WO2021208549A1 - 充电认证的方法和装置 - Google Patents
充电认证的方法和装置 Download PDFInfo
- Publication number
- WO2021208549A1 WO2021208549A1 PCT/CN2021/072430 CN2021072430W WO2021208549A1 WO 2021208549 A1 WO2021208549 A1 WO 2021208549A1 CN 2021072430 W CN2021072430 W CN 2021072430W WO 2021208549 A1 WO2021208549 A1 WO 2021208549A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- charging
- electric vehicle
- key
- connection
- charging pile
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 128
- 238000004891 communication Methods 0.000 claims abstract description 29
- 238000010295 mobile communication Methods 0.000 claims abstract description 25
- 230000015654 memory Effects 0.000 claims description 67
- 238000012545 processing Methods 0.000 claims description 43
- 238000004590 computer program Methods 0.000 claims description 7
- 230000006870 function Effects 0.000 description 20
- 238000010586 diagram Methods 0.000 description 18
- 238000012795 verification Methods 0.000 description 14
- 230000008569 process Effects 0.000 description 10
- 208000001970 congenital sucrase-isomaltase deficiency Diseases 0.000 description 7
- 230000004044 response Effects 0.000 description 7
- 230000009471 action Effects 0.000 description 6
- 230000001360 synchronised effect Effects 0.000 description 5
- 238000013461 design Methods 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 4
- 238000012546 transfer Methods 0.000 description 4
- 230000009286 beneficial effect Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000001413 cellular effect Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000009795 derivation Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60L—PROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
- B60L53/00—Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles
- B60L53/30—Constructional details of charging stations
- B60L53/305—Communication interfaces
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60L—PROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
- B60L53/00—Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles
- B60L53/60—Monitoring or controlling charging stations
- B60L53/66—Data transfer between charging stations and vehicles
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60L—PROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
- B60L53/00—Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles
- B60L53/60—Monitoring or controlling charging stations
- B60L53/65—Monitoring or controlling charging stations involving identification of vehicles or their battery types
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60L—PROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
- B60L53/00—Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles
- B60L53/60—Monitoring or controlling charging stations
- B60L53/66—Data transfer between charging stations and vehicles
- B60L53/665—Methods related to measuring, billing or payment
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60L—PROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
- B60L53/00—Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles
- B60L53/60—Monitoring or controlling charging stations
- B60L53/68—Off-site monitoring or control, e.g. remote control
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02T—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
- Y02T10/00—Road transport of goods or passengers
- Y02T10/60—Other road transportation technologies with climate change mitigation effect
- Y02T10/70—Energy storage systems for electromobility, e.g. batteries
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02T—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
- Y02T10/00—Road transport of goods or passengers
- Y02T10/60—Other road transportation technologies with climate change mitigation effect
- Y02T10/7072—Electromobility specific charging systems or methods for batteries, ultracapacitors, supercapacitors or double-layer capacitors
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02T—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
- Y02T90/00—Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
- Y02T90/10—Technologies relating to charging of electric vehicles
- Y02T90/12—Electric charging stations
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02T—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
- Y02T90/00—Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
- Y02T90/10—Technologies relating to charging of electric vehicles
- Y02T90/16—Information or communication technologies improving the operation of electric vehicles
Definitions
- This application relates to the field of Internet of Vehicles, and more specifically, to a method and device for charging authentication.
- Electric vehicles are the most important new energy vehicles in the future.
- the charging system of electric vehicles includes at least: electric vehicles, charging spots (CS), and charging management systems (CMS).
- the charging management system is a centralized trusted service system that manages charging piles and charging charges. For networked electric vehicles, information security is very important. When electric vehicles use public charging piles for charging, both electric vehicles and charging piles may be attacked, causing the communication between electric vehicles and charging piles to be tampered with or information Give way.
- This application provides a charging authentication method and device to improve the communication security between the electric vehicle and the charging pile.
- a charging authentication method is provided.
- the method is executed by an electric vehicle.
- the electric vehicle and the charging pile establish a first connection through the controller area network CAN bus.
- the electric vehicle establishes a first connection with the charging management system through the mobile communication network.
- the second connection includes: the electric vehicle sends a charging request message to the charging pile through the first connection; the electric vehicle performs identity authentication and keys with the charging pile through the second connection and the third connection between the charging pile and the charging management system Negotiation.
- the method of the embodiment of the application forwards the message between the electric vehicle and the charging pile connected via the CAN bus by the charging management system, which can solve the problem of insufficient CAN bus bandwidth.
- the electric vehicle and the charging pile are authenticated and encrypted. Key negotiation can improve the security of information transmission between electric vehicles and charging piles.
- the electric vehicle performs identity authentication and key negotiation with the charging pile through the second connection and the third connection between the charging pile and the charging management system, including: electric The vehicle sends the identity information of the electric vehicle to the charging pile through the first connection; the electric vehicle receives the identity information of the charging pile, and the identity information of the charging pile is forwarded by the charging management system through the second connection; the electric vehicle sends the first secret to the charging pile Key information, the first key information is forwarded by the charging management system through the third connection, the first key information includes the first key; the electric vehicle receives the second key information sent by the charging pile, and the second key information is Forwarded by the charging management system through the second connection, the second key information includes the second key; the electric vehicle determines the third key according to the first key and the second key, and the third key is the electric vehicle and the charging pile The shared key, the third key is used to encrypt the message between the electric vehicle and the charging pile. .
- the method of the embodiment of the present application forwards the message between the electric vehicle and the charging pile connected via the CAN bus by the charging management system, which can solve the problem of insufficient CAN bus bandwidth.
- the electric vehicle and the charging pile can obtain a consensus key, which can be used to protect the subsequent communication between the electric vehicle and the charging pile.
- the second key information further includes a digital signature of the charging pile.
- the electric vehicle receives the second key information sent by the charging pile, wherein the digital signature of the charging pile in the second key information is replaced with the digital signature of the charging management system.
- a method for charging authentication is provided.
- the method is executed by a charging pile.
- the charging pile and the electric vehicle establish a first connection through the controller area network CAN bus.
- the charging pile establishes a first connection with the charging management system through the mobile communication network.
- the charging pile performs identity authentication and key negotiation with the electric vehicle through the third connection and the second connection between the electric vehicle and the charging management system, including: charging The pile receives the identity information of the electric vehicle sent by the electric vehicle through the first connection; the charging pile sends the identity information of the charging pile, and the identity information of the charging pile is forwarded by the charging management system through the second connection; the charging pile receives the first connection sent by the electric vehicle.
- the first key information is forwarded by the charging management system through the third connection, the first key information includes the first key; the charging pile sends the second key information to the electric vehicle, the second key information It is forwarded by the charging management system through the second connection, the second key information includes the second key; the charging pile determines the third key according to the first key and the second key, and the third key is the electric vehicle and charging The key shared by the pile, the third key is used to encrypt the message between the electric vehicle and the charging pile.
- the first key information further includes a digital signature of the electric vehicle.
- the method further includes: the charging pile verifies the digital signature of the electric vehicle.
- the charging pile receives the first key information sent by the electric vehicle, wherein the digital signature of the electric vehicle in the first key information is replaced with the digital signature of the charging management system.
- a method for charging authentication is provided.
- the method is executed by a charging management system.
- the charging management system establishes a second connection with the electric vehicle through a mobile communication network, and the charging management system establishes a third connection with the charging pile through the mobile communication network.
- the charging management system forwards the identity authentication message and key agreement message between the electric vehicle and the charging pile through the second connection and the third connection, including: the charging management system passes The third connection receives the identity information of the charging pile; the charging management system sends the identity information of the charging pile to the electric vehicle through the second connection; the charging management system receives the first key information and the first key information sent by the electric vehicle through the second connection Including the first key; the charging management system sends the first key information to the charging pile through the third connection; the charging management system receives the second key information sent by the charging pile through the third connection, and the second key information includes the second key information.
- the charging management system sends the second key information to the electric vehicle through the second connection, so that the electric vehicle and the charging pile determine the third key according to the first key and the second key, and the third key is the electric vehicle and charging The key shared by the pile, the third key is used to encrypt the message between the electric vehicle and the charging pile.
- the method further includes: the charging management system verifies the identity information of the charging pile.
- the first key information further includes a digital signature of the electric vehicle.
- the method further includes: the charging management system verifies the digital signature of the electric vehicle; the charging management system Replace the digital signature of the electric vehicle with the digital signature of the charging management system.
- the second key information further includes the digital signature of the charging pile.
- the method further includes: the charging management system verifies the digital signature through the charging pile; the charging management system Replace the digital signature of the charging pile with the digital signature of the charging management system.
- a charging authentication device is provided.
- the device is installed in an electric vehicle.
- a first connection is established between the device and the charging pile through the controller area network CAN bus.
- the device is established with a charging management system through a mobile communication network.
- the second connection includes: a transceiver module for sending a charging request message to the charging pile through the first connection; a processing module, and the transceiver module are also used for, through the second connection and the third connection between the charging pile and the charging management system , Perform identity authentication and key negotiation with the charging pile.
- the processing module and the transceiver module are also used to perform identity authentication and confidentiality between the charging pile and the charging management system through the second connection and the third connection between the charging pile and the charging management system.
- the key negotiation includes: the transceiver module is used to send the identity information of the electric vehicle to the charging pile through the first connection; the transceiver module is also used to receive the identity information of the charging pile, and the identity information of the charging pile is passed through the second The transceiver module is also used to send the first key information to the charging pile, the first key information is forwarded by the charging management system through the third connection, and the first key information includes the first key; the transceiver module It is also used to receive the second key information sent by the charging pile, the second key information is forwarded by the charging management system through the second connection, and the second key information includes the second key; the processing module is used to, according to the first The first key and the second key determine the third key.
- the third key is the key shared by the electric vehicle and the
- the second key information further includes the digital signature of the charging pile.
- the processing module is further used to verify the digital signature passing the charging pile.
- the transceiver module receives the second key information sent by the charging pile, wherein the digital signature of the charging pile in the second key information is replaced with the digital signature of the charging management system.
- a charging authentication device is provided.
- the device is installed in a charging pile.
- a first connection is established between the device and the electric vehicle through the controller area network CAN bus.
- the device is established with a charging management system through a mobile communication network.
- the third connection includes: a transceiver module for receiving the charging request message sent by the electric vehicle through the first connection; the processing module, and the transceiver module are also used for, through the third connection and the second connection between the electric vehicle and the charging management system Connect, perform identity authentication and key negotiation with the electric vehicle.
- the processing module and the transceiver module are also used to perform identity authentication and encryption with the electric vehicle through the third connection and the second connection between the electric vehicle and the charging management system.
- the key negotiation includes: the transceiver module is used to receive the identity information of the electric vehicle sent by the electric vehicle through the first connection; the transceiver module is also used to transmit the identity information of the charging pile, and the identity information of the charging pile is passed by the charging management system through the first connection.
- the second connection is forwarded;
- the transceiver module is also used to receive the first key information sent by the electric vehicle, the first key information is forwarded by the charging management system through the third connection, and the first key information includes the first key;
- the transceiver module is also used to send second key information to the electric vehicle, the second key information is forwarded by the charging management system through the second connection, and the second key information includes the second key;
- the processing module is used to, according to The first key and the second key determine the third key, the third key is a key shared by the electric vehicle and the charging pile, and the third key is used to encrypt messages between the electric vehicle and the charging pile.
- the first key information further includes a digital signature of the electric vehicle.
- the processing module is further used to verify the digital signature of the electric vehicle.
- the transceiver module receives the first key information sent by the electric vehicle, wherein the digital signature of the electric vehicle in the first key information is replaced with the digital signature of the charging management system.
- a charging authentication device characterized in that the device is installed in a charging management system, the device and the electric vehicle establish a second connection through a mobile communication network, and the device and the charging pile establish a third connection through the mobile communication network.
- the first connection between the electric vehicle and the charging pile is established through the controller area network CAN bus, including: a transceiver module, used to forward the identity authentication message and key between the electric vehicle and the charging pile through the second connection and the third connection Negotiation message.
- the transceiver module forwards the identity authentication message and the key agreement message between the electric vehicle and the charging pile through the second connection and the third connection, including: the transceiver module is also used for , Receiving the identity information of the charging pile through the third connection; the transceiver module is also used to send the identity information of the charging pile to the electric vehicle through the second connection; the transceiver module is also used to receive the first secret sent by the electric vehicle through the second connection Key information, the first key information includes the first key; the transceiver module is also used to send the first key information to the charging pile through the third connection; the transceiver module is also used to receive the first key information sent by the charging pile through the third connection Two key information, the second key information includes the second key; the transceiver module is also used to send the second key information to the electric vehicle through the second connection, so that the electric vehicle and the charging pile can according to the first key and the second key.
- the key determines the third key, the third key is
- the device before the transceiver module sends the identity information of the charging pile to the electric vehicle through the second connection, the device further includes: a processing module for verifying the identity information of the charging pile.
- the first key information further includes a digital signature of the electric vehicle.
- the device further includes: a processing module for verifying the digital signature of the electric vehicle; the processing module is also used for replacing the digital signature of the electric vehicle with charging management The digital signature of the system.
- the second key information further includes the digital signature of the charging pile.
- the device before the transceiver module sends the second key information to the electric vehicle through the second connection, the device further includes: a processing module for the charging management system to verify the digital signature passed through the charging pile .
- the processing module is also used to replace the digital signature of the charging pile with the digital signature of the charging management system.
- a device for charging authentication includes: a memory, a processor, the memory stores code and data, the memory is coupled to the processor, and the processor runs the code in the memory to make the device execute the first aspect described above. And any one of the implementation manners of the first aspect, any one of the foregoing second aspect and the second aspect, and the method in any one of the third aspect and the third aspect.
- a computer-readable storage medium is provided, and an instruction is stored thereon.
- the instruction is executed, any one of the foregoing first aspect and the first aspect and the foregoing second aspect and the second aspect are executed.
- the method in any one of the implementation manners and the method in any one of the third aspect and the third aspect.
- a computer program product including instructions, which when the computer program product runs on a computer, cause the computer to execute any one of the foregoing first aspect and the first aspect, and the foregoing second and first aspects.
- the method in any one of the implementation manners of the second aspect and the method in any one of the implementation manners of the third aspect and the third aspect.
- FIG. 1 is a working flow chart of the charging system using WeChat to pay on-site payment according to an embodiment of the present application
- FIG. 2 is a schematic diagram of a charging protocol for billing payment according to an embodiment of the present application
- FIG. 3 is a system architecture of a charging authentication method according to an embodiment of the present application.
- FIG. 4 is a schematic flowchart of a charging authentication method according to an embodiment of the present application.
- FIG. 5 is a schematic flowchart of another charging authentication method according to an embodiment of the present application.
- FIG. 6 is a schematic block diagram of a charging authentication method according to an embodiment of the present application.
- FIG. 7 is a schematic block diagram of another charging authentication method according to an embodiment of the present application.
- FIG. 8 is a schematic block diagram of a charging authentication device according to an embodiment of the present application.
- FIG. 9 is a schematic structural diagram of a charging authentication device according to an application embodiment.
- FIG. 10 is a schematic block diagram of another charging authentication device according to an embodiment of the present application.
- FIG. 11 is a schematic structural diagram of another charging authentication device according to an embodiment of the present application.
- FIG. 12 is a schematic block diagram of still another charging authentication device according to an embodiment of the present application.
- FIG. 13 is a schematic structural diagram of still another charging authentication device according to an embodiment of the present application.
- On-site payment that is, after the charge is over, use cash, credit card, prepaid card, mobile phone application (WeChat Pay or Alipay) to pay for the fee.
- book-entry payment that is, the amount of consumption is credited to the user's account and settled regularly.
- malicious electric vehicles can attack the charging management system through charging piles; malicious electric vehicles can transfer charging fees to other accounts through identity forgery; in the case of billing and payment, malicious electric vehicles can deny charging transactions; malicious Charging piles can attack electric vehicles; through malicious charging piles and electric vehicles, the identity of legitimate electric vehicles charged at malicious charging piles can be used to charge malicious electric vehicles at legal charging piles; between electric vehicles and charging piles Communication has been tampered with or information has been leaked.
- FIG 1 shows the workflow of a charging system that uses WeChat to pay on-site.
- a controller area network (CAN) bus is used for communication between the electric vehicle and the charging pile.
- Electric vehicle users need to register with the charging management system in advance, provide information such as phone number, ID number, etc., and then register a WeChat payment account and install the mobile phone charging application APP that belongs to the charging management system.
- the user’s electric vehicle needs to be charged first use the mobile phone charging APP to scan the QR code on the charging pile.
- the QR code contains the identity information of the charging pile; the mobile charging APP transmits the QR code and the user’s registration information to the charging management system.
- the user sends a charging command to the charging management system; the charging management system forwards the charging command to the charging pile; the charging pile starts to charge the electric vehicle. After the charging is over, the charging management system sends a bill to the user, and the user uses WeChat to pay for the charging.
- Figure 2 shows a billing-based charging protocol. Electric vehicle users purchase a charging contract from an electric mobility operator (EMO), and charge them at the charging pile set up by the charging spot operator (CSO). After charging, the EMO will regularly contact electric vehicle users and CSOs. proceed to checkout.
- Figure 2 is a secure communication protocol based on the communication between electric vehicles and charging piles through a programmable logic controller (PLC) provided by ISO15118, where the bandwidth of the PLC is greater than that of the CAN.
- PLC programmable logic controller
- the electric vehicle obtains a signed charging contract certificate from the EMO in advance, that is, a public-private key pair.
- the electric vehicle and the charging pile exchange identity information first, and then exchange their signature certificates for authentication.
- the electric vehicle and the charging pile establish a transport layer security (TLS) session, and then the electric vehicle sends its signed charging contract certificate and certificate chain to the charging pile.
- TLS transport layer security
- the charging pile verifies the certificate and sends a random challenge to the electric vehicle.
- the electric vehicle needs to be signed with the private key of the charging contract.
- the electric vehicle signs the challenge and sends it back to the charging pile, and charging starts after the charging pile is successfully verified.
- the charging pile After the charging is over, the charging pile sends the charging degree to the electric vehicle, and the electric vehicle signs and sends it back to the charging pile, and the TLS session ends. Finally, the charging pile sends the signed charging degree to the charging management system and EMO respectively as proof of the bill.
- the billing payment charging protocol provided by ISO 15118 shown in Figure 2 is suitable for communication between electric vehicles and charging piles through PLC. Due to the limited bandwidth of CAN, the billing payment charging protocol provided by ISO 15118 is not It is suitable for communication between electric vehicles and charging piles via CAN.
- the embodiment of the present application provides a charging authentication method, so that the CAN bus can be used for communication between the electric vehicle and the charging pile, and the communication security between the electric vehicle and the charging pile is improved.
- Fig. 3 is a system architecture of a charging authentication method provided by an embodiment of the present application.
- the electric vehicle and the charging pile communicate through the CAN bus, but the CAN bandwidth is limited.
- the charging pile and the charging management system use a cellular network or wired communication, and the electric vehicle and the charging management system communicate through a cellular network. These two communication bandwidths are relatively rich.
- the charging management system, charging piles, and electric vehicles all have corresponding network interfaces, computing units, and secure storage units, and have their own public and private key pairs for digital signatures, and they have obtained information from the corresponding certification authority (CA). )
- CA certification authority
- FIG. 4 shows a schematic flowchart of a charging authentication method provided by an embodiment of the present application, including steps 401 and 402.
- the method in FIG. 4 is executed by an electric vehicle.
- the electric vehicle and the charging pile establish a first connection through the controller area network CAN bus, and the electric vehicle establishes a second connection with the charging management system through the mobile communication network.
- the electric vehicle sends a charging request message to the charging pile through the first connection.
- the electric vehicle when it sends a charging request message to the charging pile through the first connection, it can also send its own identity information.
- the electric vehicle performs identity authentication and key negotiation with the charging pile through the second connection and the third connection between the charging pile and the charging management system.
- the electric vehicle sends the first message to the charging management system through the second connection, so that the charging management system forwards the first message to the charging pile through the third connection; or, the electric vehicle receives the first message forwarded by the charging management system through the second connection.
- the second message may include the identity information of the charging pile and the random challenge for the selection of the charging pile;
- the first message may include the random challenge for the selection of the electric vehicle and the response to the random challenge of the charging pile; After the challenge, it can also respond to the random challenge of the electric vehicle, so the second message may also include the response of the charging pile to the challenge of the electric vehicle.
- the embodiment of the present application is based on a challenge response mechanism, which can avoid replay attacks, thereby improving the security of information transmission between the charging pile and the electric vehicle.
- the charging pile may also send charging parameters to the electric vehicle.
- the charging parameters include information such as voltage and current that the charging pile can provide. Therefore, the second message may also include charging parameters.
- the charging pile sends charging parameters to the electric vehicle, so that the electric vehicle can monitor whether the charging parameters match in real time during the charging process, so as to avoid the loss caused by the relay attack and improve the safety of information transmission between the charging pile and the electric vehicle.
- DHE1 is an element related to the private key of the electric vehicle and can be disclosed, and can be considered as the public key of the electric vehicle.
- DHE2 is an element related to the private key of the charging post and can be disclosed, and can be considered as the public key of the charging post.
- the electric vehicle After receiving the DHE2 sent by the charging pile, the electric vehicle obtains the key K according to DHE1 and DHE2. Similarly, the charging pile also obtains the key K according to DHE1 and DHE2. In this way, the electric vehicle and the charging pile can obtain a consensus key, which can be used to protect the subsequent communication between the electric vehicle and the charging pile.
- the first message and the second message between the electric vehicle and the charging pile are both forwarded through the charging management system.
- the digital signature is verified, and all received messages are forwarded after the verification is passed.
- the charging management system can also replace the digital signature of the electric vehicle and/or charging pile with the digital signature of the charging management system itself, and then forward the replaced message .
- electric vehicles and charging piles need to verify the digital certificate before mutually verifying their digital signatures, the workload of verifying digital certificates is relatively large. Electric vehicles and charging piles usually already know the public key of the charging management system, so there is no need for electric vehicles and charging piles. Verify the digital certificate of the charging management system, which can save work.
- FIG. 5 shows a schematic flowchart of another charging authentication method provided by an embodiment of the present application, including steps 501 and 502.
- the method in FIG. 5 is executed by a charging pile, the charging pile and the electric vehicle establish a first connection through the controller area network CAN bus, and the charging pile establishes a third connection with the charging management system through the mobile communication network.
- the charging pile receives a charging request message sent by the electric vehicle through the first connection.
- the charging pile performs identity authentication and key negotiation with the electric vehicle through the third connection and the second connection between the electric vehicle and the charging management system.
- FIG. 5 The method shown in FIG. 5 is similar to the method shown in FIG. 4, and for specific description, please refer to the description of the steps in FIG. 4 above. For brevity, details are not repeated here.
- the embodiment of the present application also provides a charging authentication method, which is executed by a charging management system.
- the charging management system establishes a second connection with the electric vehicle through a mobile communication network, and the charging management system establishes a third connection with the charging pile through the mobile communication network.
- Establishing a first connection between the electric vehicle and the charging pile through the controller area network CAN bus, the method includes:
- the charging management system forwards the identity authentication message and key agreement message between the electric vehicle and the charging pile through the second connection and the third connection.
- the charging management system receives the identity information of the charging pile through the third connection; the charging management system sends the identity information of the charging pile to the electric vehicle through the second connection; the charging management system receives the first secret sent by the electric vehicle through the second connection.
- the first key information includes the first key; the charging management system sends the first key information to the charging pile through the third connection; the charging management system receives the second key information sent by the charging pile through the third connection.
- the second key information includes the second key; the charging management system sends the second key information to the electric vehicle through the second connection, so that the electric vehicle and the charging pile can determine the third key according to the first key and the second key.
- the third key is a key shared by the electric vehicle and the charging pile, and the third key is used to encrypt messages between the electric vehicle and the charging pile.
- the charging management system before the charging management system sends the identity information of the charging pile to the electric vehicle through the second connection, the charging management system verifies the identity information of the charging pile.
- the first key information further includes a digital signature of the electric vehicle.
- the charging management system verifies the digital signature of the electric vehicle before sending the first key information to the charging pile through the third connection, and the charging management system replaces the digital signature of the electric vehicle with the digital signature of the charging management system .
- the second key information further includes a digital signature of the charging pile.
- the charging management system verifies the digital signature of the charging pile, and the charging management system replaces the digital signature of the charging pile with the digital signature of the charging management system. sign.
- Fig. 6 shows a schematic diagram of a charging authentication method provided by an embodiment of the present application. The method shown in FIG. 6 includes the following steps.
- the electric vehicle After the charging cable between the charging pile and the electric vehicle is connected, the electric vehicle starts the identity authentication and key agreement protocol, and sends the charging request ChargingReq and the identity information VID to the charging pile.
- the charging request can be a fixed string, such as 0000, and the VID is the identity of the electric vehicle, which needs to be included in the certificate Cert EV of the electric vehicle public key.
- the charging post may send the identity information CSID to the electric vehicle, where the CSID needs to be included in the public key certificate Cert CS of the charging post.
- the charging pile sends its own identity information CSID, the received electric vehicle identity information VID, challenge N CS and ⁇ DHParas ⁇ to the charging management system to inform the charging management system that the agreement is between the charging pile and the electric vehicle.
- N CS is a random number with an appropriate length, such as 125 bits, which represents a challenge to electric vehicles.
- ⁇ DHParas ⁇ is the key exchange algorithm (diffie-hellman, DH) parameter set supported by the charging pile.
- a set of DH parameters includes the (elliptic curve) prime number group and the generator g of the group.
- ⁇ DHParas ⁇ includes all charging pile support The DH parameter group, the power supply train selection.
- the system can define multiple groups of DH parameters, so ⁇ DHParas ⁇ is the serial number of each group of DH parameters.
- the charging management system forwards CSID, N CS and ⁇ DHParas ⁇ to the electric vehicle to inform the electric vehicle that it needs to answer the challenge of the charging pile.
- the embodiment of the present application further includes that the charging management system can also check whether each data is qualified before forwarding, and if it is not qualified, it can request the charging pile to resend the data.
- N EV is a random challenge for electric vehicle selection.
- DHPara is a set of DH parameters supported by electric vehicles selected from ⁇ DHParas ⁇ .
- g a is the DH element calculated by the electric vehicle, where g is the generator in DHPara, and a is the random index.
- Sign EV (CSID, N CS , N EV , DHPara, g a ) is the digital signature calculated by the private key of the electric vehicle, and is the response to the challenge of the charging pile N CS , while Cert EV is the digital certificate or the public key of the electric vehicle.
- the certificate chain is the digital signature calculated by the private key of the electric vehicle, and is the response to the challenge of the charging pile N CS , while Cert EV is the digital certificate or the public key of the electric vehicle.
- the charging management system uses Cert EV to verify the digital signature of the electric vehicle, and after the verification is passed, it forwards all the data it receives to the charging pile.
- the charging pile uses Cert EV to verify the digital signature of the electric vehicle. After the verification is passed, it will reply g b , Charging Para, Sign CS (VID, N EV , Charging Para, g b ), and Cert CS to the charging management system. Specifically, the charging pile first uses Cert EV to verify the digital signature of the electric vehicle, and the identity of the electric vehicle is verified when the verification is passed.
- g b is the DH element calculated by the charging pile.
- ChargingPara is the charging parameters that the charging pile can provide, such as voltage and current.
- Sign CS (VID, N EV , Charging Para, g b ) is a digital signature calculated by the charging pile with its own private key, and is a response to the random challenge N EV of electric vehicles.
- the charging management system uses Cert CS to verify the digital signature of the charging pile, and after the verification is passed, it forwards all the data it receives to the electric vehicle.
- KDF key derivation function
- K is used to protect the communication between subsequent electric vehicles and charging piles.
- the charging pile can also calculate the key K at this time.
- the electric vehicle uses the key K to calculate and send MAC (K, VID, CSID, N CS , N EV ) to the charging pile to determine the generated key K.
- MAC is the message authentication code. If there is no key K, the MAC value will not be forged.
- the challenge response mechanism is used to avoid replay attacks
- the key exchange algorithm is used to achieve key negotiation
- the digital signature is used for identity authentication between the electric vehicle and the charging pile, and there is a sufficient identity authentication mechanism, and generation
- the random key is used for subsequent communication protection.
- the information of steps 2, 2', 3, 3', 4, and 4'in the embodiments of this application are all forwarded through the charging management system, realizing electric vehicles Lightweight communication with charging pile, suitable for CAN bus communication.
- Fig. 7 shows a schematic diagram of another charging authentication method provided by an embodiment of the present application.
- the charging authentication process shown in Fig. 7 is similar to Fig. 6, except that:
- step 3'of Figure 6 after receiving the information sent by the electric vehicle, the charging management system verifies the digital signature of the electric vehicle according to the Cert EV of the electric vehicle, and forwards all the data it receives to the charging pile after the verification is passed.
- the charging pile uses Cert EV to verify the digital signature of the electric vehicle; similarly, in step 4'of Figure 6, the charging management system uses Cert CS to verify the digital signature of the charging pile, and then forwards its received after verification. All of the data is given to the electric vehicle.
- step 5 of Figure 6 the electric vehicle uses Cert CS to verify the digital signature of the charging pile.
- step 3'of Figure 5 the charging management system verifies the digital signature of the electric vehicle according to the Cert EV of the electric vehicle.
- step 4' the charging management system verifies the digital signature of the charging pile according to the Cert CS of the charging pile, and after the verification is passed, the digital signature of the charging pile is removed and replaced with the digital signature of the charging management system. It can be seen that in Figure 6, the role of the charging management system is verification and forwarding, while in Figure 7, the role of the charging management system is verification, re-signing and forwarding.
- the charging pile verifies the digital signature of the electric vehicle, it first needs to verify the certificate of the electric vehicle.
- the certificate chain of electric vehicles may be very long, so the charging pile may pay a higher price to verify the certificate of electric vehicles.
- electric vehicles may also pay a higher price to verify the certification of charging piles.
- the charging management system also verifies the digital signatures of the electric vehicle and the charging pile before forwarding, and the charging management system has a public-private key pair for signing. Therefore, the charging authentication method of the embodiment of the present application further includes that after the charging management system verifies the digital signatures of the electric vehicle and the charging pile, the digital signature of the electric vehicle and the charging pile is replaced with its own digital signature.
- the public key of the charging management system is already known, so there is no need to verify the certificate of the charging management system, which can greatly reduce the verification workload.
- the charging authentication method of the embodiment of the present application further includes that after the charging management system verifies the digital signature of the electric vehicle and the charging pile, only the digital signature of either the electric vehicle or the charging pile is replaced with Own digital signature.
- FIG. 8 shows a schematic block diagram of a charging authentication device 800 according to an embodiment of the present application.
- the device 800 is used to execute the method executed by the electric vehicle in the foregoing method embodiment.
- the device 800 is installed in an electric vehicle, and a first connection is established between the device 800 and the charging pile through the controller area network CAN bus, and the device 800 establishes a second connection with the charging management system through a mobile communication network.
- the specific form of the apparatus 800 may be a network device or a chip in a network device, which is not limited in the embodiment of the present application.
- the device 800 includes:
- the transceiver module 820 is configured to send a charging request message to the charging pile through the first connection.
- the processing module 810 and the transceiver module 820 are also used to perform identity authentication and key negotiation with the charging pile through the second connection and the third connection between the charging pile and the charging management system.
- the transceiver module is used to send the identity information of the electric vehicle to the charging pile through the first connection;
- the transceiver module is also used to receive the identity information of the charging pile, which is forwarded by the charging management system through the second connection; the transceiver module is also used to send the first key information to the charging pile, the first key The information is forwarded by the charging management system through the third connection, the first key information includes the first key; the transceiver module is also used to receive the second key information sent by the charging pile, the second key information is managed by the charging The second key information is forwarded by the system through the second connection, and the second key information includes the second key; the processing module is used to determine the third key according to the first key and the second key, and the third key is the electric vehicle and the charging pile The shared key, the third key is used to encrypt the message between the electric vehicle and the charging pile, and the third key is used to encrypt the message between the electric vehicle and the charging pile.
- the second key information further includes a digital signature of the charging pile.
- the processing module is further used to verify the digital signature passed through the charging pile.
- the transceiver module receives the second key information sent by the charging pile, where the digital signature of the charging pile in the second key information is replaced with the digital signature of the charging management system.
- the device 800 for charging authentication may correspond to the method in FIG. 4 in the foregoing method embodiment, and the above-mentioned and other management operations and/or functions of each module in the device 800 are respectively intended to achieve
- the corresponding steps of the method executed by the electric vehicle in the foregoing method embodiment can also achieve the beneficial effects in the foregoing method embodiment.
- details are not repeated here.
- each module in the device 800 may be implemented in the form of software and/or hardware, which is not specifically limited.
- the device 800 is presented in the form of functional modules.
- the "module” here may refer to application-specific integrated circuits ASIC, circuits, processors and memories that execute one or more software or firmware programs, integrated logic circuits, and/or other devices that can provide the above-mentioned functions.
- the device 800 may adopt the form shown in FIG. 9.
- the processing module 810 may be implemented by the processor 901 shown in FIG. 9.
- the transceiver module 820 may be implemented by the transceiver 903 shown in FIG. 9.
- the processor is implemented by executing a computer program stored in the memory.
- the function and/or implementation process of the transceiver module 810 may also be implemented by pins or circuits.
- the memory is a storage unit in the chip, such as a register, a cache, etc., and the storage unit may also be a storage unit located outside the chip in a computer device, such as the memory 902 shown in FIG. 9.
- the above-mentioned transceiver module 820 may be a transceiver, and the transceiver (indicated by the transceiver module 820 in FIG. 8) constitutes a communication interface in the communication unit.
- FIG. 9 shows a schematic structural diagram of a charging authentication device 900 according to an embodiment of the present application.
- the device 900 includes a processor 901, and the processor 901 is configured to control and manage charging authentication actions.
- the processor 901 may call an interface to perform the foregoing receiving and sending actions, where the called interface may be a logical interface or a physical interface, which is not limited.
- the physical interface can be implemented by a transceiver.
- the device 900 further includes a transceiver 903.
- the device 900 further includes a memory 902, and the memory 902 can store the program code in the foregoing method embodiment, so that the processor 901 can call it.
- the memory 902 may be coupled with the processor 901 or not.
- the device 900 includes the processor 901, the memory 902, and the transceiver 903, the processor 901, the memory 902, and the transceiver 903 communicate with each other through an internal connection path to transfer control and/or data signals.
- the processor 901, the memory 902, and the transceiver 903 can be implemented by chips, and the processor 901, the memory 902, and the transceiver 903 can be implemented on the same chip, or they may be implemented on different chips. Or any combination of two functions can be implemented in one chip.
- the memory 902 can store program codes, and the processor 901 calls the program codes stored in the memory 902 to implement corresponding functions of the device 900. It should be understood that the device 900 may also be used to perform other steps and/or operations performed by the electric vehicle in the foregoing embodiment, and for the sake of brevity, details are not described herein.
- FIG. 10 shows a schematic block diagram of a charging authentication device 1000 according to an embodiment of the present application.
- the device 1000 is used to execute the method executed by the charging pile in the foregoing method embodiment.
- the device 1000 is installed in a charging pile, the device 1000 establishes a first connection with the electric vehicle through the controller area network CAN bus, and the device 1000 establishes a second connection with the charging management system through a mobile communication network.
- the specific form of the apparatus 1000 may be a network device or a chip in a network device, which is not limited in the embodiment of the present application.
- the device 1000 includes:
- the transceiver module 1020 is configured to receive the charging request message sent by the electric vehicle through the first connection.
- the processing module 1010 and the transceiver module 1020 are also used to perform identity authentication and key negotiation with the electric vehicle through the third connection and the second connection between the electric vehicle and the charging management system.
- the transceiving module is used to receive the identity information of the electric vehicle sent by the electric vehicle through the first connection; the transceiving module is also used to transmit the identity information of the charging pile, which is used by the charging management system through the second connection
- the transceiver module is also used to receive the first key information sent by the electric vehicle, the first key information is forwarded by the charging management system through the third connection, and the first key information includes the first key
- the transceiver module It is also used to send second key information to the electric vehicle, the second key information is forwarded by the charging management system through the second connection, and the second key information includes the second key
- the processing module is used to, according to the first The key and the second key determine the third key, the third key is the key shared by the electric vehicle and the charging pile, and the third key is used to encrypt the message between the electric vehicle and the charging pile.
- the first key information further includes a digital signature of the electric vehicle.
- the processing module is further used to verify the digital signature of the electric vehicle.
- the transceiver module receives the first key information sent by the electric vehicle, wherein the digital signature of the electric vehicle in the first key information is replaced with the digital signature of the charging management system.
- the device 1000 for charging authentication may correspond to the method in FIG. 5 in the foregoing method embodiment, and the above-mentioned and other management operations and/or functions of each module in the device 1000 are respectively intended to realize
- the corresponding steps of the charging authentication method in the foregoing method embodiment can also achieve the beneficial effects in the foregoing method embodiment. For brevity, details are not described here.
- each module in the device 1000 may be implemented in the form of software and/or hardware, which is not specifically limited.
- the device 1000 is presented in the form of functional modules.
- the "module” herein may refer to application-specific integrated circuits ASIC, circuits, processors and memories that execute one or more software or firmware programs, integrated logic circuits, and/or other devices that can provide the above-mentioned functions.
- the device 1000 may adopt the form shown in FIG. 11.
- the processing module 1010 may be implemented by the processor 1101 shown in FIG. 11.
- the transceiver module 1020 can be implemented by the transceiver 1103 shown in FIG. 11.
- the processor is implemented by executing a computer program stored in the memory.
- the function and/or implementation process of the transceiver module 1010 can also be implemented by pins or circuits.
- the memory is a storage unit in the chip, such as a register, a cache, etc., and the storage unit may also be a storage unit located outside the chip in a computer device, such as the memory 1102 shown in FIG. 11.
- the foregoing transceiver module 1020 may be a transceiver, and the transceiver (indicated by the transceiver module 1020 in FIG. 10) constitutes a communication interface in the communication unit.
- FIG. 11 shows a schematic structural diagram of a charging authentication device 1100 according to an embodiment of the present application.
- the device 1100 includes a processor 1101, and the processor 1101 is configured to control and manage charging authentication actions.
- the processor 1101 may call an interface to perform the foregoing receiving and sending actions, where the called interface may be a logical interface or a physical interface, which is not limited.
- the physical interface can be implemented by a transceiver.
- the apparatus 1100 further includes a transceiver 1103.
- the apparatus 1100 further includes a memory 1102, and the memory 1102 can store the program code in the foregoing method embodiments, so as to be called by the processor 1101.
- the memory 1102 may be coupled with the processor 1101 or not.
- the device 1100 includes the processor 1101, the memory 1102, and the transceiver 1103, the processor 1101, the memory 1102, and the transceiver 1103 communicate with each other through internal connection paths, and transfer control and/or data signals.
- the processor 1101, the memory 1102, and the transceiver 1103 may be implemented by chips.
- the processor 1101, the memory 1102, and the transceiver 1103 may be implemented on the same chip or may be implemented on different chips. Or any combination of two functions can be implemented in one chip.
- the memory 1102 may store program codes, and the processor 1101 calls the program codes stored in the memory 1102 to implement corresponding functions of the apparatus 1100. It should be understood that the device 1100 may also be used to perform other steps and/or operations performed by the charging pile in the foregoing embodiment, and for the sake of brevity, details are not described herein.
- FIG. 12 shows a schematic block diagram of a charging authentication device 1200 according to an embodiment of the present application.
- the device 1200 is used to execute the method executed by the charging management system in the foregoing method embodiment.
- the device 1200 is installed in the charging management system, the device 1200 and the electric vehicle establish a second connection through the mobile communication network, the device 1200 and the charging pile establish a third connection through the mobile communication network, and the electric vehicle and the charging pile are connected through the controller area network CAN bus Establish the first connection.
- the specific form of the apparatus 1200 may be a network device or a chip in a network device, which is not limited in the embodiment of the present application.
- the device 1200 includes:
- the transceiver module 1220 is configured to forward the identity authentication message and the key agreement message between the electric vehicle and the charging pile through the second connection and the third connection.
- the transceiver module is used to receive the identity information of the charging pile through the third connection; the transceiver module is also used to transmit the identity information of the charging pile to the electric vehicle through the second connection; the transceiver module is also used to receive the identity information of the charging pile through the second connection.
- the first key information sent by the electric vehicle, the first key information includes the first key; the transceiver module is also used to send the first key information to the charging pile through the third connection; the transceiver module is also used to, through the third connection
- the second key information sent by the charging pile is connected to receive the second key information.
- the second key information includes the second key; the transceiver module is also used to send the second key information to the electric vehicle through the second connection, so that the electric vehicle and the charging pile are based on The first key and the second key determine the third key, the third key is a key shared by the electric vehicle and the charging pile, and the third key is used to encrypt messages between the electric vehicle and the charging pile.
- the device before the transceiver module sends the identity information of the charging pile to the electric vehicle through the second connection, the device further includes: a processing module 1210 for verifying the identity information of the charging pile.
- the first key information further includes a digital signature of the electric vehicle.
- the device before the transceiver module sends the first key information to the charging pile through the third connection, the device further includes: a processing module for verifying the digital signature of the electric vehicle; the processing module is also used for sending the digital signature of the electric vehicle Replaced by the digital signature of the charging management system.
- the second key information further includes a digital signature of the charging pile.
- the device before the transceiver module sends the second key information to the electric vehicle through the second connection, the device further includes: a processing module for the charging management system to verify the digital signature passed through the charging pile; the processing module is also used for connecting the charging pile The digital signature of is replaced with the digital signature of the charging management system.
- the device 1200 for charging authentication may correspond to the method executed by the charging management system in the foregoing method embodiment, and the above-mentioned and other management operations and/or functions of each module in the device 1200 are respectively
- the corresponding steps of the charging authentication method in the foregoing method embodiment are implemented, and therefore, the beneficial effects in the foregoing method embodiment can also be achieved.
- details are not described here.
- each module in the device 1200 can be implemented in the form of software and/or hardware, which is not specifically limited.
- the apparatus 1200 is presented in the form of functional modules.
- the "module” herein may refer to application-specific integrated circuits ASIC, circuits, processors and memories that execute one or more software or firmware programs, integrated logic circuits, and/or other devices that can provide the above-mentioned functions.
- the apparatus 1200 may adopt the form shown in FIG. 13.
- the processing module 1210 may be implemented by the processor 1301 shown in FIG. 13.
- the transceiver module 1220 may be implemented by the transceiver 1303 shown in FIG. 13.
- the processor is implemented by executing a computer program stored in the memory.
- the function and/or implementation process of the transceiver module 1210 may also be implemented by pins or circuits.
- the memory is a storage unit in the chip, such as a register, a cache, etc., and the storage unit may also be a storage unit located outside the chip in a computer device, such as the memory 1302 shown in FIG. 13.
- the above-mentioned transceiver module 1220 may be a transceiver, and the transceiver (indicated by the transceiver module 1220 in FIG. 12) constitutes a communication interface in the communication unit.
- FIG. 13 shows a schematic structural diagram of a charging authentication device 1300 according to an embodiment of the present application.
- the device 1300 includes a processor 1301, and the processor 1301 is configured to control and manage charging authentication actions.
- the processor 1301 may call an interface to perform the above-mentioned transceiving action, where the called interface may be a logical interface or a physical interface, which is not limited.
- the physical interface can be implemented by a transceiver.
- the device 1300 further includes a transceiver 1303.
- the device 1300 further includes a memory 1302, and the memory 1302 can store the program code in the foregoing method embodiment, so that the processor 1301 can call it.
- the memory 1302 may be coupled with the processor 1301 or not.
- the device 1300 includes the processor 1301, the memory 1302, and the transceiver 1303, the processor 1301, the memory 1302, and the transceiver 1303 communicate with each other through internal connection paths, and transfer control and/or data signals.
- the processor 1301, the memory 1302, and the transceiver 1303 may be implemented by chips.
- the processor 1301, the memory 1302, and the transceiver 1303 may be implemented in the same chip or may be implemented in different chips. Or any combination of two functions can be implemented in one chip.
- the memory 1302 may store program codes, and the processor 1301 calls the program codes stored in the memory 1302 to implement corresponding functions of the apparatus 1300. It should be understood that the device 1300 may also be used to perform other steps and/or operations performed by the charging pile in the foregoing embodiment, and for the sake of brevity, details are not described here.
- the methods disclosed in the foregoing embodiments of the present application may be applied to a processor or implemented by a processor.
- the processor may be an integrated circuit chip with signal processing capabilities.
- the steps of the foregoing method embodiments can be completed by hardware integrated logic circuits in the processor or instructions in the form of software.
- the above-mentioned processor may be a general-purpose processor, a digital signal processor (digital signal processor, DSP), an application specific integrated circuit (ASIC), a ready-made programmable gate array (field programmable gate array, FPGA) or other Programming logic devices, discrete gates or transistor logic devices, discrete hardware components can also be system on chip (SoC), central processor unit (CPU), or network processor (network processor).
- SoC system on chip
- CPU central processor unit
- network processor network processor
- processor, NP can also be a digital signal processing circuit
- DSP can also be a microcontroller (microcontroller unit, MCU), can also be a programmable controller (programmable logic device, PLD) or other Integrated chip.
- the methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed.
- the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
- the steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor.
- the software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
- the storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
- the memory in the embodiments of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
- the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), and electrically available Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
- the volatile memory may be random access memory (RAM), which is used as an external cache.
- RAM random access memory
- static random access memory static random access memory
- dynamic RAM dynamic RAM
- DRAM dynamic random access memory
- synchronous dynamic random access memory synchronous DRAM, SDRAM
- double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
- enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
- synchronous connection dynamic random access memory serial DRAM, SLDRAM
- direct rambus RAM direct rambus RAM
- the disclosed system, device, and method can be implemented in other ways.
- the device embodiments described above are merely illustrative.
- the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or It can be integrated into another system, or some features can be ignored or not implemented.
- the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
- the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
- the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
- the technical solution of the present application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
- the aforementioned storage media include: U disk, mobile hard disk, read only memory ROM, random access memory RAM, magnetic disk or optical disk and other media that can store program codes.
Abstract
Description
Claims (37)
- 一种充电认证的方法,其特征在于,所述方法由电动车执行,所述电动车与充电桩之间通过控制器局域网CAN总线建立第一连接,所述电动车通过移动通信网络与充电管理系统建立第二连接,包括:所述电动车通过所述第一连接向所述充电桩发送充电请求消息;所述电动车通过所述第二连接以及所述充电桩和所述充电管理系统之间的第三连接,与所述充电桩之间进行身份认证和密钥协商。
- 根据权利要求1所述的方法,其特征在于,所述电动车通过所述第二连接以及所述充电桩和所述充电管理系统之间的第三连接,与所述充电桩之间进行身份认证和密钥协商,包括:所述电动车通过所述第一连接向所述充电桩发送所述电动车的身份信息;所述电动车接收所述充电桩的身份信息,所述充电桩的身份信息是由所述充电管理系统通过所述第二连接转发的;所述电动车向所述充电桩发送第一密钥信息,所述第一密钥信息是由所述充电管理系统通过所述第三连接转发的,所述第一密钥信息包括第一密钥;所述电动车接收所述充电桩发送的第二密钥信息,所述第二密钥信息是由所述充电管理系统通过所述第二连接转发的,所述第二密钥信息包括第二密钥;所述电动车根据所述第一密钥和所述第二密钥确定第三密钥,所述第三密钥为所述电动车和所述充电桩共有的密钥,所述第三密钥用于加密所述电动车和所述充电桩之间的消息。
- 根据权利要求2所述的方法,其特征在于,所述第二密钥信息还包括所述充电桩的数字签名。
- 根据权利要求3所述的方法,其特征在于,所述电动车接收所述充电桩发送的第二密钥信息之后,所述方法还包括:所述电动车验证通过所述充电桩的数字签名。
- 根据权利要求3所述的方法,其特征在于,所述电动车接收所述充电桩发送的第二密钥信息,其中所述第二密钥信息中的所述充电桩的数字签名被替换为所述充电管理系统的数字签名。
- 一种充电认证的方法,其特征在于,所述方法由充电桩执行,所述充电桩与电动车之间通过控制器局域网CAN总线建立第一连接,所述充电桩通过移动通信网络与充电管理系统建立第三连接,包括:所述充电桩通过所述第一连接接收所述电动车发送的充电请求消息;所述充电桩通过所述第三连接以及所述电动车和所述充电管理系统之间的第二连接,与所述电动车之间进行身份认证和密钥协商。
- 根据权利要求6所述的方法,其特征在于,所述充电桩通过所述第三连接以及所述电动车和所述充电管理系统之间的第二连接,与所述电动车之间进行身份认证和密钥协商,包括:所述充电桩通过所述第一连接接收所述电动车发送的所述电动车的身份信息;所述充电桩发送所述充电桩的身份信息,所述充电桩的身份信息是由所述充电管理系统通过所述第二连接转发的;所述充电桩接收所述电动车发送的第一密钥信息,所述第一密钥信息是由所述充电管理系统通过所述第三连接转发的,所述第一密钥信息包括第一密钥;所述充电桩向所述电动车发送第二密钥信息,所述第二密钥信息是由所述充电管理系统通过所述第二连接转发的,所述第二密钥信息包括第二密钥;所述充电桩根据所述第一密钥和所述第二密钥确定第三密钥,所述第三密钥为所述电动车和所述充电桩共有的密钥,所述第三密钥用于加密所述电动车和所述充电桩之间的消息。
- 根据权利要求7所述的方法,其特征在于,所述第一密钥信息还包括所述电动车的数字签名。
- 根据权利要求8所述的方法,其特征在于,所述充电桩接收所述电动车发送的第一密钥信息之后,所述方法还包括:所述充电桩验证通过所述电动车的数字签名。
- 根据权利要求8所述的方法,其特征在于,所述充电桩接收所述电动车发送的第一密钥信息,其中所述第一密钥信息中的所述电动车的数字签名被替换为所述充电管理系统的数字签名。
- 一种充电认证的方法,其特征在于,所述方法由充电管理系统执行,所述充电管理系统与电动车通过移动通信网络建立第二连接,所述充电管理系统与充电桩通过移动通信网络建立第三连接,所述电动车与充电桩之间通过控制器局域网CAN总线建立第一连接,包括:所述充电管理系统通过所述第二连接和所述第三连接,转发所述电动车与所述充电桩之间的身份认证消息和密钥协商消息。
- 根据权利要求11所述的方法,其特征在于,所述充电管理系统通过所述第二连接和所述第三连接,转发所述电动车与所述充电桩之间的身份认证消息和密钥协商消息,包括:所述充电管理系统通过所述第三连接接收所述充电桩的身份信息;所述充电管理系统通过所述第二连接向所述电动车发送所述充电桩的身份信息;所述充电管理系统通过所述第二连接接收所述电动车发送的第一密钥信息,所述第一密钥信息包括第一密钥;所述充电管理系统通过所述第三连接向所述充电桩发送所述第一密钥信息;所述充电管理系统通过所述第三连接接收所述充电桩发送的第二密钥信息,所述第二密钥信息包括第二密钥;所述充电管理系统通过所述第二连接向所述电动车发送所述第二密钥信息,以便所述电动车和所述充电桩根据所述第一密钥和所述第二密钥确定第三密钥,所述第三密钥为所述电动车和所述充电桩共有的密钥,所述第三密钥用于加密所述电动车和所述充电桩之间的消息。
- 根据权利要求12所述的方法,其特征在于,所述充电管理系统通过所述第二连 接向所述电动车发送所述充电桩的身份信息之前,所述方法还包括:所述充电管理系统验证通过所述充电桩的身份信息。
- 根据权利要求12或13所述的方法,其特征在于,所述第一密钥信息还包括所述电动车的数字签名。
- 根据权利要求14所述的方法,其特征在于,所述充电管理系统通过所述第三连接向所述充电桩发送所述第一密钥信息之前,所述方法还包括:所述充电管理系统验证通过所述电动车的数字签名;所述充电管理系统将所述电动车的数字签名替换为所述充电管理系统的数字签名。
- 根据权利要求12至15中任一项所述的方法,其特征在于,所述第二密钥信息还包括所述充电桩的数字签名。
- 根据权利要求16所述的方法,其特征在于,所述充电管理系统通过所述第二连接向所述电动车发送所述第二密钥信息之前,所述方法还包括:所述充电管理系统验证通过所述充电桩的数字签名;所述充电管理系统将所述充电桩的数字签名替换为所述充电管理系统的数字签名。
- 一种充电认证的装置,其特征在于,所述装置安装在电动车中,所述装置与充电桩之间通过控制器局域网CAN总线建立第一连接,所述装置通过移动通信网络与充电管理系统建立第二连接,包括:收发模块,用于通过所述第一连接向所述充电桩发送充电请求消息;处理模块,和所述收发模块还用于,通过所述第二连接以及所述充电桩和所述充电管理系统之间的第三连接,与所述充电桩之间进行身份认证和密钥协商。
- 根据权利要求18所述的装置,其特征在于,所述处理模块和所述收发模块还用于通过所述第二连接以及所述充电桩和所述充电管理系统之间的第三连接,与所述充电桩之间进行身份认证和密钥协商,包括:所述收发模块用于,通过所述第一连接向所述充电桩发送所述电动车的身份信息;所述收发模块还用于,接收所述充电桩的身份信息,所述充电桩的身份信息是由所述充电管理系统通过所述第二连接转发的;所述收发模块还用于,向所述充电桩发送第一密钥信息,所述第一密钥信息是由所述充电管理系统通过所述第三连接转发的,所述第一密钥信息包括第一密钥;所述收发模块还用于,接收所述充电桩发送的第二密钥信息,所述第二密钥信息是由所述充电管理系统通过所述第二连接转发的,所述第二密钥信息包括第二密钥;所述处理模块用于,根据所述第一密钥和所述第二密钥确定第三密钥,所述第三密钥为所述电动车和所述充电桩共有的密钥,所述第三密钥用于加密所述电动车和所述充电桩之间的消息,所述第三密钥用于加密所述电动车和所述充电桩之间的消息。
- 根据权利要求19所述的装置,其特征在于,所述第二密钥信息还包括所述充电桩的数字签名。
- 根据权利要求20所述的装置,其特征在于,所述收发模块接收所述充电桩发送的第二密钥信息之后,所述处理模块还用于:验证通过所述充电桩的数字签名。
- 根据权利要求20所述的装置,其特征在于,所述收发模块接收所述充电桩发送 的第二密钥信息,其中所述第二密钥信息中的所述充电桩的数字签名被替换为所述充电管理系统的数字签名。
- 一种充电认证的装置,其特征在于,所述装置安装在充电桩中,所述装置与电动车之间通过控制器局域网CAN总线建立第一连接,所述装置通过移动通信网络与充电管理系统建立第三连接,包括:收发模块,用于通过所述第一连接接收所述电动车发送的充电请求消息;处理模块,和所述收发模块还用于,通过所述第三连接以及所述电动车和所述充电管理系统之间的第二连接,与所述电动车之间进行身份认证和密钥协商。
- 根据权利要求23所述的装置,其特征在于,所述处理模块和所述收发模块还用于通过所述第三连接以及所述电动车和所述充电管理系统之间的第二连接,与所述电动车之间进行身份认证和密钥协商,包括:所述收发模块用于,通过所述第一连接接收所述电动车发送的所述电动车的身份信息;所述收发模块还用于,发送所述充电桩的身份信息,所述充电桩的身份信息是由所述充电管理系统通过所述第二连接转发的;所述收发模块还用于,接收所述电动车发送的第一密钥信息,所述第一密钥信息是由所述充电管理系统通过所述第三连接转发的,所述第一密钥信息包括第一密钥;所述收发模块还用于,向所述电动车发送第二密钥信息,所述第二密钥信息是由所述充电管理系统通过所述第二连接转发的,所述第二密钥信息包括第二密钥;所述处理模块用于,根据所述第一密钥和所述第二密钥确定第三密钥,所述第三密钥为所述电动车和所述充电桩共有的密钥,所述第三密钥用于加密所述电动车和所述充电桩之间的消息。
- 根据权利要求24所述的装置,其特征在于,所述第一密钥信息还包括所述电动车的数字签名。
- 根据权利要求25所述的装置,其特征在于,所述收发模块接收所述电动车发送的第一密钥信息之后,所述处理模块还用于:验证通过所述电动车的数字签名。
- 根据权利要求25所述的装置,其特征在于,所述收发模块接收所述电动车发送的第一密钥信息,其中所述第一密钥信息中的所述电动车的数字签名被替换为所述充电管理系统的数字签名。
- 一种充电认证的装置,其特征在于,所述装置安装在充电管理系统中,所述装置与电动车通过移动通信网络建立第二连接,所述装置与充电桩通过移动通信网络建立第三连接,所述电动车与充电桩之间通过控制器局域网CAN总线建立第一连接,包括:收发模块,用于通过所述第二连接和所述第三连接,转发所述电动车与所述充电桩之间的身份认证消息和密钥协商消息。
- 根据权利要求28所述的装置,其特征在于,所述收发模块通过所述第二连接和所述第三连接,转发所述电动车与所述充电桩之间的身份认证消息和密钥协商消息,包括:所述收发模块还用于,通过所述第三连接接收所述充电桩的身份信息;所述收发模块还用于,通过所述第二连接向所述电动车发送所述充电桩的身份信息;所述收发模块还用于,通过所述第二连接接收所述电动车发送的第一密钥信息,所述第一密钥信息包括第一密钥;所述收发模块还用于,通过所述第三连接向所述充电桩发送所述第一密钥信息;所述收发模块还用于,通过所述第三连接接收所述充电桩发送的第二密钥信息,所述第二密钥信息包括第二密钥;所述收发模块还用于,通过所述第二连接向所述电动车发送所述第二密钥信息,以便所述电动车和所述充电桩根据所述第一密钥和所述第二密钥确定第三密钥,所述第三密钥为所述电动车和所述充电桩共有的密钥,所述第三密钥用于加密所述电动车和所述充电桩之间的消息。
- 根据权利要求29所述的装置,其特征在于,所述收发模块通过所述第二连接向所述电动车发送所述充电桩的身份信息之前,所述装置还包括:处理模块,用于验证通过所述充电桩的身份信息。
- 根据权利要求29或30所述的装置,其特征在于,所述第一密钥信息还包括所述电动车的数字签名。
- 根据权利要求31所述的装置,其特征在于,所述收发模块通过所述第三连接向所述充电桩发送所述第一密钥信息之前,所述装置还包括:处理模块,用于验证通过所述电动车的数字签名;所述处理模块还用于,将所述电动车的数字签名替换为所述充电管理系统的数字签名。
- 根据权利要求29至32中任一项所述的装置,其特征在于,所述第二密钥信息还包括所述充电桩的数字签名。
- 根据权利要求33所述的装置,其特征在于,所述收发模块通过所述第二连接向所述电动车发送所述第二密钥信息之前,所述装置还包括:处理模块,用于充电管理系统验证通过所述充电桩的数字签名;所述处理模块还用于,将所述充电桩的数字签名替换为所述充电管理系统的数字签名。
- 一种充电认证的装置,其特征在于,所述装置包括:存储器、处理器,所述存储器中存储代码和数据,所述存储器与所述处理器耦合,所述处理器运行所述存储器中的代码使得所述装置执行权利要求1-5中任一项所述的充电认证的方法,或者执行权利要求6-10中任一项所述的充电认证的方法,或者执行权利要求11-17中任一项所述的充电认证的方法。
- 一种计算机可读存储介质,其上存储有指令,其特征在于,该指令被执行时执行如权利要求1-5中任一项所述的充电认证的方法,或者执行权利要求6-10中任一项所述的充电认证的方法,或者执行权利要求11-17中任一项所述的充电认证的方法。
- 一种计算机程序产品,其特征在于,包括:指令,当所述计算机程序产品在计算机上运行时,使得计算机执行如权利要求1-5中任一项所述的充电认证的方法,或者执行权利要求6-10中任一项所述的充电认证的方法,或者执行权利要求11-17中任一项所述的充电认证的方法。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP21788276.0A EP4119388A4 (en) | 2020-04-15 | 2021-01-18 | CHARGING AUTHENTICATION METHOD AND DEVICE |
KR1020227039619A KR20220166869A (ko) | 2020-04-15 | 2021-01-18 | 충전 인증 방법 및 디바이스 |
JP2022562621A JP7457156B2 (ja) | 2020-04-15 | 2021-01-18 | 充電認証方法及び装置 |
US17/965,906 US20230030673A1 (en) | 2020-04-15 | 2022-10-14 | Charging Authentication Method and Apparatus |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010296590.2A CN113525152B (zh) | 2020-04-15 | 2020-04-15 | 充电认证的方法和装置 |
CN202010296590.2 | 2020-04-15 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/965,906 Continuation US20230030673A1 (en) | 2020-04-15 | 2022-10-14 | Charging Authentication Method and Apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021208549A1 true WO2021208549A1 (zh) | 2021-10-21 |
Family
ID=78083949
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/072430 WO2021208549A1 (zh) | 2020-04-15 | 2021-01-18 | 充电认证的方法和装置 |
Country Status (6)
Country | Link |
---|---|
US (1) | US20230030673A1 (zh) |
EP (1) | EP4119388A4 (zh) |
JP (1) | JP7457156B2 (zh) |
KR (1) | KR20220166869A (zh) |
CN (1) | CN113525152B (zh) |
WO (1) | WO2021208549A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114394026A (zh) * | 2021-12-21 | 2022-04-26 | 中汽创智科技有限公司 | 一种电动汽车充电方法、系统、装置、充电桩及存储介质 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103595097A (zh) * | 2013-11-15 | 2014-02-19 | 重庆长安汽车股份有限公司 | 一种纯电动车远程预约充电的控制方法 |
CN204068319U (zh) * | 2014-07-09 | 2014-12-31 | 沈阳时尚实业有限公司 | 一种二维码电动汽车充电桩 |
WO2017029424A1 (en) * | 2015-08-17 | 2017-02-23 | Nokia Technologies Oy | Methods, apparatuses and computer-readable instructions for activating charging of an electric vehicle |
WO2018166422A1 (zh) * | 2017-03-14 | 2018-09-20 | 北京佰才邦技术有限公司 | 一种充电的方法及管理平台、充电桩、电动车 |
CN109849728A (zh) * | 2019-04-12 | 2019-06-07 | 国网电动汽车(山西)服务有限公司 | 具备防仿冒的电动汽车资费套餐运营方法 |
Family Cites Families (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101116284B (zh) * | 2004-12-17 | 2012-11-14 | 艾利森电话股份有限公司 | 无线电通信网络中的防克隆相互鉴权的方法、身份模块、服务器以及系统 |
CN1731890A (zh) * | 2005-08-09 | 2006-02-08 | 重庆邮电学院 | 移动通信增值服务认证和支付的方法 |
JP5887534B2 (ja) | 2012-02-01 | 2016-03-16 | パナソニックIpマネジメント株式会社 | 充電システム |
US8515865B1 (en) | 2012-05-26 | 2013-08-20 | At&T Intellectual Property I, L.P. | Methods, systems, and products for charging batteries |
DE102012014456A1 (de) * | 2012-07-21 | 2014-01-23 | Audi Ag | Verfahren zum Betreiben einer Aufladestation |
JP5886333B2 (ja) | 2014-02-04 | 2016-03-16 | ソフトバンク株式会社 | 電力供給システム |
KR101623338B1 (ko) | 2013-03-19 | 2016-05-24 | 주식회사 케이티 | 도전 방지를 위한 전기차 충전 방법 및 이를 위한 전기차의 충전 인증 시스템 |
US11349675B2 (en) * | 2013-10-18 | 2022-05-31 | Alcatel-Lucent Usa Inc. | Tamper-resistant and scalable mutual authentication for machine-to-machine devices |
US9315109B2 (en) | 2013-11-02 | 2016-04-19 | At&T Intellectual Property I, L.P. | Methods, systems, and products for charging batteries |
DE102014212415A1 (de) * | 2014-06-27 | 2015-12-31 | Robert Bosch Gmbh | Verfahren zum Betreiben einer Ladestation |
US9805519B2 (en) | 2015-08-12 | 2017-10-31 | Madhusoodhan Ramanujam | Performing services on autonomous vehicles |
CN108369763A (zh) * | 2015-12-03 | 2018-08-03 | 英诺吉创新有限公司 | 用于车辆的充电系统 |
CN107801187B (zh) * | 2016-08-31 | 2021-02-02 | 华为技术有限公司 | 加解密方法、装置及系统 |
JP6896471B2 (ja) | 2017-03-23 | 2021-06-30 | 株式会社東芝 | サービス利用認証システムおよびサービス利用認証方法 |
CN107786548B (zh) * | 2017-10-13 | 2021-03-23 | 北京佰才邦技术有限公司 | 充电管理方法及装置、服务器和计算机可读存储介质 |
CN107670040B (zh) | 2017-10-25 | 2020-10-27 | 深圳先进技术研究院 | 金纳米笼-二氧化锰复合纳米颗粒及其制备方法和应用 |
JP6919496B2 (ja) * | 2017-10-25 | 2021-08-18 | トヨタ自動車株式会社 | 通信システム、およびサーバ装置 |
CN111791741B (zh) * | 2018-03-09 | 2021-07-30 | 宁德时代新能源科技股份有限公司 | 充电认证方法、充电桩、监控平台、bms、认证芯片和介质 |
CN109774526A (zh) | 2019-03-28 | 2019-05-21 | 国网电动汽车(山西)服务有限公司 | 一种具备防仿冒的车桩识别鉴权方法 |
CN110519726B (zh) * | 2019-09-20 | 2022-08-16 | 湖北工业大学 | 一种基于多服务器的v2g网络中车辆的轻量级匿名认证系统与方法 |
-
2020
- 2020-04-15 CN CN202010296590.2A patent/CN113525152B/zh active Active
-
2021
- 2021-01-18 WO PCT/CN2021/072430 patent/WO2021208549A1/zh unknown
- 2021-01-18 JP JP2022562621A patent/JP7457156B2/ja active Active
- 2021-01-18 KR KR1020227039619A patent/KR20220166869A/ko active Search and Examination
- 2021-01-18 EP EP21788276.0A patent/EP4119388A4/en active Pending
-
2022
- 2022-10-14 US US17/965,906 patent/US20230030673A1/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103595097A (zh) * | 2013-11-15 | 2014-02-19 | 重庆长安汽车股份有限公司 | 一种纯电动车远程预约充电的控制方法 |
CN204068319U (zh) * | 2014-07-09 | 2014-12-31 | 沈阳时尚实业有限公司 | 一种二维码电动汽车充电桩 |
WO2017029424A1 (en) * | 2015-08-17 | 2017-02-23 | Nokia Technologies Oy | Methods, apparatuses and computer-readable instructions for activating charging of an electric vehicle |
WO2018166422A1 (zh) * | 2017-03-14 | 2018-09-20 | 北京佰才邦技术有限公司 | 一种充电的方法及管理平台、充电桩、电动车 |
CN109849728A (zh) * | 2019-04-12 | 2019-06-07 | 国网电动汽车(山西)服务有限公司 | 具备防仿冒的电动汽车资费套餐运营方法 |
Non-Patent Citations (1)
Title |
---|
See also references of EP4119388A4 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114394026A (zh) * | 2021-12-21 | 2022-04-26 | 中汽创智科技有限公司 | 一种电动汽车充电方法、系统、装置、充电桩及存储介质 |
Also Published As
Publication number | Publication date |
---|---|
EP4119388A4 (en) | 2023-09-27 |
JP2023522017A (ja) | 2023-05-26 |
CN113525152A (zh) | 2021-10-22 |
EP4119388A1 (en) | 2023-01-18 |
JP7457156B2 (ja) | 2024-03-27 |
CN113525152B (zh) | 2023-07-18 |
US20230030673A1 (en) | 2023-02-02 |
KR20220166869A (ko) | 2022-12-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110380852B (zh) | 双向认证方法及通信系统 | |
JP5579872B2 (ja) | 安全な複数uim認証および鍵交換 | |
CN103491540B (zh) | 一种基于身份凭证的无线局域网双向接入认证系统及方法 | |
US8724819B2 (en) | Credential provisioning | |
AU2011305477B2 (en) | Shared secret establishment and distribution | |
US10516654B2 (en) | System, apparatus and method for key provisioning delegation | |
US20080235513A1 (en) | Three Party Authentication | |
CN101409619B (zh) | 闪存卡及虚拟专用网密钥交换的实现方法 | |
CN106327184A (zh) | 一种基于安全硬件隔离的移动智能终端支付系统及方法 | |
CN109714167A (zh) | 适用于移动应用签名的身份认证与密钥协商方法及设备 | |
CN109067539A (zh) | 联盟链交易方法、设备及计算机可读存储介质 | |
WO2019001061A1 (zh) | 支付验证的方法、系统及移动设备和安全认证设备 | |
CN103020825A (zh) | 一种基于软体客户端的安全支付认证方法 | |
CN114362993B (zh) | 一种区块链辅助的车联网安全认证方法 | |
CN103905384A (zh) | 基于安全数字证书的嵌入式终端间会话握手的实现方法 | |
CN112311543B (zh) | Gba的密钥生成方法、终端和naf网元 | |
WO2021208549A1 (zh) | 充电认证的方法和装置 | |
CN112419021A (zh) | 电子发票验证方法、系统、存储介质、计算机设备、终端 | |
CN103716328A (zh) | 一种操作请求处理方法和系统 | |
WO2013152653A1 (zh) | 空中接口安全方法及设备 | |
Pejaś et al. | Authentication protocol for software and hardware components in distributed electronic signature creation system | |
Chen et al. | Building general-purpose security services on EMV payment cards | |
CN113676468B (zh) | 一种基于消息验证技术的三方增强认证系统设计方法 | |
CN114118996A (zh) | 一种基于区块链的电力账单支付的方法 | |
CN103716327B (zh) | 一种操作请求处理方法和系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21788276 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2022562621 Country of ref document: JP Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2021788276 Country of ref document: EP Effective date: 20221014 |
|
ENP | Entry into the national phase |
Ref document number: 20227039619 Country of ref document: KR Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |