WO2018210324A1 - 一种通过充电装置对用户设备进行充电的方法与设备 - Google Patents

一种通过充电装置对用户设备进行充电的方法与设备 Download PDF

Info

Publication number
WO2018210324A1
WO2018210324A1 PCT/CN2018/087421 CN2018087421W WO2018210324A1 WO 2018210324 A1 WO2018210324 A1 WO 2018210324A1 CN 2018087421 W CN2018087421 W CN 2018087421W WO 2018210324 A1 WO2018210324 A1 WO 2018210324A1
Authority
WO
WIPO (PCT)
Prior art keywords
charging
authentication information
user equipment
identification information
information
Prior art date
Application number
PCT/CN2018/087421
Other languages
English (en)
French (fr)
Inventor
顾晓斌
龚蔚
鲍渊智
Original Assignee
上海掌门科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 上海掌门科技有限公司 filed Critical 上海掌门科技有限公司
Publication of WO2018210324A1 publication Critical patent/WO2018210324A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J7/00Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries
    • H02J7/00032Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries characterised by data exchange
    • H02J7/00036Charger exchanging data with battery
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J7/00Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries
    • H02J7/0068Battery or charger load switching, e.g. concurrent charging and load supply

Definitions

  • the present application relates to the field of communications, and in particular, to a technology for charging a user equipment by a charging device.
  • the cost of the charging cabinet is high, and the user scans the two-dimensional code of the cabinet to remove the charging treasure, and the charging treasure is completely out of the cabinet and is no longer controlled; in the actual operation process, the store is also troublesome (occupying the place and having no interest) due to the cumbersome process. Drive) directly pull the charging treasure to the user, causing the charging treasure to completely lose control.
  • a method for charging a user equipment by a charging device at a user equipment end comprising:
  • a method for charging a user equipment at a charging device end comprising:
  • the discharging circuit between the charging device and the user equipment is closed to charge the user equipment.
  • a method of controlling a charging device comprising:
  • a method for charging a user equipment by a charging device at a network device end comprising:
  • a method for charging a user equipment by a charging device comprising:
  • the user equipment acquires device identification information corresponding to the charging device
  • the charging authentication information corresponding to the device identification information, wherein the charging authentication information is used to close a discharging circuit between the charging device and the user equipment to charge the user equipment;
  • the charging device acquires the charging authentication information, where the charging authentication information is input by a user or sent by the user equipment;
  • the charging device verifies the charging authentication information
  • the charging device closes a discharging circuit between the charging device and the user equipment to charge the user equipment.
  • a method for charging a user equipment by a charging device comprising:
  • the user equipment acquires device identification information corresponding to the charging device
  • the charging authentication information request includes the device identification information
  • the network device Determining, by the network device, the charging authentication information corresponding to the device identification information, wherein the charging authentication information is used to close a discharging circuit of the charging device corresponding to the device identification information to charge the user equipment;
  • the network device returns the charging authentication information to the user equipment
  • the charging device acquires the charging authentication information, where the charging authentication information is input by a user or sent by the user equipment;
  • the charging device verifies the charging authentication information
  • the charging device closes a discharging circuit between the charging device and the user equipment to charge the user equipment.
  • an apparatus for charging a user equipment by a charging device at a user equipment end comprising:
  • a memory arranged to store computer executable instructions that, when executed, cause the processor to execute:
  • an apparatus for charging a user equipment at a charging device end comprising:
  • a memory arranged to store computer executable instructions that, when executed, cause the processor to execute:
  • the discharging circuit between the charging device and the user equipment is closed to charge the user equipment.
  • an apparatus for controlling a charging apparatus comprising:
  • a memory arranged to store computer executable instructions that, when executed, cause the processor to execute:
  • an apparatus for charging a user equipment by a charging device at a network device end comprising:
  • a memory arranged to store computer executable instructions that, when executed, cause the processor to execute:
  • a computer readable medium comprising instructions that, when executed, cause a system to:
  • a computer readable medium comprising instructions that, when executed, cause a system to:
  • the discharging circuit between the charging device and the user equipment is closed to charge the user equipment.
  • a computer readable medium comprising instructions that, when executed, cause a system to:
  • a computer readable medium comprising instructions that, when executed, cause a system to:
  • the present application adds a circuit and a digital button similar to the security control to the charging power source, and then obtains the charging authentication information in the application by acquiring the device identification information of the charging device, and references the authentication information with the internal charging device. Matching, if the obtained charging authentication information and the reference authentication information match the verification, the charging device charges the user equipment; the solution reaches the sharing of the charging device, and no longer depends on the cabinet, thereby further reducing the cost realized by the shared charging device, so that The promotion of shared charging devices is becoming more popular.
  • FIG. 1 shows a system topology diagram for charging a user equipment by a charging device, in accordance with an embodiment of the present application
  • FIG. 2 is a flow chart showing a method for charging a user equipment by a charging device at a user equipment end according to an embodiment of the present application
  • Figure 3 shows a sub-step of a step in Figure 2
  • FIG. 4 illustrates a flow chart of a method for charging a user equipment at a charging device end, in accordance with another embodiment of the present application
  • FIG. 5 illustrates a flow chart of a method for charging a user equipment by a charging device at a network device end according to still another embodiment of the present application
  • FIG. 6 shows a flow chart of a system method for charging a user equipment by a charging device, in accordance with an embodiment of the present application
  • FIG. 7 illustrates a flow chart of a system method for charging a user equipment by a charging device in accordance with another embodiment of the present application
  • FIG. 8 is a schematic structural view of a charging device according to an embodiment of the present application.
  • the terminal, the device of the service network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
  • processors CPUs
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory.
  • RAM random access memory
  • ROM read only memory
  • Memory is an example of a computer readable medium.
  • Computer readable media includes both permanent and non-persistent, removable and non-removable media.
  • Information storage can be implemented by any method or technology.
  • the information can be computer readable instructions, data structures, modules of programs, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), digital versatile disk (DVD) or other optical storage,
  • the device referred to in the present application includes but is not limited to a user equipment, a network device, or a device formed by integrating a user equipment and a network device through a network.
  • the user equipment includes, but is not limited to, any mobile electronic product that can perform human-computer interaction with the user (for example, human-computer interaction through a touchpad), such as a smart phone, a tablet computer, etc., and the mobile electronic product can be operated by any operation.
  • System such as android operating system, iOS operating system, etc.
  • the network device includes an electronic device capable of automatically performing numerical calculation and information processing according to an instruction set or stored in advance, and the hardware includes but is not limited to a microprocessor, an application specific integrated circuit (ASIC), and programmable logic.
  • ASIC application specific integrated circuit
  • the network device includes, but is not limited to, a computer, a network host, a single network server, a plurality of network server sets, or a plurality of servers; wherein the cloud is composed of a large number of computers or network servers based on Cloud Computing.
  • cloud computing is a kind of distributed computing, a virtual supercomputer composed of a group of loosely coupled computers.
  • the network includes, but is not limited to, the Internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless ad hoc network (Ad Hoc network), and the like.
  • the device may also be a program running on the user equipment, the network device, or the user equipment and the network device, the network device, the touch terminal, or the network device and the touch terminal integrated through the network.
  • FIG. 1 shows a typical application scenario of the present application.
  • the user equipment acquires the device identification information of the charging device to determine the corresponding charging authentication information, and then performs charging after being verified by the charging device.
  • the solution can be completed by the user equipment and the charging device, or can be completed by the user equipment, the network device and the charging device.
  • FIG. 2 illustrates a method for charging a user equipment by a charging device at a user equipment end, the method including steps S11 and S12, in accordance with an aspect of the present application.
  • the user equipment acquires device identification information corresponding to the charging device.
  • the user equipment that has the corresponding device identification information such as the serial number attached to the charging device acquires the serial number by detecting the information input by the user; for example, the charging device is affixed with the two-dimensional code, wherein the user equipment scans the charging device.
  • the QR code to get its corresponding serial number.
  • step S12 the user equipment determines charging authentication information corresponding to the device identification information, wherein the charging authentication information is used to close a discharging circuit between the charging device and the user equipment to charge the user equipment. .
  • the charging authentication information corresponding to the serial number of the charging device is obtained based on the serial number, and the charging authentication information can be used to close the discharge circuit pair between the charging device and the user equipment.
  • User equipment is charging. The process of obtaining the charging authentication information may be performed locally on the user equipment or may be uploaded to the network device for processing. After processing by the network device, the network device returns the charging authentication information to the user equipment.
  • the charging authentication information may be preset or generated in real time.
  • the user holds the user device and the user wants to charge the user device using the charging device.
  • the user equipment first obtains the serial number corresponding to the charging treasure.
  • the user equipment detects the serial number corresponding to the charging treasure input by the user in the user equipment, and may also obtain the serial number of the charging treasure by scanning the two-dimensional code.
  • the user equipment obtains the charging authentication information corresponding to the serial number based on the serial number of the charging treasure, wherein the charging authentication information is a password of the charging treasure closed discharge circuit.
  • the user inputs charging authentication information to the charging treasure, and the charging device verifies the charging authentication information; if the charging authentication information passes the verification, the charging circuit of the charging treasure is closed, and the external device can be powered.
  • the method further comprises the step S13.
  • step S13 the user equipment presents the charging authentication information; or the user equipment transmits the charging authentication information to the charging device, so that the charging device closes the discharging circuit to charge the user equipment.
  • the charging authentication information is presented on the screen, and the user manually inputs the charging authentication information on the mechanical keyboard of the charging device according to the presented charging authentication information; or the user equipment Searching and connecting to the charging device via Bluetooth, and then transmitting the charging authentication information to the charging device by means of Bluetooth transmission.
  • the user equipment may also send the charging authentication information through a short-range communication method such as NFC (Near Field Communication), and the process is similar to the above, and details are not described herein again.
  • NFC Near Field Communication
  • the user equipment queries the charging authentication information corresponding to the serial number of the charging treasure locally, and returns the charging authentication information corresponding to the serial number after the application database matches.
  • the charging authentication information is presented on the screen thereof, and the user manually inputs the charging authentication information on the mechanical keyboard of the charging device according to the presented charging authentication information; or the user equipment can search for the charging in the Bluetooth.
  • the charging authentication information is transmitted to the charging treasure through Bluetooth in the application; the user can also complete the transmission process by NFC and other short-distance communication methods.
  • the charging authentication information is verified; if the charging authentication information is verified, the charging circuit of the charging treasure is closed, and the external device can be powered.
  • step S12 includes sub-step S12a and sub-step S12b.
  • the user equipment sends a charging authentication information request to the corresponding network device, wherein the charging authentication information request includes the device identification information;
  • the user equipment receives the And charging identification information corresponding to the device identification information, wherein the charging authentication information is used to close a discharging circuit between the charging device and the user equipment to charge the user equipment.
  • the user equipment After the user equipment acquires the serial number of the charging device, the user equipment sends a charging authentication information request to the network device, and requests the network device for the charging authentication information corresponding to the charging device, where the charging authentication information request includes the sequence of the charging device.
  • the network device After the network device performs the query to obtain the charging authentication information preset by the serial number or generates the dynamic charging authentication information in real time based on the serial number, the corresponding charging authentication information is returned to the user equipment, and the charging authentication information is used to close the discharging circuit of the charging device. Thereby charging the user equipment.
  • the serial number is sent to the network device.
  • the network device receives the serial number, determines the charging authentication information preset by the serial number in the database, or generates charging authentication information in real time based on the serial number and the dynamic factor (such as time, random number, etc.), and then the network device will The charging authentication information is returned to the user equipment.
  • the user equipment transmits the charging authentication information to the charging device through user input or a short-distance communication method such as Bluetooth or NFC.
  • the charging authentication information is verified; if the charging authentication information is verified, the charging circuit of the charging treasure is closed, and the external device can be powered.
  • the user equipment Preferably, in step b, the user equipment generates charging authentication information corresponding to the device identification information, wherein the charging authentication information is used to close a discharging circuit of the charging device to charge the user equipment.
  • the user equipment is based on the inherent information of the charging treasure (for example, hardware identification information or serial number of the charging treasure, or the inherent information and dynamic factors of the charging treasure (for example, current time, number of counters, random number, etc.), This charging authentication information is generated.
  • the charging authentication information corresponding to the serial number of the charging treasure can be locally queried.
  • the user obtains the serial number of the charging treasure based on the inherent information of the charging treasure (for example, hardware identification information or serial number of the charging treasure, etc.), or the inherent information and dynamic factor of the charging treasure (for example, current
  • the charging authentication information is generated by time, counter number, random number, and the like.
  • the user equipment transmits the serial number to the network device.
  • the network device receives the serial number, determines the charging authentication information preset by the serial number in the database, or generates charging authentication information in real time based on the serial number and the dynamic factor (such as time, random number, etc.), and then the network device will The charging authentication information is returned to the user equipment. After the user equipment obtains the charging authentication information, the charging authentication information is transmitted to the charging treasure through user input or a short-distance communication method such as Bluetooth or NFC. After the charging device obtains the charging authentication information, the charging authentication information is verified; if the charging authentication information is verified, the charging circuit of the charging treasure is closed, and the external device can be powered.
  • the device identification information comprises at least one of: device serial number information of the charging device; two-dimensional code information of the charging device.
  • the device identification information acquired by the user equipment may be device serial number information of the charging device manually input by the user, or may be two-dimensional code information of the charging device scanned by the user equipment.
  • the user holds the user device and the user wants to charge the user device using the charging treasure.
  • the user equipment first obtains the serial number corresponding to the charging treasure, wherein the user equipment can detect the serial number corresponding to the charging treasure manually input by the user, and can also obtain the serial number of the charging treasure by scanning the two-dimensional code, wherein The two-dimensional code contains device identification information of the charging device. After obtaining the serial number of the charging treasure, the user equipment can locally query the charging authentication information corresponding to the serial number of the charging treasure.
  • the user equipment transmits the serial number to the network device.
  • the network device receives the serial number, determines the charging authentication information preset by the serial number in the database, or generates charging authentication information in real time based on the serial number and the dynamic factor (such as time, random number, etc.), and then the network device will The charging authentication information is returned to the user equipment.
  • the charging authentication information is transmitted to the charging treasure through user input or a short-distance communication method such as Bluetooth or NFC.
  • the charging authentication information is verified; if the charging authentication information is verified, the charging circuit of the charging treasure is closed, and the external device can be powered.
  • step S21 the charging device acquires the charging authentication information, wherein the charging authentication information is input by a user or transmitted by the user equipment; in step S22, the charging device verifies the charging authentication information; in step S23 And when the charging authentication information is verified, the charging device closes a discharging circuit between the charging device and the user equipment to charge the user equipment.
  • FIG. 8 is a structural diagram of a charging device for charging a user equipment, including a discharge circuit, the charging device further including an output control switch disposed on the discharge circuit for obtaining verification information of charging authentication information An input module, and an output control module respectively electrically connected to the output control switch and the verification information input module; wherein the output control module receives and verifies charging authentication information input by the verification information input module, when The charging authentication information is controlled to be closed, so that the charging device is externally charged by the discharging circuit.
  • the physical keyboard of the charging device detects the charging authentication information input by the user, and then the output control module of the charging device verifies whether the charging authentication information is correct. If the charging authentication information passes the verification, the output control switch of the charging device closes the charging.
  • the user holds the user device and the user wants to charge the user device using the charging treasure.
  • the user equipment first obtains the serial number corresponding to the charging treasure.
  • the user equipment can detect the device identification information such as the serial number corresponding to the charging treasure that is input by the user in the application installed by the user equipment, and can also obtain the method by scanning the two-dimensional code.
  • the serial number of the charging treasure After the user equipment obtains the serial number of the charging treasure, the user equipment locally queries the charging authentication information corresponding to the charging treasure according to the serial number, and returns the charging authentication information corresponding to the serial number after the local database matches.
  • the user equipment After obtaining the serial number of the charging treasure, the user equipment sends the serial number to the network device; the network device matches the charging authentication information corresponding to the serial number in the database, or generates the charging corresponding to the serial number in real time. The authentication information is then returned to the user equipment by the network device.
  • the charging treasure can be searched in the Bluetooth, and the connection between the user equipment and the charging treasure is established through Bluetooth, and the charging authentication information is transmitted to the charging treasure through the Bluetooth in the application; Users can also complete the transmission process through NFC and other short-range communication methods. The user can also input the charging authentication information through the physical keyboard of the charging treasure, so that the charging treasure receives the charging authentication information.
  • the charging treasure After receiving the charging authentication information, the charging treasure performs matching verification with the reference authentication information inside the charging treasure; here, the reference authentication information may be stored locally by the charging treasure, or may be generated in real time by the charging treasure.
  • the charging treasure includes a verification information generating module.
  • the verification information generating module After the charging treasure receives the charging authentication information provided by the user, the verification information generating module generates reference authentication information for verifying the charging authentication information in real time, wherein the verification information generating module may The reference authentication is generated based on the inherent information of the charging treasure (for example, hardware identification information or serial number of the charging treasure, or the inherent information and dynamic factors of the charging treasure (for example, current time, number of counters, random number, etc.) information.
  • the output control module of the charging treasure sends a closing switch command to the output control switch, and when the output control switch is closed, the discharging circuit is Connected, the charging treasure starts charging the user equipment.
  • sub-step S22a when the charging device receives the charging authentication information, corresponding reference authentication information is generated; in sub-step S22b, the charging device verifies the charging authentication information based on the reference authentication information.
  • the charging device receives the charging authentication information, and the verification information generating module simultaneously generates the reference authentication information, where the reference authentication information may be preset reference authentication information, or may be based on the inherent information of the charging treasure (for example, charging)
  • the hardware identification information or serial number of the treasure, or the inherent information and dynamic factors of the charging treasure for example, the current time, the number of counters, the random number, etc.
  • the verification information generating module will charge The authentication information is matched with the reference authentication information to verify the charging authentication information.
  • the user equipment obtains the serial number of the charging treasure, and determines corresponding charging authentication information based on the serial number. After obtaining the charging authentication information, the user equipment transmits the charging authentication information to the charging treasure by detecting the manner of the user input or the short-distance transmission mode such as Bluetooth or NFC. After receiving the charging authentication information, the charging treasure performs matching verification with the reference authentication information inside the charging treasure, and compares the charging authentication information with the reference authentication information one by one; here, the reference authentication information may be a charging treasure local pre- It can also be generated in real time by the charging treasure. For example, the charging treasure includes a verification information generating module.
  • the verification information generating module After the charging treasure receives the charging authentication information provided by the user, the verification information generating module generates reference authentication information for verifying the charging authentication information in real time, wherein the verification information generating module may The reference authentication is generated based on the inherent information of the charging treasure (for example, hardware identification information or serial number of the charging treasure, or the inherent information and dynamic factors of the charging treasure (for example, current time, number of counters, random number, etc.) information. If the charging authentication information and the reference authentication information are the same for each bit, the charging authentication information is successfully verified, and the charging control module outputs a closing switch command to the output control switch. When the output control switch is closed, the discharging circuit is connected. Charging treasure starts charging the user equipment.
  • the inherent information of the charging treasure for example, hardware identification information or serial number of the charging treasure, or the inherent information and dynamic factors of the charging treasure (for example, current time, number of counters, random number, etc.
  • step S23 when the charging authentication information fails the verification, and the charging duration of the user equipment exceeds a predetermined charging duration threshold, the discharging circuit is turned off to stop charging the user equipment.
  • the charging device has been turned off and cannot be operated, the emergency charging function is activated and connected to the charging device, and the charging device urgently charges the user equipment for a certain period of time.
  • the charging authentication information fails verification, and the charging duration exceeds the predetermined charging duration threshold, the discharging circuit is turned off to stop charging the user equipment.
  • the user holds the user equipment, and the user wants to use the charging treasure to charge the user equipment.
  • the user equipment has been shut down due to insufficient power, the user equipment is connected to the charging device, and the charging device activates the emergency charging function.
  • the serial number corresponding to the charging treasure is obtained.
  • the user equipment can detect the serial number corresponding to the charging treasure entered by the user in the application installed by the user equipment, and can also obtain the charging by scanning the two-dimensional code.
  • the serial number of the treasure After the user equipment obtains the serial number of the charging treasure, the user equipment locally queries the charging authentication information corresponding to the charging treasure according to the serial number, and returns the charging authentication information corresponding to the serial number after the local database matches.
  • the user equipment After obtaining the serial number of the charging treasure, the user equipment sends the serial number to the network device; the network device matches the charging authentication information corresponding to the serial number in the database, or generates the charging corresponding to the serial number in real time. The authentication information is then returned to the user equipment by the network device.
  • the charging treasure can be searched in the Bluetooth, and the connection between the user equipment and the charging treasure is established through Bluetooth, and the charging authentication information is transmitted to the charging treasure through the Bluetooth in the application; Users can also complete the transmission process through NFC and other short-range communication methods. The user can also input the charging authentication information through the physical keyboard of the charging treasure, so that the charging treasure receives the charging authentication information.
  • the charging treasure After receiving the charging authentication information, the charging treasure performs matching verification with the reference authentication information inside the charging treasure; here, the reference authentication information may be stored locally by the charging treasure, or may be generated in real time by the charging treasure.
  • the charging treasure includes a verification information generating module.
  • the verification information generating module After the charging treasure receives the charging authentication information provided by the user, the verification information generating module generates reference authentication information for verifying the charging authentication information in real time, wherein the verification information generating module may The reference authentication is generated based on the inherent information of the charging treasure (for example, hardware identification information or serial number of the charging treasure, or the inherent information and dynamic factors of the charging treasure (for example, current time, number of counters, random number, etc.) information.
  • the output control module of the charging treasure sends a closing switch command to the output control switch. When the output control switch is closed, the discharging circuit is connected, and the charging treasure starts charging the user equipment or other user equipment.
  • a method for controlling a charging device comprises a step S41 (not shown) and a step S42 (not shown).
  • step S41 the user equipment acquires the device identification information corresponding to the charging device;
  • step S42 the charging authentication information corresponding to the device identification information is determined, wherein the charging authentication information is used to close the discharging circuit of the charging device.
  • Charge externally For example, after the user equipment acquires the serial number information of the charging device, and selects to charge the other user equipment by using the charging device, the corresponding charging charging authentication information for external charging is generated according to the serial number of the charging device.
  • the user holds the user device, and the user wants to use the charging device to charge the user device of the user device or other user through the application.
  • the user equipment first obtains the serial number corresponding to the charging treasure, wherein the user equipment can detect the serial number corresponding to the charging treasure entered by the user, and can also obtain the serial number of the charging treasure by scanning the two-dimensional code.
  • the user equipment After the user equipment obtains the serial number of the charging treasure, the user equipment locally queries the charging authentication information corresponding to the charging treasure according to the serial number, and returns the charging authentication information corresponding to the serial number after the local database matches.
  • the user equipment After obtaining the serial number of the charging treasure, the user equipment sends the serial number to the network device; the network device matches the charging authentication information corresponding to the serial number in the database, or generates the charging corresponding to the serial number in real time. The authentication information is then returned to the user equipment by the network device.
  • the charging treasure can be searched in the Bluetooth, and the connection between the user equipment and the charging treasure is established through Bluetooth, and the charging authentication information is transmitted to the charging treasure through Bluetooth in the application; Users can also complete the transmission process through NFC and other short-range communication methods. The user can also input the charging authentication information through the physical keyboard of the charging treasure, so that the charging treasure receives the charging authentication information.
  • the charging treasure After receiving the charging authentication information, the charging treasure performs matching verification with the reference authentication information inside the charging treasure; here, the reference authentication information may be stored locally by the charging treasure, or may be generated in real time by the charging treasure.
  • the charging treasure includes a verification information generating module.
  • the verification information generating module After the charging treasure receives the charging authentication information provided by the user, the verification information generating module generates reference authentication information for verifying the charging authentication information in real time, wherein the verification information generating module may The reference authentication is generated based on the inherent information of the charging treasure (for example, hardware identification information or serial number of the charging treasure, or the inherent information and dynamic factors of the charging treasure (for example, current time, number of counters, random number, etc.) information.
  • the charging treasure output control module sends an open switch command to the output control switch, and after the output control switch is turned off, the output discharge circuit is disconnected, and the charging is performed. Bao stops charging the user equipment.
  • FIG. 5 illustrates a method for charging a user equipment by a charging device at a network device side according to still another aspect of the present application, wherein the method includes steps S31, S32, and S33.
  • the network device receives the charging authentication information request sent by the user equipment, where the charging authentication information request includes device identification information; in step S32, the network device determines the charging authentication information corresponding to the device identification information.
  • the charging authentication information is used to close a discharging circuit of the charging device corresponding to the device identification information to charge the user equipment; in step S33, the network device returns the charging authentication information to the user device.
  • the network device receives the authentication information request that is sent by the user equipment and includes the charging device identification information, where the network device determines the charging authentication information corresponding to the serial number in the database based on the charging device identification information, such as the serial number, and returns the charging authentication information.
  • the network device receives an authentication information request sent by the user equipment, including the charging device identification information, such as a serial number, based on the charging device identification information (eg, a charging treasure serial number, etc.), or the device identification information and a dynamic factor (eg, The current time, the number of counters, the random number, and the like), and the charging authentication information is generated.
  • the network device then returns the charging authentication information to the user device.
  • the user holds the user device and the user wants to charge the user device using the charging treasure.
  • the user equipment first obtains the serial number corresponding to the charging treasure, wherein the user equipment can detect the serial number corresponding to the charging treasure input by the user in the user equipment, and can also obtain the serial number of the charging treasure by scanning the two-dimensional code.
  • the user equipment sends the serial number to the network device, and after the network device matches in the database, determines the charging authentication information preset by the serial number, and then the network device authenticates the charging. The information is returned to the user device.
  • the charging treasure can be searched in the Bluetooth, and the connection between the user equipment and the charging treasure is established through Bluetooth, and the charging authentication information is transmitted to the charging treasure through Bluetooth in the application; Users can also complete the transmission process through NFC and other short-range communication methods. The user can also input the charging authentication information through the physical keyboard of the charging treasure, so that the charging treasure receives the charging authentication information.
  • the charging treasure After receiving the charging authentication information, the charging treasure performs matching verification with the reference authentication information inside the charging treasure; here, the reference authentication information may be stored locally by the charging treasure, or may be generated in real time by the charging treasure.
  • the charging treasure includes a verification information generating module.
  • the verification information generating module After the charging treasure receives the charging authentication information provided by the user, the verification information generating module generates reference authentication information for verifying the charging authentication information in real time, wherein the verification information generating module may The reference authentication is generated based on the inherent information of the charging treasure (for example, hardware identification information or serial number of the charging treasure, or the inherent information and dynamic factors of the charging treasure (for example, current time, number of counters, random number, etc.) information.
  • the output control module of the charging treasure sends a closing switch command to the output control switch, and when the output control switch is closed, the discharging circuit is Connected, the charging treasure starts charging the user equipment.
  • the network device generates charging authentication information corresponding to the device identification information according to the authentication information generation setting of the charging device corresponding to the device identification information, wherein the charging authentication information is used to close the A discharge circuit of the charging device charges the user equipment.
  • the network device receives an authentication information request sent by the user equipment, including charging device identification information, such as a serial number, based on the charging device identification information (eg, a charging treasure serial number, etc.), or the device identification information and a dynamic factor (eg, current).
  • the charging authentication information is generated by time, counter number, random number, and the like.
  • the network device then returns the charging authentication information to the user device.
  • the user holds the user device and the user wants to charge the user device using the charging treasure.
  • the user equipment first obtains the serial number corresponding to the charging treasure, wherein the user equipment can detect the serial number corresponding to the charging treasure input by the user in the user equipment, and can also obtain the serial number of the charging treasure by scanning the two-dimensional code. After obtaining the serial number of the charging treasure, the user equipment sends the serial number to the network device, and after the network device matches in the database, determines the charging authentication information preset by the serial number, and then the network device authenticates the charging.
  • the information is returned to the user equipment; for example, the user equipment sends the serial number to the corresponding network device, and the network device receives the authentication information request sent by the user equipment, including the charging device identification information, such as the serial number, based on the charging device identification information (eg, The charging treasure serial number, etc., or the device identification information and dynamic factors (eg, current time, number of counters, random number, etc.), generate the charging authentication information.
  • the network device then returns the charging authentication information to the user device.
  • the charging treasure can be searched in the Bluetooth, and the connection between the user equipment and the charging treasure is established through Bluetooth, and the charging authentication information is transmitted to the charging treasure through Bluetooth in the application; Users can also complete the transmission process through NFC and other short-range communication methods. The user can also input the charging authentication information through the physical keyboard of the charging treasure, so that the charging treasure receives the charging authentication information.
  • the charging treasure After receiving the charging authentication information, the charging treasure performs matching verification with the reference authentication information inside the charging treasure; here, the reference authentication information may be stored locally by the charging treasure, or may be generated in real time by the charging treasure.
  • the charging treasure includes a verification information generating module.
  • the verification information generating module After the charging treasure receives the charging authentication information provided by the user, the verification information generating module generates reference authentication information for verifying the charging authentication information in real time, wherein the verification information generating module may The reference authentication is generated based on the inherent information of the charging treasure (for example, hardware identification information or serial number of the charging treasure, or the inherent information and dynamic factors of the charging treasure (for example, current time, number of counters, random number, etc.) information.
  • the output control module of the charging treasure sends a closing switch command to the output control switch, and when the output control switch is closed, the discharging circuit is Connected, the charging treasure starts charging the user equipment.
  • the authentication information generation setting includes at least one of: an authentication information generation algorithm configuration in the charging device; authentication information generation element information in the charging device, wherein the authentication information generation element information includes At least one of the device identification information, hardware identification information of the charging device, and reception time information requested by the charging authentication information.
  • the network device receives an authentication information request sent by the user equipment, including charging device identification information, such as a serial number, based on the charging device identification information (eg, a charging treasure serial number, etc.), or the device identification information, a dynamic factor (eg, current).
  • charging authentication information is generated by a specific algorithm configuration or an algorithm configuration corresponding to the serial number, such as time, number of counters, random number, and the like.
  • the user holds the user device and the user wants to charge the user device using the charging treasure.
  • the user equipment first obtains the serial number corresponding to the charging treasure, wherein the user equipment can detect the serial number corresponding to the charging treasure input by the user in the user equipment, and can also obtain the serial number of the charging treasure by scanning the two-dimensional code. After obtaining the serial number of the charging treasure, the user equipment sends the serial number to the network device, and after the network device matches in the database, determines the charging authentication information preset by the serial number, and then the network device authenticates the charging.
  • the information is returned to the user equipment; for example, the user equipment sends the serial number to the corresponding network device, and the network device receives the authentication information request sent by the user equipment, including the charging device identification information, such as the serial number, based on the charging device identification information (eg, The charging authentication serial number, or the like, or the device identification information, dynamic factors (eg, current time, number of counters, random numbers, etc.), and a specific algorithm configuration or an algorithm configuration corresponding to the serial number, generates the charging authentication information.
  • the network device then returns the charging authentication information to the user device.
  • the charging treasure can be searched in the Bluetooth, and the connection between the user equipment and the charging treasure is established through Bluetooth, and the charging authentication information is transmitted to the charging treasure through Bluetooth in the application; Users can also complete the transmission process through NFC and other short-range communication methods. The user can also input the charging authentication information through the physical keyboard of the charging treasure, so that the charging treasure receives the charging authentication information.
  • the charging treasure After receiving the charging authentication information, the charging treasure performs matching verification with the reference authentication information inside the charging treasure; here, the reference authentication information may be stored locally by the charging treasure, or may be generated in real time by the charging treasure.
  • the charging treasure includes a verification information generating module.
  • the verification information generating module After the charging treasure receives the charging authentication information provided by the user, the verification information generating module generates reference authentication information for verifying the charging authentication information in real time, wherein the verification information generating module may Based on the inherent information of the charging treasure (for example, hardware identification information or serial number of the charging treasure, etc.), or the inherent information and dynamic factors of the charging treasure (for example, current time, number of counters, random number, etc.), and a specific algorithm The configuration or the algorithm configuration corresponding to the serial number generates the reference authentication information.
  • the inherent information of the charging treasure for example, hardware identification information or serial number of the charging treasure, etc.
  • dynamic factors of the charging treasure for example, current time, number of counters, random number, etc.
  • the output control module of the charging treasure sends a closing switch command to the output control switch, and when the output control switch is closed, the discharging circuit is Connected, the charging treasure starts charging the user equipment.
  • FIG. 6 illustrates a method for charging a user equipment by a charging device, in accordance with an aspect of the present application, wherein the method includes:
  • the user equipment acquires device identification information corresponding to the charging device
  • the charging authentication information corresponding to the device identification information, wherein the charging authentication information is used to close a discharging circuit between the charging device and the user equipment to charge the user equipment;
  • the charging device acquires the charging authentication information, where the charging authentication information is input by a user or sent by the user equipment;
  • the charging device verifies the charging authentication information
  • the charging device closes a discharge circuit between the charging device and the user device to charge the user device.
  • FIG. 7 illustrates a method for charging a user equipment by a charging device in accordance with another aspect of the present application, wherein the method includes:
  • the user equipment acquires device identification information corresponding to the charging device
  • the charging authentication information request includes the device identification information
  • the network device Determining, by the network device, the charging authentication information corresponding to the device identification information, wherein the charging authentication information is used to close a discharging circuit of the charging device corresponding to the device identification information to charge the user equipment;
  • the network device returns the charging authentication information to the user equipment
  • the charging device acquires the charging authentication information, where the charging authentication information is input by a user or sent by the user equipment;
  • the charging device verifies the charging authentication information
  • the charging device closes a discharging circuit between the charging device and the user equipment to charge the user equipment.
  • an apparatus for charging a user equipment by a charging device at a user equipment end comprising:
  • a memory arranged to store computer executable instructions that, when executed, cause the processor to execute:
  • an apparatus for charging a user equipment at a charging device end comprising:
  • a memory arranged to store computer executable instructions that, when executed, cause the processor to execute:
  • the discharging circuit between the charging device and the user equipment is closed to charge the user equipment.
  • an apparatus for controlling a charging apparatus comprising:
  • a memory arranged to store computer executable instructions that, when executed, cause the processor to execute:
  • an apparatus for charging a user equipment by a charging device at a network device end comprising:
  • a memory arranged to store computer executable instructions that, when executed, cause the processor to execute:
  • a computer readable medium comprising instructions that, when executed, cause a system to:
  • a computer readable medium comprising instructions that, when executed, cause a system to:
  • the discharging circuit between the charging device and the user equipment is closed to charge the user equipment.
  • a computer readable medium comprising instructions that, when executed, cause a system to:
  • a computer readable medium comprising instructions that, when executed, cause a system to:
  • the present application can be implemented in software and/or a combination of software and hardware, for example, using an application specific integrated circuit (ASIC), a general purpose computer, or any other similar hardware device.
  • the software program of the present application can be executed by a processor to implement the steps or functions described above.
  • the software programs (including related data structures) of the present application can be stored in a computer readable recording medium such as a RAM memory, a magnetic or optical drive or a floppy disk and the like.
  • some of the steps or functions of the present application may be implemented in hardware, for example, as a circuit that cooperates with a processor to perform various steps or functions.
  • a portion of the present application can be applied as a computer program product, such as computer program instructions, which, when executed by a computer, can invoke or provide a method and/or technical solution in accordance with the present application.
  • the form of computer program instructions in a computer readable medium includes, but is not limited to, source files, executable files, installation package files, etc., accordingly, the manner in which the computer program instructions are executed by the computer includes but not Limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding installation. program.
  • the computer readable medium can be any available computer readable storage medium or communication medium that can be accessed by a computer.
  • Communication media includes media that can be transferred from one system to another by communication signals including, for example, computer readable instructions, data structures, program modules or other data.
  • Communication media can include conductive transmission media such as cables and wires (eg, fiber optics, coaxial, etc.) and wireless (unguided transmission) media capable of propagating energy waves, such as acoustic, electromagnetic, RF, microwave, and infrared.
  • Computer readable instructions, data structures, program modules or other data may be embodied, for example, as modulated data signals in a wireless medium, such as a carrier wave or a similar mechanism, such as embodied in a portion of a spread spectrum technique.
  • modulated data signal refers to a signal whose one or more features are altered or set in such a manner as to encode information in the signal. Modulation can be analog, digital or hybrid modulation techniques.
  • the computer readable storage medium may comprise, by way of example and not limitation, vols and non-volatile, implemented in any method or technology for storing information such as computer readable instructions, data structures, program modules or other data.
  • a computer readable storage medium includes, but is not limited to, volatile memory such as random access memory (RAM, DRAM, SRAM); and nonvolatile memory such as flash memory, various read only memories (ROM, PROM, EPROM) , EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disks, tapes, CDs, DVDs); or other currently known media or later developed for storage in computer systems Computer readable information/data used.
  • volatile memory such as random access memory (RAM, DRAM, SRAM)
  • nonvolatile memory such as flash memory, various read only memories (ROM, PROM, EPROM) , EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disk
  • an embodiment in accordance with the present application includes a device including a memory for storing computer program instructions and a processor for executing program instructions, wherein when the computer program instructions are executed by the processor, triggering
  • the apparatus operates based on the aforementioned methods and/or technical solutions in accordance with various embodiments of the present application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Charge And Discharge Circuits For Batteries Or The Like (AREA)

Abstract

本申请的目的是提供一种用于通过充电装置对用户设备进行充电的方法,其中,该方法包括:获取所述充电装置对应的装置识别信息;确定所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述充电装置与用户设备间的放电电路以对所述用户设备进行充电。本申请实现了共享充电装置不再依赖柜体,降低了共享充电装置的成本,使共享充电装置的推广更加普及。

Description

一种通过充电装置对用户设备进行充电的方法与设备 技术领域
本申请涉及通信领域,尤其涉及一种用于通过充电装置对用户设备进行充电的技术。
背景技术
随着人们生活水平的提高,移动设备(如手机、MP3、平板等)使用越来越普及,且随着移动设备的功能越来越强大,其内置的电池容量有限,容易出现电量不足的情况,在移动使用过程中不方便使用固定的电源进行充电,而随身携带充电宝又会增加一定的负担。
目前存在的充电机柜成本高,而且用户扫描柜体二维码取出充电宝后充电宝彻底脱离柜体不再受控;实际运营过程中由于过程繁琐,店家也嫌麻烦(占地方,且无利益驱动)直接把充电宝拔下来给用户使用,造成充电宝完全失控。
发明内容
本申请的一个目的是提供一种用于通过充电装置对用户设备进行充电的方法。
根据本申请的一个方面,提供了一种在用户设备端用于通过充电装置对用户设备进行充电的方法,该方法包括:
获取所述充电装置对应的装置识别信息;
确定所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述充电装置与用户设备间的放电电路以对所述用户设备进行充电。
根据本申请的另一个方面,提供了一种在充电装置端用于对用户设备进行充电的方法,该方法包括:
获取所述充电认证信息,其中,所述充电认证信息由用户输入或由所述用户设备发送;
验证所述充电认证信息;
当所述充电认证信息通过验证,闭合充电装置与所述用户设备间的放电电路以对所述用户设备进行充电。
根据本申请的又一个方面,提供了一种控制充电装置的方法,该方法包括:
获取充电装置对应的装置识别信息;
确定所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述充电装置的放电电路以对外充电。
根据本申请的再一个方面,提供了一种在网络设备端用于通过充电装置对用户设备进行充电的方法,该方法包括:
接收用户设备发送的充电认证信息请求,其中所述充电认证信息请求包括装置识别信息;
确定所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述装置识别信息对应的充电装置的放电电路以对所述用户设备进行充电;
将所述充电认证信息返回至所述用户设备。
根据本申请的一个方面,提供了一种用于通过充电装置对用户设备进行充电的方法,其中,该方法包括:
用户设备获取所述充电装置对应的装置识别信息;
所述用户设备确定所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述充电装置与用户设备间的放电电路以对所述用户设备进行充电;
所述充电装置获取所述充电认证信息,其中,所述充电认证信息由用户输入或由所述用户设备发送;
所述充电装置验证所述充电认证信息;
当所述充电认证信息通过验证,所述充电装置闭合所述充电装置与所述用户设备间的放电电路以对所述用户设备进行充电。
根据本申请的另一个方面,提供了一种用于通过充电装置对用户设备进行充电的方法,其中,该方法包括:
用户设备获取所述充电装置对应的装置识别信息;
所述用户设备向对应的网络设备发送的充电认证信息请求,其中所述充电认证信息请求包括所述装置识别信息;
所述网络设备接收所述用户设备发送的充电认证信息请求;
所述网络设备确定所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述装置识别信息对应的充电装置的放电电路以对所述用户设备进行充电;
所述网络设备将所述充电认证信息返回至所述用户设备;
所述用户设备接收所述网络设备返回的所述装置识别信息对应的充电认证信息;
所述充电装置获取所述充电认证信息,其中,所述充电认证信息由用户输入或由所述用户设备发送;
所述充电装置验证所述充电认证信息;
当所述充电认证信息通过验证,所述充电装置闭合所述充电装置与所述用户设备间的放电电路以对所述用户设备进行充电。
根据本申请的一个方面,提供了一种在用户设备端用于通过充电装置对用户设备进行充电的设备,该设备包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行:
获取所述充电装置对应的装置识别信息;
确定所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述充电装置与用户设备间的放电电路以对所述用户设备进行充电。
根据本申请的另一个方面,提供了一种在充电装置端用于对用户设备进行充电的设备,该设备包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行:
获取所述充电认证信息,其中,所述充电认证信息由用户输入或由所述用户设备发送;
验证所述充电认证信息;
当所述充电认证信息通过验证,闭合充电装置与所述用户设备间的放电电路以对所述用户设备进行充电。
根据本申请的又一个方面,提供了一种用于控制充电装置的设备,该设备包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行:
获取充电装置对应的装置识别信息;
确定所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述充电装置的放电电路以对外充电。
根据本申请的再一个方面,提供了一种在网络设备端用于通过充电装置对用户设备进行充电的设备,该设备包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行:
接收用户设备发送的充电认证信息请求,其中所述充电认证信息请求包括装置识别信息;
确定所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述装置识别信息对应的充电装置的放电电路以对所述用户设备进行充电;
将所述充电认证信息返回至所述用户设备。
根据本申请的一个方面,提供了一种包括指令的计算机可读介质,所述指令在被执行时使得系统进行如下操作:
获取所述充电装置对应的装置识别信息;
确定所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述充电装置与用户设备间的放电电路以对所述用户设备进行充 电。
根据本申请的另一个方面,提供了一种包括指令的计算机可读介质,所述指令在被执行时使得系统进行如下操作:
获取所述充电认证信息,其中,所述充电认证信息由用户输入或由所述用户设备发送;
验证所述充电认证信息;
当所述充电认证信息通过验证,闭合充电装置与所述用户设备间的放电电路以对所述用户设备进行充电。
根据本申请的又一个方面,提供了一种包括指令的计算机可读介质,所述指令在被执行时使得系统进行如下操作:
获取充电装置对应的装置识别信息;
确定所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述充电装置的放电电路以对外充电。
根据本申请的再一个方面,提供了一种包括指令的计算机可读介质,所述指令在被执行时使得系统进行如下操作:
接收用户设备发送的充电认证信息请求,其中所述充电认证信息请求包括装置识别信息;
确定所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述装置识别信息对应的充电装置的放电电路以对所述用户设备进行充电;
将所述充电认证信息返回至所述用户设备。
与现有技术相比,本申请通过给充电电源增加类似密保控制的电路和数字按键,然后通过获取充电装置的装置识别信息进而在应用中获取充电认证信息,并与充电装置内部参考认证信息匹配,若获取的充电认证信息与参考认证信息匹配验证一致则充电装置对用户设备充电;本方案达到了充电装置的共享,且不再依赖柜体,进一步降低了共享充电装置实现的成本,使共享充电装置的推广更加普及。
附图说明
通过阅读参照以下附图所作的对非限制性实施例所作的详细描述,本申请的其它特征、目的和优点将会变得更明显:
图1示出根据本申请一个实施例的一种用于通过充电装置对用户设备进行充电的系统拓扑图;
图2示出根据本申请一个实施例的一种在用户设备端用于通过充电装置对用户设备进行充电的方法流程图;
图3示出了图2中一个步骤的子步骤;
图4示出了根据本申请的另一个实施例的一种在充电装置端用于对用户设备进行充电的方法流程图;
图5示出了根据本申请的又一个实施例的一种在网络设备端用于通过充电装置对用户设备进行充电的方法流程图;
图6示出了根据本申请的一个实施例的一种用于通过充电装置对用户设备进行充电的系统方法流程图;
图7示出了根据本申请的另一个实施例的一种用于通过充电装置对用户设备进行充电的系统方法流程图;
图8示出了根据本申请的一个实施例的一种充电装置的结构示意图;
附图中相同或相似的附图标记代表相同或相似的部件。
具体实施方式
下面结合附图对本申请作进一步详细描述。
在本申请一个典型的配置中,终端、服务网络的设备和可信方均包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器 (DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。
本申请所指设备包括但不限于用户设备、网络设备、或用户设备与网络设备通过网络相集成所构成的设备。所述用户设备包括但不限于任何一种可与用户进行人机交互(例如通过触摸板进行人机交互)的移动电子产品,例如智能手机、平板电脑等,所述移动电子产品可以采用任意操作系统,如android操作系统、iOS操作系统等。其中,所述网络设备包括一种能够按照事先设定或存储的指令,自动进行数值计算和信息处理的电子设备,其硬件包括但不限于微处理器、专用集成电路(ASIC)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、数字信号处理器(DSP)、嵌入式设备等。所述网络设备包括但不限于计算机、网络主机、单个网络服务器、多个网络服务器集或多个服务器构成的云;在此,云由基于云计算(Cloud Computing)的大量计算机或网络服务器构成,其中,云计算是分布式计算的一种,由一群松散耦合的计算机集组成的一个虚拟超级计算机。所述网络包括但不限于互联网、广域网、城域网、局域网、VPN网络、无线自组织网络(Ad Hoc网络)等。优选地,所述设备还可以是运行于所述用户设备、网络设备、或用户设备与网络设备、网络设备、触摸终端或网络设备与触摸终端通过网络相集成所构成的设备上的程序。
当然,本领域技术人员应能理解上述设备仅为举例,其他现有的或今后可能出现的设备如可适用于本申请,也应包含在本申请保护范围以内,并在此以引用方式包含于此。
在本申请的描述中,“多个”的含义是两个或者更多,除非另有明确具体的限定。
图1示出了本申请的一个典型应用场景,用户设备获取充电装置的装置识别信息确定获取对应的充电认证信息,然后通过充电装置的验证后进行充电。该方案可由用户设备与充电装置两方配合完成,也可以通过用户 设备、网络设备及充电装置三方配合完成。
图2示出了根据本申请一个方面的一种在用户设备端用于通过充电装置对用户设备进行充电的方法,该方法包括步骤S11和步骤S12。
具体地,在步骤S11中,用户设备获取所述充电装置对应的装置识别信息。例如,充电装置上贴有对应装置识别信息如序列号等用户设备通过检测用户输入的信息获取该序列号;又例如,充电装置上贴有二维码,其中,用户设备通过扫描该充电装置上的二维码来获取其对应的序列号。
随后,在步骤S12中,用户设备确定所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述充电装置与用户设备间的放电电路以对所述用户设备进行充电。例如,用户设备获取充电装置对应的充电装置的序列号后,基于该序列号获取充电装置序列号对应的充电认证信息,该充电认证信息可以用于闭合充电装置与用户设备之间的放电电路对用户设备进行充电。获取充电认证信息的过程可以在用户设备本地完成,也可以上传到网络设备端处理,网络设备端处理后,网络设备将该充电认证信息返回给用户设备。该充电认证信息可以是预设的,也可以是实时生成的。
例如,用户持有用户设备,用户想要使用充电装置对用户设备进行充电。用户设备先获取该充电宝对应的序列号,例如,用户设备检测用户在用户设备中输入的该充电宝对应的序列号,也可以通过扫描二维码的方式获取该充电宝的序列号。用户设备基于该充电宝的序列号以后获取该序列号对应的充电认证信息,其中,该充电认证信息为该充电宝闭合放电电路的密码。用户向充电宝输入充电认证信息,充电装置对该充电认证信息进行验证;若该充电认证信息通过验证,则充电宝的放电电路闭合,可向外部设备供电。
优选地,该方法还包括步骤S13。在步骤S13中,用户设备呈现所述充电认证信息;或者用户设备将所述充电认证信息发送至所述充电装置,以供所述充电装置闭合所述放电电路来对所述用户设备进行充电。例如,用户获取到该充电装置序列号对应的充电认证信息后,在屏幕上呈现出充电认证信息,用户根据呈现的充电认证信息在充电装置的机械键盘上手动 输入该充电认证信息;或者用户设备通过蓝牙搜索并连接到该充电装置,然后将该充电认证信息用蓝牙传输的方式发送至该充电装置。又例如,用户设备还可以通过NFC(Near Field Communication,近场通信)等近距离通讯方式来发送充电认证信息,过程与上述类似,在此不再赘述。
例如,用户设备获取到该充电宝的序列号以后,在本地查询该充电宝的序列号对应的充电认证信息,应用数据库匹配后返回该序列号对应的充电认证信息。用户设备获取充电认证信息后,在其屏幕上呈现该充电认证信息,用户根据呈现的充电认证信息在充电装置的机械键盘上手动输入该充电认证信息;或者用户设备可以在蓝牙中搜索到该充电宝,通过蓝牙建立用户设备与充电宝之间的链接后,在应用中通过蓝牙的方式将该充电认证信息传输给该充电宝;用户还可以通过NFC等近距离通信方式完成传输过程。充电装置获取该充电认证信息后,对该充电认证信息进行验证;若该充电认证信息通过验证,则充电宝的放电电路闭合,可向外部设备供电。
优选地,参考图3,步骤S12包括子步骤S12a和子步骤S12b。在子步骤S12a中,用户设备向对应的网络设备发送充电认证信息请求,其中所述充电认证信息请求包括所述装置识别信息;在子步骤S12b中,用户设备接收所述网络设备返回的所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述充电装置与所述用户设备间的放电电路以对所述用户设备进行充电。例如,用户设备获取该充电装置的序列号后,向网络设备发送充电认证信息请求,向网络设备请求该充电装置对应的的充电认证信息,其中,该充电认证信息请求包含了该充电装置的序列号;网络设备进行查询获取序列号预设的充电认证信息或基于序列号实时生成动态充电认证信息后,向用户设备返回对应的充电认证信息,该充电认证信息用于闭合充电装置的放电电路,从而对用户设备进行充电。
例如,用户获取到该充电宝的序列号后,将该序列号发送至网络设备。网络设备接收到该序列号,在数据库中进行查询后确定序列号预设的充电认证信息或基于序列号和动态因子(如时间,随机数等)实时生成充电认证信息,随后,该网络设备将该充电认证信息返回给用户设备。用户设备 获取充电认证信息后,通过用户输入或者蓝牙、NFC等近距离通信方式将该充电认证信息发送给充电装置。充电装置获取该充电认证信息后,对该充电认证信息进行验证;若该充电认证信息通过验证,则充电宝的放电电路闭合,可向外部设备供电。
优选地,在步骤b中,用户设备生成所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述充电装置的放电电路以对所述用户设备进行充电。例如,用户设备基于该充电宝的固有信息(例如,充电宝的硬件标识信息或序列号等),或该充电宝的固有信息及动态因子(例如,当前时间、计数器次数、随机数等),生成该充电认证信息。
例如,用户设备获取到该充电宝的序列号后,可以在本地查询该充电宝的序列号对应的充电认证信息。又例如,用户获取到该充电宝的序列号以后,基于该充电宝的固有信息(例如,充电宝的硬件标识信息或序列号等),或该充电宝的固有信息及动态因子(例如,当前时间、计数器次数、随机数等),生成该充电认证信息。还例如,用户设备将该序列号发送至网络设备。网络设备接收到该序列号,在数据库中进行查询后确定序列号预设的充电认证信息或基于序列号和动态因子(如时间,随机数等)实时生成充电认证信息,随后,该网络设备将该充电认证信息返回给用户设备。用户设备获取充电认证信息后,通过用户输入或蓝牙、NFC等近距离通讯方式将该充电认证信息传输给该充电宝。充电装置获取该充电认证信息后,对该充电认证信息进行验证;若该充电认证信息通过验证,则充电宝的放电电路闭合,可向外部设备供电。
优选地,所述装置识别信息包括以下至少任一项:所述充电装置的装置序列号信息;所述充电装置的二维码信息。例如,用户设备获取的装置识别信息可以是用户手动输入的充电装置的装置序列号信息,也可以用户设备扫描到的充电装置的二维码信息。
例如,用户持有用户设备,用户想要使用充电宝对用户设备进行充电。用户设备先获取该充电宝对应的序列号,其中,用户设备可以检测用户手动输入的该充电宝对应的序列号,也可以通过扫描二维码的方式获取该充电宝的序列号,其中,该二维码包含该充电装置的装置识别信息。用户设 备获取到该充电宝的序列号后,可以在本地查询该充电宝的序列号对应的充电认证信息。又例如,用户获取到该充电宝的序列号以后,基于该充电宝的固有信息(例如,充电宝的硬件标识信息或序列号等),或该充电宝的固有信息及动态因子(例如,当前时间、计数器次数、随机数等),生成该充电认证信息。还例如,用户设备将该序列号发送至网络设备。网络设备接收到该序列号,在数据库中进行查询后确定序列号预设的充电认证信息或基于序列号和动态因子(如时间,随机数等)实时生成充电认证信息,随后,该网络设备将该充电认证信息返回给用户设备。用户设备获取充电认证信息后,通过用户输入或蓝牙、NFC等近距离通讯方式将该充电认证信息传输给该充电宝。充电宝获取该充电认证信息后,对该充电认证信息进行验证;若该充电认证信息通过验证,则充电宝的放电电路闭合,可向外部设备供电。
图4示出了根据本申请另一个方面的一种在充电装置端用于对用户设备进行充电的方法,其中,该方法包括步骤S21、步骤S22及步骤S23。在步骤S21中,充电装置获取所述充电认证信息,其中,所述充电认证信息由用户输入或由所述用户设备发送;在步骤S22中,充电装置验证所述充电认证信息;在步骤S23中,当所述充电认证信息通过验证,充电装置闭合充电装置与所述用户设备间的放电电路以对所述用户设备进行充电。图8示出了一种对用户设备进行充电的充电装置的结构图,包括放电电路,所述充电装置还包括设置于所述放电电路上的输出控制开关,用于获取充电认证信息的验证信息输入模块,以及分别与所述输出控制开关、所述验证信息输入模块电连接的输出控制模块;其中,所述输出控制模块接收并验证所述验证信息输入模块输入的充电认证信息,当所述充电认证信息通过验证,控制所述输出控制开关闭合,使得所述充电装置通过所述放电电路对外充电。例如,充电装置的物理键盘检测用户输入的充电认证信息,然后,该充电装置的输出控制模块验证该充电认证信息是否正确,若该充电认证信息通过验证,则充电装置的输出控制开关闭合该充电装置与所述用户设备间的放电电路,以对该用户设备进行充电。
例如,用户持有用户设备,用户想要使用充电宝对该用户设备进行充 电。用户设备先获取该充电宝对应的序列号,例如,用户设备可以检测用户在用户设备安装的应用中键入的该充电宝对应的序列号等装置识别信息,也可以通过扫描二维码的方式获取该充电宝的序列号。用户设备获取到该充电宝的序列号以后,根据该序列号在用户设备本地查询该充电宝对应的充电认证信息,本地数据库匹配后返回该序列号对应的充电认证信息。或者,用户设备获取到该充电宝的序列号后,将该序列号发送至网络设备;网络设备在其数据库中匹配到该序列号对应的充电认证信息,或者,实时生成该序列号对应的充电认证信息,随后,该网络设备将该充电认证信息返回给用户设备。
用户设备获取充电认证信息后,可以在蓝牙中搜索到该充电宝,通过蓝牙建立用户设备与充电宝之间的连接后,在应用中通过蓝牙的方式将该充电认证信息传输给该充电宝;用户还可以通过NFC等近距离通信方式完成传输过程。用户还可以通过充电宝的物理键盘输入该充电认证信息,从而使充电宝接收该充电认证信息。
充电宝接收到该充电认证信息后,将其与充电宝内部的参考认证信息进行匹配验证;在此,该参考认证信息可以是充电宝本地存储的,也可以是充电宝内部实时生成的。例如,充电宝包含验证信息发生模块,当充电宝接收到用户提供的充电认证信息后,该验证信息发生模块实时生成用于验证该充电认证信息的参考认证信息,其中,该验证信息发生模块可基于该充电宝的固有信息(例如,充电宝的硬件标识信息或序列号等),或该充电宝的固有信息及动态因子(例如,当前时间、计数器次数、随机数等),生成该参考认证信息。若该充电认证信息与参考认证信息每一位均相同,则该充电认证信息通过验证;随后,充电宝的输出控制模块向输出控制开关发送闭合开关指令,当输出控制开关闭合后,放电电路被连通,该充电宝对用户设备开始充电。
优选地,在步骤S22中,包括子步骤S22a(未示出)和子步骤S22b(未示出)。在子步骤S22a中,当充电装置接收到所述充电认证信息,生成对应的参考认证信息;在子步骤S22b中,充电装置根据所述参考认证信息验证所述充电认证信息。例如,充电装置接收到充电认证信息同时, 验证信息发生模块同时生成参考认证信息,其中,该参考认证信息可以是预设的参考认证信息,也可以是基于该充电宝的固有信息(例如,充电宝的硬件标识信息或序列号等),或该充电宝的固有信息及动态因子(例如,当前时间、计数器次数、随机数等),生成的参考认证信息;随后,在验证信息发生模块将充电认证信息与参考认证信息进行匹配,对充电认证信息进行验证。
例如,用户设备获取到该充电宝的序列号,基于该序列号确定对应的充电认证信息。用户设备获取充电认证信息后,通过检测用户输入的方式或蓝牙、NFC等近距离传输方式将充电认证信息传输给充电宝。充电宝接收到该充电认证信息后,将其与充电宝内部的参考认证信息进行匹配验证,逐位比较充电认证信息与参考认证信息是否一致;在此,该参考认证信息可以是充电宝本地预设的,也可以是充电宝内部实时生成的。例如,充电宝包含验证信息发生模块,当充电宝接收到用户提供的充电认证信息后,该验证信息发生模块实时生成用于验证该充电认证信息的参考认证信息,其中,该验证信息发生模块可基于该充电宝的固有信息(例如,充电宝的硬件标识信息或序列号等),或该充电宝的固有信息及动态因子(例如,当前时间、计数器次数、随机数等),生成该参考认证信息。若充电认证信息与参考认证信息每一位均相同,则该充电认证信息验证成功,充电宝的输出控制模块向输出控制开关发送闭合开关指令,当输出控制开关闭合后,放电电路被连通,该充电宝对用户设备开始充电。
优选地,在步骤S23中,当所述充电认证信息未通过验证,且所述用户设备的充电时长超过预定的充电时长阈值,断开所述放电电路以停止对所述用户设备进行充电。例如,当充电设备已经关机,无法操作时,启动紧急充电功能,连接到充电装置,充电装置对用户设备紧急充电一定时间。充电认证信息未通过验证,且充电时长超过该预定充电时长阈值时,断开该放电电路以停止对所述用户设备进行充电。
例如,用户持有用户设备,用户想要使用充电宝对用户设备进行充电,此时用户设备已经因电量不足而关机,用户设备连接到充电装置,充电装置启动紧急充电功能。用户设备开机后先获取该充电宝对应的序列号,其 中,用户设备可以检测用户在用户设备安装的应用中键入的该充电宝对应的序列号,也可以通过扫描二维码的方式获取该充电宝的序列号。用户设备获取到该充电宝的序列号以后,根据该序列号在用户设备本地查询该充电宝对应的充电认证信息,本地数据库匹配后返回该序列号对应的充电认证信息。或者,用户设备获取到该充电宝的序列号后,将该序列号发送至网络设备;网络设备在其数据库中匹配到该序列号对应的充电认证信息,或者,实时生成该序列号对应的充电认证信息,随后,该网络设备将该充电认证信息返回给用户设备。
用户设备获取充电认证信息后,可以在蓝牙中搜索到该充电宝,通过蓝牙建立用户设备与充电宝之间的连接后,在应用中通过蓝牙的方式将该充电认证信息传输给该充电宝;用户还可以通过NFC等近距离通信方式完成传输过程。用户还可以通过充电宝的物理键盘输入该充电认证信息,从而使充电宝接收该充电认证信息。
充电宝接收到该充电认证信息后,将其与充电宝内部的参考认证信息进行匹配验证;在此,该参考认证信息可以是充电宝本地存储的,也可以是充电宝内部实时生成的。例如,充电宝包含验证信息发生模块,当充电宝接收到用户提供的充电认证信息后,该验证信息发生模块实时生成用于验证该充电认证信息的参考认证信息,其中,该验证信息发生模块可基于该充电宝的固有信息(例如,充电宝的硬件标识信息或序列号等),或该充电宝的固有信息及动态因子(例如,当前时间、计数器次数、随机数等),生成该参考认证信息。若该充电认证信息验证成功,则充电宝的输出控制模块向输出控制开关发送闭合开关指令,当输出控制开关闭合后,放电电路被连通,该充电宝对该用户设备或其他用户设备开始充电。
优选地,根据本申请的又一方面的一种用于控制充电装置的方法,其中,该方法包括步骤S41(未示出)和步骤S42(未示出)。在步骤S41中,用户设备获取充电装置对应的装置识别信息;在步骤S42中,确定所述装置识别信息对应的充电认证信息,其中所述充电认证信息用于闭合所述充电装置的放电电路以对外充电。例如,用户设备获取该充电装置的序列号信息后,选择使用该充电装置对其他用户设备进行充电,则根据该充电装 置的序列号生成对应的对外充电的充电充电认证信息。
例如,用户持有用户设备,用户想要通过该应用使用充电宝对自己的用户设备或其他用户的用户设备进行充电。用户设备先获取该充电宝对应的序列号,其中,用户设备可以检测用户键入的该充电宝对应的序列号,也可以通过扫描二维码的方式获取该充电宝的序列号。用户设备获取到该充电宝的序列号以后,根据该序列号在用户设备本地查询该充电宝对应的充电认证信息,本地数据库匹配后返回该序列号对应的充电认证信息。或者,用户设备获取到该充电宝的序列号后,将该序列号发送至网络设备;网络设备在其数据库中匹配到该序列号对应的充电认证信息,或者,实时生成该序列号对应的充电认证信息,随后,该网络设备将该充电认证信息返回给用户设备。
用户设备获取充电认证信息后,可以在蓝牙中搜索到该充电宝,通过蓝牙建立用户设备与充电宝之间的链接后,在应用中通过蓝牙的方式将该充电认证信息传输给该充电宝;用户还可以通过NFC等近距离通信方式完成传输过程。用户还可以通过充电宝的物理键盘输入该充电认证信息,从而使充电宝接收该充电认证信息。
充电宝接收到该充电认证信息后,将其与充电宝内部的参考认证信息进行匹配验证;在此,该参考认证信息可以是充电宝本地存储的,也可以是充电宝内部实时生成的。例如,充电宝包含验证信息发生模块,当充电宝接收到用户提供的充电认证信息后,该验证信息发生模块实时生成用于验证该充电认证信息的参考认证信息,其中,该验证信息发生模块可基于该充电宝的固有信息(例如,充电宝的硬件标识信息或序列号等),或该充电宝的固有信息及动态因子(例如,当前时间、计数器次数、随机数等),生成该参考认证信息。若该充电认证信息验证未成功,且紧急充电功能时间超过预定时间阈值,则充电宝输出控制模块向输出控制开关发送断开开关指令,输出控制开关断开后,输出放电电路断开,该充电宝对用户设备停止充电。
图5示出了根据本申请再一方面的一种在网络设备端用于通过充电装置对用户设备进行充电的方法,其中,该方法包括步骤S31、步骤S32及 步骤S33。其中,在步骤S31中,网络设备接收用户设备发送的充电认证信息请求,其中,所述充电认证信息请求包括装置识别信息;在步骤S32中,网络设备确定所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述装置识别信息对应的充电装置的放电电路以对所述用户设备进行充电;在步骤S33中,网络设备将所述充电认证信息返回至所述用户设备。例如,网络设备接收用户设备发送的包含充电装置识别信息的认证信息请求,其中,网络设备基于充电装置识别信息如序列号,在数据库确定序列号对应的充电认证信息,并将该充电认证信息返回给用户设备。又例如,网络设备接收用户设备发送的包含充电装置识别信息如序列号的认证信息请求,基于该充电装置识别信息(例如,充电宝序列号等),或该装置识别信息及动态因子(例如,当前时间、计数器次数、随机数等),生成该充电认证信息。随后,网络设备将该充电认证信息返回至该用户设备。
例如,用户持有用户设备,用户想要使用充电宝对用户设备进行充电。用户设备先获取该充电宝对应的序列号,其中,用户设备可以检测用户在用户设备中输入的该充电宝对应的序列号,也可以通过扫描二维码的方式获取该充电宝的序列号。用户设备获取到该充电宝的序列号以后,将该序列号发送至网络设备,网络设备在其数据库中匹配后,确定该序列号预设的充电认证信息,随后,该网络设备将该充电认证信息返回给用户设备。
用户设备获取充电认证信息后,可以在蓝牙中搜索到该充电宝,通过蓝牙建立用户设备与充电宝之间的链接后,在应用中通过蓝牙的方式将该充电认证信息传输给该充电宝;用户还可以通过NFC等近距离通信方式完成传输过程。用户还可以通过充电宝的物理键盘输入该充电认证信息,从而使充电宝接收该充电认证信息。
充电宝接收到该充电认证信息后,将其与充电宝内部的参考认证信息进行匹配验证;在此,该参考认证信息可以是充电宝本地存储的,也可以是充电宝内部实时生成的。例如,充电宝包含验证信息发生模块,当充电宝接收到用户提供的充电认证信息后,该验证信息发生模块实时生成用于验证该充电认证信息的参考认证信息,其中,该验证信息发生模块可基于 该充电宝的固有信息(例如,充电宝的硬件标识信息或序列号等),或该充电宝的固有信息及动态因子(例如,当前时间、计数器次数、随机数等),生成该参考认证信息。若该充电认证信息与参考认证信息每一位均相同,则该充电认证信息通过验证;随后,充电宝的输出控制模块向输出控制开关发送闭合开关指令,当输出控制开关闭合后,放电电路被连通,该充电宝对用户设备开始充电。
优选地,在步骤S32中,网络设备根据所述装置识别信息对应的充电装置的认证信息生成设置,生成所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述充电装置的放电电路以对所述用户设备进行充电。例如,网络设备接收用户设备发送的包含充电装置识别信息如序列号的认证信息请求,基于该充电装置识别信息(例如,充电宝序列号等),或该装置识别信息及动态因子(例如,当前时间、计数器次数、随机数等),生成该充电认证信息。随后,网络设备将该充电认证信息返回至该用户设备。
例如,用户持有用户设备,用户想要使用充电宝对用户设备进行充电。用户设备先获取该充电宝对应的序列号,其中,用户设备可以检测用户在用户设备中输入的该充电宝对应的序列号,也可以通过扫描二维码的方式获取该充电宝的序列号。用户设备获取到该充电宝的序列号以后,将该序列号发送至网络设备,网络设备在其数据库中匹配后,确定该序列号预设的充电认证信息,随后,该网络设备将该充电认证信息返回给用户设备;又例如,用户设备将该序列号发送至对应网络设备,网络设备接收用户设备发送的包含充电装置识别信息如序列号的认证信息请求,基于该充电装置识别信息(例如,充电宝序列号等),或该装置识别信息及动态因子(例如,当前时间、计数器次数、随机数等),生成该充电认证信息。随后,网络设备将该充电认证信息返回至该用户设备。
用户设备获取充电认证信息后,可以在蓝牙中搜索到该充电宝,通过蓝牙建立用户设备与充电宝之间的链接后,在应用中通过蓝牙的方式将该充电认证信息传输给该充电宝;用户还可以通过NFC等近距离通信方式完成传输过程。用户还可以通过充电宝的物理键盘输入该充电认证信息, 从而使充电宝接收该充电认证信息。
充电宝接收到该充电认证信息后,将其与充电宝内部的参考认证信息进行匹配验证;在此,该参考认证信息可以是充电宝本地存储的,也可以是充电宝内部实时生成的。例如,充电宝包含验证信息发生模块,当充电宝接收到用户提供的充电认证信息后,该验证信息发生模块实时生成用于验证该充电认证信息的参考认证信息,其中,该验证信息发生模块可基于该充电宝的固有信息(例如,充电宝的硬件标识信息或序列号等),或该充电宝的固有信息及动态因子(例如,当前时间、计数器次数、随机数等),生成该参考认证信息。若该充电认证信息与参考认证信息每一位均相同,则该充电认证信息通过验证;随后,充电宝的输出控制模块向输出控制开关发送闭合开关指令,当输出控制开关闭合后,放电电路被连通,该充电宝对用户设备开始充电。
优选地,所述认证信息生成设置包括以下至少任一项:所述充电装置中的认证信息生成算法配置;所述充电装置中的认证信息生成要素信息,其中,所述认证信息生成要素信息包括所述装置识别信息、所述充电装置的硬件标识信息及所述充电认证信息请求的接收时间信息中至少之一。例如,网络设备接收用户设备发送的包含充电装置识别信息如序列号的认证信息请求,基于该充电装置识别信息(例如,充电宝序列号等),或该装置识别信息、动态因子(例如,当前时间、计数器次数、随机数等),以及特定的算法配置或与序列号对应的算法配置,生成该充电认证信息。
例如,用户持有用户设备,用户想要使用充电宝对用户设备进行充电。用户设备先获取该充电宝对应的序列号,其中,用户设备可以检测用户在用户设备中输入的该充电宝对应的序列号,也可以通过扫描二维码的方式获取该充电宝的序列号。用户设备获取到该充电宝的序列号以后,将该序列号发送至网络设备,网络设备在其数据库中匹配后,确定该序列号预设的充电认证信息,随后,该网络设备将该充电认证信息返回给用户设备;又例如,用户设备将该序列号发送至对应网络设备,网络设备接收用户设备发送的包含充电装置识别信息如序列号的认证信息请求,基于该充电装置识别信息(例如,充电宝序列号等),或该装置识别信息、动态因子(例 如,当前时间、计数器次数、随机数等),以及特定的算法配置或与序列号对应的算法配置,生成该充电认证信息。随后,网络设备将该充电认证信息返回至该用户设备。
用户设备获取充电认证信息后,可以在蓝牙中搜索到该充电宝,通过蓝牙建立用户设备与充电宝之间的链接后,在应用中通过蓝牙的方式将该充电认证信息传输给该充电宝;用户还可以通过NFC等近距离通信方式完成传输过程。用户还可以通过充电宝的物理键盘输入该充电认证信息,从而使充电宝接收该充电认证信息。
充电宝接收到该充电认证信息后,将其与充电宝内部的参考认证信息进行匹配验证;在此,该参考认证信息可以是充电宝本地存储的,也可以是充电宝内部实时生成的。例如,充电宝包含验证信息发生模块,当充电宝接收到用户提供的充电认证信息后,该验证信息发生模块实时生成用于验证该充电认证信息的参考认证信息,其中,该验证信息发生模块可基于该充电宝的固有信息(例如,充电宝的硬件标识信息或序列号等),或该充电宝的固有信息及动态因子(例如,当前时间、计数器次数、随机数等),以及特定的算法配置或与序列号对应的算法配置,生成该参考认证信息。若该充电认证信息与参考认证信息每一位均相同,则该充电认证信息通过验证;随后,充电宝的输出控制模块向输出控制开关发送闭合开关指令,当输出控制开关闭合后,放电电路被连通,该充电宝对用户设备开始充电。
图6示出了根据本申请一个方面的一种用于通过充电装置对用户设备进行充电的方法,其中,该方法包括:
用户设备获取所述充电装置对应的装置识别信息;
所述用户设备确定所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述充电装置与用户设备间的放电电路以对所述用户设备进行充电;
所述充电装置获取所述充电认证信息,其中,所述充电认证信息由用户输入或由所述用户设备发送;
所述充电装置验证所述充电认证信息;
当所述充电认证信息通过验证,所述充电装置闭合所述充电装置与所述 用户设备间的放电电路以对所述用户设备进行充电。
图7示出了根据本申请的另一方面的一种用于通过充电装置对用户设备进行充电的方法,其中,该方法包括:
用户设备获取所述充电装置对应的装置识别信息;
所述用户设备向对应的网络设备发送的充电认证信息请求,其中所述充电认证信息请求包括所述装置识别信息;
所述网络设备接收所述用户设备发送的充电认证信息请求;
所述网络设备确定所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述装置识别信息对应的充电装置的放电电路以对所述用户设备进行充电;
所述网络设备将所述充电认证信息返回至所述用户设备;
所述用户设备接收所述网络设备返回的所述装置识别信息对应的充电认证信息;
所述充电装置获取所述充电认证信息,其中,所述充电认证信息由用户输入或由所述用户设备发送;
所述充电装置验证所述充电认证信息;
当所述充电认证信息通过验证,所述充电装置闭合所述充电装置与所述用户设备间的放电电路以对所述用户设备进行充电。
根据本申请的一个方面,提供了一种在用户设备端用于通过充电装置对用户设备进行充电的设备,该设备包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行:
获取所述充电装置对应的装置识别信息;
确定所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述充电装置与用户设备间的放电电路以对所述用户设备进行充电。
根据本申请的另一个方面,提供了一种在充电装置端用于对用户设备进行充电的设备,该设备包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行:
获取所述充电认证信息,其中,所述充电认证信息由用户输入或由所述用户设备发送;
验证所述充电认证信息;
当所述充电认证信息通过验证,闭合充电装置与所述用户设备间的放电电路以对所述用户设备进行充电。
根据本申请的又一个方面,提供了一种用于控制充电装置的设备,该设备包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行:
获取充电装置对应的装置识别信息;
确定所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述充电装置的放电电路以对外充电。
根据本申请的再一个方面,提供了一种在网络设备端用于通过充电装置对用户设备进行充电的设备,该设备包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行:
接收用户设备发送的充电认证信息请求,其中所述充电认证信息请求包括装置识别信息;
确定所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述装置识别信息对应的充电装置的放电电路以对所述用户设备进行充电;
将所述充电认证信息返回至所述用户设备。
根据本申请的一个方面,提供了一种包括指令的计算机可读介质,所述指令在被执行时使得系统进行如下操作:
获取所述充电装置对应的装置识别信息;
确定所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述充电装置与用户设备间的放电电路以对所述用户设备进行充电。
根据本申请的另一个方面,提供了一种包括指令的计算机可读介质,所述指令在被执行时使得系统进行如下操作:
获取所述充电认证信息,其中,所述充电认证信息由用户输入或由所述用户设备发送;
验证所述充电认证信息;
当所述充电认证信息通过验证,闭合充电装置与所述用户设备间的放电电路以对所述用户设备进行充电。
根据本申请的又一个方面,提供了一种包括指令的计算机可读介质,所述指令在被执行时使得系统进行如下操作:
获取充电装置对应的装置识别信息;
确定所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述充电装置的放电电路以对外充电。
根据本申请的再一个方面,提供了一种包括指令的计算机可读介质,所述指令在被执行时使得系统进行如下操作:
接收用户设备发送的充电认证信息请求,其中所述充电认证信息请求包括装置识别信息;
确定所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述装置识别信息对应的充电装置的放电电路以对所述用户设备进行充电;
将所述充电认证信息返回至所述用户设备。
需要注意的是,本申请可在软件和/或软件与硬件的组合体中被实施,例如,可采用专用集成电路(ASIC)、通用目的计算机或任何其他类似硬件设备来实现。在一个实施例中,本申请的软件程序可以通过处理器执行以实现上文所述步骤或功能。同样地,本申请的软件程序(包括相关的数据结构)可以被存储到计算机可读记录介质中,例如,RAM存储器,磁 或光驱动器或软磁盘及类似设备。另外,本申请的一些步骤或功能可采用硬件来实现,例如,作为与处理器配合从而执行各个步骤或功能的电路。
另外,本申请的一部分可被应用为计算机程序产品,例如计算机程序指令,当其被计算机执行时,通过该计算机的操作,可以调用或提供根据本申请的方法和/或技术方案。本领域技术人员应能理解,计算机程序指令在计算机可读介质中的存在形式包括但不限于源文件、可执行文件、安装包文件等,相应地,计算机程序指令被计算机执行的方式包括但不限于:该计算机直接执行该指令,或者该计算机编译该指令后再执行对应的编译后程序,或者该计算机读取并执行该指令,或者该计算机读取并安装该指令后再执行对应的安装后程序。在此,计算机可读介质可以是可供计算机访问的任意可用的计算机可读存储介质或通信介质。
通信介质包括藉此包含例如计算机可读指令、数据结构、程序模块或其他数据的通信信号被从一个系统传送到另一系统的介质。通信介质可包括有导的传输介质(诸如电缆和线(例如,光纤、同轴等))和能传播能量波的无线(未有导的传输)介质,诸如声音、电磁、RF、微波和红外。计算机可读指令、数据结构、程序模块或其他数据可被体现为例如无线介质(诸如载波或诸如被体现为扩展频谱技术的一部分的类似机制)中的已调制数据信号。术语“已调制数据信号”指的是其一个或多个特征以在信号中编码信息的方式被更改或设定的信号。调制可以是模拟的、数字的或混合调制技术。
作为示例而非限制,计算机可读存储介质可包括以用于存储诸如计算机可读指令、数据结构、程序模块或其它数据的信息的任何方法或技术实现的易失性和非易失性、可移动和不可移动的介质。例如,计算机可读存储介质包括,但不限于,易失性存储器,诸如随机存储器(RAM,DRAM,SRAM);以及非易失性存储器,诸如闪存、各种只读存储器(ROM,PROM,EPROM,EEPROM)、磁性和铁磁/铁电存储器(MRAM,FeRAM);以及磁性和光学存储设备(硬盘、磁带、CD、DVD);或其它现在已知的介质或今后开发的能够存储供计算机系统使用的计算机可读信息/数据。
在此,根据本申请的一个实施例包括一个装置,该装置包括用于存储 计算机程序指令的存储器和用于执行程序指令的处理器,其中,当该计算机程序指令被该处理器执行时,触发该装置运行基于前述根据本申请的多个实施例的方法和/或技术方案。
对于本领域技术人员而言,显然本申请不限于上述示范性实施例的细节,而且在不背离本申请的精神或基本特征的情况下,能够以其他的具体形式实现本申请。因此,无论从哪一点来看,均应将实施例看作是示范性的,而且是非限制性的,本申请的范围由所附权利要求而不是上述说明限定,因此旨在将落在权利要求的等同要件的含义和范围内的所有变化涵括在本申请内。不应将权利要求中的任何附图标记视为限制所涉及的权利要求。此外,显然“包括”一词不排除其他单元或步骤,单数不排除复数。装置权利要求中陈述的多个单元或装置也可以由一个单元或装置通过软件或者硬件来实现。第一,第二等词语用来表示名称,而并不表示任何特定的顺序。

Claims (16)

  1. 一种在用户设备端用于通过充电装置对用户设备进行充电的方法,其中,该方法包括:
    获取所述充电装置对应的装置识别信息;
    确定所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述充电装置与用户设备间的放电电路以对所述用户设备进行充电。
  2. 根据权利要求1所述的方法,其中,所述方法还包括:
    呈现所述充电认证信息;或者
    将所述充电认证信息发送至所述充电装置,以供所述充电装置闭合所述放电电路来对所述用户设备进行充电。
  3. 根据权利要求1或2所述的方法,其中,所述确定所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述充电装置与用户设备间的放电电路以对所述用户设备进行充电包括:
    向对应的网络设备发送充电认证信息请求,其中所述充电认证信息请求包括所述装置识别信息;
    接收所述网络设备返回的所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述充电装置与所述用户设备间的放电电路以对所述用户设备进行充电。
  4. 根据权利要求1或2所述的方法,其中,所述确定所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述充电装置与用户设备间的放电电路以对所述用户设备进行充电包括:
    生成所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述充电装置的放电电路以对所述用户设备进行充电。
  5. 根据权利要求1至4中任一项所述的方法,其中,所述装置识别信息包括以下至少任一项:
    所述充电装置的装置序列号信息;
    所述充电装置的二维码标识信息。
  6. 一种在充电装置端用于对用户设备进行充电的方法,其中,该方法包括:
    获取充电认证信息,其中,所述充电认证信息由用户输入或由用户设备发送;
    验证所述充电认证信息;
    当所述充电认证信息通过验证,闭合充电装置与所述用户设备间的放电电路以对所述用户设备进行充电。
  7. 根据权利要求6所述的方法,其中,所述验证所述充电认证信息包括:
    当接收到所述充电认证信息,生成对应的参考认证信息;
    根据所述参考认证信息验证所述充电认证信息。
    其中,所述当所述充电认证信息通过验证,闭合充电装置与所述用户设备间的放电电路以对所述用户设备进行充电包括:
    当所述充电认证信息与所述密码信息相匹配,闭合所述充电装置与所述用户设备间的放电电路以对所述用户设备进行充电。
  8. 根据权利要求6或7所述的方法,所述当所述充电认证信息通过验证,闭合充电装置与所述用户设备间的放电电路以对所述用户设备进行充电还包括:
    当所述充电认证信息未通过验证,且所述用户设备的充电时长超过预定的充电时长阈值,断开所述放电电路以停止对所述用户设备进行充电。
  9. 一种用于控制充电装置的方法,其中,该方法包括:
    获取充电装置对应的装置识别信息;
    确定所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述充电装置的放电电路以对外充电。
  10. 一种在网络设备端用于通过充电装置对用户设备进行充电的方法,其中,该方法包括:
    接收用户设备发送的充电认证信息请求,其中,所述充电认证信息请求包括装置识别信息;
    确定所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述装置识别信息对应的充电装置的放电电路以对所述用户设备进行充电;
    将所述充电认证信息返回至所述用户设备。
  11. 根据权利要求10所述的方法,其中,所述确定所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述装置识别信息对应的充电装置的放电电路以对所述用户设备进行充电包括:
    根据所述装置识别信息对应的充电装置的认证信息生成设置,生成所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述充电装置的放电电路以对所述用户设备进行充电。
  12. 根据权利要求11所述的方法,其中,所述认证信息生成设置包括以下至少任一项:
    所述充电装置中的认证信息生成算法配置;
    所述充电装置中的认证信息生成要素信息,其中,所述认证信息生成要素信息包括所述装置识别信息、所述充电装置的硬件标识信息及所述充电认证信息请求的接收时间信息中至少之一。
  13. 一种用于通过充电装置对用户设备进行充电的方法,其中,该方法包括:
    用户设备获取所述充电装置对应的装置识别信息;
    所述用户设备确定所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述充电装置与用户设备间的放电电路以对所述用户设备进行充电;
    所述充电装置获取所述充电认证信息,其中,所述充电认证信息由用户输入或由所述用户设备发送;
    所述充电装置验证所述充电认证信息;
    当所述充电认证信息通过验证,所述充电装置闭合所述充电装置与所述用户设备间的放电电路以对所述用户设备进行充电。
  14. 一种用于通过充电装置对用户设备进行充电的方法,其中,该方法包括:
    用户设备获取所述充电装置对应的装置识别信息;
    所述用户设备向对应的网络设备发送的充电认证信息请求,其中所述充电认证信息请求包括所述装置识别信息;
    所述网络设备接收所述用户设备发送的充电认证信息请求;
    所述网络设备确定所述装置识别信息对应的充电认证信息,其中,所述充电认证信息用于闭合所述装置识别信息对应的充电装置的放电电路以对所述用户设备进行充电;
    所述网络设备将所述充电认证信息返回至所述用户设备;
    所述用户设备接收所述网络设备返回的所述装置识别信息对应的充电认证信息;
    所述充电装置获取所述充电认证信息,其中,所述充电认证信息由用户输入或由所述用户设备发送;
    所述充电装置验证所述充电认证信息;
    当所述充电认证信息通过验证,所述充电装置闭合所述充电装置与所述用户设备间的放电电路以对所述用户设备进行充电。
  15. 一种用于通过充电装置对用户设备进行充电的设备,其中,该设备包括:
    处理器;以及
    被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行如权利要求1至12中任一项所述方法的操作。
  16. 一种包括指令的计算机可读介质,所述指令在被执行时使得系统进行如权利要求1至12中任一项所述方法的操作。
PCT/CN2018/087421 2017-05-19 2018-05-18 一种通过充电装置对用户设备进行充电的方法与设备 WO2018210324A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710359583.0A CN107231019B (zh) 2017-05-19 2017-05-19 一种通过充电装置对用户设备进行充电的方法与设备
CN201710359583.0 2017-05-19

Publications (1)

Publication Number Publication Date
WO2018210324A1 true WO2018210324A1 (zh) 2018-11-22

Family

ID=59933250

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/087421 WO2018210324A1 (zh) 2017-05-19 2018-05-18 一种通过充电装置对用户设备进行充电的方法与设备

Country Status (2)

Country Link
CN (1) CN107231019B (zh)
WO (1) WO2018210324A1 (zh)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107231019B (zh) * 2017-05-19 2021-04-30 上海掌门科技有限公司 一种通过充电装置对用户设备进行充电的方法与设备
CN107135227A (zh) * 2017-05-27 2017-09-05 深圳来电科技有限公司 验证方法及设备
CN107785963B (zh) * 2017-10-31 2020-11-24 杭州小电科技股份有限公司 一种充电方法及充电系统
CN108400639A (zh) * 2018-03-30 2018-08-14 上海掌门科技有限公司 一种充电宝及其充电参数的控制方法及系统
CN108683231A (zh) * 2018-06-04 2018-10-19 深圳金海螺科技有限公司 充电装置、系统及充电方法
CN110730211B (zh) * 2019-09-20 2022-04-29 深圳小黄电智能科技有限公司 一种共享充电控制方法、共享充电客户端以及共享充电服务终端
CN111476631B (zh) * 2020-03-31 2023-08-29 深圳街电科技有限公司 一种移动电源放电方法、服务器、租赁设备及移动电源

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105172609A (zh) * 2015-09-02 2015-12-23 青岛特锐德电气股份有限公司 一种电动汽车、充电装置、充电系统和方法
US20160180721A1 (en) * 2014-10-03 2016-06-23 Ivan Otulic System and method for tracking, surveillance and remote control of powered personal recreational vehicles
CN106330822A (zh) * 2015-06-19 2017-01-11 中兴新能源汽车有限责任公司 汽车充电终端与认证服务器的认证方法、设备及系统
CN106329585A (zh) * 2015-06-19 2017-01-11 中兴新能源汽车有限责任公司 无线充电认证方法及装置
CN106427645A (zh) * 2016-11-16 2017-02-22 东软集团股份有限公司 一种电动汽车充电的方法、装置及系统
CN107231019A (zh) * 2017-05-19 2017-10-03 上海掌门科技有限公司 一种通过充电装置对用户设备进行充电的方法与设备

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2822142B1 (en) * 2013-07-01 2017-12-06 HTC Corporation Method for wireless charging authentication and related wireless charging system
CN205017028U (zh) * 2015-06-03 2016-02-03 吴钰淳 一种新型的充电系统
CN106684937A (zh) * 2015-11-05 2017-05-17 上海网电网络科技有限公司 一种基于移动充电装置的充电控制方法及装置、系统
CN205141726U (zh) * 2015-11-05 2016-04-06 上海网电网络科技有限公司 一种新型充电宝及一种新型充电装置
CN106356919B (zh) * 2016-08-31 2020-07-31 富泰锦(成都)科技有限公司 智能充电终端应急充电方法及应急充电系统
CN106602657B (zh) * 2016-12-29 2019-09-06 杭州微飞胜科技有限公司 一种充电桩及其工作方法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160180721A1 (en) * 2014-10-03 2016-06-23 Ivan Otulic System and method for tracking, surveillance and remote control of powered personal recreational vehicles
CN106330822A (zh) * 2015-06-19 2017-01-11 中兴新能源汽车有限责任公司 汽车充电终端与认证服务器的认证方法、设备及系统
CN106329585A (zh) * 2015-06-19 2017-01-11 中兴新能源汽车有限责任公司 无线充电认证方法及装置
CN105172609A (zh) * 2015-09-02 2015-12-23 青岛特锐德电气股份有限公司 一种电动汽车、充电装置、充电系统和方法
CN106427645A (zh) * 2016-11-16 2017-02-22 东软集团股份有限公司 一种电动汽车充电的方法、装置及系统
CN107231019A (zh) * 2017-05-19 2017-10-03 上海掌门科技有限公司 一种通过充电装置对用户设备进行充电的方法与设备

Also Published As

Publication number Publication date
CN107231019A (zh) 2017-10-03
CN107231019B (zh) 2021-04-30

Similar Documents

Publication Publication Date Title
WO2018210324A1 (zh) 一种通过充电装置对用户设备进行充电的方法与设备
US11055392B2 (en) Proximity unlock and lock operations for electronic devices
JP7042842B2 (ja) スマートドアロックシステムに基づくオフライン検証コードの生成方法及びそのシステム
US20210192579A1 (en) Smart broadcasting device
JP2020537471A (ja) 無線給電の効率化
WO2018210320A1 (zh) 一种通过充电装置对用户设备进行充电的方法与设备
WO2017185610A1 (zh) 一种智能终端、遥控器及智能终端支付方法
US20200286006A1 (en) Method and apparatus for secure check-in
WO2019037581A1 (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
CN107148068B (zh) 一种用于连接无线接入点的方法与设备
WO2019001224A1 (zh) 一种用于推荐社交用户的方法与设备
WO2019076282A1 (zh) 一种用于管理用户的方法与设备
WO2019037596A1 (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
WO2018233473A1 (zh) 一种用于配置无线路由设备的方法与设备
WO2019037603A1 (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
WO2019037602A1 (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
WO2018228225A2 (zh) 一种用于进行用户推荐的方法与设备
US20240054465A1 (en) Systems and methods for network configurations of pin pads
US11153387B2 (en) Decentralized network protected IoT query resolution
CN112073578B (zh) 一种在社交应用中使用或限制应用功能的方法与设备
CN111259452A (zh) 一种基于区块链的数据管理方法以及相关装置
CN113010858A (zh) 一种用于在用户设备中登录应用的方法与设备
WO2019041782A1 (zh) 物品使用控制方法、验证设备、终端设备以及系统
US11683104B2 (en) Audio based service set identifier
WO2019037597A1 (zh) 一种用于对用户设备进行无线连接预授权的方法与设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18801962

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 04/03/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 18801962

Country of ref document: EP

Kind code of ref document: A1