WO2018210320A1 - 一种通过充电装置对用户设备进行充电的方法与设备 - Google Patents

一种通过充电装置对用户设备进行充电的方法与设备 Download PDF

Info

Publication number
WO2018210320A1
WO2018210320A1 PCT/CN2018/087416 CN2018087416W WO2018210320A1 WO 2018210320 A1 WO2018210320 A1 WO 2018210320A1 CN 2018087416 W CN2018087416 W CN 2018087416W WO 2018210320 A1 WO2018210320 A1 WO 2018210320A1
Authority
WO
WIPO (PCT)
Prior art keywords
charging
charging device
user equipment
application
authentication information
Prior art date
Application number
PCT/CN2018/087416
Other languages
English (en)
French (fr)
Inventor
顾晓斌
龚蔚
鲍渊智
Original Assignee
上海掌门科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 上海掌门科技有限公司 filed Critical 上海掌门科技有限公司
Publication of WO2018210320A1 publication Critical patent/WO2018210320A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J7/00Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries
    • H02J7/00032Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries characterised by data exchange
    • H02J7/00036Charger exchanging data with battery
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J7/00Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries
    • H02J7/0068Battery or charger load switching, e.g. concurrent charging and load supply
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J7/00Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries
    • H02J7/00032Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries characterised by data exchange
    • H02J7/00045Authentication, i.e. circuits for checking compatibility between one component, e.g. a battery or a battery charger, and another component, e.g. a power source

Definitions

  • the present application relates to the field of communications, and in particular, to a control charging device and a technology for charging a user equipment by a charging device.
  • the charging cabinet used is costly; while the user obtains the charging treasure stored in the charging treasure storage cabinet by scanning the code, the charging treasure is no longer controlled after being separated from the cabinet, and can be used arbitrarily, especially in the service provider directly charging the treasure Provided to the user for use.
  • a method for charging a user equipment by a charging device at a user equipment end comprising:
  • the charging authentication information is used to close a discharging circuit between the charging device and the user equipment to charge the user equipment.
  • a method for charging a user equipment at a charging device end comprising:
  • the discharge circuit between the charging device and the user equipment is closed to charge the user equipment.
  • a method for controlling a charging device comprising:
  • the charging authentication information is sent to the charging device by the application in the user equipment, wherein the charging authentication information is used to close the discharging circuit of the charging device to externally charge.
  • a method for charging a user equipment by a charging device comprising:
  • the user equipment sends charging authentication information to the charging device by using the application in the user equipment;
  • the charging device acquires charging authentication information provided by the application
  • the charging device verifies the application according to the charging authentication information
  • the charging device closes a discharge circuit between the charging device and the user equipment to charge the user equipment.
  • an apparatus for charging a user equipment by a charging device comprising:
  • a memory arranged to store computer executable instructions that, when executed, cause the processor to:
  • the charging authentication information is used to close a discharging circuit between the charging device and the user equipment to charge the user equipment.
  • a charging apparatus for charging a user equipment comprising:
  • a memory arranged to store computer executable instructions that, when executed, cause the processor to:
  • the discharge circuit between the charging device and the user equipment is closed to charge the user equipment.
  • an apparatus for controlling a charging apparatus comprising:
  • a memory arranged to store computer executable instructions that, when executed, cause the processor to:
  • the charging authentication information is sent to the charging device by the application in the user equipment, wherein the charging authentication information is used to close the discharging circuit of the charging device to externally charge.
  • a computer readable medium comprising instructions that, when executed, cause a system to:
  • the charging authentication information is used to close a discharging circuit between the charging device and the user equipment to charge the user equipment.
  • a computer readable medium comprising instructions that, when executed, cause a system to:
  • the discharge circuit between the charging device and the user equipment is closed to charge the user equipment.
  • a computer readable medium comprising instructions that, when executed, cause a system to:
  • the charging authentication information is sent to the charging device by the application in the user equipment, wherein the charging authentication information is used to close the discharging circuit of the charging device to externally charge.
  • the present application transmits the charging authentication information from the user equipment to the charging device, and the charging device verifies the charging authentication information based on the charging authentication information, thereby realizing verification of the charging authority of the user, and Control and management of the output.
  • FIG. 1 shows a flow chart of a method for charging a user equipment by a charging device at a user equipment end according to an embodiment of the present application
  • Figure 2 is a flow chart showing the sub-steps of a step of the method of Figure 1;
  • FIG. 3 illustrates a flow chart of a method for charging a user equipment by a charging device at a user equipment end according to another embodiment of the present application
  • FIG. 4 is a flow chart showing a method for charging a user equipment by a charging device at a user equipment end according to still another embodiment of the present application;
  • FIG. 5 illustrates a flow chart of a method for charging a user equipment by a charging device at a user equipment end according to still another embodiment of the present application
  • FIG. 6 shows a flow chart of a method for charging a user equipment by a charging device, in accordance with an embodiment of the present application
  • FIG. 7 illustrates a flow chart of a method for charging a user equipment at a charging device end according to an embodiment of the present application
  • the terminal, the device of the service network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
  • processors CPUs
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory.
  • RAM random access memory
  • ROM read only memory
  • Memory is an example of a computer readable medium.
  • Computer readable media includes both permanent and non-persistent, removable and non-removable media.
  • Information storage can be implemented by any method or technology.
  • the information can be computer readable instructions, data structures, modules of programs, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), digital versatile disk (DVD) or other optical storage,
  • the device referred to in the present application includes but is not limited to a user equipment, a network device, or a device formed by integrating a user equipment and a network device through a network.
  • the user equipment includes, but is not limited to, any mobile electronic product that can perform human-computer interaction with the user (for example, human-computer interaction through a touchpad), such as a smart phone, a tablet computer, etc., and the mobile electronic product can be operated by any operation.
  • System such as android operating system, iOS operating system, etc.
  • the network device includes an electronic device capable of automatically performing numerical calculation and information processing according to an instruction set or stored in advance, and the hardware includes but is not limited to a microprocessor, an application specific integrated circuit (ASIC), and programmable logic.
  • ASIC application specific integrated circuit
  • the network device includes, but is not limited to, a computer, a network host, a single network server, a plurality of network server sets, or a plurality of servers; wherein the cloud is composed of a large number of computers or network servers based on Cloud Computing.
  • cloud computing is a kind of distributed computing, a virtual supercomputer composed of a group of loosely coupled computers.
  • the network includes, but is not limited to, the Internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless ad hoc network (Ad Hoc network), and the like.
  • the device may also be a program running on the user equipment, the network device, or the user equipment and the network device, the network device, the touch terminal, or the network device and the touch terminal integrated through the network.
  • a method for charging a user equipment by a charging device at a user equipment end comprising the step S11.
  • the user equipment sends charging authentication information to the charging device through an application installed in the user equipment; wherein the charging authentication information is used to close a discharging circuit between the charging device and the user equipment to The user equipment is charged.
  • the user equipment transmitting charging authentication information to the charging device through the application installed in the user equipment means that the charging device needs to receive the charging device before charging the user equipment through the discharging circuit.
  • Charging authentication information sent by the user equipment the charging authentication information is sent to the charging device by the charging authentication application installed on the user equipment; the charging device verifies the charging authentication information, and when the charging authentication information passes verification, the charging device closes the discharging circuit , charging the user equipment.
  • the charging authentication information may be determined by the charging authentication application according to the authority corresponding to the user application account, or may be determined by the installation state of the charging authentication application on the current user equipment, and may also be performed by the user equipment through Bluetooth communication, Near Field Communication (NFC), and mobile.
  • NFC Near Field Communication
  • Data communication, wireless local area network communication, etc. are acquired; and the user equipment sends charging authentication information to the charging device, and may also be based on a communication cable (eg, a USB cable), Bluetooth communication, near field communication, mobile data communication (eg, based on 3G/4G) Communication methods such as network) and wireless LAN communication.
  • a charging service company B provides a charging device Ca to a user A for the user A to charge the mobile phone Ma.
  • the user A installs the charging authentication application provided by the charging service company B on the mobile phone Ma in advance, and the charging authentication application is used in conjunction with the charging device Ca, and can send charging authentication information to the charging device Ca during operation, for the charging device Ca to identify the mobile phone Ma Or verification of charging permissions.
  • the charging certificate application is running.
  • the user A operates the charging authentication application, and sends charging authentication information to the charging device Ca, the charging authentication information including the charging authority of the corresponding account of the user A in the charging authentication application.
  • the charging device Ca authenticates the charging authority of the user A.
  • the charging device Ca closes the discharging circuit between the user and the mobile phone Ma to charge the mobile phone Ma.
  • the charging authentication information sent by the charging authentication application to the charging device Ca includes “installed charging authentication application”.
  • the charging authentication information includes a previously agreed message “app installed”, and when the charging device Ca detects the charging authentication. The information, that is, the closed discharge circuit, charges the mobile phone Ma.
  • the discharge circuit between the user equipment and the charging device may include a wired charging interface or a wireless charging module.
  • the mobile phone Ma is connected to the USB charging interface of the charging device Ca through a USB charging cable and charged; or the charging device Ca provides a wireless charging transmitting module, and the mobile phone Ma is charged by the corresponding wireless charging receiving module.
  • the charging device may comprise a cable, for example, powered by a power converter, for example, the charging device Ca is a charging base or a fixed charging cabinet; and may also include a battery.
  • the charging device Ca is a “charging treasure” or a mobile power source (Mobile Power Pack, MPP). ).
  • the method further includes step S12.
  • step S12 the user equipment first establishes its communication connection with the charging device; subsequently, in step S11, the user equipment transmits charging authentication information from the charging device via the application in the user device and via the communication connection.
  • step S12 the user equipment establishes its communication connection with the charging device, for example, the user equipment and the charging device communicate via a communication cable (eg, a USB cable), Bluetooth communication, near field communication, mobile data communication (eg, Connected to each other based on 3G/4G network), wireless local area network communication, etc., and establishes a communication connection based on the agreed communication protocol; in step S11, the user equipment passes the communication established in step S12 through the application installed in the user equipment Connect to send charging authentication information to the charging device.
  • a communication cable eg, a USB cable
  • a charging service company B provides a charging device Ca to a user A for the user A to charge the mobile phone Ma.
  • the user A installs the charging authentication application provided by the charging service company B on the mobile phone Ma in advance, and the charging authentication application is used in conjunction with the charging device Ca, and can send charging authentication information to the charging device Ca during operation, for the charging device Ca to identify the mobile phone Ma Or verification of charging permissions.
  • the charging device Ca and the mobile phone Ma are connected by a USB cable, and the charging authentication application is in an operating state.
  • the mobile phone Ma detects the charging device Ca
  • the mobile phone Ma sends a communication connection request to the charging device Ca through the charging authentication application based on the agreed communication protocol, and the charging device Ca receives the communication connection request and responds to the communication connection request, thereby charging device Ca
  • a communication connection is established with the mobile phone Ma.
  • Libusb is a user-space-based USB library that is designed with a series of external application programming interfaces (APIs) for application calls.
  • the charging authentication application can be developed based on Libusb. In the charging authentication application, the Java calling related interface is adopted, and the USB bus is driven by the user mode.
  • the communication between the charging device Ca and the mobile phone Ma can also be connected to each other based on Bluetooth communication, near field communication, mobile data communication (for example, 3G/4G network), wireless local area network communication, etc., and establish a communication connection based on the agreed communication protocol.
  • the mobile phone Ma searches for a WiFi hotspot signal or a Bluetooth signal provided by the charging device Ca and establishes a wireless connection between the mobile phone Ma and the charging device Ca.
  • the user A operates the charging authentication application, and sends charging authentication information to the charging device Ca, the charging authentication information including the charging authority of the corresponding account of the user A in the charging authentication application.
  • the charging device Ca authenticates the charging authority of the user A.
  • the charging authority corresponding to the charging authentication information is “right to charge”
  • the charging device Ca closes the discharging circuit between the user and the mobile phone Ma to charge the mobile phone Ma.
  • the charging authentication information sent by the charging authentication application to the charging device Ca includes “installed charging authentication application”.
  • the charging authentication information includes a previously agreed message “app installed”, and when the charging device Ca detects the charging authentication.
  • the information that is, the closed discharge circuit, charges the mobile phone Ma.
  • the user equipment sends a communication connection request to the charging device, and receives a communication connection response returned by the charging device based on the communication connection request, thereby establishing the user equipment and the charging device.
  • Communication connection For example, the user equipment and the charging device are connected and communicated by the charging cable, and the user equipment sends a communication connection request to the charging device according to the agreed protocol.
  • the charging device After receiving the communication connection request, the charging device returns a corresponding communication connection response to the user equipment, and the user The communication connection between the device and the charging device is established; in this process, the charging device may further determine user equipment information of the user equipment according to the communication connection request, such as the device type, model, etc., and the user equipment may also determine the charging device according to the communication connection response.
  • Charging device information such as identification information such as serial number, or other information such as capacity, manufacturer, etc.
  • the user equipment communicates with the charging device by means of Bluetooth communication, and the user equipment first pairs with the charging device. During the pairing process, the user equipment sends a master device paging request to the external device, and the charging device monitors the master device paging request.
  • the slave device sends a paging response, and the user equipment receives the slave paging response, and an ACL link connection is established between the user equipment and the charging device; based on the ACL link connection, the master device An RFCOMM connection request is initiated, and the charging device responds to the RFCOMM connection request to establish a Bluetooth communication connection between the user equipment and the charging device.
  • the communication connection request may also be sent by the charging device to the user equipment, and after the charging device receives the communication connection response returned by the user equipment based on the communication connection request, the communication connection between the user equipment and the charging device is established.
  • the specific process is similar to the above process, and will not be described again, and is included herein by reference.
  • the user equipment establishes a communication connection between the user equipment and the charging device based on a USB connection between the user equipment and the charging device.
  • the user equipment and the charging device are connected to each other via a USB cable, and a communication connection is established based on the agreed communication protocol.
  • a charging service company B provides a charging device Ca to a user A for the user A to charge the mobile phone Ma.
  • the user A installs the charging authentication application provided by the charging service company B on the mobile phone Ma in advance, and the charging authentication application is used in conjunction with the charging device Ca, and can send charging authentication information to the charging device Ca during operation, for the charging device Ca to identify the mobile phone Ma Or verification of charging permissions.
  • the charging device Ca and the mobile phone Ma are connected by a USB cable, and the charging authentication application is in an operating state.
  • the mobile phone Ma detects the charging device Ca
  • the mobile phone Ma sends a communication connection request to the charging device Ca through the charging authentication application based on the agreed communication protocol, and the charging device Ca receives the communication connection request and responds to the communication connection request, thereby charging device Ca
  • a communication connection is established with the mobile phone Ma.
  • Libusb is a user-space-based USB library that is designed with a series of external application programming interfaces (APIs) for application calls.
  • the charging authentication application can be developed based on Libusb. In the charging authentication application, the Java calling related interface is adopted, and the USB bus is driven by the user mode.
  • the user A operates the charging authentication application, and sends charging authentication information to the charging device Ca, the charging authentication information including the charging authority of the corresponding account of the user A in the charging authentication application.
  • the charging device Ca authenticates the charging authority of the user A.
  • the charging authority corresponding to the charging authentication information is “right to charge”
  • the charging device Ca closes the discharging circuit between the user and the mobile phone Ma to charge the mobile phone Ma.
  • the charging authentication information sent by the charging authentication application to the charging device Ca includes “installed charging authentication application”.
  • the charging authentication information includes a previously agreed message “app installed”, and when the charging device Ca detects the charging authentication.
  • the information that is, the closed discharge circuit, charges the mobile phone Ma.
  • step S12 includes sub-step S12a and sub-step S12b.
  • the user equipment acquires device identification information of the charging device based on the USB connection between the user equipment and the charging device; in sub-step S12b, the user equipment is established according to the device identification information of the charging device.
  • a communication connection with the charging device For example, the user equipment is connected to the charging device via a USB communication cable, and the user equipment reads the device identification information of the charging device for distinguishing from other charging devices through the USB communication cable; subsequently, the user equipment according to the device identification information, Establish a wireless connection with the charging device.
  • a charging service company B provides a charging device Ca to a user A for the user A to charge the mobile phone Ma.
  • the user A installs the charging authentication application provided by the charging service company B on the mobile phone Ma in advance, and the charging authentication application is used in conjunction with the charging device Ca, and can send charging authentication information to the charging device Ca during operation, for the charging device Ca to identify the mobile phone Ma Or verification of charging permissions.
  • the charging authentication application is in an operating state.
  • the mobile phone Ma detects the charging device Ca and reads the WiFi identification information (for example, SSID (Service Set Identifier) and MAC address) of the charging device Ca. Subsequently, the mobile phone Ma connects the WiFi hotspot provided by the charging device Ca according to the WiFi identification information, and establishes a WiFi wireless connection between the mobile phone Ma and the charging device Ca.
  • the mobile phone Ma reads the Bluetooth identification information of the charging device Ca, and establishes a Bluetooth wireless connection between the mobile phone Ma and the charging device Ca based on the Bluetooth identification information.
  • the user A operates the charging authentication application, and sends charging authentication information to the charging device Ca, the charging authentication information including the charging authority of the corresponding account of the user A in the charging authentication application.
  • the charging device Ca authenticates the charging authority of the user A.
  • the charging authority corresponding to the charging authentication information is “right to charge”
  • the charging device Ca closes the discharging circuit between the user and the mobile phone Ma to charge the mobile phone Ma.
  • the charging authentication information sent by the charging authentication application to the charging device Ca includes “installed charging authentication application”.
  • the charging authentication information includes a previously agreed message “app installed”, and when the charging device Ca detects the charging authentication.
  • the information that is, the closed discharge circuit, charges the mobile phone Ma.
  • the method further includes step S13.
  • step S13 the user equipment acquires device identification information of the charging device based on the USB connection between the user equipment and the charging device; in step S11, the user equipment is based on the device identification information acquired in step S13.
  • the charging authentication information is sent to the charging device by the application in the user equipment.
  • the user equipment is connected to the charging device via a USB communication cable, and the user equipment reads the device identification information of the charging device for distinguishing from other charging devices through the USB communication cable; subsequently, the user device passes the installed application,
  • the charging authentication information for charging authentication is transmitted to the charging device by wired or wireless communication based on the acquired device identification information.
  • a charging service company B provides a charging device Ca to a user A for the user A to charge the mobile phone Ma.
  • the user A installs the charging authentication application provided by the charging service company B on the mobile phone Ma in advance, and the charging authentication application is used in conjunction with the charging device Ca, and can send charging authentication information to the charging device Ca during operation, for the charging device Ca to identify the mobile phone Ma Or verification of charging permissions.
  • the charging authentication application is in an operating state. After the charging device Ca and the mobile phone Ma are connected by the USB cable, the mobile phone Ma detects the charging device Ca and reads the network address of the charging device Ca in the wireless local area network.
  • the user A operates the charging authentication application, and sends the charging authentication information to the network address corresponding to the charging device Ca through the charging authentication application, where the charging authentication information includes the charging authority of the corresponding account of the user A in the charging authentication application.
  • the charging device Ca authenticates the charging authority of the user A. When the charging authority corresponding to the charging authentication information is “right to charge”, the charging device Ca closes the discharging circuit between the user and the mobile phone Ma to charge the mobile phone Ma.
  • the charging authentication information sent by the charging authentication application to the charging device Ca includes “installed charging authentication application”.
  • the charging authentication information includes a previously agreed message “app installed”, and when the charging device Ca detects the charging authentication.
  • the information that is, the closed discharge circuit, charges the mobile phone Ma.
  • the mobile phone Ma transmits charging authentication information to the charging device Ca through the mobile communication network, and the process is similar to the above, and will not be described again.
  • the method further includes step S14.
  • step S14 the user equipment generates charging authentication information by using the application in the user equipment; in step S11, the user equipment transmits the charging authentication information generated in step S14 to the charging device through the application.
  • the charging authentication application installed on the user equipment generates fixed, pre-agreed charging authentication information, for example, including a contract character string, and sends the charging string to the charging device, and the charging device detects the charging authentication information.
  • the charging device charges the user equipment; for example, the user equipment generates the authentication information in real time and sends the authentication information to the charging device, and the charging device verifies the verification device, and the charging device closes the discharge circuit, and the charging device pairs the user equipment. Charge it.
  • a charging service company B provides a charging device Ca to a user A for the user A to charge the mobile phone Ma.
  • the user A installs the charging authentication application provided by the charging service company B on the mobile phone Ma in advance, and the charging authentication application is used in conjunction with the charging device Ca, and can send charging authentication information to the charging device Ca during operation, for the charging device Ca to identify the mobile phone Ma Or verification of charging permissions.
  • the charging device Ca and the mobile phone Ma are connected by a USB cable.
  • the charging certificate application is running.
  • the user A operates the charging authentication application, and sends charging authentication information to the charging device Ca, where the charging authentication information includes charging authority of the corresponding account of the user A in the charging authentication application, and the permission may be returned by the cloud server after sending the query request to the cloud server.
  • Mobile phone Ma Mobile phone Ma.
  • the charging device Ca authenticates the charging authority of the user A. When the charging authority corresponding to the charging authentication information is “right to charge”, the charging device Ca closes the discharging circuit between the user and the mobile phone Ma to charge the mobile phone Ma.
  • the charging authentication information sent by the charging authentication application to the charging device Ca includes “installed charging authentication application”.
  • the charging authentication information includes a previously agreed message “app installed”, and when the charging device Ca detects the charging authentication.
  • the information that is, the closed discharge circuit, charges the mobile phone Ma.
  • the user A obtains the charging authorization by scanning the two-dimensional code by using the mobile phone Ma in the charging authentication application, and the charging authentication application sends the charging authentication information to the charging device Ca according to the scanned two-dimensional code information, and the charging device Ca pairs After the charging authentication information is verified, the discharge circuit is closed to charge the mobile phone Ma.
  • the method further includes step S15.
  • step S15 the user equipment performs security authentication on the charging device through the application in the user equipment; in step S11, when the charging device passes the security authentication in step S15, the user equipment sends the charging device to the charging device through the application. Charging certification information.
  • a charging service company B provides a charging device Ca to a user A for the user A to charge the mobile phone Ma.
  • the user A installs the charging authentication application provided by the charging service company B on the mobile phone Ma in advance, and the charging authentication application is used in conjunction with the charging device Ca, and can send charging authentication information to the charging device Ca during operation, for the charging device Ca to identify the mobile phone Ma Or verification of charging permissions.
  • the charging certificate application is running.
  • the mobile phone Ma Before transmitting the charging authentication information, the mobile phone Ma performs safety authentication on the charging device Ca through the charging authentication application. For example, after establishing a communication connection between the mobile phone Ma and the charging device Ca, the charging authentication application in the mobile phone Ma sends a security authentication request to the charging device.
  • the security authentication request includes a random number
  • the charging device Ca performs encryption calculation based on the random number and the encryption algorithm, and returns the ciphertext to the charging authentication application, and the charging authentication application uses the same algorithm to the random number.
  • the encryption calculation is performed, and the result is compared with the ciphertext returned by the charging device Ca. If the two are the same, the security authentication passes, otherwise it does not pass.
  • security authentication can also be performed based on digital certificates, encryption chips, asymmetric passwords, and the like.
  • the charging authentication application passes the safety authentication of the charging device
  • the user A operates the charging authentication application, and sends charging authentication information to the charging device Ca
  • the charging authentication information includes the charging authority of the corresponding account of the user A in the charging authentication application.
  • the charging device Ca authenticates the charging authority of the user A.
  • the charging authority corresponding to the charging authentication information is “right to charge”
  • the charging device Ca closes the discharging circuit between the user and the mobile phone Ma to charge the mobile phone Ma.
  • the charging authentication information sent by the charging authentication application to the charging device Ca includes “installed charging authentication application”.
  • the charging authentication information includes a previously agreed message “app installed”, and when the charging device Ca detects the charging authentication.
  • the information that is, the closed discharge circuit, charges the mobile phone Ma.
  • the discharge circuit between the user equipment and the charging device may include a wired charging interface or a wireless charging module.
  • the mobile phone Ma is connected to the USB charging interface of the charging device Ca through a USB charging cable and charged; or the charging device Ca provides a wireless charging transmitting module, and the mobile phone Ma is charged by the corresponding wireless charging receiving module.
  • the charging device may comprise a cable, for example by means of a power converter, for example the charging device Ca is a charging base or a fixed charging cabinet; it may also comprise a battery, for example the charging device Ca is a "charging treasure", ie a mobile power source.
  • a method for charging a user equipment at a charging device end comprising steps S21, S22, and S23.
  • step S21 the charging device acquires the charging authentication information provided by the application in the user equipment;
  • step S22 the charging device verifies the application according to the charging authentication information;
  • step S23 when the application passes the verification, A discharge circuit between the charging device and the user equipment is closed to charge the user equipment.
  • the charging device acquires the charging authentication information provided by the application in the user equipment, and the charging device needs to first receive the charging authentication information sent by the user equipment before charging the user equipment through the discharging circuit.
  • the charging authentication information may be generated in advance by a charging authentication application installed on the user equipment, for example, including a contract character string; or may be generated in real time by the charging authentication application.
  • step S22 the charging device verifies the application according to the charging authentication information, that after the charging device receives the charging authentication information sent by the charging authentication application in step S21, the charging device performs the charging authentication information according to the corresponding rule. Verification, thereby verifying the charging authentication application that sent the charging authentication information. For example, according to the verification rule, when the charging authentication information includes the agreed character string and the charging authentication information passes the verification, the charging device detects whether the charging authentication information includes the agreed character string; and, for example, according to the verification rule, the charging authentication information is When the charging authentication application is generated in real time, the charging device generates comparison information according to the same algorithm and compares it with the charging authentication information.
  • the charging authentication information is verified; for example, after the charging authentication device processes the charging authentication information, When the specific content is extracted therefrom, the charging authentication information is verified, for example, the charging authentication information is encrypted, and the charging device first decrypts the charging authentication information after receiving the charging authentication information.
  • the charging authentication application is also verified accordingly.
  • the charging authentication information may be determined by the charging authentication application according to the authority corresponding to the user application account, or may be determined by the installation state of the charging authentication application on the current user equipment, and may also be performed by the user equipment through Bluetooth communication or Near Field Communication (NFC). Acquisition by mobile data communication, wireless local area network communication, etc.; and the user equipment sends charging authentication information to the charging device, and may also be based on a communication cable (eg, a USB cable), Bluetooth communication, near field communication, mobile data communication (eg, based on 3G) /4G network), wireless LAN communication and other communication methods.
  • a communication cable eg, a USB cable
  • Bluetooth communication e.g, near field communication
  • mobile data communication eg, based on 3G) /4G network
  • wireless LAN communication e.g, Wi-Fi
  • step S23 when the application (eg, the charging authentication application) passes verification, the charging device closes the discharge circuit between it and the user equipment to charge the user equipment.
  • the application eg. the charging authentication application
  • a charging service company B provides a charging device Ca to a user A for the user A to charge the mobile phone Ma.
  • the user A installs the charging authentication application provided by the charging service company B on the mobile phone Ma in advance, and the charging authentication application is used in conjunction with the charging device Ca, and can send charging authentication information to the charging device Ca during operation, for the charging device Ca to identify the mobile phone Ma Or verification of charging permissions.
  • the charging certificate application is running.
  • the user A operates the charging authentication application and sends charging authentication information to the charging device Ca, the charging authentication information including the charging authority of the corresponding account of the user A in the charging authentication application.
  • the charging device Ca authenticates the charging authority of the user A.
  • the charging authentication information and the charging authentication application pass the verification, and the charging device Ca closes the discharge between the charging device and the mobile phone Ma.
  • the circuit charges the mobile phone Ma.
  • the charging authentication information is encrypted and sent to the charging device Ca.
  • the charging device Ca decrypts the charging authentication information according to the decryption algorithm corresponding to the encryption algorithm, and reads the charging authority of the user as “right to charge”, then charging the authentication information and charging.
  • the authentication application passes the verification, and the charging device Ca closes the discharge circuit to charge the mobile phone Ma.
  • the charging authentication information sent by the charging authentication application to the charging device Ca includes a previously agreed message “Installed charging authentication application” or “app installed”, and when the charging device Ca detects the charging authentication information, the charging authentication information is charged. And the charging certification application passes the verification, and the charging device Ca, that is, the closed discharge circuit, charges the mobile phone Ma.
  • the charging authentication application After the serial number of the charging device is input into the charging authentication application, the charging authentication application generates charging authentication information based on the serial number; the charging device Ca also generates comparison information based on the same generation algorithm according to the serial number, and compares the comparison information. Compared with the charging authentication information, when the two are consistent, the charging authentication information and the charging authentication application pass the verification, and the charging device Ca closes the discharging circuit to charge the mobile phone Ma.
  • the discharge circuit between the user equipment and the charging device may include a wired charging interface or a wireless charging module.
  • the mobile phone Ma is connected to the USB charging interface of the charging device Ca through a USB charging cable and charged; or the charging device Ca provides a wireless charging transmitting module, and the mobile phone Ma is charged by the corresponding wireless charging receiving module.
  • the charging device may comprise a cable, for example by means of a power converter, for example the charging device Ca is a charging base or a fixed charging cabinet; it may also comprise a battery, for example the charging device Ca is a "charging treasure", ie a mobile power source.
  • the method further comprises a step S24 (not shown).
  • step S24 when the application (eg, charge authentication application) fails verification, the discharge circuit is turned off to stop charging the user equipment.
  • the charging device closes the discharge circuit to charge the user equipment, and receives the charging authentication information sent by the charging authentication application installed on the user equipment, and the charging authentication information is not verified by the charging device, for example, does not include the appointment string,
  • the comparison information calculated by the charging device according to the same algorithm does not coincide with the charging authentication information, the charging authentication information is decrypted, and the specific content is not extracted, the discharging circuit is turned off, and charging of the user equipment is stopped.
  • the charging device can charge a certain amount of power, and then the discharge circuit is kept closed or the discharge circuit is turned off according to the verification result of the charging authentication information.
  • a charging service company B provides a charging device Ca to a user A for the user A to charge the mobile phone Ma.
  • the user A installs the charging authentication application provided by the charging service company B on the mobile phone Ma in advance, and the charging authentication application is used in conjunction with the charging device Ca, and can send charging authentication information to the charging device Ca during operation, for the charging device Ca to identify the mobile phone Ma Or verification of charging permissions.
  • the charging device Ca is connected to the mobile phone Ma via a charging cable, and the discharging circuit between the charging device Ca and the mobile phone Ma is in a closed state, and the charging device Ca charges the mobile phone Ma through the discharging circuit.
  • the mobile phone Ma has been shut down due to insufficient power, unable to run the charging authentication application, and is unable to send charging authentication information to the charging device Ca through the charging authentication application.
  • User A activates the mobile phone Ma and runs the charging authentication application.
  • the user A operates the charging authentication application, and sends charging authentication information to the charging device Ca, the charging authentication information including the charging authority of the corresponding account of the user A in the charging authentication application.
  • the charging device Ca authenticates the charging authority of the user A.
  • the charging authority corresponding to the charging authentication information is “entitled to charge”
  • the charging authentication information and the charging authentication application pass the verification.
  • the charging authentication information is encrypted and sent to the charging device Ca.
  • the charging device Ca decrypts the charging authentication information according to the decryption algorithm corresponding to the encryption algorithm, and reads the charging authority of the user as “right to charge”, then charging the authentication information and charging.
  • the certification application is verified.
  • the charging authentication information sent by the charging authentication application to the charging device Ca includes a previously agreed message “Installed charging authentication application” or “app installed”, and when the charging device Ca detects the charging authentication information, the charging authentication information is charged. And the charging certification application is verified.
  • the charging authentication application After the serial number of the charging device is input into the charging authentication application, the charging authentication application generates charging authentication information based on the serial number; the charging device Ca also generates comparison information based on the same generation algorithm according to the serial number, and compares the comparison information. Compared with the charging authentication information, when the two are consistent, the charging authentication information and the charging authentication application pass the verification.
  • the charging device Ca disconnects the discharging circuit, and the charging device Ca stops charging the mobile phone Ma.
  • the discharge circuit between the user equipment and the charging device may include a wired charging interface or a wireless charging module.
  • the mobile phone Ma is connected to the USB charging interface of the charging device Ca through a USB charging cable and charged; or the charging device Ca provides a wireless charging transmitting module, and the mobile phone Ma is charged by the corresponding wireless charging receiving module.
  • the charging device may comprise a cable, for example by means of a power converter, for example the charging device Ca is a charging base or a fixed charging cabinet; it may also comprise a battery, for example the charging device Ca is a "charging treasure", ie a mobile power source.
  • step S24 when the application fails verification and the charging duration of the user equipment exceeds a predetermined charging duration threshold, the discharging circuit is turned off to stop the user
  • the device is charged. For example, after detecting that the user equipment is connected, the charging device closes the discharge circuit and charges the user equipment; but, within a predetermined charging duration, does not receive the charging authentication information sent by the charging authentication application, or the charging authentication information sent by the charging authentication application. Failure to pass the verification of the charging device, the charging device disconnects the discharging circuit to stop charging the user equipment.
  • the charging device closes the discharge circuit in an initial state, and charges the user equipment after detecting that the user equipment is accessed; but does not receive the charging authentication information sent by the charging authentication application or the charging authentication application within a predetermined charging duration.
  • the sent charging authentication information fails to be verified by the charging device, and the charging device disconnects the discharging circuit to stop charging the user equipment; the user equipment is disconnected, the discharging circuit is closed, and the next connection is awaited.
  • the charging device can charge a certain amount of power, and then the discharge circuit is kept closed or the discharge circuit is turned off according to the verification result of the charging authentication information.
  • a charging service company B provides a charging device Ca to a user A for the user A to charge the mobile phone Ma.
  • the user A installs the charging authentication application provided by the charging service company B on the mobile phone Ma in advance, and the charging authentication application is used in conjunction with the charging device Ca, and can send charging authentication information to the charging device Ca during operation, for the charging device Ca to identify the mobile phone Ma Or verification of charging permissions.
  • the charging device Ca is connected to the mobile phone Ma via a charging cable, and the discharging circuit between the charging device Ca and the mobile phone Ma is in a closed state, and the charging device Ca charges the mobile phone Ma through the discharging circuit.
  • the mobile phone Ma has been shut down due to insufficient power, unable to run the charging authentication application, and is unable to send charging authentication information to the charging device Ca through the charging authentication application.
  • User A activates the mobile phone Ma and runs the charging authentication application.
  • the user A operates the charging authentication application, and sends charging authentication information to the charging device Ca, the charging authentication information including the charging authority of the corresponding account of the user A in the charging authentication application.
  • the charging device Ca authenticates the charging authority of the user A.
  • the charging authority corresponding to the charging authentication information is “right to charge”
  • the charging authentication information and the charging authentication application pass the verification, otherwise the verification is not passed.
  • the charging authentication information is encrypted and sent to the charging device Ca.
  • the charging device Ca decrypts the charging authentication information according to the decryption algorithm corresponding to the encryption algorithm, and reads the charging authority of the user as “right to charge”, then charging the authentication information and charging.
  • the authentication application passed the verification, otherwise it failed the verification.
  • the charging authentication information sent by the charging authentication application to the charging device Ca includes a previously agreed message “Installed charging authentication application” or “app installed”, and when the charging device Ca detects the charging authentication information, the charging authentication information is charged.
  • the charging certification application passed the verification, otherwise it failed the verification.
  • the charging authentication application after the serial number of the charging device is input into the charging authentication application, the charging authentication application generates charging authentication information based on the serial number; the charging device Ca also generates comparison information based on the same generation algorithm according to the serial number, and compares the comparison information. Compared with the charging authentication information, when the two are consistent, the charging authentication information and the charging authentication application pass the verification, otherwise the verification is not passed.
  • the charging device Ca disconnects the discharging circuit. On, the charging device Ca stops charging the mobile phone Ma.
  • the discharge circuit between the user equipment and the charging device may include a wired charging interface or a wireless charging module.
  • the mobile phone Ma is connected to the USB charging interface of the charging device Ca through a USB charging cable and charged; or the charging device Ca provides a wireless charging transmitting module, and the mobile phone Ma is charged by the corresponding wireless charging receiving module.
  • the charging device may comprise a cable, for example by means of a power converter, for example the charging device Ca is a charging base or a fixed charging cabinet; it may also comprise a battery, for example the charging device Ca is a "charging treasure", ie a mobile power source.
  • a method for controlling a charging device comprising a step S31 (not shown).
  • the user equipment transmits charging authentication information to the charging device through the application in the user device, wherein the charging authentication information is used to close the discharging circuit of the charging device to externally charge.
  • the charging device needs to first receive the charging authentication information sent by the user equipment before the closed discharge circuit is externally charged, and the charging authentication information is sent to the charging device by the charging authentication application installed on the user equipment; the charging device adds the charging authentication information to the charging device. The verification is performed, and when the charging authentication information is verified, the charging device closes the discharging circuit to charge the external device.
  • the external device includes, but is not limited to, a user device that sends charging authentication information, and other devices than the user device.
  • the charging authentication information may be determined by the charging authentication application according to the authority corresponding to the user application account, or may be determined by the installation state of the charging authentication application on the current user equipment, and may also be performed by the user equipment through Bluetooth communication, Near Field Communication (NFC), and mobile. Data communication, wireless local area network communication, etc. are acquired; and the user equipment sends charging authentication information to the charging device, and may also be based on a communication cable (eg, a USB cable), Bluetooth communication, near field communication, mobile data communication (eg, based on 3G/4G) Communication methods such as network) and wireless LAN communication.
  • a charging service company B provides a charging device Ca to a user A for the user A to charge his mobile phone Ma.
  • User A connects his mobile phone Ma with the charging device Ca through a charging cable.
  • the user C installs the charging authentication application provided by the charging service company B on the mobile phone Mb in advance, and the charging authentication application is used in conjunction with the charging device Ca, and can transmit charging authentication information to the charging device Ca during operation, for the charging device Ca to the user C
  • the mobile phone Mb verifies the identity or charging authority.
  • the charging authentication application on the user's mobile phone Mb is in operation.
  • the user C operates the charging authentication application to send charging authentication information to the charging device Ca by means of NFC communication, and the charging authentication information includes the charging authority of the corresponding account of the user C in the charging authentication application.
  • the charging device Ca authenticates the charging authority of the user C.
  • the charging device Ca closes the discharging circuit between the user and the mobile phone Ma of the user A, and the mobile phone of the user A Ma is charging.
  • the charging authentication information sent by the charging authentication application to the charging device Ca includes “installed charging authentication application”.
  • the charging authentication information includes a previously agreed message “app installed”, and when the charging device Ca detects the charging authentication. The information, that is, the closed discharge circuit charges the user's mobile phone Ma.
  • the discharge circuit between the user equipment and the charging device may include a wired charging interface or a wireless charging module.
  • the mobile phone Ma is connected to the USB charging interface of the charging device Ca through a USB charging cable and charged; or the charging device Ca provides a wireless charging transmitting module, and the mobile phone Ma is charged by the corresponding wireless charging receiving module.
  • the charging device may comprise a cable, for example by means of a power converter, for example the charging device Ca is a charging base or a fixed charging cabinet; it may also comprise a battery, for example the charging device Ca is a "charging treasure", ie a mobile power source.
  • an apparatus for charging a user equipment by a charging device comprising:
  • a memory arranged to store computer executable instructions that, when executed, cause the processor to:
  • the charging authentication information is used to close a discharging circuit between the charging device and the user equipment to charge the user equipment.
  • a charging apparatus for charging a user equipment includes:
  • a memory arranged to store computer executable instructions that, when executed, cause the processor to:
  • the discharge circuit between the charging device and the user equipment is closed to charge the user equipment.
  • an apparatus for controlling a charging apparatus comprising:
  • a memory arranged to store computer executable instructions that, when executed, cause the processor to:
  • the charging authentication information is sent to the charging device by the application in the user equipment, wherein the charging authentication information is used to close the discharging circuit of the charging device to externally charge.
  • a computer readable medium comprising instructions that, when executed, cause a system to:
  • the charging authentication information is used to close a discharging circuit between the charging device and the user equipment to charge the user equipment.
  • a computer readable medium comprising instructions that, when executed, cause a system to:
  • the discharge circuit between the charging device and the user equipment is closed to charge the user equipment.
  • a computer readable medium comprising instructions that, when executed, cause a system to:
  • the charging authentication information is sent to the charging device by the application in the user equipment, wherein the charging authentication information is used to close the discharging circuit of the charging device to externally charge.
  • the present application can be implemented in software and/or a combination of software and hardware, for example, using an application specific integrated circuit (ASIC), a general purpose computer, or any other similar hardware device.
  • the software program of the present application can be executed by a processor to implement the steps or functions described above.
  • the software programs (including related data structures) of the present application can be stored in a computer readable recording medium such as a RAM memory, a magnetic or optical drive or a floppy disk and the like.
  • some of the steps or functions of the present application may be implemented in hardware, for example, as a circuit that cooperates with a processor to perform various steps or functions.
  • a portion of the present application can be applied as a computer program product, such as computer program instructions, which, when executed by a computer, can invoke or provide a method and/or technical solution in accordance with the present application.
  • the form of computer program instructions in a computer readable medium includes, but is not limited to, source files, executable files, installation package files, etc., accordingly, the manner in which the computer program instructions are executed by the computer includes but not Limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding installation. program.
  • the computer readable medium can be any available computer readable storage medium or communication medium that can be accessed by a computer.
  • Communication media includes media that conveys communication signals, e.g., computer readable instructions, data structures, program modules or other data, from one system to another.
  • Communication media can include conductive transmission media such as cables and wires (eg, fiber optics, coaxial, etc.) and wireless (unguided transmission) media capable of propagating energy waves, such as acoustic, electromagnetic, RF, microwave, and infrared.
  • Computer readable instructions, data structures, program modules or other data may be embodied, for example, as modulated data signals in a wireless medium, such as a carrier wave or a similar mechanism, such as embodied in a portion of a spread spectrum technique.
  • modulated data signal refers to a signal whose one or more features are altered or set in such a manner as to encode information in the signal. Modulation can be analog, digital or hybrid modulation techniques.
  • the computer readable storage medium may comprise, by way of example and not limitation, vols and non-volatile, implemented in any method or technology for storing information such as computer readable instructions, data structures, program modules or other data.
  • a computer readable storage medium includes, but is not limited to, volatile memory such as random access memory (RAM, DRAM, SRAM); and nonvolatile memory such as flash memory, various read only memories (ROM, PROM, EPROM) , EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disks, tapes, CDs, DVDs); or other currently known media or later developed for storage in computer systems Computer readable information/data used.
  • volatile memory such as random access memory (RAM, DRAM, SRAM)
  • nonvolatile memory such as flash memory, various read only memories (ROM, PROM, EPROM) , EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disk
  • an embodiment in accordance with the present application includes a device including a memory for storing computer program instructions and a processor for executing program instructions, wherein when the computer program instructions are executed by the processor, triggering
  • the apparatus operates based on the aforementioned methods and/or technical solutions in accordance with various embodiments of the present application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Charge And Discharge Circuits For Batteries Or The Like (AREA)
  • Telephone Function (AREA)

Abstract

一种用于通过充电装置对用户设备进行充电的方法,该方法包括:用户设备通过所述用户设备中应用向充电装置发送充电认证信息(S11);所述充电装置获取所述应用所提供的充电认证信息(S21);所述充电装置根据所述充电认证信息对所述应用进行验证(S22);当所述应用通过验证,所述充电装置闭合所述充电装置与所述用户设备间的放电电路以对所述用户设备进行充电(S23)。通过将充电认证信息由用户设备传输至充电装置,并由充电装置基于该充电认证信息对充电认证信息进行验证,实现了对用户充电权限的验证,以及对电源输出的控制和管理。

Description

一种通过充电装置对用户设备进行充电的方法与设备 技术领域
本申请涉及通信领域,尤其涉及一种控制充电装置和用于通过充电装置对用户设备进行充电的技术。
背景技术
随着人们生活水平的不断提高,便携电子产品被广泛使用,甚至已成为生活中不可缺少的物品,例如移动电话、平板电脑、MP3播放器等。这些设备的功能不断增强,但是通常内置电池的容量却有限,很容易出现电量不足的情况,在移动使用中不方便寻找固定电源进行充电。随身携带移动电源(或称充电宝),又会增加负担。
目前所用充电机柜,成本高昂;而用户通过扫码方式获取充电宝存放柜内存放的充电宝,充电宝脱离柜体后不再受控,可任意使用,尤其是在服务提供方直接将充电宝提供给用户使用的情况下。
发明内容
本申请的一个目的是提供一种通过充电装置对用户设备进行充电的方法。
根据本申请的一个方面,提供了一种在用户设备端用于通过充电装置对用户设备进行充电的方法,该方法包括:
通过用户设备中应用向充电装置发送充电认证信息;
其中,所述充电认证信息用于闭合所述充电装置与所述用户设备间的放电电路以对所述用户设备进行充电。
根据本申请的另一个方面,提供了一种在充电装置端用于对用户设备进行充电的方法,该方法包括:
获取用户设备中应用所提供的充电认证信息;
根据所述充电认证信息对所述应用进行验证;
当所述应用通过验证,闭合充电装置与所述用户设备间的放电电路以对 所述用户设备进行充电。
根据本申请的又一个方面,提供了一种用于控制充电装置的方法,该方法包括:
通过用户设备中应用向充电装置发送充电认证信息,其中,所述充电认证信息用于闭合所述充电装置的放电电路以对外充电。
根据本申请的再一个方面,提供了一种用于通过充电装置对用户设备进行充电的方法,该方法包括:
用户设备通过所述用户设备中应用向充电装置发送充电认证信息;
所述充电装置获取所述应用所提供的充电认证信息;
所述充电装置根据所述充电认证信息对所述应用进行验证;
当所述应用通过验证,所述充电装置闭合所述充电装置与所述用户设备间的放电电路以对所述用户设备进行充电。
根据本申请的一个方面,提供了一种用于通过充电装置对用户设备进行充电的设备,该设备包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:
通过用户设备中应用向充电装置发送充电认证信息;
其中,所述充电认证信息用于闭合所述充电装置与所述用户设备间的放电电路以对所述用户设备进行充电。
根据本申请的另一个方面,提供了一种用于对用户设备进行充电的充电装置,该充电装置包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:
获取用户设备中应用所提供的充电认证信息;
根据所述充电认证信息对所述应用进行验证;
当所述应用通过验证,闭合充电装置与所述用户设备间的放电电路以对所述用户设备进行充电。
根据本申请的又一个方面,提供了一种用于控制充电装置的设备,该设备包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:
通过用户设备中应用向充电装置发送充电认证信息,其中,所述充电认证信息用于闭合所述充电装置的放电电路以对外充电。
根据本申请的一个方面,提供了一种包括指令的计算机可读介质,所述指令在被执行时使得系统:
通过用户设备中应用向充电装置发送充电认证信息;
其中,所述充电认证信息用于闭合所述充电装置与所述用户设备间的放电电路以对所述用户设备进行充电。
根据本申请的另一个方面,提供了一种包括指令的计算机可读介质,所述指令在被执行时使得系统:
获取用户设备中应用所提供的充电认证信息;
根据所述充电认证信息对所述应用进行验证;
当所述应用通过验证,闭合充电装置与所述用户设备间的放电电路以对所述用户设备进行充电。
根据本申请的又一个方面,提供了一种包括指令的计算机可读介质,所述指令在被执行时使得系统:
通过用户设备中应用向充电装置发送充电认证信息,其中,所述充电认证信息用于闭合所述充电装置的放电电路以对外充电。
与现有技术相比,本申请通过将充电认证信息由用户设备传输至充电装置,并由充电装置基于该充电认证信息对充电认证信息进行验证,实现了对用户充电权限的验证,以及对电源输出的控制和管理。
附图说明
通过阅读参照以下附图所作的对非限制性实施例所作的详细描述,本申请的其它特征、目的和优点将会变得更明显:
图1示出根据本申请一个实施例的一种在用户设备端用于通过充电装置对用户设备进行充电的方法流程图;
图2示出图1中方法一个步骤的子步骤流程图;
图3示出根据本申请另一个实施例的一种在用户设备端用于通过充电装置对用户设备进行充电的方法流程图;
图4示出根据本申请又一个实施例的一种在用户设备端用于通过充电装置对用户设备进行充电的方法流程图;
图5示出根据本申请再一个实施例的一种在用户设备端用于通过充电装置对用户设备进行充电的方法流程图;
图6示出根据本申请一个实施例的一种用于通过充电装置对用户设备进行充电的方法流程图;
图7示出根据本申请一个实施例的一种在充电装置端用于对用户设备进行充电的方法流程图;
附图中相同或相似的附图标记代表相同或相似的部件。
具体实施方式
下面结合附图对本申请作进一步详细描述。
在本申请一个典型的配置中,终端、服务网络的设备和可信方均包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒 式磁带,磁带磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。
本申请所指设备包括但不限于用户设备、网络设备、或用户设备与网络设备通过网络相集成所构成的设备。所述用户设备包括但不限于任何一种可与用户进行人机交互(例如通过触摸板进行人机交互)的移动电子产品,例如智能手机、平板电脑等,所述移动电子产品可以采用任意操作系统,如android操作系统、iOS操作系统等。其中,所述网络设备包括一种能够按照事先设定或存储的指令,自动进行数值计算和信息处理的电子设备,其硬件包括但不限于微处理器、专用集成电路(ASIC)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、数字信号处理器(DSP)、嵌入式设备等。所述网络设备包括但不限于计算机、网络主机、单个网络服务器、多个网络服务器集或多个服务器构成的云;在此,云由基于云计算(Cloud Computing)的大量计算机或网络服务器构成,其中,云计算是分布式计算的一种,由一群松散耦合的计算机集组成的一个虚拟超级计算机。所述网络包括但不限于互联网、广域网、城域网、局域网、VPN网络、无线自组织网络(Ad Hoc网络)等。优选地,所述设备还可以是运行于所述用户设备、网络设备、或用户设备与网络设备、网络设备、触摸终端或网络设备与触摸终端通过网络相集成所构成的设备上的程序。
当然,本领域技术人员应能理解上述设备仅为举例,其他现有的或今后可能出现的设备如可适用于本申请,也应包含在本申请保护范围以内,并在此以引用方式包含于此。
在本申请的描述中,“多个”的含义是两个或者更多,除非另有明确具体的限定。
根据本申请的一个方面,提供了一种在用户设备端用于通过充电装置对用户设备进行充电的方法,该方法包括步骤S11。在步骤S11中,用户设备通过安装在该用户设备中的应用向充电装置发送充电认证信息;其中,所述充电认证信息用于闭合所述充电装置与所述用户设备间的放电电路以对所述用户设备进行充电。
参考图6,具体而言,在步骤S11中,用户设备通过安装在该用户设 备中的应用向充电装置发送充电认证信息是指,充电装置在通过放电电路对用户设备充电之前,需要首先接收该用户设备发送的充电认证信息,该充电认证信息由安装于用户设备上的充电认证应用向充电装置发送;充电装置对该充电认证信息进行验证,当该充电认证信息通过验证,充电装置闭合放电电路,对该用户设备充电。充电认证信息可由充电认证应用根据用户应用账号对应的权限确定,也可由当前用户设备上充电认证应用的安装状态确定,还可由用户设备通过蓝牙通信、近场通信(NFC,Near Field Communication)、移动数据通信、无线局域网通信等方式获取;而用户设备向充电装置发送充电认证信息,也可基于通信线缆(例如USB连接线)、蓝牙通信、近场通信、移动数据通信(例如基于3G/4G网络)、无线局域网通信等通信方式进行。
当然,本领域技术人员应能理解,上述通信方式仅为举例,其他现有的或今后可能出现的通信方式如可适用于本申请,也应包含在本申请保护范围以内,并在此以引用方式包含于此。
例如,某充电服务公司乙向某用户甲提供充电装置Ca,供用户甲给手机Ma充电。用户甲事先在手机Ma上安装充电服务公司乙提供的充电认证应用,该充电认证应用与充电装置Ca配套使用,运行时可向充电装置Ca发送充电认证信息,供充电装置Ca对手机Ma进行身份或充电权限的验证。充电认证应用处于运行状态。用户甲操作充电认证应用,向充电装置Ca发送充电认证信息,该充电认证信息包含用户甲在充电认证应用中对应账号的充电权限。充电装置Ca对用户甲的充电权限进行鉴别,当充电认证信息对应的充电权限为“有权充电”,则充电装置Ca闭合其与手机Ma之间的放电电路,对手机Ma进行充电。又例如,充电认证应用向充电装置Ca发送的充电认证信息中,包含“已安装充电认证应用”,例如充电认证信息中包含事先约定的消息“app installed”,当充电装置Ca检测到该充电认证信息,即闭合放电电路对手机Ma充电。
其中,用户设备与充电装置之间的放电电路可包含有线充电接口或无线充电模块。例如,手机Ma通过USB充电线缆连接充电装置Ca的USB充电接口并充电;或充电装置Ca提供无线充电发射模块,手机Ma通过 相应的无线充电接收模块进行充电。充电装置可包括线缆,例如通过电源转换器供电,例如充电装置Ca为充电底座或固定的充电柜;也可包括蓄电池,例如充电装置Ca为“充电宝”即移动电源(Mobile Power Pack,MPP)。
优选地,参考图1,该方法还包括步骤S12。在步骤S12中,用户设备首先建立其与充电装置的通信连接;随后,在步骤S11中,用户设备通过所述用户设备中应用并经由所述通信连接向从所述充电装置发送充电认证信息。
具体而言,在步骤S12中,用户设备建立其与充电装置的通信连接,例如,用户设备与充电装置通过通信线缆(例如USB连接线)、蓝牙通信、近场通信、移动数据通信(例如基于3G/4G网络)、无线局域网通信等方式相互连接,并基于约定的通信协议建立通信连接;在步骤S11中,用户设备通过安装在该用户设备中的应用,经由在步骤S12中建立的通信连接,向充电装置发送充电认证信息。
例如,某充电服务公司乙向某用户甲提供充电装置Ca,供用户甲给手机Ma充电。用户甲事先在手机Ma上安装充电服务公司乙提供的充电认证应用,该充电认证应用与充电装置Ca配套使用,运行时可向充电装置Ca发送充电认证信息,供充电装置Ca对手机Ma进行身份或充电权限的验证。
其中,充电装置Ca与手机Ma通过USB线缆连接,充电认证应用处于运行状态。手机Ma检测到充电装置Ca后,基于约定的通信协议,手机Ma通过充电认证应用向充电装置Ca发送通信连接请求,充电装置Ca收到该通信连接请求后相应该通信连接请求,从而充电装置Ca和手机Ma之间的通信连接建立。Libusb是基于用户空间的USB库,设计了一系列外部应用程序接口(API,Application Programming Interface)供应用程序调用。充电认证应用可基于Libusb开发,在充电认证应用中采用Java调用相关接口的方式,通过用户态驱动操作USB总线。当然,充电装置Ca与手机Ma之间的通信也可基于蓝牙通信、近场通信、移动数据通信(例如3G/4G网络)、无线局域网通信等方式相互连接,并基于约定的通信协议建立通信连接。例如,通过手机Ma搜索充电装置Ca提供的WiFi热点 信号或蓝牙信号并建立手机Ma和充电装置Ca之间的无线连接。
用户甲操作充电认证应用,向充电装置Ca发送充电认证信息,该充电认证信息包含用户甲在充电认证应用中对应账号的充电权限。充电装置Ca对用户甲的充电权限进行鉴别,当充电认证信息对应的充电权限为“有权充电”,则充电装置Ca闭合其与手机Ma之间的放电电路,对手机Ma进行充电。又例如,充电认证应用向充电装置Ca发送的充电认证信息中,包含“已安装充电认证应用”,例如充电认证信息中包含事先约定的消息“app installed”,当充电装置Ca检测到该充电认证信息,即闭合放电电路对手机Ma充电。
其中,优选地,在步骤S12中,用户设备向充电装置发送通信连接请求,并接收所述充电装置基于所述通信连接请求返回的通信连接响应,从而建立所述用户设备与所述充电装置的通信连接。例如,用户设备与充电装置通过充电线缆连接并通信,用户设备基于约定的协议向充电装置发送通信连接请求,充电装置接收到该通信连接请求后,向用户设备返回相应的通信连接响应,用户设备与充电装置之间的通信连接建立;在此过程中,充电装置还可根据通信连接请求确定用户设备的用户设备信息,例如设备类型、型号等,用户设备也可根据通信连接响应确定充电装置的充电装置信息,例如序列号等标识信息,或容量、生产厂商等其他信息。又例如,用户设备与充电装置通过蓝牙通信的方式通信,用户设备与充电装置首先进行配对,配对过程中,用户设备向外部设备发送主设备寻呼请求,充电装置则监听主设备寻呼请求,一旦监听到寻呼请求,向外发送从设备寻呼响应,用户设备接收到该从设备寻呼响应,用户设备与充电装置之间即建立ACL链路连接;基于该ACL链路连接,主设备发起RFCOMM连接请求,充电装置响应该RFCOMM连接请求,从而建立用户设备与充电装置之间的蓝牙通信连接。当然,另一方面,也可由充电装置向用户设备发送通信连接请求,在充电装置接收用户设备基于该通信连接请求返回的通信连接响应后,用户设备和充电装置之间的通信连接即被建立,具体过程与上述过程类似,不再赘述,并以引用的方式包含于此。
优选地,在步骤S12中,用户设备基于该用户设备与充电装置间的 USB连接,建立所述用户设备与所述充电装置的通信连接。例如,用户设备与充电装置通过USB线缆相互连接,并基于约定的通信协议建立通信连接。
例如,某充电服务公司乙向某用户甲提供充电装置Ca,供用户甲给手机Ma充电。用户甲事先在手机Ma上安装充电服务公司乙提供的充电认证应用,该充电认证应用与充电装置Ca配套使用,运行时可向充电装置Ca发送充电认证信息,供充电装置Ca对手机Ma进行身份或充电权限的验证。
其中,充电装置Ca与手机Ma通过USB线缆连接,充电认证应用处于运行状态。手机Ma检测到充电装置Ca后,基于约定的通信协议,手机Ma通过充电认证应用向充电装置Ca发送通信连接请求,充电装置Ca收到该通信连接请求后相应该通信连接请求,从而充电装置Ca和手机Ma之间的通信连接建立。Libusb是基于用户空间的USB库,设计了一系列外部应用程序接口(API,Application Programming Interface)供应用程序调用。充电认证应用可基于Libusb开发,在充电认证应用中采用Java调用相关接口的方式,通过用户态驱动操作USB总线。
用户甲操作充电认证应用,向充电装置Ca发送充电认证信息,该充电认证信息包含用户甲在充电认证应用中对应账号的充电权限。充电装置Ca对用户甲的充电权限进行鉴别,当充电认证信息对应的充电权限为“有权充电”,则充电装置Ca闭合其与手机Ma之间的放电电路,对手机Ma进行充电。又例如,充电认证应用向充电装置Ca发送的充电认证信息中,包含“已安装充电认证应用”,例如充电认证信息中包含事先约定的消息“app installed”,当充电装置Ca检测到该充电认证信息,即闭合放电电路对手机Ma充电。
进一步优选地,参考图2,步骤S12包括子步骤S12a和子步骤S12b。在子步骤S12a中,用户设备基于该用户设备与充电装置间的USB连接,获取所述充电装置的装置标识信息;在子步骤S12b中,根据所述充电装置的装置标识信息建立所述用户设备与所述充电装置的通信连接。例如,将用户设备与充电装置通过USB通信线缆相连,用户设备通过USB通信 线缆读取充电装置的用于与其他充电装置相区别的装置标识信息;随后,用户设备根据该装置标识信息,与充电装置建立无线连接。
例如,某充电服务公司乙向某用户甲提供充电装置Ca,供用户甲给手机Ma充电。用户甲事先在手机Ma上安装充电服务公司乙提供的充电认证应用,该充电认证应用与充电装置Ca配套使用,运行时可向充电装置Ca发送充电认证信息,供充电装置Ca对手机Ma进行身份或充电权限的验证。
其中,充电装置Ca与手机Ma通过USB线缆连接后,充电认证应用处于运行状态。手机Ma检测到充电装置Ca,并读取充电装置Ca的WiFi标识信息(例如SSID(Service Set Identifier,服务集标识)和MAC地址)。随后,手机Ma根据该WiFi标识信息连接充电装置Ca所提供的WiFi热点,并建立手机Ma和充电装置Ca之间的WiFi无线连接。当然,也可在充电装置Ca与手机Ma通过USB线缆连接后,手机Ma读取充电装置Ca的蓝牙标识信息,并基于该蓝牙标识信息建立手机Ma和充电装置Ca之间的蓝牙无线连接。
用户甲操作充电认证应用,向充电装置Ca发送充电认证信息,该充电认证信息包含用户甲在充电认证应用中对应账号的充电权限。充电装置Ca对用户甲的充电权限进行鉴别,当充电认证信息对应的充电权限为“有权充电”,则充电装置Ca闭合其与手机Ma之间的放电电路,对手机Ma进行充电。又例如,充电认证应用向充电装置Ca发送的充电认证信息中,包含“已安装充电认证应用”,例如充电认证信息中包含事先约定的消息“app installed”,当充电装置Ca检测到该充电认证信息,即闭合放电电路对手机Ma充电。
优选地,参考图3,该方法还包括步骤S13。在步骤S13中,用户设备基于该用户设备与充电装置间的USB连接,获取所述充电装置的装置标识信息;在步骤S11中,用户设备基于在步骤S13中所获取的所述装置标识信息,通过所述用户设备中应用向所述充电装置发送充电认证信息。例如,将用户设备与充电装置通过USB通信线缆相连,用户设备通过USB通信线缆读取充电装置的用于与其他充电装置相区别的装置标识信息;随 后,用户设备通过所安装的应用,基于所获取的装置标识信息,将用于充电认证的充电认证信息通过有线或无线通信方式发送至充电装置。
例如,某充电服务公司乙向某用户甲提供充电装置Ca,供用户甲给手机Ma充电。用户甲事先在手机Ma上安装充电服务公司乙提供的充电认证应用,该充电认证应用与充电装置Ca配套使用,运行时可向充电装置Ca发送充电认证信息,供充电装置Ca对手机Ma进行身份或充电权限的验证。
其中,充电认证应用处于运行状态。充电装置Ca与手机Ma通过USB线缆连接后,手机Ma检测到充电装置Ca,并读取充电装置Ca在无线局域网中的网络地址。用户甲操作充电认证应用,通过充电认证应用向充电装置Ca对应的网络地址发送充电认证信息,该充电认证信息包含用户甲在充电认证应用中对应账号的充电权限。充电装置Ca对用户甲的充电权限进行鉴别,当充电认证信息对应的充电权限为“有权充电”,则充电装置Ca闭合其与手机Ma之间的放电电路,对手机Ma进行充电。又例如,充电认证应用向充电装置Ca发送的充电认证信息中,包含“已安装充电认证应用”,例如充电认证信息中包含事先约定的消息“app installed”,当充电装置Ca检测到该充电认证信息,即闭合放电电路对手机Ma充电。
又例如,手机Ma通过移动通信网络向充电装置Ca发送充电认证信息,过程与上述类似,不再赘述。
优选地,参考图4,该方法还包括步骤S14。在步骤S14中,用户设备通过该用户设备中应用生成充电认证信息;在步骤S11中,用户设备通过该应用,将步骤S14中生成的充电认证信息发送至充电装置。例如,用户设备在连接到充电装置后,安装于用户设备的充电认证应用生成固定的、事先约定的充电认证信息,例如包含约定字符串,并发送至充电装置,充电装置检测到该充电认证信息后闭合放电电路,充电装置对用户设备进行充电;又例如,由用户设备实时生成该认证信息,并发送至充电装置,充电装置对其进行验证,验证通过则闭合放电电路,充电装置对用户设备进行充电。
例如,某充电服务公司乙向某用户甲提供充电装置Ca,供用户甲给 手机Ma充电。用户甲事先在手机Ma上安装充电服务公司乙提供的充电认证应用,该充电认证应用与充电装置Ca配套使用,运行时可向充电装置Ca发送充电认证信息,供充电装置Ca对手机Ma进行身份或充电权限的验证。
其中,充电装置Ca与手机Ma通过USB线缆连接。充电认证应用处于运行状态。用户甲操作充电认证应用,向充电装置Ca发送充电认证信息,该充电认证信息包含用户甲在充电认证应用中对应账号的充电权限,该权限可在向云端服务器发送查询请求后由云端服务器返回至手机Ma。充电装置Ca对用户甲的充电权限进行鉴别,当充电认证信息对应的充电权限为“有权充电”,则充电装置Ca闭合其与手机Ma之间的放电电路,对手机Ma进行充电。又例如,充电认证应用向充电装置Ca发送的充电认证信息中,包含“已安装充电认证应用”,例如充电认证信息中包含事先约定的消息“app installed”,当充电装置Ca检测到该充电认证信息,即闭合放电电路对手机Ma充电。再例如,用户甲通过在充电认证应用中使用手机Ma扫描二维码的方式获得充电授权,充电认证应用根据所扫描到的二维码信息,向充电装置Ca发送充电认证信息,充电装置Ca对该充电认证信息验证通过后,闭合放电电路对手机Ma进行充电。
优选地,参考图5,该方法还包括步骤S15。在步骤S15中,用户设备通过该用户设备中应用对充电装置进行安全认证;在步骤S11中,当所述充电装置在步骤S15中通过安全认证,用户设备通过所述应用向所述充电装置发送充电认证信息。
例如,某充电服务公司乙向某用户甲提供充电装置Ca,供用户甲给手机Ma充电。用户甲事先在手机Ma上安装充电服务公司乙提供的充电认证应用,该充电认证应用与充电装置Ca配套使用,运行时可向充电装置Ca发送充电认证信息,供充电装置Ca对手机Ma进行身份或充电权限的验证。充电认证应用处于运行状态。在发送充电认证信息之前,手机Ma通过充电认证应用对充电装置Ca进行安全认证,例如建立手机Ma和充电装置Ca之间通信连接之后,手机Ma中的充电认证应用向充电装置发送安全认证请求,该安全认证请求中包含一随机数,充电装置Ca收到 安全认证请求后基于该随机数和加密算法进行加密计算,将密文返回至充电认证应用,而充电认证应用根据相同的算法对随机数进行加密计算,并将结果与充电装置Ca返回的密文相比较,若二者相同则安全认证通过,否则不通过。当然,也可基于数字证书、加密芯片、非对称密码等进行安全认证。
当充电认证应用对充电装置的安全认证通过,用户甲操作充电认证应用,向充电装置Ca发送充电认证信息,该充电认证信息包含用户甲在充电认证应用中对应账号的充电权限。充电装置Ca对用户甲的充电权限进行鉴别,当充电认证信息对应的充电权限为“有权充电”,则充电装置Ca闭合其与手机Ma之间的放电电路,对手机Ma进行充电。又例如,充电认证应用向充电装置Ca发送的充电认证信息中,包含“已安装充电认证应用”,例如充电认证信息中包含事先约定的消息“app installed”,当充电装置Ca检测到该充电认证信息,即闭合放电电路对手机Ma充电。
其中,用户设备与充电装置之间的放电电路可包含有线充电接口或无线充电模块。例如,手机Ma通过USB充电线缆连接充电装置Ca的USB充电接口并充电;或充电装置Ca提供无线充电发射模块,手机Ma通过相应的无线充电接收模块进行充电。充电装置可包括线缆,例如通过电源转换器供电,例如充电装置Ca为充电底座或固定的充电柜;也可包括蓄电池,例如充电装置Ca为“充电宝”,即移动电源。
参考图6和7,根据本申请的另一个方面,提供了一种在充电装置端用于对用户设备进行充电的方法,该方法包括步骤S21、步骤S22和步骤S23。在步骤S21中,充电装置获取用户设备中应用提供的充电认证信息;在步骤S22中,充电装置根据所述充电认证信息对所述应用进行验证;在步骤S23中,当所述应用通过验证,闭合该充电装置与所述用户设备间的放电电路以对所述用户设备进行充电。
具体而言,在步骤S21中,充电装置获取用户设备中应用提供的充电认证信息是指,充电装置在通过放电电路对用户设备充电之前,需要首先接收用户设备发送的充电认证信息。该充电认证信息可以是由安装于用户设备上的充电认证应用事先生成的,例如包含约定字符串;也可由充电认 证应用实时生成。
在步骤S22中,充电装置根据所述充电认证信息对所述应用进行验证是指,充电装置接收到步骤S21中充电认证应用所发送的充电认证信息后,根据相应的规则对该充电认证信息进行验证,从而对发送该充电认证信息的充电认证应用进行验证。例如,根据验证规则,当充电认证信息中包含约定的字符串时该充电认证信息通过验证,则充电装置检测充电认证信息中是否包含约定的字符串;又例如,根据验证规则,充电认证信息由充电认证应用实时生成,则充电装置根据相同算法生成比较信息,并将其与充电认证信息相比较,若两者一致则充电认证信息通过验证;再例如,充电认证装置将充电认证信息进行处理后,从其中提取到特定内容,则充电认证信息通过验证,例如充电认证信息是加密的,充电装置接收到充电认证信息后首先对其进行解密。当充电认证信息通过验证,充电认证应用也相应通过验证。
其中,充电认证信息可由充电认证应用根据用户应用账号对应的权限确定,也可由当前用户设备上充电认证应用的安装状态确定,还可由用户设备通过蓝牙通信、近场通信(NFC,Near Field Communication)、移动数据通信、无线局域网通信等方式获取;而用户设备向充电装置发送充电认证信息,也可基于通信线缆(例如USB连接线)、蓝牙通信、近场通信、移动数据通信(例如基于3G/4G网络)、无线局域网通信等通信方式进行。
当然,本领域技术人员应能理解,上述通信方式仅为举例,其他现有的或今后可能出现的通信方式如可适用于本申请,也应包含在本申请保护范围以内,并在此以引用方式包含于此。
在步骤S23中,当所述应用(例如,充电认证应用)通过验证,充电装置闭合它与所述用户设备间的放电电路以对所述用户设备进行充电。
例如,某充电服务公司乙向某用户甲提供充电装置Ca,供用户甲给手机Ma充电。用户甲事先在手机Ma上安装充电服务公司乙提供的充电认证应用,该充电认证应用与充电装置Ca配套使用,运行时可向充电装置Ca发送充电认证信息,供充电装置Ca对手机Ma进行身份或充电权限的验证。充电认证应用处于运行状态。用户甲操作充电认证应用,向充电 装置Ca发送充电认证信息,该充电认证信息包含用户甲在充电认证应用中对应账号的充电权限。充电装置Ca对用户甲的充电权限进行鉴别,当充电认证信息对应的充电权限为“有权充电”,则充电认证信息和充电认证应用通过验证,充电装置Ca闭合其与手机Ma之间的放电电路,对手机Ma进行充电。或者,充电认证信息被加密后发送至充电装置Ca,充电装置Ca根据加密算法对应的解密算法,将充电认证信息解密后,读取用户充电权限为“有权充电”,则充电认证信息和充电认证应用通过验证,充电装置Ca闭合放电电路对手机Ma充电。又例如,充电认证应用向充电装置Ca发送的充电认证信息中,包含事先约定的消息“已安装充电认证应用”或“app installed”,当充电装置Ca检测到该充电认证信息,则充电认证信息和充电认证应用通过验证,充电装置Ca即闭合放电电路对手机Ma充电。再例如,将充电装置的序列号输入充电认证应用后,充电认证应用基于该序列号生成了充电认证信息;充电装置Ca也根据该序列号基于相同的生成算法生成比较信息,并将该比较信息与充电认证信息比对,当二者一致,则充电认证信息和充电认证应用通过验证,充电装置Ca闭合放电电路对手机Ma充电。
其中,用户设备与充电装置之间的放电电路可包含有线充电接口或无线充电模块。例如,手机Ma通过USB充电线缆连接充电装置Ca的USB充电接口并充电;或充电装置Ca提供无线充电发射模块,手机Ma通过相应的无线充电接收模块进行充电。充电装置可包括线缆,例如通过电源转换器供电,例如充电装置Ca为充电底座或固定的充电柜;也可包括蓄电池,例如充电装置Ca为“充电宝”,即移动电源。
优选地,该方法还包括步骤S24(未示出)。在步骤S24(未示出)中,当所述应用(例如充电认证应用)未通过验证,断开所述放电电路以停止对所述用户设备充电。例如,充电装置闭合放电电路对用户设备充电,并接收到安装于用户设备上的充电认证应用所发送的充电认证信息,且该充电认证信息未通过充电装置的验证,例如不包含约定字符串、充电装置根据相同算法计算的比较信息与充电认证信息不一致、将充电认证信息解密后未提取到特定内容等,则断开放电电路,停止对用户设备的充电。当用 户设备因为电量过低无法开机,可由充电装置充入一定电量,再根据充电认证信息的验证结果,保持放电电路闭合,或断开放电电路。
例如,某充电服务公司乙向某用户甲提供充电装置Ca,供用户甲给手机Ma充电。用户甲事先在手机Ma上安装充电服务公司乙提供的充电认证应用,该充电认证应用与充电装置Ca配套使用,运行时可向充电装置Ca发送充电认证信息,供充电装置Ca对手机Ma进行身份或充电权限的验证。充电装置Ca与手机Ma通过充电线缆相连,充电装置Ca与手机Ma之间的放电电路处于闭合状态,充电装置Ca通过该放电电路对手机Ma充电。但是此时,手机Ma已经因为电量不足关机,无法运行充电认证应用,更无法通过充电认证应用向充电装置Ca发送充电认证信息。
当充电过程持续一段时间后,用户甲启动手机Ma,并运行充电认证应用。用户甲操作充电认证应用,向充电装置Ca发送充电认证信息,该充电认证信息包含用户甲在充电认证应用中对应账号的充电权限。充电装置Ca对用户甲的充电权限进行鉴别,当充电认证信息对应的充电权限为“有权充电”,则充电认证信息和充电认证应用通过验证。或者,充电认证信息被加密后发送至充电装置Ca,充电装置Ca根据加密算法对应的解密算法,将充电认证信息解密后,读取用户充电权限为“有权充电”,则充电认证信息和充电认证应用通过验证。又例如,充电认证应用向充电装置Ca发送的充电认证信息中,包含事先约定的消息“已安装充电认证应用”或“app installed”,当充电装置Ca检测到该充电认证信息,则充电认证信息和充电认证应用通过验证。再例如,将充电装置的序列号输入充电认证应用后,充电认证应用基于该序列号生成了充电认证信息;充电装置Ca也根据该序列号基于相同的生成算法生成比较信息,并将该比较信息与充电认证信息比对,当二者一致,则充电认证信息和充电认证应用通过验证。
而当充电认证信息及充电认证应用未通过充电装置Ca的验证,充电装置Ca将放电电路断开,充电装置Ca停止对手机Ma充电。
其中,用户设备与充电装置之间的放电电路可包含有线充电接口或无线充电模块。例如,手机Ma通过USB充电线缆连接充电装置Ca的USB 充电接口并充电;或充电装置Ca提供无线充电发射模块,手机Ma通过相应的无线充电接收模块进行充电。充电装置可包括线缆,例如通过电源转换器供电,例如充电装置Ca为充电底座或固定的充电柜;也可包括蓄电池,例如充电装置Ca为“充电宝”,即移动电源。
其中,优选地,在步骤S24(未示出)中,当所述应用未通过验证,且所述用户设备的充电时长超过预定的充电时长阈值,断开所述放电电路以停止对所述用户设备充电。例如,充电装置检测到用户设备接入后,闭合放电电路并对用户设备充电;但是在预定的充电时长内,未接收到充电认证应用发送的充电认证信息,或充电认证应用发送的充电认证信息未能通过充电装置的验证,充电装置将放电电路断开,以停止对该用户设备充电。又例如,充电装置初始状态下闭合放电电路,在检测到到用户设备接入后对用户设备充电;但是在预定的充电时长内,未接收到充电认证应用发送的充电认证信息,或充电认证应用发送的充电认证信息未能通过充电装置的验证,充电装置将放电电路断开,以停止对该用户设备充电;待检到改用户设备断开连接,闭合放电电路,等待下一次连接。
此时,当用户设备因为电量过低无法开机,可由充电装置充入一定电量,再根据充电认证信息的验证结果,保持放电电路闭合,或断开放电电路。
例如,某充电服务公司乙向某用户甲提供充电装置Ca,供用户甲给手机Ma充电。用户甲事先在手机Ma上安装充电服务公司乙提供的充电认证应用,该充电认证应用与充电装置Ca配套使用,运行时可向充电装置Ca发送充电认证信息,供充电装置Ca对手机Ma进行身份或充电权限的验证。充电装置Ca与手机Ma通过充电线缆相连,充电装置Ca与手机Ma之间的放电电路处于闭合状态,充电装置Ca通过该放电电路对手机Ma充电。但是此时,手机Ma已经因为电量不足关机,无法运行充电认证应用,更无法通过充电认证应用向充电装置Ca发送充电认证信息。
当充电过程持续3分钟后,用户甲启动手机Ma,并运行充电认证应用。用户甲操作充电认证应用,向充电装置Ca发送充电认证信息,该充电认证信息包含用户甲在充电认证应用中对应账号的充电权限。充电装置 Ca对用户甲的充电权限进行鉴别,当充电认证信息对应的充电权限为“有权充电”,则充电认证信息和充电认证应用通过验证,否则未通过验证。或者,充电认证信息被加密后发送至充电装置Ca,充电装置Ca根据加密算法对应的解密算法,将充电认证信息解密后,读取用户充电权限为“有权充电”,则充电认证信息和充电认证应用通过验证,否则未通过验证。又例如,充电认证应用向充电装置Ca发送的充电认证信息中,包含事先约定的消息“已安装充电认证应用”或“app installed”,当充电装置Ca检测到该充电认证信息,则充电认证信息和充电认证应用通过验证,否则未通过验证。再例如,将充电装置的序列号输入充电认证应用后,充电认证应用基于该序列号生成了充电认证信息;充电装置Ca也根据该序列号基于相同的生成算法生成比较信息,并将该比较信息与充电认证信息比对,当二者一致,则充电认证信息和充电认证应用通过验证,否则未通过验证。
如果在从充电装置Ca检测到手机Ma接入开始的5分钟内,充电装置Ca所接收到的充电认证信息均未能通过验证,或未接收到充电认证信息,则充电装置Ca将放电电路断开,充电装置Ca停止对手机Ma充电。
其中,用户设备与充电装置之间的放电电路可包含有线充电接口或无线充电模块。例如,手机Ma通过USB充电线缆连接充电装置Ca的USB充电接口并充电;或充电装置Ca提供无线充电发射模块,手机Ma通过相应的无线充电接收模块进行充电。充电装置可包括线缆,例如通过电源转换器供电,例如充电装置Ca为充电底座或固定的充电柜;也可包括蓄电池,例如充电装置Ca为“充电宝”,即移动电源。
根据本申请的又一个方面,提供了一种用于控制充电装置的方法,该方法包括步骤S31(未示出)。在步骤S31(未示出)中,用户设备通过该用户设备中应用向充电装置发送充电认证信息,其中,所述充电认证信息用于闭合所述充电装置的放电电路以对外充电。例如,充电装置在闭合放电电路对外充电之前,需要首先接收用户设备发送的充电认证信息,该充电认证信息由安装于该用户设备上的充电认证应用向充电装置发送;充电装置对该充电认证信息进行验证,当该充电认证信息通过验证,充电装置 闭合放电电路,以对外部设备充电。其中,外部设备包括但不限于发送充电认证信息的用户设备,以及该用户设备以外的其他设备。充电认证信息可由充电认证应用根据用户应用账号对应的权限确定,也可由当前用户设备上充电认证应用的安装状态确定,还可由用户设备通过蓝牙通信、近场通信(NFC,Near Field Communication)、移动数据通信、无线局域网通信等方式获取;而用户设备向充电装置发送充电认证信息,也可基于通信线缆(例如USB连接线)、蓝牙通信、近场通信、移动数据通信(例如基于3G/4G网络)、无线局域网通信等通信方式进行。
当然,本领域技术人员应能理解,上述通信方式仅为举例,其他现有的或今后可能出现的通信方式如可适用于本申请,也应包含在本申请保护范围以内,并在此以引用方式包含于此。
例如,某充电服务公司乙向某用户甲提供充电装置Ca,供用户甲给其手机Ma充电。用户甲将其手机Ma与充电装置Ca通过充电线缆连接。用户丙事先在其手机Mb上安装充电服务公司乙提供的充电认证应用,该充电认证应用与充电装置Ca配套使用,运行时可向充电装置Ca发送充电认证信息,供充电装置Ca对用户丙的手机Mb进行身份或充电权限的验证。用户丙手机Mb上的充电认证应用处于运行状态。用户丙操作充电认证应用,通过NFC通信的方式向充电装置Ca发送充电认证信息,该充电认证信息包含用户丙在充电认证应用中对应账号的充电权限。充电装置Ca对用户丙的充电权限进行鉴别,当充电认证信息对应的充电权限为“有权充电”,则充电装置Ca闭合其与用户甲的手机Ma之间的放电电路,对用户甲的手机Ma进行充电。又例如,充电认证应用向充电装置Ca发送的充电认证信息中,包含“已安装充电认证应用”,例如充电认证信息中包含事先约定的消息“app installed”,当充电装置Ca检测到该充电认证信息,即闭合放电电路对用户甲的手机Ma充电。
其中,用户设备与充电装置之间的放电电路可包含有线充电接口或无线充电模块。例如,手机Ma通过USB充电线缆连接充电装置Ca的USB充电接口并充电;或充电装置Ca提供无线充电发射模块,手机Ma通过相应的无线充电接收模块进行充电。充电装置可包括线缆,例如通过电源 转换器供电,例如充电装置Ca为充电底座或固定的充电柜;也可包括蓄电池,例如充电装置Ca为“充电宝”,即移动电源。
根据本申请的一个方面,提供了一种用于通过充电装置对用户设备进行充电的设备,该设备包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:
通过用户设备中应用向充电装置发送充电认证信息;
其中,所述充电认证信息用于闭合所述充电装置与所述用户设备间的放电电路以对所述用户设备进行充电。
根据本申请的另一个方面,提供了一种用于对用户设备进行充电的充电装置,其中,该充电装置包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:
获取用户设备中应用所提供的充电认证信息;
根据所述充电认证信息对所述应用进行验证;
当所述应用通过验证,闭合充电装置与所述用户设备间的放电电路以对所述用户设备进行充电。
根据本申请的又一个方面,提供了一种用于控制充电装置的设备,该设备包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:
通过用户设备中应用向充电装置发送充电认证信息,其中,所述充电认证信息用于闭合所述充电装置的放电电路以对外充电。
根据本申请的一个方面,提供了一种包括指令的计算机可读介质,所述指令在被执行时使得系统进行以下操作:
通过用户设备中应用向充电装置发送充电认证信息;
其中,所述充电认证信息用于闭合所述充电装置与所述用户设备间的放电电路以对所述用户设备进行充电。
根据本申请的另一个方面,提供了一种包括指令的计算机可读介质,所述指令在被执行时使得系统进行以下操作:
获取用户设备中应用所提供的充电认证信息;
根据所述充电认证信息对所述应用进行验证;
当所述应用通过验证,闭合充电装置与所述用户设备间的放电电路以对所述用户设备进行充电。
根据本申请的又一个方面,提供了一种包括指令的计算机可读介质,所述指令在被执行时使得系统进行以下操作:
通过用户设备中应用向充电装置发送充电认证信息,其中,所述充电认证信息用于闭合所述充电装置的放电电路以对外充电。
需要注意的是,本申请可在软件和/或软件与硬件的组合体中被实施,例如,可采用专用集成电路(ASIC)、通用目的计算机或任何其他类似硬件设备来实现。在一个实施例中,本申请的软件程序可以通过处理器执行以实现上文所述步骤或功能。同样地,本申请的软件程序(包括相关的数据结构)可以被存储到计算机可读记录介质中,例如,RAM存储器,磁或光驱动器或软磁盘及类似设备。另外,本申请的一些步骤或功能可采用硬件来实现,例如,作为与处理器配合从而执行各个步骤或功能的电路。
另外,本申请的一部分可被应用为计算机程序产品,例如计算机程序指令,当其被计算机执行时,通过该计算机的操作,可以调用或提供根据本申请的方法和/或技术方案。本领域技术人员应能理解,计算机程序指令在计算机可读介质中的存在形式包括但不限于源文件、可执行文件、安装包文件等,相应地,计算机程序指令被计算机执行的方式包括但不限于:该计算机直接执行该指令,或者该计算机编译该指令后再执行对应的编译后程序,或者该计算机读取并执行该指令,或者该计算机读取并安装该指令后再执行对应的安装后程序。在此,计算机可读介质可以是可供计算机访问的任意可用的计算机可读存储介质或通信介质。
通信介质包括藉此包含例如计算机可读指令、数据结构、程序模块或 其他数据的通信信号被从一个系统传送到另一系统的介质。通信介质可包括有导的传输介质(诸如电缆和线(例如,光纤、同轴等))和能传播能量波的无线(未有导的传输)介质,诸如声音、电磁、RF、微波和红外。计算机可读指令、数据结构、程序模块或其他数据可被体现为例如无线介质(诸如载波或诸如被体现为扩展频谱技术的一部分的类似机制)中的已调制数据信号。术语“已调制数据信号”指的是其一个或多个特征以在信号中编码信息的方式被更改或设定的信号。调制可以是模拟的、数字的或混合调制技术。
作为示例而非限制,计算机可读存储介质可包括以用于存储诸如计算机可读指令、数据结构、程序模块或其它数据的信息的任何方法或技术实现的易失性和非易失性、可移动和不可移动的介质。例如,计算机可读存储介质包括,但不限于,易失性存储器,诸如随机存储器(RAM,DRAM,SRAM);以及非易失性存储器,诸如闪存、各种只读存储器(ROM,PROM,EPROM,EEPROM)、磁性和铁磁/铁电存储器(MRAM,FeRAM);以及磁性和光学存储设备(硬盘、磁带、CD、DVD);或其它现在已知的介质或今后开发的能够存储供计算机系统使用的计算机可读信息/数据。
在此,根据本申请的一个实施例包括一个装置,该装置包括用于存储计算机程序指令的存储器和用于执行程序指令的处理器,其中,当该计算机程序指令被该处理器执行时,触发该装置运行基于前述根据本申请的多个实施例的方法和/或技术方案。
对于本领域技术人员而言,显然本申请不限于上述示范性实施例的细节,而且在不背离本申请的精神或基本特征的情况下,能够以其他的具体形式实现本申请。因此,无论从哪一点来看,均应将实施例看作是示范性的,而且是非限制性的,本申请的范围由所附权利要求而不是上述说明限定,因此旨在将落在权利要求的等同要件的含义和范围内的所有变化涵括在本申请内。不应将权利要求中的任何附图标记视为限制所涉及的权利要求。此外,显然“包括”一词不排除其他单元或步骤,单数不排除复数。装置权利要求中陈述的多个单元或装置也可以由一个单元或装置通过软件或者硬件来实现。第一,第二等词语用来表示名称,而并不表示任何特定 的顺序。

Claims (19)

  1. 一种在用户设备端用于通过充电装置对用户设备进行充电的方法,其中,该方法包括:
    通过用户设备中应用向充电装置发送充电认证信息;
    其中,所述充电认证信息用于闭合所述充电装置与所述用户设备间的放电电路以对所述用户设备进行充电。
  2. 根据权利要求1所述的方法,其中,所述方法还包括:
    建立所述用户设备与充电装置的通信连接;
    其中,所述通过用户设备中应用向充电装置发送充电认证信息包括:
    通过所述用户设备中应用并经由所述通信连接向从所述充电装置发送充电认证信息。
  3. 根据权利要求2所述的方法,其中,所述建立所述用户设备与充电装置的通信连接包括:
    向充电装置发送通信连接请求;
    接收所述充电装置基于所述通信连接请求返回的通信连接响应,从而建立所述用户设备与所述充电装置的通信连接。
  4. 根据权利要求2或3所述的方法,其中,所述建立所述用户设备与充电装置的通信连接包括:
    基于用户设备与充电装置间的USB连接,建立所述用户设备与所述充电装置的通信连接。
  5. 根据权利要求4所述的方法,其中,所述建立所述用户设备与充电装置的通信连接包括:
    基于用户设备与充电装置间的USB连接,获取所述充电装置的装置标识信息;
    根据所述充电装置的装置标识信息建立所述用户设备与所述充电装置的通信连接。
  6. 根据权利要求2或3所述的方法,其中,所述通信连接包括以下任一项:
    所述用户设备与所述充电装置之间的USB连接;
    所述用户设备与所述充电装置之间的蓝牙通信连接;
    所述用户设备与所述充电装置之间的近场通信连接;
    移动通信数据通信连接;
    无线局域网通信连接。
  7. 根据权利要求1所述的方法,其中,所述方法包括:
    基于用户设备与充电装置间的USB连接,获取所述充电装置的装置标识信息;
    其中,所述通过用户设备中应用向充电装置发送充电认证信息包括:
    基于所述充电装置的装置标识信息,通过所述用户设备中应用向所述充电装置发送充电认证信息。
  8. 根据权利要求1至7中任一项所述的方法,其中,所述方法还包括:
    通过用户设备中应用生成充电认证信息;
    其中,所述通过用户设备中应用向充电装置发送充电认证信息包括:
    通过所述应用向充电装置发送所述充电认证信息。
  9. 根据权利要求1至8中任一项所述的方法,其中,所述方法还包括:
    通过用户设备中应用对充电装置进行安全认证;
    其中,所述通过用户设备中应用向充电装置发送充电认证信息包括:
    当所述充电装置通过安全认证,通过所述应用向所述充电装置发送充电认证信息。
  10. 一种在充电装置端用于对用户设备进行充电的方法,其中,该方法包括:
    获取用户设备中应用所提供的充电认证信息;
    根据所述充电认证信息对所述应用进行验证;
    当所述应用通过验证,闭合充电装置与所述用户设备间的放电电路以对所述用户设备进行充电。
  11. 根据权利要求10所述的方法,其中,所述方法还包括:
    当所述应用未通过验证,断开所述放电电路以停止对所述用户设备进行充电。
  12. 根据权利要求11所述的方法,所述当所述应用未通过验证,断开所述放电电路以停止对所述用户设备进行充电包括:
    当所述应用未通过验证,且所述用户设备的充电时长超过预定的充电时长阈值,断开所述放电电路以停止对所述用户设备进行充电。
  13. 根据权利要求10至12中任一项所述的方法,其中,所述放电电路包括有线充电接口或无线充电模块。
  14. 一种用于控制充电装置的方法,其中,该方法包括:
    通过用户设备中应用向充电装置发送充电认证信息,其中,所述充电认证信息用于闭合所述充电装置的放电电路以对外充电。
  15. 一种用于通过充电装置对用户设备进行充电的方法,其中,该方法包括:
    用户设备通过所述用户设备中应用向充电装置发送充电认证信息;
    所述充电装置获取所述应用所提供的充电认证信息;
    所述充电装置根据所述充电认证信息对所述应用进行验证;
    当所述应用通过验证,所述充电装置闭合所述充电装置与所述用户设备间的放电电路以对所述用户设备进行充电。
  16. 一种用于通过充电装置对用户设备进行充电的设备,其中,该设备包括:
    处理器;以及
    被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行根据权利要求1至9中任一项所述方法的操作。
  17. 一种用于对用户设备进行充电的充电装置,其中,该充电装置包括:
    处理器;以及
    被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行根据权利要求10至13中任一项所述方法的操作。
  18. 一种用于控制充电装置的设备,其中,该设备包括:
    处理器;以及
    被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行根据权利要求14所述方法的操作。
  19. 一种包括指令的计算机可读介质,所述指令在被执行时使得系统 进行根据权利要求1至14中任一项所述方法的操作。
PCT/CN2018/087416 2017-05-19 2018-05-18 一种通过充电装置对用户设备进行充电的方法与设备 WO2018210320A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710361297.8 2017-05-19
CN201710361297.8A CN107104484B (zh) 2017-05-19 2017-05-19 一种通过充电装置对用户设备进行充电的方法与设备

Publications (1)

Publication Number Publication Date
WO2018210320A1 true WO2018210320A1 (zh) 2018-11-22

Family

ID=59670155

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/087416 WO2018210320A1 (zh) 2017-05-19 2018-05-18 一种通过充电装置对用户设备进行充电的方法与设备

Country Status (2)

Country Link
CN (1) CN107104484B (zh)
WO (1) WO2018210320A1 (zh)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107104484B (zh) * 2017-05-19 2020-12-18 上海掌门科技有限公司 一种通过充电装置对用户设备进行充电的方法与设备
CN109428359A (zh) * 2017-08-31 2019-03-05 河南裕展精密科技有限公司 智能充电设备、方法和存储设备
CN111163044B (zh) * 2019-08-07 2020-08-21 上海钧正网络科技有限公司 电池管理方法、设备、服务器及系统
CN112636402A (zh) * 2019-09-24 2021-04-09 北京小米移动软件有限公司 充电方法及装置、电子设备
CN112152283A (zh) * 2020-09-04 2020-12-29 湖南铁山信息科技有限公司 充电识别方法、装置、铁鞋、存储介质及处理器
CN115412334A (zh) * 2022-08-25 2022-11-29 中交信息技术国家工程实验室有限公司 一种甚高频数据交换系统用户身份双向验证方法及系统

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104281802A (zh) * 2013-07-01 2015-01-14 宏达国际电子股份有限公司 无线充电验证的方法及相关无线充电系统
CN104281065A (zh) * 2014-09-16 2015-01-14 深圳市赤道极光信息科技有限公司 一种网络控制充电方法和系统
CN205017028U (zh) * 2015-06-03 2016-02-03 吴钰淳 一种新型的充电系统
CN105743195A (zh) * 2016-04-12 2016-07-06 上海斐讯数据通信技术有限公司 一种基于无线充电器的控制系统及方法
CN105932729A (zh) * 2016-04-27 2016-09-07 乐视控股(北京)有限公司 用于电子设备的充电器认证方法、装置及电子设备
US20160320867A1 (en) * 2015-04-30 2016-11-03 Microsoft Technology Licensing, Llc Mobile Client Device Wireless Charging, Communication, and Authentication Techniques
CN107104484A (zh) * 2017-05-19 2017-08-29 上海掌门科技有限公司 一种通过充电装置对用户设备进行充电的方法与设备

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104281802A (zh) * 2013-07-01 2015-01-14 宏达国际电子股份有限公司 无线充电验证的方法及相关无线充电系统
CN104281065A (zh) * 2014-09-16 2015-01-14 深圳市赤道极光信息科技有限公司 一种网络控制充电方法和系统
US20160320867A1 (en) * 2015-04-30 2016-11-03 Microsoft Technology Licensing, Llc Mobile Client Device Wireless Charging, Communication, and Authentication Techniques
CN205017028U (zh) * 2015-06-03 2016-02-03 吴钰淳 一种新型的充电系统
CN105743195A (zh) * 2016-04-12 2016-07-06 上海斐讯数据通信技术有限公司 一种基于无线充电器的控制系统及方法
CN105932729A (zh) * 2016-04-27 2016-09-07 乐视控股(北京)有限公司 用于电子设备的充电器认证方法、装置及电子设备
CN107104484A (zh) * 2017-05-19 2017-08-29 上海掌门科技有限公司 一种通过充电装置对用户设备进行充电的方法与设备

Also Published As

Publication number Publication date
CN107104484A (zh) 2017-08-29
CN107104484B (zh) 2020-12-18

Similar Documents

Publication Publication Date Title
US11509485B2 (en) Identity authentication method and system, and computing device
WO2018210320A1 (zh) 一种通过充电装置对用户设备进行充电的方法与设备
KR102269749B1 (ko) 무선 전력 수신을 가능하게 하는 수신기
US10148135B2 (en) System, apparatus and method for authenticating a device using a wireless charger
CN106063183B (zh) 用于云辅助密码学的方法和装置
US9509502B2 (en) Symmetric keying and chain of trust
KR101289530B1 (ko) 스마트폰의 관리하에서 스마트폰의 베어러 및 서버 독립 부모 제어를 위한 방법 및 장치
US11991527B2 (en) Communication method and communication device
US9621540B2 (en) Secure provisioning of computing devices for enterprise connectivity
JP2021521667A (ja) 無線電力受信を効率化する受信装置
WO2018210324A1 (zh) 一种通过充电装置对用户设备进行充电的方法与设备
CN111355684B (zh) 一种物联网数据传输方法、装置、系统、电子设备及介质
CN104247329A (zh) 请求云服务的装置的安全补救
EP3668120A1 (en) Hearing device with service mode and related method
JP6752013B2 (ja) サービス・モードを備えた聴覚装置および関連の方法
KR101835640B1 (ko) 통신 연결 인증 방법, 그에 따른 게이트웨이 장치, 및 그에 따른 통신 시스템
US20230180007A1 (en) Electronic device and method for electronic device to provide ranging-based service
CN113127914A (zh) 一种电力物联网数据安全防护方法
KR20210060282A (ko) 하드웨어 보안 모듈을 이용한 클라우드를 통한 IoT(Internet of Thing) 디바이스 인증 시스템 및 방법
CN113301537B (zh) 用于建立通信连接的方法、装置、电子设备以及存储介质
KR101836211B1 (ko) 전자 기기 인증 매니저 장치
WO2019037602A1 (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
CN114793178B (zh) 配网方法、装置、设备和存储介质
WO2019037597A1 (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
CN113472737B (zh) 边缘设备的数据处理方法、装置及电子设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18802701

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 27/02/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 18802701

Country of ref document: EP

Kind code of ref document: A1