CN117935428A - Vehicle charging pile connection method and device, storage medium and electronic device - Google Patents

Vehicle charging pile connection method and device, storage medium and electronic device Download PDF

Info

Publication number
CN117935428A
CN117935428A CN202311816338.XA CN202311816338A CN117935428A CN 117935428 A CN117935428 A CN 117935428A CN 202311816338 A CN202311816338 A CN 202311816338A CN 117935428 A CN117935428 A CN 117935428A
Authority
CN
China
Prior art keywords
charging pile
information
identification information
cloud service
service platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311816338.XA
Other languages
Chinese (zh)
Inventor
于欢
李木犀
杨雪珠
王梓安
徐明蔚
邵馨蕊
边泽宇
陈明
胡闯
高铭霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
FAW Group Corp
Original Assignee
FAW Group Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by FAW Group Corp filed Critical FAW Group Corp
Priority to CN202311816338.XA priority Critical patent/CN117935428A/en
Publication of CN117935428A publication Critical patent/CN117935428A/en
Pending legal-status Critical Current

Links

Landscapes

  • Electric Propulsion And Braking For Vehicles (AREA)

Abstract

The invention discloses a vehicle charging pile connection method and device, a storage medium and an electronic device. Wherein the method comprises the following steps: acquiring encryption identification information of a target charging pile; transmitting registration application information to the cloud service platform based on the encryption identification information so that the cloud service platform registers the target charging pile according to the registration application information; receiving equipment identification information from a cloud service platform in response to successful registration of the target charging pile; and establishing Bluetooth connection between the terminal equipment and the target charging pile by using the equipment identification information. The invention solves the technical problem of poor safety in the communication process of the terminal equipment and the vehicle charging pile in the related technology.

Description

Vehicle charging pile connection method and device, storage medium and electronic device
Technical Field
The invention relates to the field of vehicle communication, in particular to a vehicle charging pile connection method and device, a storage medium and an electronic device.
Background
In the control function of the communication private charging post, since the private charging post is usually charged and paid by the vehicle owner, a large amount of data information such as secret data and control data is involved in the connection process of the vehicle machine and the charging post. If the data information is illegally acquired by other people, the problems that the electric quantity of the charging pile is illegally stolen, personal information of a user is exposed and the like are easily caused.
In view of the above problems, no effective solution has been proposed at present.
Disclosure of Invention
The embodiment of the invention provides a vehicle charging pile connection method, a device, a storage medium and an electronic device, which are used for at least solving the technical problem of poor safety in the communication process of terminal equipment and a vehicle charging pile in the related technology.
According to an aspect of an embodiment of the present invention, there is provided a vehicle charging pile connection method including: acquiring encryption identification information of a target charging pile, wherein the encryption identification information is obtained by adopting a first key to encrypt equipment identification information of the target charging pile; transmitting registration application information to the cloud service platform based on the encryption identification information so that the cloud service platform registers the target charging pile according to the registration application information, wherein the registration application information comprises the encryption identification information and account identification information, the account identification information is used for representing unique identification information of the terminal equipment, and the cloud service platform is used for decrypting the registration application information to obtain equipment identification information; receiving equipment identification information from a cloud service platform in response to successful registration of the target charging pile; and establishing Bluetooth connection between the terminal equipment and the target charging pile by using the equipment identification information, wherein the terminal equipment is used for controlling the target charging pile to charge the target vehicle.
Optionally, the cloud service platform is further configured to decrypt the registration application information by using the first key to obtain the device identification information and create an account binding relationship when no account binding relationship exists between the target charging pile and the account identification information, where the account binding relationship is used to record an association relationship between the account identification information and the device identification information.
Optionally, the vehicle charging pile connection method further includes: the method comprises the steps of responding to successful registration of a target charging pile, sending key application information to a cloud service platform so that the cloud service platform generates a second key and encrypted identity information based on the key application information, wherein the second key is used for carrying out identity authentication on terminal equipment, and the encrypted identity information is obtained by carrying out encryption processing on account identification information, the second key and aging information by adopting a first key; and receiving a second key and encrypted identity information from the cloud service platform.
Optionally, the vehicle charging pile connection method further includes: transmitting clock request information to the target charging pile by utilizing Bluetooth connection so that the target charging pile performs clock synchronization with the terminal equipment according to the clock request information; and receiving clock response information fed back by the target charging pile, wherein the clock response information is used for determining that clock synchronization is successfully performed between the target charging pile and the terminal equipment.
Optionally, the vehicle charging pile connection method further includes: sending account identification information to the cloud service platform so that the cloud service platform queries a second key based on the account identification information and the account binding relationship; and receiving identification response information fed back by the cloud service platform, wherein the identification response information is used for determining that the cloud service platform successfully inquires the second key based on the account identification information and the account binding relation.
Optionally, the vehicle charging pile connection method further includes: receiving authentication request information from a target charging pile in response to successful execution of a gun inserting operation on the target charging pile; transmitting a preset random number and random number encryption information to a target charging pile based on authentication request information so that the cloud service platform carries out identity authentication on terminal equipment based on the preset random number and the random number encryption information, wherein the random number encryption information is obtained by adopting a second key to encrypt the preset random number; and receiving authentication response information fed back by the cloud service platform, wherein the authentication response information is used for determining whether the identity authentication of the terminal equipment is successful or not.
Optionally, the cloud service platform is further configured to decrypt the random number encryption information by using the second key to obtain a decrypted random number, and start a charging process for the target vehicle when the decrypted random number is consistent with the preset random number.
According to one embodiment of the present invention, there is also provided a vehicle charging pile connection device including: the acquisition module is used for acquiring the encrypted identification information of the target charging pile, wherein the encrypted identification information is obtained by adopting a first key to encrypt the equipment identification information of the target charging pile; the cloud service platform is used for decrypting the registration application information to obtain equipment identification information; the receiving module is used for responding to successful registration of the target charging pile and receiving equipment identification information from the cloud service platform; the establishing module is used for establishing Bluetooth connection between the terminal equipment and the target charging pile by utilizing the equipment identification information, wherein the terminal equipment is used for controlling the target charging pile to charge the target vehicle.
Optionally, the cloud service platform is further configured to decrypt the registration application information by using the first key to obtain the device identification information and create an account binding relationship when no account binding relationship exists between the target charging pile and the account identification information, where the account binding relationship is used to record an association relationship between the account identification information and the device identification information.
Optionally, the vehicle charging pile connection device further includes: the generation module is used for responding to successful registration of the target charging pile, sending key application information to the cloud service platform so that the cloud service platform generates a second key and encrypted identity information based on the key application information, wherein the second key is used for carrying out identity authentication on the terminal equipment, and the encrypted identity information is obtained by carrying out encryption processing on account identification information, the second key and aging information by adopting the first key; and the receiving module is also used for receiving the second key and the encrypted identity information from the cloud service platform.
Optionally, the sending module is further configured to: transmitting clock request information to the target charging pile by utilizing Bluetooth connection so that the target charging pile performs clock synchronization with the terminal equipment according to the clock request information; the receiving module is also used for: and receiving clock response information fed back by the target charging pile, wherein the clock response information is used for determining that clock synchronization is successfully performed between the target charging pile and the terminal equipment.
Optionally, the sending module is further configured to: sending account identification information to the cloud service platform so that the cloud service platform queries a second key based on the account identification information and the account binding relationship; the receiving module is also used for: and receiving identification response information fed back by the cloud service platform, wherein the identification response information is used for determining that the cloud service platform successfully inquires the second key based on the account identification information and the account binding relation.
Optionally, the receiving module is further configured to: receiving authentication request information from a target charging pile in response to successful execution of a gun inserting operation on the target charging pile; the sending module is further configured to: transmitting a preset random number and random number encryption information to a target charging pile based on authentication request information so that the cloud service platform carries out identity authentication on terminal equipment based on the preset random number and the random number encryption information, wherein the random number encryption information is obtained by adopting a second key to encrypt the preset random number; the receiving module is also used for: and receiving authentication response information fed back by the cloud service platform, wherein the authentication response information is used for determining whether the identity authentication of the terminal equipment is successful or not.
Optionally, the cloud service platform is further configured to decrypt the random number encryption information by using the second key to obtain a decrypted random number, and start a charging process for the target vehicle when the decrypted random number is consistent with the preset random number.
According to an embodiment of the present invention, there is also provided a nonvolatile storage medium in which a computer program is stored, wherein the computer program is configured to execute the vehicle charging pile connection method in any one of the above-described aspects when run.
According to one embodiment of the present invention, there is also provided an electronic device including a memory and a processor, wherein the memory stores a computer program, and the processor is configured to run the computer program to perform the vehicle charging pile connection method of any one of the above.
In the embodiment of the invention, the encryption identification information of the target charging pile is acquired, and the registration application information is sent to the cloud service platform based on the encryption identification information, so that the cloud service platform can register the target charging pile according to the registration application information, the equipment identification information from the cloud service platform is received in response to the successful registration of the target charging pile, bluetooth connection is established between the terminal equipment and the target charging pile by using the equipment identification information, the safety mechanism of double authentication is realized through the verification of the encryption identification information and the equipment identification information, the communication safety between the charging pile and the terminal equipment is ensured, the technical effect of improving the safety in the communication process of the terminal equipment and the vehicle charging pile is realized, and the technical problem of poor safety in the communication process of the terminal equipment and the vehicle charging pile in the related technology is solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute a limitation on the application. In the drawings:
Fig. 1 is a method for connecting a charging pile of a vehicle according to one embodiment of the present invention;
fig. 2 is a schematic view illustrating a method for connecting a charging pile of a vehicle according to an embodiment of the present invention;
fig. 3 is a schematic view of a further vehicle charging pile connection method according to one embodiment of the present invention;
fig. 4 is a block diagram illustrating a structure of a vehicle charging pile connection device according to an embodiment of the present invention.
Detailed Description
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present invention and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the invention described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
According to an embodiment of the present invention, there is provided a vehicle charging pile connection method, it being noted that the steps shown in the flowchart of the drawings may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is shown in the flowchart, in some cases the steps shown or described may be performed in an order different from that herein.
The method embodiments may be performed in an electronic device or similar computing device that includes a memory and a processor. Taking an example of operation on a vehicle terminal, the vehicle terminal may include one or more processors (which may include, but are not limited to, a central Processing unit (Central Processing Unit, CPU), a graphics processor (Graphics Processing Unit, GPU), a Digital Signal Processing (DSP) chip, a microprocessor (Micro Controller Unit, MCU), a programmable logic device (Field Programmable GATE ARRAY, FPGA), a neural network processor (Neural-network Processor Unit, NPU), a tensor processor (Tensor Processing Unit, TPU), an artificial intelligence (ARTIFICIAL INTELLIGENCE, AI) type processor, etc., and a memory for storing data. Alternatively, the vehicle terminal may further include a transmission device, an input-output device, and a display device for a communication function. It will be appreciated by those skilled in the art that the above description of the structure is merely illustrative and is not intended to limit the structure of the vehicle terminal. For example, the vehicle terminal may also include more or fewer components than the above structural description, or have a different configuration than the above structural description.
The memory may be used to store a computer program, for example, a software program of application software and a module, such as a computer program corresponding to the vehicle charging pile connection method in the embodiment of the present invention, and the processor executes various functional applications and data processing by running the computer program stored in the memory, that is, implements the vehicle charging pile connection method described above. The memory may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid state memory. In some examples, the memory may further include memory remotely located with respect to the processor, the remote memory being connectable to the mobile terminal through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission means is used for receiving or transmitting data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the mobile terminal. In one example, the transmission means comprises a network adapter (Network Interface Controller, simply referred to as NIC) that can be connected to other network devices via a base station to communicate with the internet. In one example, the transmission device may be a Radio Frequency (RF) module, which is used to communicate with the internet wirelessly.
Display devices may be, for example, touch screen type liquid crystal displays (Liquid Crustal Display, LCDs) and touch displays (also referred to as "touch screens" or "touch display screens"). The liquid crystal display may enable a user to interact with a user interface of the mobile terminal. In some embodiments, the mobile terminal has a graphical user interface (GRAPHICAL USER INTERFACE, GUI) with which a user can interact with the GUI by touching finger contacts and/or gestures on the touch-sensitive surface, where the human-machine interaction functions optionally include the following interactions: executable instructions for performing the above-described human-machine interaction functions, such as creating web pages, drawing, word processing, making electronic documents, games, video conferencing, instant messaging, sending and receiving electronic mail, talking interfaces, playing digital video, playing digital music, and/or web browsing, are configured/stored in a computer program product or readable storage medium executable by one or more processors.
Fig. 1 is a vehicle charging pile connection method according to one embodiment of the present invention, as shown in fig. 1, the method is performed by a terminal device, and the method includes the following steps:
Step S10, obtaining encryption identification information of a target charging pile, wherein the encryption identification information is obtained by adopting a first key to encrypt equipment identification information of the target charging pile;
In the above step S10, the device identification information of the target charging pile is used to identify the uniqueness and location of the charging pile, and includes: an unencrypted target charging pile Serial Number (SN), a bluetooth media access Control (MEDIA ACCESS Control, MAC) address of the target charging pile, a password to be input when connecting to the target charging pile bluetooth module, and the like, where the bluetooth MAC address of the target charging pile refers to a unique identification code of the target charging pile bluetooth module, and is used to uniquely identify the target charging pile in bluetooth communication. The first key is a special code or password used to encrypt the information. The encrypted identification information of the target charging stake refers to information such as the target charging stake SN encrypted by the first key, the MAC address of the target charging stake, a Bluetooth password which needs to be input when the target charging stake Bluetooth module is connected, and the like.
Specifically, the terminal device obtains encrypted identification information of the target charging pile. For example, the target charging stake holds the first key, encrypts the device identification information, and converts the encrypted identification information into a two-dimensional code. And the terminal equipment reads the information in the two-dimensional code through scanning the generated two-dimensional code.
Step S12, registration application information is sent to the cloud service platform based on the encryption identification information, so that the cloud service platform registers the target charging pile according to the registration application information, wherein the registration application information comprises the encryption identification information and account identification information, the account identification information is used for representing unique identification information of the terminal equipment, and the cloud service platform is used for decrypting the registration application information to obtain equipment identification information;
In the step S12, the cloud service platform refers to a service platform based on a cloud computing architecture provided by a remote service Provider (TELEMATICS SERVICE Provider, TSP), and includes services such as storage, computing, database, and network. Decryption refers to the process of recovering encrypted information into the original unencrypted information. For example, symmetric encryption algorithms refer to encryption and decryption using the same key, common symmetric encryption algorithms include the advanced encryption standard (Advanced Encryption Standard, AES), and the like. The asymmetric encryption algorithm means that different keys are used for encryption and decryption, a public key is used for encryption, a private key is used for decryption, and common asymmetric encryption algorithms include a Rivest-Shamir-Adleman (RSA) algorithm, and the like. The account information indicates the current mobile phone number for registering the application program of the control target charging stake.
Specifically, the TSP decrypts the encrypted identification information in the registration application information to obtain the SN of the target charging pile, and the TSP applies for registration of the target charging pile according to the SN of the target charging pile and the mobile phone number.
Step S14, receiving equipment identification information from a cloud service platform in response to successful registration of the target charging pile;
In the step S14, when the target charging pile is successfully registered, the received TSP may decrypt the encrypted identification information in the registration application information to obtain the MAC address of the target charging pile and the bluetooth password to be input when the bluetooth module of the target charging pile is connected.
And S16, establishing Bluetooth connection between the terminal equipment and the target charging pile by using the equipment identification information, wherein the terminal equipment is used for controlling the target charging pile to charge the target vehicle.
In the above step S16, the terminal device refers to a device where an application related to the target charging pile is located, for example, a device such as a smart phone.
Specifically, the terminal device can establish Bluetooth connection with the target charging pile through the MAC address and the Bluetooth password of the target charging pile, so that the target charging pile can be controlled through the terminal device. For example, after a bluetooth connection is established between a mobile phone Application (APP) and a target charging pile, the mobile phone APP can send a control signal to the target charging pile, where the control signal may include instructions of starting charging, stopping charging, setting a charging amount, and the like.
Based on the steps S10 to S16, the method comprises the steps of acquiring the encryption identification information of the target charging pile and sending registration application information to the cloud service platform based on the encryption identification information, so that the cloud service platform can register the target charging pile according to the registration application information, the equipment identification information from the cloud service platform is received in response to the successful registration of the target charging pile, bluetooth connection is established between the terminal equipment and the target charging pile by using the equipment identification information, and the safety mechanism of double authentication is realized through verification of the encryption identification information and the equipment identification information, the communication safety between the charging pile and the terminal equipment is ensured, and the technical effect of improving the safety in the communication process of the terminal equipment and the vehicle charging pile is realized, so that the technical problem of poor safety in the communication process of the terminal equipment and the vehicle charging pile in the related technology is solved.
Optionally, the cloud service platform is further configured to decrypt the registration application information by using the first key to obtain the device identification information and create an account binding relationship when no account binding relationship exists between the target charging pile and the account identification information, where the account binding relationship is used to record an association relationship between the account identification information and the device identification information.
Specifically, the TSP looks up whether there is a cell phone number that binds with the decrypted SN. When an account binding relationship does not exist between the SN of the target charging pile and the current mobile phone number, namely the SN of the target charging pile and the current mobile phone number are not associated with each other on the cloud service platform, the cloud service platform decrypts the registration application information by using the first key to obtain unencrypted equipment identification information, and the cloud service platform creates the account binding relationship, namely records the association relationship between the current mobile phone number and the SN of the target charging pile; when the account binding relation exists between the SN and the current mobile phone number, namely the target charging pile SN and the current mobile phone number are associated on the cloud service platform, registration fails, and a registration failure reason is fed back to the terminal equipment. Through verifying the account binding relationship, the security association between the private alternating-current charging pile and the mobile phone number of the user can be ensured, and an unauthorized user is prevented from operating the target charging pile, so that the security of the target charging pile is protected, and unnecessary loss caused by malicious use of other people is prevented.
Optionally, the vehicle charging pile connection method further includes:
Step S141, in response to successful registration of the target charging pile, key application information is sent to the cloud service platform, so that the cloud service platform generates a second key and encrypted identity information based on the key application information, wherein the second key is used for carrying out identity authentication on the terminal equipment, and the encrypted identity information is obtained by carrying out encryption processing on account identification information, the second key and aging information by adopting the first key;
in step S141, the validity time of the aging information for indicating the encrypted identity information and/or the second key is generally used to ensure validity of the identity information and prevent expiration. For example, the identity information and/or the second key may be used only within 24 hours after registration, or only within a specific time period per day. When this time or date is exceeded, the key will fail, requiring a new key to be retrieved for continued use.
Step S142, receiving the second key and the encrypted identity information from the cloud service platform.
Specifically, after the target charging pile is successfully registered, the terminal equipment sends a request to the cloud service platform, the request is obtained for acquiring a key and identity information for identity authentication, and the cloud service full platform generates a key and encrypted identity information for carrying out identity authentication on the current mobile phone number after receiving the request, wherein the encrypted identity information is obtained by encrypting the current mobile phone number, the key for carrying out identity authentication and the time-efficient information by using a first key. And the terminal equipment receives the second key and the encrypted identity information sent by the cloud service platform and safely stores the second key and the encrypted identity information.
Based on the steps S141 to S142, in response to successful registration of the target charging pile, the terminal device sends key application information to the cloud service platform, so that the cloud service platform generates a second key and encrypted identity information based on the key application information, the terminal device receives the second key and encrypted identity information from the cloud service platform, and the cloud service platform generates and manages the key for identity authentication and the encrypted identity information, thereby improving the reliability and safety of communication between the terminal device and the target charging pile.
Optionally, the vehicle charging pile connection method further includes:
Step S171, a Bluetooth connection is utilized to send clock request information to a target charging pile, so that the target charging pile performs clock synchronization with the terminal equipment according to the clock request information;
In the step S171, the clock request information is that the terminal device is used to request the target charging pile to perform clock synchronization according to the request information. Typically, the clock request message contains data about a time stamp, time offset, etc., to ensure that the terminal device is synchronized with the time of the target charging stake.
It is noted that the bluetooth connection between the terminal device and the target charging stake is based on the transport layer security system protocol (Transport Layer Security, TLS) 1.2. The protocol is used to encrypt network communications and to ensure the security and integrity of data transmissions.
And step S172, receiving clock response information fed back by the target charging pile, wherein the clock response information is used for determining that clock synchronization is successfully performed between the target charging pile and the terminal equipment.
Specifically, the terminal device sends clock request information to the target charging pile through the connection in the target communication to request the target charging pile to perform clock synchronization with the terminal device, wherein the clock request information contains data such as a time stamp. The target charging pile adjusts the internal clock according to the received clock request information, so that the internal clock is synchronous with the clock of the terminal equipment sending the clock request. And after the target charging pile adjusts the internal clock, sending a clock response message to the terminal equipment. And the terminal equipment confirms that the clock synchronization between the target charging pile and the terminal equipment is successful through the received clock response information. For example, the mobile APP sends a clock request message to the charging stake containing a current time stamp to request that the charging stake be clock synchronized with the mobile APP, where the time stamp may be an accurate time obtained from an internet time server. After receiving the clock request information, the target charging pile analyzes the clock request information and adjusts the internal clock according to the time information in the clock request information so as to synchronize the time of the target charging pile and the mobile phone APP. After the charging pile adjusts the internal clock, a clock response message is sent back to the mobile phone APP, and the mobile phone APP is informed of successful clock synchronization. The mobile phone APP receives the clock response information, and an poem indicating that clock synchronization is successful appears on an interface of the APP. And the mobile phone APP confirms that the clock synchronization between the charging pile and the mobile phone APP is successful through the received clock response information.
Based on the steps S171 to S172, the Bluetooth connection is utilized to send clock request information to the target charging pile, so that the target charging pile performs clock synchronization with the terminal equipment according to the clock request information; and receiving clock response information fed back by the target charging pile, and through clock synchronization, errors or confusion caused by time asynchronization can be avoided, so that the efficiency and reliability of communication between the terminal equipment and the target charging pile are improved.
Optionally, the vehicle charging pile connection method further includes:
Step S181, account identification information is sent to the cloud service platform, so that the cloud service platform queries a second key based on the account identification information and the account binding relationship;
Step S182, identification response information fed back by the cloud service platform is received, wherein the identification response information is used for determining that the cloud service platform successfully inquires the second secret key based on the account identification information and the account binding relation.
Specifically, the terminal device sends account identification information to the cloud service platform, the cloud service platform queries a second key based on the account identification information and the account binding relationship, the cloud service platform feeds the queried second key back to the terminal device, and the terminal device receives information fed back by the cloud service platform and successfully querying the second key.
Based on the steps S181 to S182, the terminal device sends account identification information to the cloud service platform, so that the cloud service platform queries the second key based on the account identification information and the account binding relationship; the terminal equipment receives the identification response information fed back by the cloud service platform, and queries through the account identification information and the account binding relation, so that the safety of communication between the terminal equipment and the cloud service platform is improved.
Optionally, the vehicle charging pile connection method further includes:
Step S191, receiving authentication request information from the target charging pile in response to successful execution of the gun inserting operation on the target charging pile;
Step S192, a preset random number and random number encryption information are sent to a target charging pile based on authentication request information, so that the cloud service platform carries out identity authentication on terminal equipment based on the preset random number and the random number encryption information, wherein the random number encryption information is obtained by carrying out encryption processing on the preset random number by adopting a second secret key;
step S193, receiving authentication response information fed back by the cloud service platform, wherein the authentication response information is used for determining whether the identity authentication for the terminal device is successful.
Specifically, after the gun inserting operation is performed on the target charging pile, the target charging pile initiates authentication request information to the terminal equipment. After receiving the authentication request information, the terminal equipment sends a preset random number to the target charging pile based on the authentication request information and random number encryption information obtained by encrypting the preset random number by using a second key, and the cloud service platform carries out identity authentication on the terminal equipment based on the preset random number and the random number encryption information and sends authentication response information, namely an identity authentication result of the terminal equipment, to the terminal equipment. If the identity authentication of the terminal equipment is successful, the target charging pile starts to execute charging operation; if the identity authentication of the terminal equipment fails, the target charging pile returns authentication failure information and the identity authentication failure reason of the terminal equipment.
Based on the steps S191 to S193, in response to successful execution of the gun inserting operation on the target charging pile, the terminal device receives authentication request information from the target charging pile; the terminal equipment sends a preset random number and random number encryption information to the target charging pile based on the authentication request information, so that the cloud service platform carries out identity authentication on the terminal equipment based on the preset random number and the random number encryption information; the terminal equipment receives authentication response information fed back by the cloud service platform; the charging process of the target vehicle can be started only under the condition that the identity authentication is successful, and the safety and reliability of the terminal equipment in the communication process with the vehicle charging pile are improved.
Optionally, the cloud service platform is further configured to decrypt the random number encryption information by using the second key to obtain a decrypted random number, and start a charging process for the target vehicle when the decrypted random number is consistent with the preset random number.
Specifically, the cloud service platform uses the second secret key to decrypt the random number encryption information to obtain a decrypted random number, if the decrypted random number is consistent with the preset random number, a charging process of the target vehicle is started, if the decrypted random number is inconsistent with the preset random number, the charging process of the target vehicle is failed to start, and the failure reason is fed back to the terminal device.
Fig. 2 is a schematic diagram of a vehicle charging pile connection method according to an embodiment of the present invention, and as shown in fig. 2, the vehicle charging pile connection method mainly includes the following steps:
Step S201, obtaining encryption identification information of a target charging pile;
step S202, transmitting registration application information based on the encryption identification information;
step S203, when no account binding relation exists between the target charging pile and the account identification information, decrypting the registration application information by adopting a first key to obtain equipment identification information, and creating the account binding relation;
step S204, sending registration success information of the target charging pile;
step S205, sending key application information;
Step S206, generating a second key and encryption identity information based on the key application information;
Step S207, a second key, encrypted identity information and equipment identification information are sent;
step S208, receiving the second key, the encrypted identity information and the device identification information from the cloud service platform.
Fig. 3 is a schematic view of yet another vehicle charging pile connection method according to an embodiment of the present invention, and as shown in fig. 3, the vehicle charging pile connection method mainly includes the following steps:
Step S301, establishing Bluetooth connection by using equipment identification information;
step S302, sending clock request information;
Step S303, clock synchronization is carried out with the terminal equipment according to the clock request information;
Step S304, sending clock synchronization success information;
step S305, transmitting account identification information;
Step S306, the second secret key is successfully queried based on the account identification information and the account binding relation;
step S307, successful identification information is sent;
Step S308, performing a robbery inserting operation;
step S309, transmitting authentication request information;
Step S310, the preset random number is encrypted by using a second key to obtain preset random number encryption information;
step S311, a preset random number and random number encryption information are sent;
Step S312, the second secret key is used for decrypting the random number encryption information to obtain a decrypted random number, and whether the decrypted random number is consistent with the preset random number or not is judged;
step S313, in response to the fact that the decryption random number is consistent with the preset random number, the identity authentication success information is sent;
in step S314, the charging process of the target vehicle is started.
Step S315, the identity authentication failure information is sent in response to the fact that the decryption random number is inconsistent with the preset random number.
Based on the steps S301 to S315, the method includes the steps of obtaining the encrypted identification information of the target charging pile and sending registration application information to the cloud service platform based on the encrypted identification information, so that the cloud service platform registers the target charging pile according to the registration application information, responding to successful registration of the target charging pile, receiving the equipment identification information from the cloud service platform, establishing bluetooth connection between the terminal equipment and the target charging pile by using the equipment identification information, and verifying the encrypted identification information and the equipment identification information, so that a dual-authentication safety mechanism is realized, communication safety between the charging pile and the terminal equipment is ensured, and further, the technical effect of improving safety in the communication process of the terminal equipment and the vehicle charging pile is realized, and the technical problem of poor safety in the communication process of the terminal equipment and the vehicle charging pile in the related technology is solved.
From the description of the above embodiments, it will be clear to a person skilled in the art that the method according to the above embodiments may be implemented by means of software plus the necessary general hardware platform, but of course also by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising several instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method of the various embodiments of the present invention.
The embodiment of the invention also provides a vehicle charging pile connecting device, which is used for realizing the embodiment and the preferred implementation mode, and the description is omitted. As used below, the term "module" may be a combination of software and/or hardware that implements a predetermined function. While the means described in the following embodiments are preferably implemented in software, implementation in hardware, or a combination of software and hardware, is also possible and contemplated.
Fig. 4 is a block diagram illustrating a structure of a vehicle charging pile connection device according to an embodiment of the present invention. As shown in fig. 4, the apparatus includes:
an obtaining module 401, configured to obtain encrypted identification information of the target charging pile, where the encrypted identification information is obtained by encrypting equipment identification information of the target charging pile using a first key;
The sending module 402 is configured to send registration application information to the cloud service platform based on the encrypted identification information, so that the cloud service platform registers the target charging pile according to the registration application information, where the registration application information includes the encrypted identification information and account identification information, the account identification information is used to represent unique identification information of the terminal device, and the cloud service platform is configured to decrypt the registration application information to obtain device identification information;
a receiving module 403, configured to receive device identification information from the cloud service platform in response to successful registration of the target charging pile;
And the establishing module 404 is configured to establish a bluetooth connection between the terminal device and the target charging pile by using the device identification information, where the terminal device is configured to control the target charging pile to charge the target vehicle.
Optionally, the cloud service platform is further configured to decrypt the registration application information by using the first key to obtain the device identification information and create an account binding relationship when no account binding relationship exists between the target charging pile and the account identification information, where the account binding relationship is used to record an association relationship between the account identification information and the device identification information.
Optionally, the vehicle charging pile connection device further includes: the generating module 405 is configured to send key application information to the cloud service platform in response to successful registration of the target charging pile, so that the cloud service platform generates a second key and encrypted identity information based on the key application information, where the second key is used to authenticate the identity of the terminal device, and the encrypted identity information is obtained by encrypting account identification information, the second key and aging information by using the first key; the receiving module 402 is further configured to receive the second key and the encrypted identity information from the cloud service platform.
Optionally, the sending module 402 is further configured to: transmitting clock request information to the target charging pile by utilizing Bluetooth connection so that the target charging pile performs clock synchronization with the terminal equipment according to the clock request information; the receiving module 402 is further configured to: and receiving clock response information fed back by the target charging pile, wherein the clock response information is used for determining that clock synchronization is successfully performed between the target charging pile and the terminal equipment.
Optionally, the sending module 402 is further configured to: sending account identification information to the cloud service platform so that the cloud service platform queries a second key based on the account identification information and the account binding relationship; the receiving module 402 is further configured to: and receiving identification response information fed back by the cloud service platform, wherein the identification response information is used for determining that the cloud service platform successfully inquires the second key based on the account identification information and the account binding relation.
Optionally, the receiving module 403 is further configured to: receiving authentication request information from a target charging pile in response to successful execution of a gun inserting operation on the target charging pile; the sending module 402 is further configured to: transmitting a preset random number and random number encryption information to a target charging pile based on authentication request information so that the cloud service platform carries out identity authentication on terminal equipment based on the preset random number and the random number encryption information, wherein the random number encryption information is obtained by adopting a second key to encrypt the preset random number; the receiving module 403 is further configured to: and receiving authentication response information fed back by the cloud service platform, wherein the authentication response information is used for determining whether the identity authentication of the terminal equipment is successful or not.
Optionally, the cloud service platform is further configured to decrypt the random number encryption information by using the second key to obtain a decrypted random number, and start a charging process for the target vehicle when the decrypted random number is consistent with the preset random number.
It should be noted that each of the above modules may be implemented by software or hardware, and for the latter, it may be implemented by, but not limited to: the modules are all located in the same processor; or the above modules may be located in different processors in any combination.
According to one embodiment of the present invention, there is also provided a non-volatile storage medium having a computer program stored therein, wherein the computer program is arranged to perform the steps of any of the method embodiments described above when run.
Alternatively, in the present embodiment, the above-described storage medium may be configured to store a computer program for performing the steps of:
s1, acquiring encryption identification information of a target charging pile, wherein the encryption identification information is obtained by adopting a first secret key to encrypt equipment identification information of the target charging pile;
S2, transmitting registration application information to the cloud service platform based on the encryption identification information so that the cloud service platform registers the target charging pile according to the registration application information, wherein the registration application information comprises the encryption identification information and account identification information, the account identification information is used for representing unique identification information of the terminal equipment, and the cloud service platform is used for decrypting the registration application information to obtain equipment identification information;
S3, receiving equipment identification information from a cloud service platform in response to successful registration of the target charging pile;
And S4, establishing Bluetooth connection between the terminal equipment and the target charging pile by using the equipment identification information, wherein the terminal equipment is used for controlling the target charging pile to charge the target vehicle.
Alternatively, in the present embodiment, the storage medium may include, but is not limited to: a usb disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory RAM), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing a computer program.
According to one embodiment of the present invention, there is also provided an electronic device comprising a memory having a computer program stored therein and a processor arranged to run the computer program to perform the steps of any of the method embodiments described above.
Alternatively, in the present embodiment, the above-described processor may be configured to execute the following steps by a computer program:
s1, acquiring encryption identification information of a target charging pile, wherein the encryption identification information is obtained by adopting a first secret key to encrypt equipment identification information of the target charging pile;
S2, transmitting registration application information to the cloud service platform based on the encryption identification information so that the cloud service platform registers the target charging pile according to the registration application information, wherein the registration application information comprises the encryption identification information and account identification information, the account identification information is used for representing unique identification information of the terminal equipment, and the cloud service platform is used for decrypting the registration application information to obtain equipment identification information;
S3, receiving equipment identification information from a cloud service platform in response to successful registration of the target charging pile;
And S4, establishing Bluetooth connection between the terminal equipment and the target charging pile by using the equipment identification information, wherein the terminal equipment is used for controlling the target charging pile to charge the target vehicle.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
In the foregoing embodiments of the present invention, the descriptions of the embodiments are emphasized, and for a portion of this disclosure that is not described in detail in this embodiment, reference is made to the related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed technology may be implemented in other manners. The above-described embodiments of the apparatus are merely exemplary, and the division of the units, for example, may be a logic function division, and may be implemented in another manner, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interfaces, units or modules, or may be in electrical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied essentially or in part or all of the technical solution or in part in the form of a software product stored in a storage medium, including instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a usb disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely a preferred embodiment of the present invention and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present invention, which are intended to be comprehended within the scope of the present invention.

Claims (10)

1. A vehicle charging pile connection method, characterized by comprising:
Acquiring encryption identification information of a target charging pile, wherein the encryption identification information is obtained by adopting a first key to encrypt equipment identification information of the target charging pile;
Transmitting registration application information to a cloud service platform based on the encryption identification information so that the cloud service platform registers the target charging pile according to the registration application information, wherein the registration application information comprises the encryption identification information and account identification information, the account identification information is used for representing unique identification information of terminal equipment, and the cloud service platform is used for decrypting the registration application information to obtain the equipment identification information;
receiving the equipment identification information from the cloud service platform in response to successful registration of the target charging pile;
And establishing Bluetooth connection between the terminal equipment and the target charging pile by using the equipment identification information, wherein the terminal equipment is used for controlling the target charging pile to charge a target vehicle.
2. The vehicle charging pile connection method according to claim 1, wherein the cloud service platform is further configured to decrypt the registration application information with the first key to obtain the device identification information and create the account binding relationship when no account binding relationship exists between the target charging pile and the account identification information, where the account binding relationship is used to record an association relationship between the account identification information and the device identification information.
3. The vehicle charging pile connection method according to claim 2, characterized in that the method further comprises:
Responding to successful registration of the target charging pile, sending key application information to the cloud service platform so that the cloud service platform generates a second key and encrypted identity information based on the key application information, wherein the second key is used for carrying out identity authentication on the terminal equipment, and the encrypted identity information is obtained by carrying out encryption processing on the account identification information, the second key and aging information by adopting the first key;
and receiving the second key and the encrypted identity information from the cloud service platform.
4. The vehicle charging pile connection method according to claim 1, characterized in that the method further comprises:
transmitting clock request information to the target charging pile by utilizing the Bluetooth connection so as to enable the target charging pile to perform clock synchronization with the terminal equipment according to the clock request information;
And receiving clock response information fed back by the target charging pile, wherein the clock response information is used for determining that clock synchronization is successfully performed between the target charging pile and the terminal equipment.
5. A vehicle charging stake connection method as claimed in claim 3, further comprising:
sending the account identification information to the cloud service platform so that the cloud service platform queries the second key based on the account identification information and the account binding relationship;
And receiving identification response information fed back by the cloud service platform, wherein the identification response information is used for determining that the cloud service platform successfully inquires the second key based on the account identification information and the account binding relationship.
6. The vehicle charging pile connection method according to claim 5, characterized in that the method further comprises:
receiving authentication request information from the target charging pile in response to successful execution of a gun inserting operation on the target charging pile;
Transmitting a preset random number and random number encryption information to the target charging pile based on the authentication request information so that the cloud service platform carries out identity authentication on the terminal equipment based on the preset random number and the random number encryption information, wherein the random number encryption information is obtained by adopting the second key to encrypt the preset random number;
And receiving authentication response information fed back by the cloud service platform, wherein the authentication response information is used for determining whether the identity authentication of the terminal equipment is successful or not.
7. The vehicle charging pile connection method according to claim 6, wherein the cloud service platform is further configured to decrypt the random number encryption information using the second key to obtain a decrypted random number, and start a charging process for the target vehicle when the decrypted random number is identical to the preset random number.
8. A vehicle charging pile connection device, characterized by comprising:
The acquisition module is used for acquiring the encrypted identification information of the target charging pile, wherein the encrypted identification information is obtained by adopting a first key to encrypt the equipment identification information of the target charging pile;
The cloud service platform is used for decrypting the registration application information to obtain the equipment identification information;
the receiving module is used for responding to successful registration of the target charging pile and receiving the equipment identification information from the cloud service platform;
The establishing module is used for establishing Bluetooth connection between the terminal equipment and the target charging pile by utilizing the equipment identification information, wherein the terminal equipment is used for controlling the target charging pile to charge a target vehicle.
9. A non-volatile storage medium, characterized in that the storage medium has stored therein a computer program, wherein,
The computer program is configured to execute the vehicle charging pile connection method according to any one of claims 1 to 7 at the time of execution.
10. An electronic device comprising a memory and a processor, characterized in that the memory has stored therein a computer program, the processor being arranged to run the computer program to perform the vehicle charging pile connection method as claimed in any one of claims 1 to 7.
CN202311816338.XA 2023-12-26 2023-12-26 Vehicle charging pile connection method and device, storage medium and electronic device Pending CN117935428A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311816338.XA CN117935428A (en) 2023-12-26 2023-12-26 Vehicle charging pile connection method and device, storage medium and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311816338.XA CN117935428A (en) 2023-12-26 2023-12-26 Vehicle charging pile connection method and device, storage medium and electronic device

Publications (1)

Publication Number Publication Date
CN117935428A true CN117935428A (en) 2024-04-26

Family

ID=90769388

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311816338.XA Pending CN117935428A (en) 2023-12-26 2023-12-26 Vehicle charging pile connection method and device, storage medium and electronic device

Country Status (1)

Country Link
CN (1) CN117935428A (en)

Similar Documents

Publication Publication Date Title
US10380361B2 (en) Secure transaction method from a non-secure terminal
EP3241335B1 (en) Method and apparatus for securing a mobile application
CN109379189B (en) Block chain account key backup and recovery method, device, terminal and system
CN109992949B (en) Equipment authentication method, over-the-air card writing method and equipment authentication device
CN106227503A (en) Safety chip COS firmware update, service end, terminal and system
CN111107066A (en) Sensitive data transmission method and system, electronic equipment and storage medium
EP2601771A1 (en) System and method for securely using multiple subscriber profiles with a security component and a mobile telecommunications device
CN112565265B (en) Authentication method, authentication system and communication method between terminal devices of Internet of things
CN114465803B (en) Object authorization method, device, system and storage medium
JP2007028015A (en) Program, system and method for time stamp verification, and time stamp generation request method
CN110659899B (en) Offline payment method, device and equipment
CN109547196B (en) Watch token system implementation method, watch token system and device
US20240106633A1 (en) Account opening methods, systems, and apparatuses
JP5781678B1 (en) Electronic data utilization system, portable terminal device, and method in electronic data utilization system
JP4028849B2 (en) Communication system, portable terminal, and program
KR20150016802A (en) Security device and method moving data using the same
CN110313005B (en) Security architecture for device applications
CN115801287A (en) Signature authentication method and device
CN117935428A (en) Vehicle charging pile connection method and device, storage medium and electronic device
CN115378609A (en) Electronic certificate display method, verification method, terminal and server
JP5489913B2 (en) Portable information device and encrypted communication program
CN107682147B (en) Security management method and system for smart card chip operating system file
CN111192049A (en) Network security payment protection method and mobile terminal
CN110719264B (en) Information processing method and device, electronic equipment and storage medium
CN113129005A (en) Offline payment method and system, payment terminal and collection terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination