WO2019134138A1 - 非智能电池的认证方法、设备和存储介质 - Google Patents

非智能电池的认证方法、设备和存储介质 Download PDF

Info

Publication number
WO2019134138A1
WO2019134138A1 PCT/CN2018/071649 CN2018071649W WO2019134138A1 WO 2019134138 A1 WO2019134138 A1 WO 2019134138A1 CN 2018071649 W CN2018071649 W CN 2018071649W WO 2019134138 A1 WO2019134138 A1 WO 2019134138A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
mobile device
smart battery
obtaining
processor
Prior art date
Application number
PCT/CN2018/071649
Other languages
English (en)
French (fr)
Inventor
王仕博
郑伟宏
周游
Original Assignee
深圳市大疆创新科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市大疆创新科技有限公司 filed Critical 深圳市大疆创新科技有限公司
Priority to PCT/CN2018/071649 priority Critical patent/WO2019134138A1/zh
Priority to CN201880031261.6A priority patent/CN110612619A/zh
Publication of WO2019134138A1 publication Critical patent/WO2019134138A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01MPROCESSES OR MEANS, e.g. BATTERIES, FOR THE DIRECT CONVERSION OF CHEMICAL ENERGY INTO ELECTRICAL ENERGY
    • H01M10/00Secondary cells; Manufacture thereof
    • H01M10/42Methods or arrangements for servicing or maintenance of secondary cells or secondary half-cells
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01MPROCESSES OR MEANS, e.g. BATTERIES, FOR THE DIRECT CONVERSION OF CHEMICAL ENERGY INTO ELECTRICAL ENERGY
    • H01M50/00Constructional details or processes of manufacture of the non-active parts of electrochemical cells other than fuel cells, e.g. hybrid cells
    • H01M50/20Mountings; Secondary casings or frames; Racks, modules or packs; Suspension devices; Shock absorbers; Transport or carrying devices; Holders
    • H01M50/202Casings or frames around the primary casing of a single cell or a single battery
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01MPROCESSES OR MEANS, e.g. BATTERIES, FOR THE DIRECT CONVERSION OF CHEMICAL ENERGY INTO ELECTRICAL ENERGY
    • H01M50/00Constructional details or processes of manufacture of the non-active parts of electrochemical cells other than fuel cells, e.g. hybrid cells
    • H01M50/20Mountings; Secondary casings or frames; Racks, modules or packs; Suspension devices; Shock absorbers; Transport or carrying devices; Holders
    • H01M50/247Mountings; Secondary casings or frames; Racks, modules or packs; Suspension devices; Shock absorbers; Transport or carrying devices; Holders specially adapted for portable devices, e.g. mobile phones, computers, hand tools or pacemakers
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02EREDUCTION OF GREENHOUSE GAS [GHG] EMISSIONS, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
    • Y02E60/00Enabling technologies; Technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02E60/10Energy storage using batteries

Definitions

  • Embodiments of the present invention relate to the field of electronic device technologies, and in particular, to a method, device, and storage medium for authenticating a non-smart battery.
  • Smart batteries are widely used in notebook computers, drones, electric vehicles, mobile phones, etc.
  • the smart battery is equipped with a management circuit that can manage the remaining power, encryption, abnormality, and charging.
  • smart batteries have the disadvantages of complicated manufacturing processes, high cost, and low productivity. Therefore, non-smart batteries are still used in mobile devices such as electric toothbrushes, toys, and electric bicycles.
  • Non-smart batteries are generally only equipped with a voltage detection circuit to make an inaccurate estimation of the battery power.
  • the battery yield can only be controlled by the manufacturer's strict factory inspection. After some mobile device products are introduced to the market, some non-smart battery manufacturers will produce and sell non-smart batteries that are compatible with mobile device products. However, some non-intelligent manufacturers reduce batteries by reducing battery capacity and lowering factory inspection standards. Cost, profit. These non-smart batteries may degrade performance for mobile device products and present serious safety hazards (eg batteries may explode).
  • Embodiments of the present invention provide a method, a device, and a storage medium for authenticating a non-smart battery for authentication by a non-smart battery mounted on the mobile device.
  • an embodiment of the present invention provides a method for authenticating a non-smart battery, which is applied to a mobile device, and the method includes:
  • the removable device is normally started.
  • an embodiment of the present invention provides a method for authenticating a non-smart battery, which is applied to the non-smart battery, and the method includes:
  • the mobile device is normally powered.
  • an embodiment of the present invention provides a mobile device, including: a processor and a memory, where
  • the memory is configured to store program instructions
  • the processor executing the program instructions for:
  • the removable device is normally started.
  • an embodiment of the present invention provides a non-smart battery, including: a memory and a processor;
  • the memory is configured to store program instructions
  • the processor executing the program instructions for:
  • the mobile device is normally powered.
  • an embodiment of the present invention provides a computer readable storage medium, including: the computer readable storage medium storing program instructions, when the program instructions are run on a processor, performing the first aspect Non-smart battery authentication method.
  • an embodiment of the present invention provides a computer readable storage medium, including: the computer readable storage medium storing program instructions, when the program instructions are run on a processor, performing the second aspect Non-smart battery authentication method.
  • an embodiment of the present invention provides a program product, where program instructions of the program product are stored in a readable storage medium, and at least one processor of the mobile device reads and executes program instructions from the readable storage medium.
  • the mobile device is caused to perform the authentication method of the non-smart battery described in the first aspect.
  • an embodiment of the present invention provides a program product, where program instructions of the program product are stored in a readable storage medium, and at least one processor of the non-smart battery reads and executes the The program instructions cause the non-smart battery to perform the authentication method of the non-smart battery according to the second aspect.
  • the method, device and storage medium for authenticating a non-smart battery provided by the embodiment of the present invention, the first key of the non-smart battery and the second key of the mobile device are obtained by the mobile device, and then the first key and the second key The key is authenticated. If the authentication is successful, the mobile device can start working normally, or the non-smart battery obtains the first key and the second key of the mobile device, and then authenticates the first key and the second key. If the authentication succeeds, the mobile device is normally powered, so that the mobile device can start working normally, and the non-smart battery that cannot be authenticated is used to be used in the mobile device product. In this way, the quality of the non-smart battery is improved and the mobile device is improved. The safety of the use of equipment products guarantees the performance of mobile equipment products.
  • Embodiment 1 is a flowchart of Embodiment 1 of a method for authenticating a non-smart battery according to an embodiment of the present invention
  • Embodiment 2 is a flowchart of Embodiment 2 of a method for authenticating a non-smart battery according to an embodiment of the present invention
  • Embodiment 3 is a flowchart of Embodiment 3 of a method for authenticating a non-smart battery according to an embodiment of the present invention
  • Embodiment 4 is a flowchart of Embodiment 4 of a method for authenticating a non-smart battery according to an embodiment of the present invention
  • FIG. 5 is a specific application diagram of an implementation method of a non-smart battery authentication method according to an embodiment of the present invention
  • FIG. 6 is a schematic structural diagram of Embodiment 1 of an authentication device for a non-smart battery according to an embodiment of the present invention
  • FIG. 7 is a schematic structural diagram of Embodiment 2 of an authentication device for a non-smart battery according to an embodiment of the present invention.
  • Embodiment 8 is a schematic structural diagram of Embodiment 3 of an authentication device for a non-smart battery according to an embodiment of the present invention.
  • FIG. 9 is a schematic structural diagram of a mobile device according to an embodiment of the present invention.
  • FIG. 10 is a schematic structural diagram of a non-smart battery according to an embodiment of the present invention.
  • the present invention provides a non-smart battery authentication method based on a battery having a lower capacity and lower detection standard, which is introduced by some manufacturers.
  • the battery installed in the mobile device product is authenticated to prevent the battery of poor quality from being used. In the mobile device product, the use safety of the mobile device product is guaranteed. It should be understood in the embodiments of the present invention that a non-smart battery refers to a battery other than a smart battery.
  • a mobile device refers to a device that can be moved by a power system configured by itself or a device that can be moved under the action of an external force, such as an electric toothbrush, a toy, a craft, an electric bicycle, a part of a terminal device, an unmanned aerial vehicle, etc.
  • an external force such as an electric toothbrush, a toy, a craft, an electric bicycle, a part of a terminal device, an unmanned aerial vehicle, etc.
  • a removable device for non-smart batteries for non-smart batteries.
  • Embodiment 1 is a flowchart of Embodiment 1 of a method for authenticating a non-smart battery according to an embodiment of the present invention.
  • the solution of this embodiment is applied to a mobile device, wherein an execution body of the authentication method is used.
  • the method may be a mobile device.
  • the execution body may be a processor of the mobile device, and the authentication method of the non-smart battery specifically includes the following steps:
  • S101 Acquire a first key of the non-smart battery to be authenticated.
  • the mobile device needs to first authenticate the non-smart battery.
  • the key of the non-smart battery to be authenticated needs to be obtained, that is, the first key, first.
  • the key may be pre-stored in a preset component of the non-smart battery, read directly from the preset component of the non-smart battery when the mobile device needs it, or the first key may be performed by the non-smart battery. Sending, the mobile device can receive the first key, and the solution is not limited.
  • the preset component of the non-smart battery may be an encryption chip, a storage device such as a memory, or the like.
  • the mobile device also needs to obtain its own key, that is, the second key described above, wherein obtaining the second key of the mobile device may include the following feasible methods:
  • the second key of the mobile device may be pre-configured in the mobile device, for example, the second key is stored in a local storage device of the mobile device configuration, and can be directly read when needed.
  • the second key stored in the local storage device may be pre-configured in the mobile device, for example, the second key is stored in a local storage device of the mobile device configuration, and can be directly read when needed. The second key stored in the local storage device.
  • the second key may be stored in the terminal device, where the terminal device may include a terminal such as a laptop computer, a desktop computer, a smart phone, etc., when the non-smart battery needs to be authenticated, the mobile device may be The terminal device is connected by wire or wirelessly, and the second key is obtained from the terminal device. For example, the second key is sent to the mobile device via a mobile phone, a computer, or the like.
  • the second key may be stored in the server, and the removable device may acquire the second key from the server.
  • the second key may be stored in a server of the manufacturer of the mobile device product.
  • the mobile device can establish a communication connection directly with the server and obtain a second key from the server.
  • the mobile device can establish a communication connection with the server through an intermediate device (for example, a terminal device or the like), and indirectly obtain a second key from the server, that is, the intermediate device acquires the second key from the server, and is movable. The device obtains the second key from the intermediate device.
  • an intermediate device for example, a terminal device or the like
  • S101 and S102 have no limitation of the order, and may be executed sequentially or simultaneously, and the first key and the second key may be acquired before the authentication is performed.
  • the first key and the second key are authenticated, and the RSA public key encryption algorithm, Data Encryption Standard (DES), and advanced encryption may be specifically used.
  • the first key and the second key are authenticated by one or more algorithms, such as an Advanced Encryption Standard (AES), a Secure Hash Algorithm (SHA) (for example, SHA224).
  • AES Advanced Encryption Standard
  • SHA Secure Hash Algorithm
  • the first key and the second key may be authenticated by using other authentication algorithms, and the solution is not limited.
  • the first key is a public key
  • the second key is a private key
  • the first key is a private key
  • the second key is a public key
  • the non-smart battery is considered to be a non-smart battery that meets the requirements, for example, the original non-smart battery of the mobile device or the non-smart battery is qualified. If used, it can be started normally so that the user can continue to use the removable device.
  • the mobile device obtains the first key of the non-smart battery and the second key of the mobile device, and then authenticates the first key and the second key, if If the authentication is successful, the mobile device can start normally, ensure the quality of the non-smart battery, avoid non-original batteries that cannot be authenticated, or other batteries whose quality is not up to the requirements are used in the mobile device.
  • the quality of smart batteries improves the safety of mobile devices and ensures the performance of mobile devices.
  • Embodiment 2 is a flowchart of Embodiment 2 of a method for authenticating a non-smart battery according to an embodiment of the present invention. As shown in FIG. 2, the method for authenticating the non-smart battery includes the following steps:
  • S201 Acquire a first key of the non-smart battery to be authenticated.
  • S203 Perform authentication on the first key and the second key.
  • steps S201-S203 are the same as steps S101-S103, please refer to the foregoing section.
  • the non-smart battery is not the original battery of the mobile device or the non-smart battery is unqualified. Start normally, or end the process of starting a removable device.
  • the method for prompting the battery to fail or the device not starting may also be used. Therefore, the method for authenticating the non-smart battery further includes:
  • S205 Send prompt information according to a preset manner, where the prompt information is used to indicate that the battery authentication fails.
  • the mobile device may send the prompt information according to a preset manner to indicate the reason why the user may fail to start the mobile device, and may also indicate the non-smart battery.
  • the authentication fails, and the manner in which the prompt information is sent may prompt the user that the non-smart battery currently installed on the mobile device has a security risk.
  • the manner of sending the prompt information is not limited.
  • the voice information of the prompting authentication failure may be played, or the prompt information indicating that the authentication fails may be displayed on the interactive device of the mobile device (such as a display screen), or may be By controlling the indicator light of the mobile device to light or flash according to the preset mode, the user can be notified that the battery authentication fails, and the device does not start, and the solution is not limited.
  • the mobile device obtains the first key of the non-smart battery and the second key of the mobile device, and then authenticates the first key and the second key, if If the authentication fails, the mobile device is refused to be started normally, the quality of the non-smart battery is guaranteed, the non-original battery that cannot be authenticated, or other batteries whose quality is not up to the requirements are used in the product, and the prompt information can also be sent to the user. The user is prompted to fail the battery authentication, so that the user can replace the appropriate battery use as soon as possible to improve the quality of the battery and the safety of the product.
  • FIG. 3 is a flowchart of Embodiment 3 of a method for authenticating a non-smart battery according to an embodiment of the present invention.
  • the execution body of the method is the non-smart battery itself.
  • the execution body is the processor of the non-smart battery.
  • the method specifically includes the following steps:
  • S301 Acquire a first key of the mobile device to be powered.
  • the non-smart battery needs to acquire the key of the mobile device, that is, the first key in the step, and the specific acquisition manner may be to read the first key pre-stored in the storage device of the mobile device.
  • the first key sent by the mobile device may be received, and the solution is not limited.
  • the storage device of the removable device may be a memory or the like.
  • the non-smart battery also needs to acquire its own second key, which can be pre-programmed or configured in a preset component of the non-smart battery, and is used from the preset component when needed.
  • the preset component may be a storage device such as an encryption chip or a memory.
  • S301 and S302 have no limitation of the order, and the first key and the second key may be acquired before the authentication is performed.
  • the first key and the second key are authenticated, and the RSA public key encryption algorithm may be adopted, and the data encryption standard (Data encryption standard)
  • Data encryption standard One or more algorithms in the Encryption Standard (DES), Advanced Encryption Standard (AES), Secure Hash Algorithm (SHA) (for example: SHA224), etc., to the first key and the The second key is used for authentication.
  • DES Encryption Standard
  • AES Advanced Encryption Standard
  • SHA Secure Hash Algorithm
  • the first key and the second key may be authenticated by using other authentication algorithms, and the solution is not limited.
  • the first key is a public key
  • the second key is a private key
  • the first key is a private key
  • the second key is a public key
  • the non-smart battery is considered to be the original battery of the mobile device, or the non-smart battery is qualified, or the non-smart battery and the movable device are considered to be If it is matched, it can be used to supply power to the mobile device normally, so that the mobile device can be started normally, so that the user can continue to use the mobile device.
  • the non-smart battery acquires the first key and the second key of the mobile device, and then authenticates the first key and the second key. If the authentication succeeds, the normal direction is normal.
  • the mobile device is powered to enable the mobile device to start up normally. In this way, the mobile device is determined to be the original product matched by the non-smart battery, and the non-smart battery is prevented from being applied to the non-original mobile device or is unqualified. On the removable device, avoid the hidden danger caused by the application of the non-smart battery to the unmatched mobile device product.
  • Embodiment 4 is a flowchart of Embodiment 4 of a method for authenticating a non-smart battery according to an embodiment of the present invention. As shown in FIG. 4, based on the embodiment shown in FIG. 3, the method for authenticating the non-smart battery specifically includes The following steps:
  • S401 Acquire a first key of the mobile device to be powered.
  • steps S401-S403 are the same as steps S301-S303, please refer to the foregoing section.
  • the non-smart battery fails to authenticate the first key and the second key, it is considered that the non-smart battery does not match the mobile device, for example, the mobile device is not the non-smart battery.
  • the original equipment, or the quality of the mobile equipment is not qualified. Therefore, power to the mobile device can be denied.
  • the method before acquiring the second key from the preset component of the non-smart battery, the method further includes:
  • the non-smart battery receives the second key sent by the terminal device, or acquires the second key from the server, and then writes the second key into the preset component.
  • the non-smart battery can obtain the second key from a terminal device such as a programmer or a computer connected to the programmer, or can establish a connection with the server through the intermediate device to obtain the second key, and then The second key is written to the preset component to read the second key when authentication is required.
  • a terminal device such as a programmer or a computer connected to the programmer
  • the non-smart battery acquires the first key and the second key of the mobile device, and then authenticates the first key and the second key, and if the authentication fails, the method refuses to
  • the mobile device can be powered to avoid the application of the non-smart battery to the non-original mobile device or the unqualified mobile device, thereby avoiding the hidden danger caused by the non-smart battery being applied to the unmatched mobile device product.
  • the authentication method of the non-smart battery provided by the present invention is performed by taking the key in any mobile device, that is, the key as the private key and the key in the non-smart battery as the public key. Description.
  • FIG. 5 is a schematic diagram of an example of a method for authenticating a non-smart battery according to an embodiment of the present invention.
  • a mobile device obtains a communication key through an intermediate device or directly establishes a communication connection with a server, and then obtains a corresponding private key, and then
  • the private key is stored in a local storage device (also referred to as a storage medium) of the removable device, and the public key is burned into the encryption chip of the non-smart battery through the encryption jig, and the encryption jig includes an intermediate device or programming And so on.
  • the user's operation or the like triggers the activation of the private key and the public key after the mobile device body is started. If successful, the mobile device body starts normally, otherwise it exits abnormally;
  • the encryption jig obtains the private key from the server.
  • the encryption jig burns the public key into the non-smart battery encryption chip.
  • the mobile device body obtains the private key from the server.
  • the mobile device body stores the private key in the storage device.
  • the non-smart battery public key is read through the communication link.
  • the mobile device body authenticates the private key and the public key.
  • the public key and the private key may not be acquired by the server, but are saved in advance in the local terminal device.
  • the private key may also be burned without passing through the jig, and may be burned by the mobile device body through a communication link.
  • the method for authenticating a non-smart battery provided by the invention authenticates a non-smart battery through a key, avoids the disadvantages of complicated manufacturing process, high cost, and reduced productivity of the smart battery, and can prevent low-quality batteries not produced by the original factory from entering the market. Affect product performance.
  • FIG. 6 is a schematic structural diagram of Embodiment 1 of a device for authenticating a non-smart battery according to an embodiment of the present invention.
  • the mobile device 600 provided in this embodiment includes:
  • the obtaining module 601 is configured to acquire a first key of the non-smart battery to be authenticated
  • the obtaining module 601 is further configured to acquire a second key of the authentication device of the non-smart battery;
  • the processing module 602 is configured to authenticate the first key and the second key.
  • the processing module 602 is further configured to: if the authentication is successful, start the authentication device of the non-smart battery normally.
  • the authentication device of the non-smart battery provided in this embodiment is used to perform the technical solution of the mobile device in any of the foregoing method embodiments, and the implementation principle and technical effects are similar, and details are not described herein again.
  • the processing module 602 is further configured to refuse to start the mobile device normally if the authentication fails.
  • the processing module 602 is further configured to send prompt information according to a preset manner, where the prompt information is used to indicate that the battery authentication fails.
  • the obtaining module 601 is specifically configured to:
  • the preset component comprises an encryption chip or a storage device.
  • the obtaining module 601 is specifically configured to:
  • the second key is obtained from a server.
  • the first key is a public key
  • the second key is a private key
  • the first key is a private key
  • the second key is a public key
  • processing module 602 is specifically configured to:
  • the first key and the second key are authenticated using one or more algorithms in RSA, DES, AES, SHA.
  • the authentication device of the non-smart battery provided by any of the foregoing embodiments is used to perform the technical solution of the mobile device in any of the foregoing method embodiments, and the implementation principle and technical effects are similar, and details are not described herein again.
  • FIG. 7 is a schematic structural diagram of Embodiment 2 of an authentication device for a non-smart battery according to an embodiment of the present invention.
  • the authentication device 700 for a non-smart battery provided in this embodiment includes:
  • the obtaining module 701 is configured to acquire a first key of the mobile device to be powered
  • the obtaining module 701 is further configured to acquire a second key of the authentication device 20 of the non-smart battery;
  • the processing module 702 is configured to authenticate the first key and the second key
  • the processing module 702 is further configured to supply power to the movable device normally if the authentication succeeds.
  • the authentication device of the non-smart battery provided in this embodiment is used to implement the technical solution of the non-smart battery in any of the foregoing method embodiments, and the implementation principle and technical effects are similar, and details are not described herein again.
  • the obtaining module 701 is specifically configured to:
  • FIG 8 is a schematic structural diagram of a third embodiment of an authentication device for a non-smart battery according to an embodiment of the present invention.
  • the non-smart battery authentication device 20 further includes: a preset component 703;
  • the obtaining module 701 is specifically configured to:
  • a second key is obtained from the preset component 703 of the non-smart battery.
  • the preset component 703 includes an encryption chip or a storage device.
  • the obtaining module 701 is further configured to:
  • the first key is a public key
  • the second key is a private key
  • the first key is a private key
  • the second key is a public key
  • the processing module 702 is specifically configured to:
  • the first key and the second key are authenticated using one or more algorithms in RSA, DES, AES, SHA.
  • the authentication device of the non-smart battery provided by the foregoing embodiment is used to implement the technical solution of the non-smart battery in any of the foregoing method embodiments, and the implementation principle and technical effects are similar, and details are not described herein again.
  • FIG. 9 is a schematic structural diagram of a mobile device according to an embodiment of the present invention.
  • the mobile device 900 provided in this embodiment includes: a memory 901 and a processor 902.
  • the memory 901 is configured to store program instructions.
  • the processor 902 executes the program instructions for:
  • the removable device is normally started.
  • processor 902 is further configured to:
  • processor 902 is further configured to:
  • the prompt information is sent according to a preset manner, and the prompt information is used to indicate that the battery authentication fails.
  • processor 902 is specifically configured to:
  • the preset component comprises an encryption chip or a storage device.
  • the processor 902 is specifically configured to acquire the second key stored locally by the mobile device.
  • the second key may be stored in the memory 901 or may be stored in the mobile device. Among other storage devices.
  • the second key is obtained from a server.
  • the first key is a public key
  • the second key is a private key
  • the first key is a private key
  • the second key is a public key
  • processor 902 is specifically configured to:
  • the first key and the second key are authenticated using one or more algorithms in RSA, DES, AES, SHA.
  • the mobile device provided in this embodiment is used to implement the technical solution of the mobile device in any of the foregoing method embodiments, and the implementation principle and technical effects are similar, and details are not described herein again.
  • the non-smart battery 1000 includes: a memory 1001 and a processor 1002;
  • the memory 1001 is configured to store program instructions
  • the processor 1002 executes the program instructions for:
  • the mobile device is normally powered.
  • processor 1002 is further configured to:
  • the processor 1002 is specifically configured to:
  • the processor 1002 is specifically configured to:
  • the preset component comprises an encryption chip or a storage device.
  • the storage device in the preset component may be the foregoing memory 1001, or may be different from other storage devices of the memory 1001, and the solution is not limited thereto.
  • processor 1002 is further configured to:
  • the first key is a public key
  • the second key is a private key
  • the first key is a private key
  • the second key is a public key
  • the processor 1002 is specifically configured to:
  • the first key and the second key are authenticated using one or more algorithms in RSA, DES, AES, SHA.
  • the non-smart battery provided in this embodiment is used to perform the technical solution of the non-smart battery in any of the foregoing method embodiments, and the implementation principle and technical effects are similar, and details are not described herein again.
  • the embodiment of the invention further provides a computer readable storage medium, comprising: the computer readable storage medium storing program instructions, when the program instructions are run on a processor, performing the non-movable device side Smart battery authentication method.
  • the embodiment of the invention further provides a computer readable storage medium, comprising: the computer readable storage medium storing program instructions, when the program instructions are run on a processor, performing the non-smart battery of the second aspect Certification method.
  • the embodiment of the present invention further provides a program product, where the program instructions of the program product are stored in a readable storage medium, and at least one processor of the mobile device reads and executes program instructions from the readable storage medium, so that The mobile device performs an authentication method for the non-smart battery.
  • An embodiment of the present invention further provides a program product, where program instructions of the program product are stored in a readable storage medium, and at least one processor of the non-smart battery reads and executes the program instruction from the readable storage medium, A non-smart battery is implemented to perform a non-smart battery authentication method.
  • the processor may be a central processing unit (CPU), and the processor may also be other general purpose processors, digital signal processors (Digital Signal Processor). , DSP), Application Specific Integrated Circuit (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, etc.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
  • the foregoing program may be stored in a computer readable storage medium, and the program is executed when executed.
  • the foregoing storage medium includes: read-only memory (ROM), random access memory (RAM), magnetic disk or optical disk, and the like, which can store program codes. Medium.

Landscapes

  • Engineering & Computer Science (AREA)
  • Manufacturing & Machinery (AREA)
  • Chemical & Material Sciences (AREA)
  • Chemical Kinetics & Catalysis (AREA)
  • Electrochemistry (AREA)
  • General Chemical & Material Sciences (AREA)
  • Telephone Function (AREA)

Abstract

提供一种非智能电池的认证方法、设备和存储介质,所述方法包括可移动设备(900)获取待认证的非智能电池(1000)的第一密钥(S101);获取可移动设备(900)的第二密钥(S102);对第一密钥和第二密钥进行认证(S103);若认证成功,正常启动可移动设备(900)(S104);或者非智能电池(1000)获取待供电的可移动设备(900)的第一密钥(S301);获取非智能电池(1000)的第二密钥(S302);对第一密钥和第二密钥进行认证(S303);若认证成功,则向可移动设备(900)正常供电(S304);以使可移动设备(900)正常启动工作,保证该非智能电池(1000)的品质,避免不能认证通过的非原厂电池,或者其他品质未达到要求的电池被使用到产品中,提高电池的品质和产品安全。

Description

非智能电池的认证方法、设备和存储介质 技术领域
本发明实施例涉及电子设备技术领域,尤其涉及一种非智能电池的认证方法、设备和存储介质。
背景技术
智能电池在笔记本电脑、无人机、电动汽车、手机等领域得到广泛的应用,智能电池中设置有管理电路,可以对剩余电量、加密、异常、充电进行管理。但是智能电池存在制造工艺复杂、成本昂贵、产能低等缺点。因此,在电动牙刷、玩具、电动自行车等可移动设备中依然采用非智能电池。
非智能电池一般只设置有电压检测电路,对电池电量进行不精确估计,电池的良率只能通过生产厂家严格的出厂检测进行控制。某些可移动设备产品推出市场后,部分非智能电池厂商会生产与销售与可移动设备产品兼容的非智能电池,然而,其中,有些非智能厂商通过减少电池容量、降低出厂检测标准来降低电池成本,牟取利益。这些非智能电池可能会降低对可移动设备产品的性能,并且存在严重的安全隐患(例如电池可能会爆炸)。
发明内容
本发明实施例提供一种非智能电池的认证方法、设备和存储介质,用于安装到可移动设备上的非智能电池进行认证。
第一方面,本发明实施例提供一种非智能电池的认证方法,应用于可移动设备,所述包括:
获取待认证的非智能电池的第一密钥;
获取所述可移动设备的第二密钥;
对所述第一密钥和所述第二密钥进行认证;
若认证成功,正常启动所述可移动设备。
第二方面,本发明实施例提供一种非智能电池的认证方法,应用于所述非智能电池,所述方法包括:
获取待供电的可移动设备的第一密钥;
获取所述非智能电池的第二密钥;
对所述第一密钥和所述第二密钥进行认证;
若认证成功,则向所述可移动设备正常供电。
第三方面,本发明实施例提供一种可移动设备,包括:处理器和存储器,
所述存储器,用于存储程序指令;
所述处理器,执行所述程序指令以用于:
获取待认证的非智能电池的第一密钥;
获取所述可移动设备的第二密钥;
对所述第一密钥和所述第二密钥进行认证;
若认证成功,正常启动所述可移动设备。
第四方面,本发明实施例提供一种非智能电池,包括:存储器和处理器;
所述存储器,用于存储程序指令;
所述处理器,执行所述程序指令以用于:
获取待供电的可移动设备的第一密钥;
获取所述非智能电池的第二密钥;
对所述第一密钥和所述第二密钥进行认证;
若认证成功,则向所述可移动设备正常供电。
第五方面,本发明实施例提供一种计算机可读存储介质,包括:所述计算机可读存储介质中存储有程序指令,当所述程序指令在处理器上运行时,执行第一方面所述非智能电池的认证方法。
第六方面,本发明实施例提供一种计算机可读存储介质,包括:所述计算机可读存储介质中存储有程序指令,当所述程序指令在处理器上运行时,执行第二方面所述非智能电池的认证方法。
第七方面,本发明实施例提供一种程序产品,所述程序产品的程序指令存储在可读存储介质中,可移动设备的至少一个处理器从所述可读存储介质读取并执行程序指令,使得可移动设备执行第一方面所述的非智能电池的认证方法。
第十方面,本发明实施例提供一种程序产品,所述程序产品的程序指令存储在可读存储介质中,非智能电池的至少一个处理器从所述可读存储介质 读取并执行所述程序指令,使得非智能电池执行第二方面所述的非智能电池的认证方法。
本发明实施例提供的非智能电池的认证方法、设备和存储介质,可移动设备通过获取非智能电池的第一密钥以及可移动设备的第二密钥,然后对第一密钥和第二密钥进行认证,若认证成功则可移动设备正常启动工作,或者非智能电池获取第一密钥以及可移动设备的第二密钥,然后对第一密钥和第二密钥进行认证,若认证成功则正常向可移动设备供电,以使可移动设备正常启动工作,避免不能认证通过的非智能电池被使用到可移动设备产品中,通过这样方式保证该非智能电池的品质,提高可移动设备产品的使用安全性,保证可移动设备产品的性能。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作一简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本发明的实施例提供的非智能电池的认证方法实施例一的流程图;
图2为本发明的实施例提供的非智能电池的认证方法实施例二的流程图;
图3为本发明的实施例提供的非智能电池的认证方法实施例三的流程图;
图4为本发明的实施例提供的非智能电池的认证方法实施例四的流程图;
图5为本发明的实施例提供的非智能电池的认证方法实现的具体应用图;
图6为本发明的实施例提供的非智能电池的认证装置实施例一的结构示意图;
图7为本发明的实施例提供的非智能电池的认证装置实施例二的结构示意图;
图8为本发明的实施例提供的非智能电池的认证装置实施例三的结构示意图;
图9为本发明的实施例提供的可移动设备的结构示意图;
图10为本发明的实施例提供的非智能电池的结构示意图。
具体实施方式
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
基于目前存在部分厂商推出的容量较低、降低检测标准的电池,本发明提供一种非智能电池的认证方法,对安装在可移动设备产品中的电池进行认证,避免品质较差的电池被使用到可移动设备产品中,保证可移动设备产品的使用安全性。在本发明的实施例中应理解,非智能电池指的是除了智能电池之外的电池。
可移动设备指的是通过自身配置的动力系统可以实现移动的设备或者在外力的作用下可以移动的设备,例如:电动牙刷、玩具、工艺品、电动自行车、部分终端设备、无人飞行器等需要使用非智能电池的可移动的设备。
图1为本发明的实施例提供的非智能电池的认证方法实施例一的流程图,如图1所示,本实施例的方案应用于可移动设备中,其中,所述认证方法的执行主体可以是可移动设备,具体地,所述执行主体可以是可移动设备的处理器,该非智能电池的认证方法具体包括以下步骤:
S101:获取待认证的非智能电池的第一密钥。
在本步骤中,可移动设备在安装了非智能电池之后,需要对该非智能电池先进行认证,首先需要获取待认证的非智能电池的密钥,也就是上述的第一密钥,第一密钥可以预先存储在非智能电池的预设组件中,在可移动设备需要时候直接从该非智能电池的预设组件中读取来获取,也可以由该非智能电池将第一密钥进行发送,该可移动设备接收第一密钥即可,对此本方案不做限制。
可选的,该非智能电池的预设组件可以是加密芯片、或者存储器等存储装置等。
S102:获取可移动设备的第二密钥。
在本步骤中,可移动设备还需要获取自身的密钥,即上述的第二密钥,其中,获取可移动设备的第二密钥可以包括如下几种可行的方式:
一种可行的方式:获取可移动设备本地存储的所述第二密钥。具体地,该可移动设备的第二密钥可以是预先配置在可移动设备中,例如所述第二密钥存储在可移动设备配置的本地存储装置中,在需要的时候,可以直接读取本地存储装置中存储的该第二密钥。
另一种可行的方式:接收终端设备发送的所述第二密钥。具体地,第二密钥可以存储在终端设备中,其中,所述终端设备可以包括膝上型电脑、台式电脑、智能手机等终端,在需要对非智能电池进行认证时,可移动设备可以与终端设备有线或者无线地连接,从终端设备中获取第二密钥。例如:通过手机、电脑等将第二密钥发送给可该可移动设备。
另一种可行的方式:从服务器获取所述第二密钥。具体地,第二密钥可以存储在服务器中,,可移动设备可以从服务器获取第二密钥。
在具体实现中,为了避免密钥的泄露,保证信息的安全性,所述第二密钥可保存在可移动设备产品生产厂家的服务器中。在某些实施例中,可移动设备可以直接跟服务器建立通信连接,从服务器中获取第二密钥。在其他实施例中,可移动设备可以通过中间设备(例如终端设备等)与服务器之间建立通信连接,间接的从服务器获取第二密钥,即中间设备从服务器获取第二密钥,可移动设备从中间设备获取第二密钥。
在上述方案中,应理解S101和S102没有先后顺序的限制,可以先后执行,也可以同时执行,在进行认证前获取到第一密钥和第二密钥即可。
S103:对第一密钥和第二密钥进行认证。
在获取到第一密钥和第二密钥之后,对第一密钥和第二密钥进行认证,具体的可采用RSA公钥加密算法、数据加密标准(Data Encryption Standard,DES)、高级加密标准(Advanced Encryption Standard,AES)、安全哈希算法(Secure Hash Algorithm,SHA)(例如:SHA224)等中一种或多种算法对所述第一密钥和所述第二密钥进行认证。还可以采用其他的认证算法对第一密钥和第二密钥进行认证,对此本方案不做限制。
该方案的一种具体实现中,第一密钥为公钥,所述第二密钥为私钥;或者,所述第一密钥为私钥,所述第二密钥为公钥。
S104:若认证成功,正常启动可移动设备。
若对上述第一密钥和第二密钥认证成功,则认为该非智能电池是符合要 求的非智能电池,例如是该可移动设备的原厂非智能电池或者该非智能电池品质合格,可以使用,则可以正常启动,以便用户继续使用该可移动设备。
本实施例提供的非智能电池的认证方法,可移动设备通过获取非智能电池的第一密钥以及可移动设备的第二密钥,然后对第一密钥和第二密钥进行认证,若认证成功则可移动设备正常启动工作,保证该非智能电池的品质,避免不能认证通过的非原厂电池,或者其他品质未达到要求的电池被使用到可移动设备中,通过该方式保证该非智能电池的品质,提高可移动设备的使用安全性,保证可移动设备产品的性能。
图2为本发明的实施例提供的非智能电池的认证方法实施例二的流程图,如图2所示,在上述实施例的基础上,该非智能电池的认证方法具体包括以下步骤:
S201:获取待认证的非智能电池的第一密钥。
S202:获取可移动设备的第二密钥。
S203:对第一密钥和第二密钥进行认证。
其中步骤S201-S203具体原理和解释与步骤S101-S103相同,请参见前述部分。
S204:若认证失败,则拒绝正常启动所述可移动设备。
在本步骤中,若对上述第一密钥和第二密钥认证失败,则认为该非智能电池不是可移动设备的原厂电池或者该非智能电池品质不合格,不允许使用,则可拒绝正常启动,或者结束启动可移动设备的过程。
可选的,在该方案的一种具体实现中,还可以向用于提示电池不合格或者设备不启动的原因,因此,该非智能电池的认证方法还包括:
S205:按照预设的方式发送提示信息,所述提示信息用于指示电池认证失败。
在本步骤中,可移动设备在对第一密钥和第二密钥认证失败后,可按照预设的方式发送提示信息,以便指示用户可移动设备启动失败的原因,也可以指示非智能电池认证失败,通过这种发送提示信息的方式可以提示用户当前安装到可移动设备上的非智能电池存在安全隐患。
该提示信息的发送方式本方案不做限制,可以是播放提示认证失败的语音信息,也可以是在可移动设备的交互装置(例如显示屏等)上显示指示认 证失败的提示信息,还可以是通过控制可移动设备的指示灯按照预设模式点亮或者闪烁等方式,能够告知用户电池认证失败,设备不启动即可,对此本方案也不做限制。
本实施例提供的非智能电池的认证方法,可移动设备通过获取非智能电池的第一密钥以及可移动设备的第二密钥,然后对第一密钥和第二密钥进行认证,若认证失败则拒绝正常启动可移动设备,保证该非智能电池的品质,避免不能认证通过的非原厂电池或者其他品质未达到要求的电池被使用到产品中,同时还可以向用户发送提示信息,提示用户电池认证失败,以便用户尽快更换合适的电池使用,提高电池的品质和产品安全。
图3为本发明的实施例提供的非智能电池的认证方法实施例三的流程图,如图3所示,与前述两个实施例的技术方案不同,本实施例提供的非智能电池的认证方法的执行主体为该非智能电池本身,具体地,执行主体为该非智能电池的处理器,该方法具体包括以下步骤:
S301:获取待供电的可移动设备的第一密钥。
在本步骤中,非智能电池需要获取可移动设备的密钥,也就是步骤中的第一密钥,具体的获取方式可以是读取可移动设备的存储装置中预先存储的第一密钥,或者也可以接收可移动设备发送的第一密钥,对此本方案不做限制。可移动设备的存储装置可以是存储器等。
S302:获取非智能电池的第二密钥。
在本步骤中,非智能电池还需要获取自身的第二密钥,该第二密钥可预先烧写或者配置在非智能电池的预设组件中,在需要使用时候从该预设组件中进行读取,该预设组件可以是加密芯片、或者存储器等存储装置。
在上述方案中,应理解S301和S302没有先后顺序的限制,在进行认证前获取到第一密钥和第二密钥即可。
S303:对第一密钥和第二密钥进行认证。
在本步骤中,在非智能电池获取到第一密钥和第二密钥之后,对第一密钥和第二密钥进行认证,具体的可采用RSA公钥加密算法,数据加密标准(Data Encryption Standard,DES),高级加密标准(Advanced Encryption Standard,AES),安全哈希算法(Secure Hash Algorithm,SHA)(例如: SHA224)等中一种或多种算法对所述第一密钥和所述第二密钥进行认证。还可以采用其他的认证算法对第一密钥和第二密钥进行认证,对此本方案不做限制。
该方案的一种具体实现中,第一密钥为公钥,第二密钥为私钥;或者,第一密钥为私钥,第二密钥为公钥。
S304:若认证成功,则向可移动设备正常供电。
若对上述第一密钥和第二密钥认证成功,则认为该非智能电池是该可移动设备的原厂电池,或者该非智能电池品质合格,或者认为该非智能电池与可移动设备是匹配的,可以使用,则正常向可移动设备供电,以使该可移动设备正常启动,方便用户继续使用该可移动设备。
本实施例提供的非智能电池的认证方法,非智能电池获取第一密钥以及可移动设备的第二密钥,然后对第一密钥和第二密钥进行认证,若认证成功则正常向可移动设备供电,以使可移动设备正常启动工作,通过该种方式确定可移动设备为该非智能电池匹配的原厂产品,避免将该非智能电池应用在非原厂可移动设备或者不合格的可移动设备上,避免该非智能电池应用到不匹配的可移动设备产品上而造成的隐患。
图4为本发明的实施例提供的非智能电池的认证方法实施例四的流程图,如图4所示,在上述图3所示实施例的基础上,该非智能电池的认证方法具体包括以下步骤:
S401:获取待供电的可移动设备的第一密钥。
S402:获取非智能电池的第二密钥。
S403:对第一密钥和第二密钥进行认证。
其中步骤S401-S403具体原理和解释与步骤S301-S303相同,请参见前述部分。
S404:若认证失败,则拒绝向可移动设备供电。
在本步骤中,若非智能电池对上述第一密钥和第二密钥认证失败,则认为非智能电池与该可移动设备之间不匹配,例如:可移动设备并未是该非智能电池的原厂设备,或者该可移动设备的品质不合格等。因此可拒绝向可移动设备供电。
在上述图3和图4所示的实施例的基础上,在从所述非智能电池的预设 组件中获取第二密钥之前,该方法还包括:
非智能电池接收终端设备发送的所述第二密钥,或者从服务器获取第二密钥,然后再将第二密钥写入到预设组件中。
在该方案中,非智能电池可以从烧写器、或者连接烧写器的电脑等终端设备中获取到第二密钥,也可以通过中间设备与服务器建立连接获取到第二密钥,然后再将该第二密钥写入预设组件中,以便在需要进行认证的时候读取该第二密钥。
本实施例提供的非智能电池的认证方法,非智能电池获取第一密钥以及可移动设备的第二密钥,然后对第一密钥和第二密钥进行认证,若认证失败则拒绝向可移动设备供电,避免将该非智能电池应用在非原厂可移动设备或者不合格的可移动设备上,避免该非智能电池应用到不匹配的可移动设备产品上而造成的隐患。
在上述几个实施例的基础上,以任一可移动设备即产品中的密钥为私钥、非智能电池中的密钥为公钥为例,对本发明提供的非智能电池的认证方法进行说明。
图5为本发明的实施例提供的非智能电池的认证方法一实例的示意图,如图5所示,可移动设备通过中间设备或者直接与服务器之间建立通信连接,获取对应的私钥,然后将该私钥存储在可移动设备的本地存储装置(也称为存储介质)中,通过加密治具将公钥烧录到非智能电池的加密芯片中,该加密治具包括中间设备或者烧写器等。通过用户的操作等触发可移动设备主体启动后对私钥和公钥进行认证,如果成功,可移动设备主体正常启动,否则异常退出;
该方案的一种具体实现过程如下:
1、加密治具从服务器获取私钥。
2、加密治具将公钥烧录到非智能电池加密芯片中。
3、可移动设备主体从服务器获取私钥。
4、可移动设备主体将私钥存储到存储装置中。
5、可移动设备主体开机后通过通信链路读取非智能电池公钥。
6、可移动设备主体对私钥和公钥进行认证。
7、如果认证成功,则正常启动可移动设备,以便用户使用。
8、如果认证失败,则拒绝正常启动可移动设备。
在该方案中,应理解公钥和私钥可以不通过服务器获取,而是预先将其保存在本地的终端设备中。可选的,私钥也可以不通过治具烧录,可以是可移动设备主体通过通信链路烧录。
本发明提供的非智能电池的认证方法,通过密钥对非智能电池进行认证,避免智能电池制造工艺复杂、成本昂贵、产能降低等缺点,同时可以避免非原厂生产的低品质电池流入市场,影响产品性能。
图6为本发明的实施例提供的非智能电池的认证装置实施例一的结构示意图,如图6所示,本实施例提供的可移动设备600包括:
获取模块601,用于获取待认证的非智能电池的第一密钥;
所述获取模块601还用于获取所述非智能电池的认证装置的第二密钥;
处理模块602,用于对所述第一密钥和所述第二密钥进行认证;
所述处理模块602还用于若认证成功,正常启动所述非智能电池的认证装置。
本实施例提供的非智能电池的认证装置,用于执行前述任一方法实施例中可移动设备的技术方案,其实现原理和技术效果类似,在此不再赘述。
在上述实施例的基础上,所述处理模块602还用于若认证失败,则拒绝正常启动所述可移动设备。
可选的,所述处理模块602还用于按照预设的方式发送提示信息,所述提示信息用于指示电池认证失败。
可选的,所述获取模块601具体用于:
从所述待认证的非智能电池中的预设组件中获取第一密钥。
可选的,所述预设组件包括加密芯片或存储装置。
可选的,所述获取模块601具体用于:
获取可移动设备本地存储的所述第二密钥;或者,
接收终端设备发送的所述第二密钥;或者,
从服务器获取所述第二密钥。
可选的,所述第一密钥为公钥,所述第二密钥为私钥;或者,
所述第一密钥为私钥,所述第二密钥为公钥。
可选的,所述处理模块602具体用于:
使用RSA,DES,AES,SHA中一种或多种算法对所述第一密钥和所述第二密钥进行认证。
上述任一实施例提供的非智能电池的认证装置,用于执行前述任一方法实施例中可移动设备的技术方案,其实现原理和技术效果类似,在此不再赘述。
图7为本发明的实施例提供的非智能电池的认证装置实施例二的结构示意图,如图7所示,本实施例提供的非智能电池的认证装置700包括:
获取模块701,用于获取待供电的可移动设备的第一密钥;
所述获取模块701还用于获取所述非智能电池的认证装置20的第二密钥;
处理模块702,用于对所述第一密钥和所述第二密钥进行认证;
所述处理模块702还用于若认证成功,则向所述可移动设备正常供电。
本实施例提供的非智能电池的认证装置,用于执行前述任一方法实施例中非智能电池的技术方案,其实现原理和技术效果类似,在此不再赘述。
在上述实施例的基础上,所述获取模块701具体用于:
从所述可移动设备的存储装置中读取所述第一密钥;或者,
接收所述可移动设备发送的所述第一密钥。
图8为本发明的实施例提供的非智能电池的认证装置实施例三的结构示意图,如图8所示,所述非智能电池的认证装置20还包括:预设组件703;
所述获取模块701具体用于:
从所述非智能电池的预设组件703中获取第二密钥。
可选的,所述预设组件703包括加密芯片或存储装置。
可选的,所述获取模块701还用于:
接收终端设备发送的所述第二密钥,或者从服务器获取所述第二密钥;
将所述第二密钥写入到所述预设组件中。
可选的,所述第一密钥为公钥,所述第二密钥为私钥;
或者,
所述第一密钥为私钥,所述第二密钥为公钥。
所述处理模块702具体用于:
使用RSA,DES,AES,SHA中一种或多种算法对所述第一密钥和所述 第二密钥进行认证。
上述实施例提供的非智能电池的认证装置,用于执行前述任一方法实施例中非智能电池的技术方案,其实现原理和技术效果类似,在此不再赘述。
图9为本发明的实施例提供的可移动设备的结构示意图,如图9所示,本实施例提供的可移动设备900包括:存储器901和处理器902,
所述存储器901,用于存储程序指令;
所述处理器902,执行所述程序指令以用于:
获取待认证的非智能电池的第一密钥;
获取所述可移动设备的第二密钥;
对所述第一密钥和所述第二密钥进行认证;
若认证成功,正常启动所述可移动设备。
可选的,所述处理器902还用于:
若认证失败,则拒绝正常启动所述可移动设备。
可选的,所述处理器902还用于:
按照预设的方式发送提示信息,所述提示信息用于指示电池认证失败。
可选的,所述处理器902具体用于:
从所述待认证的非智能电池中的预设组件中获取第一密钥。
可选的,所述预设组件包括加密芯片或存储装置。
可选的,所述处理器902具体用于获取可移动设备本地存储的所述第二密钥;该方案中,该第二密钥可以存储在存储器901中,也可以存储在该可移动设备中的其他存储装置中。
或者,接收终端设备发送的所述第二密钥;
或者,从服务器获取所述第二密钥。
可选的,所述第一密钥为公钥,所述第二密钥为私钥;或者,
所述第一密钥为私钥,所述第二密钥为公钥。
可选的,所述处理器902具体用于:
使用RSA,DES,AES,SHA中一种或多种算法对所述第一密钥和所述第二密钥进行认证。
本实施例提供的可移动设备,用于执行前述任一方法实施例中可移动设备的技术方案,其实现原理和技术效果类似,在此不再赘述。
图10为本发明的实施例提供的非智能电池的结构示意图,如图10所示,该非智能电池1000包括:存储器1001和处理器1002;
所述存储器1001,用于存储程序指令;
所述处理器1002,执行所述程序指令以用于:
获取待供电的可移动设备的第一密钥;
获取所述非智能电池的第二密钥;
对所述第一密钥和所述第二密钥进行认证;
若认证成功,则向所述可移动设备正常供电。
可选的,所述处理器1002还用于:
若认证失败,则拒绝向所述可移动设备供电。
可选的,所述处理器1002具体用于:
从所述可移动设备的存储装置中读取所述第一密钥;或者,
接收所述可移动设备发送的所述第一密钥。
可选的,所述处理器1002具体用于:
从所述非智能电池的预设组件中获取第二密钥。
可选的,所述预设组件包括加密芯片或存储装置。该方案中,应理解预设组件中的存储装置可以是前述存储器1001,也可以不同于存储器1001的其他存储装置,对此本方案不做限制。
可选的,所述处理器1002还用于:
接收终端设备发送的所述第二密钥,或者从服务器获取所述第二密钥;
将所述第二密钥写入到所述预设组件中。
可选的,所述第一密钥为公钥,所述第二密钥为私钥;
或者,
所述第一密钥为私钥,所述第二密钥为公钥。
可选的,所述处理器1002具体用于:
使用RSA,DES,AES,SHA中一种或多种算法对所述第一密钥和所述第二密钥进行认证。
本实施例提供的非智能电池,用于执行前述任一方法实施例中非智能电池的技术方案,其实现原理和技术效果类似,在此不再赘述。
本发明实施例还提供一种计算机可读存储介质,包括:所述计算机可读 存储介质中存储有程序指令,当所述程序指令在处理器上运行时,执行可移动设备侧的所述非智能电池的认证方法。
本发明实施例还提供一种计算机可读存储介质,包括:所述计算机可读存储介质中存储有程序指令,当所述程序指令在处理器上运行时,执行第二方面所述非智能电池的认证方法。
本发明实施例还提供一种程序产品,所述程序产品的程序指令存储在可读存储介质中,可移动设备的至少一个处理器从所述可读存储介质读取并执行程序指令,使得可移动设备执行非智能电池的认证方法。
本发明实施例还提供一种程序产品,所述程序产品的程序指令存储在可读存储介质中,非智能电池的至少一个处理器从所述可读存储介质读取并执行所述程序指令,使得非智能电池执行非智能电池的认证方法。
在上述可移动设备和非智能电池的实施例中,应理解处理器可以是中央处理单元(Central Processing Unit,CPU),该处理器还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
本领域普通技术人员可以理解:实现上述方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成,前述的程序可以存储于一计算机可读取存储介质中,该程序在执行时,执行包括上述方法实施例的步骤;而前述的存储介质包括:只读内存(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
最后应说明的是:以上各实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述各实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分或者全部技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明各实施例技术方案的范围。

Claims (34)

  1. 一种非智能电池的认证方法,其特征在于,应用于可移动设备,所述方法包括:
    获取待认证的非智能电池的第一密钥;
    获取所述可移动设备的第二密钥;
    对所述第一密钥和所述第二密钥进行认证;
    若认证成功,正常启动所述可移动设备。
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    若认证失败,则拒绝正常启动所述可移动设备。
  3. 根据权利要求2所述的方法,其特征在于,所述方法还包括:
    按照预设的方式发送提示信息,所述提示信息用于指示所述电池认证失败。
  4. 根据权利要求1至3任一项所述的方法,其特征在于,所述获取待认证的非智能电池的第一密钥包括:
    从所述待认证的非智能电池中的预设组件中获取第一密钥。
  5. 根据权利要求4所述的方法,其特征在于,
    所述预设组件包括加密芯片或存储装置。
  6. 根据权利要求1至5任一项所述的方法,其特征在于,所述获取所述可移动设备的第二密钥包括:
    获取可移动设备本地存储的所述第二密钥;或者,
    接收终端设备发送的所述第二密钥;或者,
    从服务器获取所述第二密钥。
  7. 根据权利要求1至6任一项所述的方法,其特征在于,
    所述第一密钥为公钥,所述第二密钥为私钥;或者,
    所述第一密钥为私钥,所述第二密钥为公钥。
  8. 根据权利要求1至7任一项所述的方法,其特征在于,所述对所述第一密钥和所述第二密钥进行认证包括:
    使用RSA,数据加密标准DES,高级加密标准AES,安全哈希算法SHA中一种或多种算法对所述第一密钥和所述第二密钥进行认证。
  9. 一种非智能电池的认证方法,其特征在于,应用于所述非智能电池, 所述方法包括:
    获取待供电的可移动设备的第一密钥;
    获取所述非智能电池的第二密钥;
    对所述第一密钥和所述第二密钥进行认证;
    若认证成功,则向所述可移动设备正常供电。
  10. 根据权利要求9所述的方法,其特征在于,所述方法还包括:
    若认证失败,则拒绝向所述可移动设备供电。
  11. 根据权利要求9或10所述的方法,其特征在于,所述获取待供电的可移动设备的第一密钥,包括:
    从所述可移动设备的存储装置中读取所述第一密钥;或者,
    接收所述可移动设备发送的所述第一密钥。
  12. 权利要求9至11任一项所述的方法,其特征在于,所述获取所述非智能电池的第二密钥包括:
    从所述非智能电池的预设组件中获取第二密钥。
  13. 根据权利要求12所述的方法,其特征在于,所述预设组件包括加密芯片或存储装置。
  14. 根据权利要求12或13所述的方法,其特征在于,从所述非智能电池的预设组件中获取第二密钥之前,所述方法还包括:
    接收终端设备发送的所述第二密钥,或者从服务器获取所述第二密钥;
    将所述第二密钥写入到所述预设组件中。
  15. 根据权利要求9至14任一项所述的方法,其特征在于,
    所述第一密钥为公钥,所述第二密钥为私钥;
    或者,
    所述第一密钥为私钥,所述第二密钥为公钥。
  16. 根据权利要求9至15任一项所述的方法,其特征在于,所述对所述第一密钥和所述第二密钥进行认证,包括:
    使用RSA,数据加密标准DES,高级加密标准AES,安全哈希算法SHA中一种或多种算法对所述第一密钥和所述第二密钥进行认证。
  17. 一种可移动设备,其特征在于,包括:处理器和存储器,
    所述存储器,用于存储程序指令;
    所述处理器,执行所述程序指令以用于:
    获取待认证的非智能电池的第一密钥;
    获取所述可移动设备的第二密钥;
    对所述第一密钥和所述第二密钥进行认证;
    若认证成功,正常启动所述可移动设备。
  18. 根据权利要求17所述的可移动设备,其特征在于,所述处理器还用于:
    若认证失败,则拒绝正常启动所述可移动设备。
  19. 根据权利要求18所述的可移动设备,其特征在于,所述处理器还用于:
    按照预设的方式发送提示信息,所述提示信息用于指示电池认证失败。
  20. 根据权利要求17至19任一项所述的可移动设备,其特征在于,所述处理器具体用于:
    从所述待认证的非智能电池中的预设组件中获取第一密钥。
  21. 根据权利要求20所述的可移动设备,其特征在于,
    所述预设组件包括加密芯片或存储装置。
  22. 根据权利要求17至21任一项所述的可移动设备,其特征在于,所述处理器具体用于:
    获取可移动设备本地存储的所述第二密钥;或者,
    接收终端设备发送的所述第二密钥;或者,
    从服务器获取所述第二密钥。
  23. 根据权利要求17至22任一项所述的可移动设备,其特征在于,
    所述第一密钥为公钥,所述第二密钥为私钥;或者,
    所述第一密钥为私钥,所述第二密钥为公钥。
  24. 根据权利要求17至23任一项所述的可移动设备,其特征在于,所述处理器具体用于:
    使用RSA,数据加密标准DES,高级加密标准AES,安全哈希算法SHA中一种或多种算法对所述第一密钥和所述第二密钥进行认证。
  25. 一种非智能电池,其特征在于,包括:存储器和处理器;
    所述存储器,用于存储程序指令;
    所述处理器,执行所述程序指令以用于:
    获取待供电的可移动设备的第一密钥;
    获取所述非智能电池的第二密钥;
    对所述第一密钥和所述第二密钥进行认证;
    若认证成功,则向所述可移动设备正常供电。
  26. 根据权利要求25所述的非智能电池,其特征在于,所述处理器还用于:
    若认证失败,则拒绝向所述可移动设备供电。
  27. 根据权利要求25或26所述的非智能电池,其特征在于,所述处理器具体用于:
    从所述可移动设备的存储装置中读取所述第一密钥;或者,
    接收所述可移动设备发送的所述第一密钥。
  28. 权利要求25至27任一项所述的非智能电池,其特征在于,所述处理器具体用于:
    从所述非智能电池的预设组件中获取第二密钥。
  29. 根据权利要求28所述的非智能电池,其特征在于,所述预设组件包括加密芯片或存储装置。
  30. 根据权利要求28或29所述的非智能电池,其特征在于,所述处理器还用于:
    接收终端设备发送的所述第二密钥,或者从服务器获取所述第二密钥;
    将所述第二密钥写入到所述预设组件中。
  31. 根据权利要求25至30任一项所述的非智能电池,其特征在于,
    所述第一密钥为公钥,所述第二密钥为私钥;
    或者,
    所述第一密钥为私钥,所述第二密钥为公钥。
  32. 根据权利要求25至31任一项所述的非智能电池,其特征在于,所述处理器具体用于:
    使用RSA,数据加密标准DES,高级加密标准AES,安全哈希算法SHA中一种或多种算法对所述第一密钥和所述第二密钥进行认证。
  33. 一种计算机可读存储介质,其特征在于,包括:所述计算机可读存 储介质中存储有程序指令,当所述程序指令在处理器上运行时,执行权利要求1至8任一项所述非智能电池的认证方法。
  34. 一种计算机可读存储介质,其特征在于,包括:所述计算机可读存储介质中存储有程序指令,当所述程序指令在处理器上运行时,执行权利要求9至16任一项所述非智能电池的认证方法。
PCT/CN2018/071649 2018-01-05 2018-01-05 非智能电池的认证方法、设备和存储介质 WO2019134138A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2018/071649 WO2019134138A1 (zh) 2018-01-05 2018-01-05 非智能电池的认证方法、设备和存储介质
CN201880031261.6A CN110612619A (zh) 2018-01-05 2018-01-05 非智能电池的认证方法、设备和存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/071649 WO2019134138A1 (zh) 2018-01-05 2018-01-05 非智能电池的认证方法、设备和存储介质

Publications (1)

Publication Number Publication Date
WO2019134138A1 true WO2019134138A1 (zh) 2019-07-11

Family

ID=67144041

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/071649 WO2019134138A1 (zh) 2018-01-05 2018-01-05 非智能电池的认证方法、设备和存储介质

Country Status (2)

Country Link
CN (1) CN110612619A (zh)
WO (1) WO2019134138A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111460427A (zh) * 2020-02-26 2020-07-28 上海钧正网络科技有限公司 一种供电设备的绑定方法、装置、存储介质及设备
CN111988335A (zh) * 2020-08-31 2020-11-24 广州极飞科技有限公司 电芯身份认证方法及相关装置
CN112073199A (zh) * 2020-08-18 2020-12-11 深圳易马达科技有限公司 一种电池认证方法、装置、终端设备及介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102111272A (zh) * 2010-12-24 2011-06-29 武汉天喻信息产业股份有限公司 移动终端对外部设备进行认证方法
CN105235542A (zh) * 2015-10-27 2016-01-13 北京博望华科科技有限公司 一种基于信息安全的电动汽车电池监控系统及监控方法
CN105793815A (zh) * 2013-12-03 2016-07-20 无线电系统公司 用于验证电池认证的方法和设备
CN105914820A (zh) * 2016-05-05 2016-08-31 深圳市三颗子弹科技有限公司 带有识别功能的分离式移动电源及其认证识别方法
US20180006473A1 (en) * 2016-06-30 2018-01-04 Infineon Technologies Ag Ensuring backward compatibility in battery authentication applications

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7613924B2 (en) * 2005-03-08 2009-11-03 Texas Instruments Incorporated Encrypted and other keys in public and private battery memories
JP5064003B2 (ja) * 2005-12-20 2012-10-31 パナソニック株式会社 認証システム、及び認証装置
TWI414956B (zh) * 2009-09-16 2013-11-11 What Trend Technology Corp Ltd 具防竊功能之二次電池裝置、供電控制模組及二次電池之防竊方法
US8630411B2 (en) * 2011-02-17 2014-01-14 Infineon Technologies Ag Systems and methods for device and data authentication

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102111272A (zh) * 2010-12-24 2011-06-29 武汉天喻信息产业股份有限公司 移动终端对外部设备进行认证方法
CN105793815A (zh) * 2013-12-03 2016-07-20 无线电系统公司 用于验证电池认证的方法和设备
CN105235542A (zh) * 2015-10-27 2016-01-13 北京博望华科科技有限公司 一种基于信息安全的电动汽车电池监控系统及监控方法
CN105914820A (zh) * 2016-05-05 2016-08-31 深圳市三颗子弹科技有限公司 带有识别功能的分离式移动电源及其认证识别方法
US20180006473A1 (en) * 2016-06-30 2018-01-04 Infineon Technologies Ag Ensuring backward compatibility in battery authentication applications

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111460427A (zh) * 2020-02-26 2020-07-28 上海钧正网络科技有限公司 一种供电设备的绑定方法、装置、存储介质及设备
CN112073199A (zh) * 2020-08-18 2020-12-11 深圳易马达科技有限公司 一种电池认证方法、装置、终端设备及介质
CN111988335A (zh) * 2020-08-31 2020-11-24 广州极飞科技有限公司 电芯身份认证方法及相关装置

Also Published As

Publication number Publication date
CN110612619A (zh) 2019-12-24

Similar Documents

Publication Publication Date Title
US11200018B2 (en) Electronic device and method for sharing screen data
KR102061913B1 (ko) 전자 장치의 동작을 제어하기 위한 방법 및 장치
KR20150099441A (ko) 클라이언트 자격 증명 인증 방법 및 장치
WO2019134138A1 (zh) 非智能电池的认证方法、设备和存储介质
US11567748B2 (en) Interface device having updatable firmware, mobile device, and firmware update method
US20160088476A1 (en) Electronic device, accessory device, and method of authenticating accessory device
US9798887B2 (en) Computing device to securely activate or revoke a key
GB2473544A (en) Authenticating an accessory attached at one port of a host device, using an authentication device attached to another port.
US20120174199A1 (en) Pairing of base and detachable device
US9621986B2 (en) Electronic device, audio device, and method for supplying power to the audio device
KR20190095582A (ko) 다른 전자 장치의 인증을 수행하는 전자 장치와 이의 동작 방법
CN105046142A (zh) 设备和配件配对
WO2017076051A1 (zh) 一种获取超级用户权限的方法及装置
JP2009195014A (ja) 情報処理装置、2次電池パックおよび情報処理装置の2次電池パック認証方法
WO2019205590A1 (zh) 电池认证方法、设备电池、无人机及存储介质
US8713653B2 (en) Data processing apparatus, activation control method, and computer-readable storage medium
KR102490395B1 (ko) 외부 전자 장치의 키를 공유하는 전자 장치 및 전자 장치의 동작 방법
AU2015291536A1 (en) Method and apparatus for realizing switching between intelligent key device modes
CN105874871B (zh) 减少直接无线交互中的连接时间
WO2017080411A1 (zh) 一种充电参数的校验方法及设备和充电器
KR102545127B1 (ko) 외부 전자 장치의 키와 관련된 어플리케이션을 관리하는 전자 장치 및 전자 장치의 동작 방법
CN108182089B (zh) 一种计算机启动方法及电子设备
JP2019047726A (ja) バッテリ制御ic、バッテリパック及びその認証方法
CN105471480A (zh) 移动终端中基于车辆蓝牙通讯的应用程序登录方法及系统
US20170142583A1 (en) Methods and devices for controlling authorization to communication information

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18898205

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18898205

Country of ref document: EP

Kind code of ref document: A1