric vehicle is not revoked group membership.
6. The method for anonymous authentication of an electric vehicle of claim 1, wherein the first random number is based onAnd said identity information->Generating a temporary public key->And temporary private key->Comprising:
generating the temporary public key based on the following expression
Wherein,is a hash function;
generating the temporary private key based on the following expression
Wherein,identity information based on the electric vehicle issued to the trusted authority +.>The generated private key is then used to generate a key,,/>a random number generated for the trusted authority that is known only to the trusted authority.
7. The method for anonymous authentication of an electric vehicle of claim 6, wherein the long-term public key of the local aggregatorAnd said temporary private key->Generating a first shared key->Comprising:
generating the first shared key based on the following expression
The e function is an encryption algorithm function which is determined by negotiation with the local aggregator; the local aggregator is configured to be based onObtaining said temporary public key->,/>Identity information based on the local aggregator issued for the trusted authority +.>The generated long-term private key.
8. An electric vehicle anonymous authentication device, characterized in that it is applied to electric vehicle, said device comprising:
a first acquisition module for acquiring a license credentialThe method comprises the steps of carrying out a first treatment on the surface of the Said license credential->Identity information of the electric automobile based on a restricted partial blind signature algorithm for a central aggregator>And the long-term public key of the electric automobile>Generating a signature; said long term public key->Identity information based on the electric vehicle issued for trusted authorities>A generated public key;
a random number generation module for generating a first random numberAnd a second random number->The method comprises the steps of carrying out a first treatment on the surface of the Wherein the first random number +.>Regenerating according to a preset period;
a first key generation module for generating a first random number based on the first random numberAnd said identity information->Generating a temporary public key->And temporary private key->;
A second key generation module for generating a long-term public key according to the local aggregatorAnd said temporary private key->Generating a first shared key->The method comprises the steps of carrying out a first treatment on the surface of the The local aggregator is configured to +_based on the first shared key>Long-term private key->Obtaining said temporary public key->
A first request generation module for generating a long-term public keyFor said temporary public key->Said license->Permission time limit and said first shared key->Performing encryption to generate a group joining request;
the first request sending module is used for sending the group joining request to a local aggregator; the local aggregator verifies the license credentialValid and said temporary public key +.>Feeding back a group joining notice after the group joining notice is correct;
a calculation module for, when receiving the group join notification, based on the second random numberCalculating an identity identifier;
the identity identification sending module is used for sending the identity identification to the local aggregator; the local aggregator is configured to generate a group membership certificate from the identity identifier after the identity identifier is verifiedThe new identity identifier is sent to a target access power station and the electric automobile, and is also used for notifying the electric automobile to provide a new identity identifier again when the identity identifier is occupied;
a second acquisition module for acquiring the group membership certificateAnd storing;
a group private key storage module for storing the second random numberStored as a group private key.
9. A storage medium, characterized by: the storage medium has stored therein computer readable instructions that, when executed by one or more processors, cause the one or more processors to perform the steps of the electric vehicle anonymous authentication method of any of claims 1 to 7.
10. A computer device, comprising: one or more processors, and memory;
the memory has stored therein computer readable instructions which, when executed by the one or more processors, perform the steps of the electric vehicle anonymous authentication method of any of claims 1 to 7.
CN202311330801.XA 2023-10-16 2023-10-16 Anonymous authentication method and device for electric automobile, storage medium and computer equipment Active CN117118635B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311330801.XA CN117118635B (en) 2023-10-16 2023-10-16 Anonymous authentication method and device for electric automobile, storage medium and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311330801.XA CN117118635B (en) 2023-10-16 2023-10-16 Anonymous authentication method and device for electric automobile, storage medium and computer equipment

Publications (2)

Publication Number Publication Date
CN117118635A CN117118635A (en) 2023-11-24
CN117118635B true CN117118635B (en) 2024-02-02

Family

ID=88804194

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311330801.XA Active CN117118635B (en) 2023-10-16 2023-10-16 Anonymous authentication method and device for electric automobile, storage medium and computer equipment

Country Status (1)

Country Link
CN (1) CN117118635B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103873473A (en) * 2014-03-19 2014-06-18 西安电子科技大学 Method for authenticating anonymity groups of power-driven automobiles by charging station
CN110049432A (en) * 2019-04-11 2019-07-23 上海电力学院 Electric car accesses position data acquisition method when power grid by charging station
CN110769379A (en) * 2019-10-31 2020-02-07 长安大学 Message reporting method for forward security and privacy preservation in V2G environment
CN111092732A (en) * 2019-12-06 2020-05-01 郑州轻工业大学 Anonymous authentication method based on certificateless group signature in Internet of vehicles
CN112713997A (en) * 2020-12-28 2021-04-27 北京握奇数据股份有限公司 Key agreement method and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014137845A1 (en) * 2013-03-04 2014-09-12 University Of Vermont And State Agricultural College Systems and methods for random-access power management using packetization
US10715311B2 (en) * 2017-07-28 2020-07-14 Workday, Inc. System and method for blockchain-based user authentication based on a cryptographic challenge

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103873473A (en) * 2014-03-19 2014-06-18 西安电子科技大学 Method for authenticating anonymity groups of power-driven automobiles by charging station
CN110049432A (en) * 2019-04-11 2019-07-23 上海电力学院 Electric car accesses position data acquisition method when power grid by charging station
CN110769379A (en) * 2019-10-31 2020-02-07 长安大学 Message reporting method for forward security and privacy preservation in V2G environment
CN111092732A (en) * 2019-12-06 2020-05-01 郑州轻工业大学 Anonymous authentication method based on certificateless group signature in Internet of vehicles
CN112713997A (en) * 2020-12-28 2021-04-27 北京握奇数据股份有限公司 Key agreement method and system

Also Published As

Publication number Publication date
CN117118635A (en) 2023-11-24

Similar Documents

Publication Publication Date Title
Saxena et al. Network security and privacy challenges in smart vehicle-to-grid
Chen et al. Secure electricity trading and incentive contract model for electric vehicle based on energy blockchain
Yang et al. $ P^{2} $: Privacy-preserving communication and precise reward architecture for V2G networks in smart grid
KR102158325B1 (en) Secure charging method for electric vehicles
Höfer et al. POPCORN: privacy-preserving charging for eMobility
CN110795767B (en) Electric power transaction method, device and system and trusted cloud platform
Kim et al. Blockchain based energy trading scheme for vehicle-to-vehicle using decentralized identifiers
CN111047440A (en) Distributed shared charging pile transaction system and method based on block chain
CN105493438A (en) A method and apparatus for anonymous authentication on trust in social networking
CN113114630B (en) Authentication method and system for dynamic wireless charging privacy protection of electric vehicle
JP2002056360A (en) Ic card system and ic card
Wan et al. PRAC: Efficient privacy protection for vehicle-to-grid communications in the smart grid
CN111832066A (en) Block chain assisted V2G security authentication and private data aggregation method
Jogunola et al. Demonstrating blockchain-enabled peer-to-peer energy trading and sharing
CN111627159B (en) Charging management method, device and system based on block chain and computer equipment
Nicanfar et al. Security and privacy of electric vehicles in the smart grid context: problem and solution
JP2020088848A (en) Method and apparatus for managing enrollment certificate in security credential management system for v2x communication by relaying between eca and dcm
WO2022041895A1 (en) Blockchain-based power transaction system, transaction method and bill query method
CN104053149A (en) Method and system for realizing security mechanism of vehicle networking equipment
CN104919483A (en) Method, device and service provision means for authenticating a customer for a service to be provided by a service provision means
CN111429134A (en) Data transaction method and device based on block chain
Hao et al. A self-trading and authenticated roaming scheme based on blockchain for smart grids
CN112134694A (en) Data interaction method, master station, terminal and computer readable storage medium
KR101919693B1 (en) Anonymous payment method to provide location privacy for wireless charging of electrical vehicles and system therefor
Kilic Plug and Charge solutions with vehicle-to-grid communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant