WO2022181673A1 - 確認方法、確認装置、確認システム、プログラム及びコンピュータ可読記憶媒体 - Google Patents
確認方法、確認装置、確認システム、プログラム及びコンピュータ可読記憶媒体 Download PDFInfo
- Publication number
- WO2022181673A1 WO2022181673A1 PCT/JP2022/007553 JP2022007553W WO2022181673A1 WO 2022181673 A1 WO2022181673 A1 WO 2022181673A1 JP 2022007553 W JP2022007553 W JP 2022007553W WO 2022181673 A1 WO2022181673 A1 WO 2022181673A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- battery
- authentication
- mobile
- unit
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 146
- 238000012795 verification Methods 0.000 title claims abstract description 97
- 230000010365 information processing Effects 0.000 claims abstract description 27
- 238000004891 communication Methods 0.000 claims description 167
- 230000004044 response Effects 0.000 claims description 88
- 238000012545 processing Methods 0.000 claims description 76
- 238000012790 confirmation Methods 0.000 claims description 75
- 230000001131 transforming effect Effects 0.000 claims description 12
- 238000006243 chemical reaction Methods 0.000 abstract description 2
- 230000008569 process Effects 0.000 description 46
- 230000006870 function Effects 0.000 description 39
- 230000005540 biological transmission Effects 0.000 description 35
- 238000012423 maintenance Methods 0.000 description 18
- 238000007599 discharging Methods 0.000 description 14
- 230000004913 activation Effects 0.000 description 7
- 230000005856 abnormality Effects 0.000 description 3
- 239000000284 extract Substances 0.000 description 3
- 238000013475 authorization Methods 0.000 description 2
- 230000004397 blinking Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 230000006866 deterioration Effects 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 238000005259 measurement Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 229920001690 polydopamine Polymers 0.000 description 2
- 230000002265 prevention Effects 0.000 description 2
- 230000000452 restraining effect Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 210000000352 storage cell Anatomy 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 238000004804 winding Methods 0.000 description 1
Images
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60L—PROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
- B60L53/00—Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles
- B60L53/60—Monitoring or controlling charging stations
- B60L53/66—Data transfer between charging stations and vehicles
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60L—PROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
- B60L53/00—Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles
- B60L53/60—Monitoring or controlling charging stations
- B60L53/65—Monitoring or controlling charging stations involving identification of vehicles or their battery types
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60L—PROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
- B60L53/00—Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles
- B60L53/60—Monitoring or controlling charging stations
- B60L53/68—Off-site monitoring or control, e.g. remote control
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- H—ELECTRICITY
- H01—ELECTRIC ELEMENTS
- H01M—PROCESSES OR MEANS, e.g. BATTERIES, FOR THE DIRECT CONVERSION OF CHEMICAL ENERGY INTO ELECTRICAL ENERGY
- H01M10/00—Secondary cells; Manufacture thereof
- H01M10/42—Methods or arrangements for servicing or maintenance of secondary cells or secondary half-cells
-
- H—ELECTRICITY
- H01—ELECTRIC ELEMENTS
- H01M—PROCESSES OR MEANS, e.g. BATTERIES, FOR THE DIRECT CONVERSION OF CHEMICAL ENERGY INTO ELECTRICAL ENERGY
- H01M10/00—Secondary cells; Manufacture thereof
- H01M10/42—Methods or arrangements for servicing or maintenance of secondary cells or secondary half-cells
- H01M10/44—Methods for charging or discharging
-
- H—ELECTRICITY
- H02—GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
- H02J—CIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
- H02J7/00—Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries
-
- H—ELECTRICITY
- H02—GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
- H02J—CIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
- H02J7/00—Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries
- H02J7/02—Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries for charging batteries from ac mains by converters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
Definitions
- the present invention relates to a confirmation method, confirmation device, confirmation system, program, and computer-readable storage medium.
- Patent Literature 1 discloses a management device that authenticates a battery by comparing an authentication key stored in a battery returned to a battery station with an authentication key stored in the battery station.
- Patent Document 2 discloses a battery station that determines whether or not to accept a battery by a whitelist method.
- a confirmation method is provided in a first aspect of the present invention.
- the confirmation method described above is, for example, a method for a confirmation device to confirm whether or not a device to be confirmed is a legitimate device.
- the verification method described above comprises, for example, transforming the first information based on the second information to generate the third information.
- the verification method described above for example, comprises the step of transmitting the third information to the device to be verified.
- the above confirmation method for example, from the device to be confirmed, (i) the fifth information generated by the device to be confirmed by inversely transforming the third information based on the fourth information paired with the second information, or and (ii) receiving, by the device to be verified, sixth information generated by processing the fifth information according to a first predetermined algorithm.
- the above confirmation method is, for example, (a) comparing the first information and the fifth information when the fifth information is received, or (b) when the sixth information is received, ( i) comparing the sixth information with the seventh information generated by processing the first information according to the first algorithm, or (ii) comparing the first information and the sixth information with the first algorithm; There is a step of comparing with eighth information generated by information processing according to a related second algorithm.
- the first algorithm may be an algorithm relating to arithmetic processing using the first function or an algorithm relating to encryption processing using the ninth information.
- the second algorithm is an algorithm related to arithmetic processing using a second function that is an inverse function of the first function, or decoding using the ninth information or the tenth information paired with the ninth information It may be an algorithm for processing.
- the above verification method includes (i) acquiring the second information from the manufacturer or transferor of the verification device, or the issuer of the second information and the fourth information, or (ii) capable of wireless communication with the verification device. and obtaining the second information from the first external device that has verified that the verification device is authentic.
- the verification method described above may comprise storing the obtained second information in a first storage device disposed in the verification device.
- the above verification method may comprise receiving from the device to be verified the eleventh information and the thirteenth information generated by transforming the eleventh information based on the twelfth information.
- the verification method may comprise comparing the 11th information with the 15th information generated by inversely transforming the 13th information based on the 14th information paired with the 12th information.
- the above confirmation method may have a step of acquiring the eleventh information as the second information when the eleventh information and the fifteenth information match.
- the above confirmation method is based on the comparison result of the first information and the fifth information, the comparison result of the sixth information and the seventh information, or the comparison result of the first information and the eighth information. It may have a step of determining whether In the above confirmation method, if the first information and the fifth information do not match, the sixth information and the seventh information do not match, or the first information and the eighth information do not match, the device to be confirmed is not authorized. Alternatively, there may be a step of confirming that the device to be verified is unauthorized.
- the second information may be a public key.
- the fourth information may be a private key corresponding to the public key.
- the verification method may comprise generating a random number.
- the verification method above may comprise generating the first information based on a random number.
- the device to be confirmed may include a power storage device.
- the confirmation device may be detachably attached to the power storage device of the device to be confirmed, and may include a charging device for charging the power storage device.
- the above verification method may include the step of the device to be verified receiving the third information from the verification device.
- the above verification method may comprise the device to be verified generating the fifth information based on the third information and the fourth information.
- the above verification method may comprise the to-be-verified device sending the generated fifth information to the verification device.
- the above confirmation method includes (i) acquiring the fourth information from the manufacturer or transferor of the device to be confirmed, or the issuer of the second and fourth information, or (ii) wirelessly communicating with the device to be confirmed.
- There may be a step of obtaining the fourth information from a second external device configured to be communicable and confirming that the device to be verified is legitimate.
- the verification method described above may comprise the step of storing the obtained fourth information in a second storage device disposed in the device to be verified.
- the above confirmation method includes (i) acquiring the second information and the fourth information from the manufacturer or transferor of the device to be confirmed, or the issuer of the second information and the fourth information, or (ii) There may be a step of acquiring the second information and the fourth information from a second external device that is configured to be able to wirelessly communicate with the verification device and that has verified that the device to be verified is legitimate.
- the verification method may comprise transforming the obtained second information based on the twelfth information to generate the thirteenth information.
- the above verification method may comprise transmitting the generated thirteenth information to a verification device.
- the above verification method may comprise transmitting the second information as 11 information to the verification device.
- the confirmation device may be a storage device that stores the device to be confirmed as the device to be stored.
- the storage device may have a mounting portion to which the stored device is mounted.
- the stored device may comprise the step of determining not to attach to the attachment portion.
- the storage device may be configured to be able to store at least one of the plurality of stored devices.
- the confirmation method may have a step of obtaining shared use identification information for identifying a stored device that can be used jointly by a plurality of users among the plurality of stored devices.
- the shared use identification Based on the information, there may be the step of determining whether the device to be verified is a device to be checked that can be used jointly by a plurality of users.
- the confirmation method is such that when it is determined that the device to be confirmed is not a device to be stored that can be used jointly by a plurality of users, the device to be stored is not attached to the attachment unit. determining.
- the verification device may be the first power device having the first terminal.
- the device to be verified may be a second power device having a first terminal and a second terminal attachably configured.
- the first power There may be the step of determining to inhibit or inhibit power input/output between the device and the second power device.
- a verification device is provided in a second aspect of the present invention.
- the confirming device confirms, for example, whether or not the device to be confirmed is a legitimate device.
- the confirmation device described above includes, for example, a third information generator that converts the first information based on the second information to generate the third information.
- the confirming device described above includes, for example, a third information transmitting unit that transmits the third information to the device to be confirmed.
- the above-described confirmation device receives from the device to be confirmed: (i) fifth information generated by the device to be confirmed by inversely transforming the third information based on the fourth information paired with the second information; and (ii) the device to be verified comprises a response receiving unit for receiving sixth information generated by processing fifth information according to a predetermined first algorithm.
- the verification device (a) compares the first information with the fifth information when the fifth information is received, or (b) when the sixth information is received, ( i) comparing the sixth information with the seventh information generated by processing the first information according to the first algorithm; or (ii) comparing the first information and the sixth information in advance.
- a comparison unit that compares the eighth information generated by performing information processing according to the second algorithm is provided.
- a power storage device is provided in a third aspect of the present invention.
- the power storage device described above includes, for example, a power storage unit that stores electrical energy.
- the power storage device described above includes, for example, an electric terminal for transmitting and receiving power to and from a first power device that charges the power storage unit or uses power discharged by the power storage unit.
- the power storage device described above includes, for example, a storage unit that stores the fourth information.
- the power storage device described above includes, for example, a third information acquisition unit that acquires the third information from the first power device.
- the power storage device includes, for example, a fifth information generation unit that generates fifth information by inversely transforming the third information acquired by the third information acquisition unit based on the fourth information stored in the storage unit.
- the power storage device includes a response unit that transmits, for example, the fifth information or the sixth information generated by processing the fifth information according to a predetermined first algorithm to the first power device. Prepare.
- a verification system is provided in a fourth aspect of the present invention.
- the confirmation system described above includes, for example, a power storage device.
- the confirmation system described above may include the power storage device according to the third aspect described above.
- the verification system described above comprises, for example, a power device.
- the verification system described above may comprise a power device having a verification device according to the second aspect described above.
- the confirmation device confirms that the power storage device as the device to be confirmed is a legitimate device.
- a program is provided in a fifth aspect of the present invention.
- the program may be a program for causing a computer to execute the confirmation method according to the first aspect.
- the program may be a program for causing a computer to function as the confirmation device according to the second aspect.
- the program may be a program for causing a computer to function as the power storage device according to the third aspect.
- a sixth aspect of the present invention provides a computer-readable storage medium.
- the computer-readable storage medium described above stores, for example, the program according to the fifth aspect described above.
- the computer-readable storage media described above may be non-transitory computer-readable media.
- FIG. 1 schematically shows an example of a system configuration of a battery management system 100;
- An example of the internal configuration of the mobile battery 20 is shown schematically.
- An example of the internal configuration of the battery station 120 is shown schematically.
- An example of the authentication procedure of the mobile battery 20 is shown schematically.
- An example of the internal configuration of a battery authentication unit 378 is shown schematically.
- An example of the internal configuration of the authentication support unit 232 is shown schematically.
- An example of the internal configuration of the on-board equipment 330 is schematically shown.
- An example of the internal configuration of the on-board equipment 370 is schematically shown.
- An example of the internal configuration of mobile battery 920 is shown schematically.
- An example of the acquisition procedure of the authentication public key 74 is shown schematically.
- An example of the acquisition procedure of the authentication public key 74 is shown schematically.
- An example of the internal configuration of the computer 3000 is shown schematically.
- FIG. 1 schematically shows an example of a system configuration of a battery management system 100.
- the battery management system 100 includes one or more (sometimes simply referred to as one or more) battery stations 120 and a management server 140 .
- the battery station 120 has one or more storage units 122 and a communication unit 126 .
- storage unit 122 includes one or more slots 124 .
- communication unit 126 includes communication interface 128 .
- each part of the battery management system 100 consumes power received from the power grid 12 to operate. Also, each unit of the battery management system 100 can transmit and receive information to and from each other via the communication network 14 .
- the one or more storage units 122 and the communication unit 126 can send and receive information to and from each other via wired or wireless communication lines (not shown).
- the battery management system 100 manages one or more (sometimes referred to as one or more) mobile batteries 20 .
- the case where the battery management system 100 provides the mobile battery 20 sharing service to the user 40 of the electric motorcycle 30 is taken as an example. Details are explained.
- each of the one or more slots 124 arranged in the storage unit 122 of the battery station 120 can store one or more mobile batteries 20 . Also, each of the one or more slots 124 arranged in the storage unit 122 of the battery station 120 can charge one or more mobile batteries 20 .
- a user 40 who has subscribed to the mobile battery 20 sharing service accesses the battery management system 100 using, for example, the communication terminal 42 and requests the mobile battery 20 to be rented.
- the user 40 may reserve the rental of the mobile battery 20 by designating the desired date and time and the place to rent the mobile battery 20 and the number of the mobile batteries 20 to be rented.
- the communication terminal 42 may access the battery management system 100 via the communication network 14 and may access the battery management system 100 via the battery station 120 . Note that the user 40 may operate the battery station 120 to request the lending of the mobile battery 20 .
- the user 40 can take out the mobile battery 20 housed in the battery station 120 (sometimes referred to as taking out the mobile battery 20). This allows the user 40 to replace the mobile battery 20 attached to the electric motorcycle 30 with the mobile battery 20 housed in the battery station 120 .
- the user 40 removes the mobile battery 20 attached to the electric motorcycle 30 from the electric motorcycle 30 .
- the user 40 returns the mobile battery 20 removed from the electric motorcycle 30 to the battery station 120 .
- the battery station 120 dispenses the charged mobile battery 20 stored in the battery station 120 .
- the user 40 receives the charged mobile battery 20 from the battery station 120 and mounts the charged mobile battery 20 on the electric motorcycle 30 . Thereby, the mobile battery 20 is exchanged between the electric motorcycle 30 and the battery station 120 .
- the battery station 120 may be placed in a lockable building or site, or may be placed outdoors in an unlocked state. Considering the convenience of the users 40, the battery station 120 is preferably arranged in an environment where many users 40 can freely use it. On the other hand, when the battery station 120 is placed in an environment where a large number of users 40 can freely use the mobile battery 20 that is not under the control of the battery management system 100 (sometimes referred to as an unauthorized mobile battery 20). ) may be inserted into slot 124 of battery station 120 .
- the unauthorized mobile battery 20 When an unauthorized mobile battery 20 having specifications different from those of the authorized mobile battery 20 is inserted into the slot 124 and the electrical terminals of the unauthorized mobile battery 20 and the electrical terminals of the slot 124 are attached, the unauthorized mobile battery The usage conditions of the battery 20 may deviate from the appropriate range. Also, since the battery station 120 is used by a large number of users 40, the unauthorized mobile battery 20 is dispensed to a different user 40 than the user 40 who inserted the unauthorized mobile battery 20 into the slot 124. It is possible.
- the non-authorized mobile battery 20 is not limited to the mobile battery 20 having specifications different from those of the mobile battery 20 under the control of the battery management system 100 (sometimes referred to as the authorized mobile battery 20).
- the non-authorized mobile battery 20 may have the same specifications as the authorized mobile battery 20 or may have specifications conforming to the authorized mobile battery 20 .
- the battery management system 100 manages the deterioration state of the authorized mobile battery 20 and performs maintenance or replacement of the mobile battery 20 at appropriate timing. This allows the user 40 to use the mobile battery 20 safely. In addition, since the mobile battery 20 with less deterioration is provided, the usage experience of the user 40 is improved.
- the battery management system 100 cannot grasp the state of maintenance management of the unauthorized mobile battery 20. Therefore, if the mobile batteries 20 stored in the battery station 120 include mobile batteries 20 with insufficient maintenance management, the usage experience of the user 40 may deteriorate. Therefore, according to this embodiment, when the mobile battery 20 is attached to the slot 124 , the battery station 120 performs authentication processing for the mobile battery 20 .
- the electric motorcycle 30 or the battery station 120 acquires identification information (sometimes referred to as a battery ID) of the mobile battery 20 to be authenticated, and authenticates the mobile battery 20 as an authentication target. (ii) sending and receiving an authentication code using a common key cryptosystem; A method of authenticating the mobile battery 20 by the electric motorcycle 30 or the battery station 120 is conceivable.
- the battery management system 100 authenticates the mobile battery 20 using public key cryptography. As a result, the battery management system 100 can confirm whether or not the mobile battery 20 attached to the slot 124 is an authorized mobile battery 20 while solving the above problem.
- the battery station 120 authenticates the mobile battery 20 using public key cryptography.
- a known system can be adopted as the public key cryptosystem.
- Ciphers of the public key cryptosystem include RSA cryptography, elliptic curve cryptography, and the like.
- the battery station 120 can be equipped with a processor having higher computing power than the processor installed in the mobile battery 20 or the electric motorcycle 30 .
- the public key cryptosystem has a larger computational load than the common key cryptosystem. Therefore, when the mobile battery 20 is authenticated by the public key cryptosystem, the processor that executes the authentication process is required to perform complicated calculations at high speed.
- the battery station 120 can utilize a high performance processor to authenticate the mobile battery 20 using public key cryptography.
- the key issuer 50 issues a pair of authentication private key 72 and authentication public key 74 for each of one or more mobile batteries 20 .
- the key issuer 50 may be the manufacturer or transferor of the mobile battery 20, the manufacturer or transferor of the battery station 120, or the administrator or operator of the battery management system 100. good.
- the key issuer 50 may be a natural person, a legal entity, an organization, or an employee or staff member of the legal entity or organization.
- the key issuer 50 may use the communication terminal 52 to issue a pair of authentication private key 72 and authentication public key 74 .
- the key issuer 50 causes the storage device (not shown) of each of the one or more mobile batteries 20 to store the authentication private key 72 of each of the one or more mobile batteries 20 .
- the key issuer 50 communicably connects the communication terminal 52 and the mobile battery 20, and sends the authentication private key 72 corresponding to the mobile battery 20 connected to the communication terminal 52 from the communication terminal 52. Make the mobile battery 20 transmit.
- the communication terminal 52 and the mobile battery 20 may transmit and receive information through wired communication, or may transmit and receive information through wireless communication.
- the key issuer 50 may input the authentication private key 72 into an input device arranged in the mobile battery 20, and store the authentication private key 72 in the mobile battery 20. May be worn.
- the key issuer 50 stores the authentication public key 74 of each of the one or more mobile batteries 20 in the storage device (not shown) of each of the one or more battery stations 120 .
- the key issuer 50 makes the authentication public key 74 of each of the one or more mobile batteries 20 available to each of the one or more battery stations 120 .
- the key issuer 50 operates the communication terminal 52 so that each of the one or more battery stations 120 stores the battery ID and the authentication public key 74 for each of the one or more mobile batteries 20 in association with each other. set so that you can access the
- the database described above may be stored in the communication terminal 52 or may be stored in the management server 140 .
- the key issuer 50 communicably connects the communication terminal 52 and the battery station 120 and causes the above database to be transmitted from the communication terminal 52 to the battery station 120 .
- the communication terminal 52 and the battery station 120 may transmit and receive information through wired communication, or may transmit and receive information through wireless communication.
- the key issuer 50 may input data into the above database from an input device provided in the battery station 120, or attach a storage device storing the above database to the battery station 120. good.
- the database described above is stored in the storage device of the battery station 120 when the battery station 120 is manufactured, shipped, transferred, or installed. Also, the above database may be updated as appropriate.
- the battery station 120 first removes the mobile battery 20 attached to the slot 124. Get the battery ID.
- the battery station 120 may acquire the battery ID of the mobile battery 20 from the mobile battery 20 or acquire the battery ID of the mobile battery 20 from the communication terminal 42 .
- the battery station 120 acquires the authentication public key 74 of the mobile battery 20 attached to the slot 124 based on the battery ID.
- the battery station 120 uses the battery ID as a key to refer to the database stored in the storage device of the battery station 120, and uses the public key for authentication of the mobile battery 20 attached to the slot 124. 74 is obtained.
- the battery station 120 accesses the communication terminal 52 or the management server 140, refers to the database stored in the communication terminal 52 or the management server 140 using the battery ID as a key, and accesses the slot. 124, the authentication public key 74 of the mobile battery 20 attached to the mobile battery 20 is obtained.
- the battery station 120 prepares a code (sometimes referred to as an authentication code) for authenticating the mobile battery 20 attached to the slot 124.
- the authentication code may be a combination of numbers, letters and symbols.
- the authentication code may be image data or audio data.
- the authentication code may be generated each time authentication is performed, or may be generated each time a predetermined validity period elapses.
- the authentication code may be a code predetermined for each mobile battery 20 .
- the battery station 120 for example, generates a random number each time authentication processing is executed, and uses the random number as an authentication code.
- the battery station 120 converts the authentication code based on the authentication public key 74 of the mobile battery 20 attached to the slot 124. Specifically, the battery station 120 uses the authentication public key 74 of the mobile battery 20 attached to the slot 124 to encrypt the authentication code. This generates a challenge code containing an encrypted authentication code.
- the battery station 120 transmits the generated challenge code to the mobile battery 20 and requests a response to the challenge code.
- a response to the challenge code transmitting a response code including information indicating that mobile battery 20 has successfully decrypted the authentication code encrypted with authentication public key 74 is exemplified.
- the decrypted authentication code and (ii) the decrypted authentication code are predetermined.
- Information generated by information processing according to an algorithm (sometimes referred to as a first algorithm) is exemplified.
- the first algorithm include an algorithm related to arithmetic processing using a predetermined function (sometimes referred to as a first function), an algorithm related to encryption processing using predetermined information, and the like.
- a hash function is exemplified as the above function.
- the above encryption process may be a common key encryption process using a common key, or a public key encryption process using a public key and a private key.
- the above-described RSA cryptography, elliptic curve cryptography, and the like are exemplified as public key encryption processing.
- the authentication private key 72 of the mobile battery 20 is used to generate the authentication public key 74. Decrypt the authentication code encrypted with .
- the mobile battery 20 successfully decrypts the authentication code encrypted with the authentication public key 74, the decrypted authentication code is obtained.
- the mobile battery 20 uses the challenge code or the authentication code encrypted with the authentication public key 74 included in the challenge code and the authentication private key 72 of the mobile battery 20 to decrypt the authentication code. can be generated.
- mobile battery 20 generates a response code according to a predetermined rule.
- the above rule may be information indicating the type or generation procedure of information indicating that the mobile battery 20 has successfully decrypted the authentication code encrypted with the authentication public key 74 .
- the mobile battery 20 also transmits the generated response code to the battery station 120 as a response to the authentication response request.
- the above rule indicates that the decrypted authentication code is used as information indicating that the mobile battery 20 has successfully decrypted the authentication code encrypted with the authentication public key 74. In this case, mobile battery 20 generates a response code including the decrypted authentication code.
- the above rule is to process the decrypted authentication code according to the first algorithm as information indicating that the mobile battery 20 has successfully decrypted the authentication code encrypted with the authentication public key 74. (sometimes referred to as the first processed value of the decrypted authentication code) generated by
- mobile battery 20 generates the above first processed value by processing information on the decrypted authentication code according to the first algorithm.
- the mobile battery 20 generates a response code including the above-described first processing value.
- the first algorithm is an algorithm related to arithmetic processing using a hash function
- mobile battery 20 generates a response code containing the hash value of the decrypted authentication code.
- the first algorithm is a common-key encryption process using a common key
- mobile battery 20 generates a response code containing a ciphertext obtained by encrypting the decrypted authentication code using the common key.
- the first algorithm is a public key encryption process using a public key and a private key
- the mobile battery 20 sends a response including a ciphertext obtained by encrypting the decrypted authentication code using the private key or the public key. Generate code.
- the battery station 120 receives the response code from the mobile battery 20. Based on the above response code, the battery station 120 confirms that the mobile battery 20 has successfully decrypted the authentication code encrypted with the authentication public key 74 .
- the battery station 120 compares the authentication code generated by the battery station 120 with the authentication code included in the response code. Also, the battery station 120 confirms whether or not the mobile battery 20 has successfully decrypted the authentication code encrypted with the authentication public key 74 based on the comparison result. Thereby, the battery station 120 can confirm whether or not the mobile battery 20 attached to the slot 124 is an authorized mobile battery 20 .
- the battery station 120 determines that the mobile battery 20 attached to the slot 124 is a legitimate mobile battery 20. Confirm that On the other hand, if the authentication code generated by the battery station 120 does not match the restored authentication code included in the response code, the battery station 120 determines that the mobile battery 20 attached to the slot 124 is not a legitimate mobile battery 20. Alternatively, confirm that the mobile battery 20 attached to the slot 124 is an unauthorized mobile battery 20 .
- the battery station 120 processes the authentication code generated by the battery station 120 according to the first algorithm. (sometimes referred to as the first processed value of the authentication code generated by the battery station 120) and the first processed value of the decrypted authentication code included in the response code. Also, the battery station 120 confirms whether or not the mobile battery 20 has successfully decrypted the authentication code encrypted with the authentication public key 74 based on the comparison result. Thereby, the battery station 120 can confirm whether or not the mobile battery 20 attached to the slot 124 is an authorized mobile battery 20 .
- the first algorithm sometimes referred to as the first processed value of the authentication code generated by the battery station 120
- the battery station 120 confirms whether or not the mobile battery 20 has successfully decrypted the authentication code encrypted with the authentication public key 74 based on the comparison result. Thereby, the battery station 120 can confirm whether or not the mobile battery 20 attached to the slot 124 is an authorized mobile battery 20 .
- the battery station 120 will detect the mobile device attached to the slot 124. Confirm that the battery 20 is a genuine mobile battery 20.
- the battery station 120 detects the mobile device attached to the slot 124. It is confirmed that the battery 20 is not the authorized mobile battery 20 or that the mobile battery 20 attached to the slot 124 is the unauthorized mobile battery 20 .
- the battery station 120 if the above response code includes the first processed value of the decrypted authentication code, the battery station 120 generates the authentication code generated by the battery station 120 and the decrypted authentication contained in the response code. Information generated by processing the first processed value of the code according to a second algorithm (sometimes referred to as a second processed value of the recovered authentication code) is compared. Also, the battery station 120 confirms whether or not the mobile battery 20 has successfully decrypted the authentication code encrypted with the authentication public key 74 based on the comparison result. Thereby, the battery station 120 can confirm whether or not the mobile battery 20 attached to the slot 124 is an authorized mobile battery 20 .
- a second algorithm sometimes referred to as a second processed value of the recovered authentication code
- the second algorithm is an algorithm related to arithmetic processing using a second function that is an inverse function of the first function, or an algorithm related to decryption processing for decrypting information encrypted by the encryption processing of the first algorithm. you can The above decryption processing may be decryption processing using key information used for encryption of the first algorithm or key information paired with the key information.
- the battery station 120 determines that the mobile battery 20 attached to the slot 124 is valid. Confirm that it is the mobile battery 20 .
- the battery station 120 determines that the mobile battery 20 attached to the slot 124 is valid. Confirm that the mobile battery 20 is not the mobile battery 20 or that the mobile battery 20 attached to the slot 124 is an unauthorized mobile battery 20 .
- the battery station 120 can confirm that the mobile battery 20 is an authorized mobile battery 20 while effectively suppressing leakage of the authentication code. In addition, the battery station 120 effectively suppresses leakage of the authentication code, and prevents the mobile battery 20 attached to the slot 124 from being an authorized mobile battery 20 or the mobile battery 20 attached to the slot 124. It is possible to confirm that the mobile battery 20 is unauthorized.
- the battery station 120 is configured so that the mobile battery 20 can be replaced. Therefore, the battery station 120 may determine whether or not to replace the mobile battery 20 based on the above confirmation result.
- the battery station 120 identifies mobile batteries 20 among the plurality of mobile batteries 20 that can be jointly used by the plurality of mobile batteries 20 based on information (sometimes referred to as a white list) for identifying the mobile batteries 20. It may be determined whether the battery 20 should be replaced.
- the battery station 120 may determine whether or not to replace the mobile battery 20 based on the above confirmation result and the whitelist.
- the battery station 120 is configured to be able to charge or discharge the mobile battery 20. Therefore, the battery station 120 may determine whether the mobile battery 20 should be charged or discharged based on the confirmation result. The battery station 120 may determine whether to charge or discharge the mobile battery 20 based on the whitelist. The battery station 120 may determine whether or not to charge or discharge the mobile battery 20 based on the above confirmation result and the whitelist.
- communication network 14 conveys information.
- the communication network 14 may be a wired communication transmission line, a wireless communication transmission line, or a combination of a wireless communication transmission line and a wired communication transmission line.
- Communication network 14 may include wireless packet communication networks, the Internet, P2P networks, leased lines, VPNs, power line communication lines, and the like.
- the communication network 14 may include (i) a mobile communication network such as a mobile phone network, and (ii) a wireless MAN (eg, WiMAX®), a wireless LAN (eg, WiFi®). ), Bluetooth (registered trademark), Zigbee (registered trademark), NFC (Near Field Communication), and other wireless communication networks.
- Wireless LAN, Bluetooth (registered trademark), Zigbee (registered trademark), and NFC may be examples of short-range wireless communication.
- the mobile battery 20 stores electrical energy.
- the mobile battery 20 may be configured to be detachable (also referred to as detachable) with respect to the electric motorcycle 30 .
- the mobile battery 20 may be configured to be detachable from the battery station 120 . This allows the user 40 to replace the mobile battery 20 attached to the electric motorcycle 30 with the mobile battery 20 housed in the battery station 120 .
- the mobile battery 20 is attached to the electric motorcycle 30 and supplies electric power to the electric motorcycle 30 .
- mobile battery 20 can be detachably attached to electric motorcycle 30 .
- the mobile battery 20 is charged by the battery station 120 while it is housed in the battery station 120 .
- the mobile battery 20 may supply power to the battery station 120 while it is housed in the battery station 120 .
- the battery station 120 can use a part of the mobile battery 20 housed in the battery station 120 as, for example, an uninterruptible power supply (UPS).
- UPS uninterruptible power supply
- the mobile battery 20 stores the private key 72 for authentication.
- the authentication private key 72 may be stored in any kind of storage device (not shown) arranged in the mobile battery 20 .
- the mobile battery 20 may store various keys used for various encryption processes and/or decryption processes executed with the battery station 120 . Examples of the key include a private key for electronic signature, a public key for electronic signature (sometimes called an electronic certificate), and the like.
- the electric motorcycle 30 is equipped with the mobile battery 20 .
- the electric motorcycle 30 may be equipped with multiple mobile batteries 20 .
- the electric motorcycle 30 uses power stored in the mobile battery 20 .
- the electric motorcycle 30 runs by consuming power supplied from the mobile battery 20 .
- the communication terminal 42 transmits and receives information to and from each unit of the battery management system 100 via the communication network 14 .
- the communication terminal 42 may function as a user interface when the user 40 accesses the battery management system 100 .
- the communication terminal 42 may be used for user authentication processing by the battery management system 100 .
- Examples of the communication terminal 42 include a personal computer and a mobile terminal.
- Examples of mobile terminals include mobile phones, smart phones, PDAs, tablets, notebook or laptop computers, wearable computers, and the like.
- the communication terminal 52 transmits and receives information to and from each unit of the battery management system 100 via the communication network 14 .
- the communication terminal 52 may function as a user interface when the key issuer 50 accesses the battery management system 100 .
- the communication terminal 52 may be used for generating various keys such as the private key 72 for authentication and the public key 74 for authentication.
- the communication terminal 52 may store the generated authentication private key 72 in the storage device of the mobile battery 20 corresponding to the key. After the authentication private key 72 is stored in the mobile battery 20 , the communication terminal 52 may erase the authentication private key 72 from the storage device of the communication terminal 52 .
- Communication terminal 52 may store generated authentication public key 74 in the storage device of one or more battery stations 120 .
- the communication terminal 52 may have a database that associates and stores the battery ID and the various public keys described above for each of the one or more mobile batteries 20 .
- the database may store the battery IDs of the one or more mobile batteries 20 and the authentication public keys 74 of the one or more mobile batteries 20 in association with each other.
- the communication terminal 52 may be configured to be able to wirelessly communicate with one or more battery stations 120 .
- the communication terminal 52 may be an information processing device that has confirmed that at least one of the one or more battery stations 120 is legitimate.
- Communication terminal 52 may be a trusted information processing device for one or more battery stations 120 .
- the communication terminal 52 may be configured to be able to wirelessly communicate with one or more mobile batteries 20 .
- the communication terminal 52 may be an information processing device that has confirmed that at least one of the one or more mobile batteries 20 is genuine.
- the communication terminal 52 may be a reliable information processing device for one or more mobile batteries 20 .
- Examples of the communication terminal 52 include a personal computer and a mobile terminal.
- Examples of mobile terminals include mobile phones, smart phones, PDAs, tablets, notebook or laptop computers, wearable computers, and the like.
- the battery station 120 accommodates the mobile battery 20 .
- the battery station 120 may accommodate multiple mobile batteries 20 .
- the battery station 120 can store one or more mobile batteries 20 .
- the battery station 120 charges at least one of the one or more mobile batteries 20 .
- the battery station 120 may charge the mobile battery 20 until the charging rate or voltage of the mobile battery 20 reaches a predetermined set value.
- the battery station 120 puts the fully charged mobile battery 20 in a removable state (sometimes referred to as dispensing). In response to a request from the user 40, the battery station 120 may dispense the mobile battery 20 that meets the request.
- the battery station 120 acquires from the management server 140 information indicating the payment condition, which is the condition regarding the mobile battery 20 to be paid out, and determines the mobile battery 20 to be actually paid out of the mobile batteries 20 that meet the payment condition. You may
- the battery station 120 may discharge at least some of the plurality of mobile batteries 20.
- the battery station 120 may use the power output by discharging the mobile battery 20 .
- the battery station 120 operates by consuming power output by discharging the mobile battery 20 .
- the battery station 120 may stop or interrupt the charging operation of the other mobile batteries 20 when operating by consuming power output by discharging one mobile battery 20 . Even in this case, the battery station 120 may continue dispensing the mobile battery 20 .
- the battery station 120 can use part of the mobile battery 20 housed in the battery station 120 as an uninterruptible power supply.
- the battery station 120 for example, even if an abnormality occurs in the power supply from the power system 12 to the battery station 120, the power supply to the control device can be continued. As a result, for example, the dispensing of mobile batteries 20 by the battery station 120 can be continued. Therefore, even if the battery station 120 is installed in an area where power outages occur relatively frequently, an environment can be provided in which the batteries can be stably replaced.
- the storage unit 122 holds multiple slots 124 .
- storage unit 122 is formed independently of communication unit 126 .
- the storage unit 122 may be installed separately from the communication unit 126 or may be installed in contact with the communication unit 126 .
- the storage unit 122 is a process flow including one or more processes for controlling operation of at least one of the plurality of slots 124 based on a first command sent from the communication unit 126. to generate The storage unit 122 determines whether or not each process can be executed for each of the one or more processes. Storage unit 122 generates a second command for controlling the slot 124 targeted by the process determined to be executable. Storage unit 122 controls the operation of slot 124 based on the generated second command. This may restrict the execution of some of the instructions indicated by the first command.
- the storage unit 122 performs the operations related to the safety. It is determined whether or not a condition for permitting execution is satisfied. If it is determined that the above conditions are met, the storage unit 122 determines that the process is executable. This controls the operation of slot 124 based on the second command for the process described above. On the other hand, if it is determined that the above conditions are not met, the storage unit 122 determines that the process cannot be executed. In this case, no second command relating to the above process is sent to slot 124 .
- management server 140 may send the above request when the communication environment of battery station 120 is good. can be revoked. However, if the communication environment of the battery station 120 is not good, it may take some time for the management server 140 to cancel the above request.
- the storage unit 122 determines whether or not the second command can be executed according to the state of the battery station 120. Therefore, the battery station 120 can immediately It is possible to cancel or interrupt the execution of some processing.
- each of the multiple slots 124 is configured to be able to store at least one of the one or more mobile batteries 20 . At least one of the one or more mobile batteries 20 is attached to each of the plurality of slots 124 . Also, each of the plurality of slots 124 includes an electrical terminal (not shown) electrically connected to one or more electrical terminals (not shown) of the mobile battery 20 . Thereby, each of the plurality of slots 124 can charge or discharge the mobile battery 20 stored in each slot.
- electrically connected is not limited to the case where two elements are physically directly connected.
- a third element may intervene between the above two elements.
- the input and output windings of a transformer are not physically connected, but are electrically connected. This allows the slot 124 to support not only wired charging and discharging of the mobile battery 20 but also wireless charging and discharging of the mobile battery 20 .
- Each of the plurality of slots 124 may have a communication terminal communicably connected to one or more mobile battery 20 communication terminals.
- the communication method between the communication terminal of the slot 124 and the communication terminal of the mobile battery 20 may be a wired communication method or a wireless communication method.
- each of the plurality of slots 124 can read information from or write information to the storage device (not shown) of the mobile battery 20 stored in each slot.
- the communication unit 126 is in charge of information processing involving at least one of the user 40 and the management server 140 among the information processing in the battery station 120 .
- communication unit 126 receives and responds to requests from user 40 and/or management server 140 .
- the communication unit 126 issues instructions (sometimes referred to as commands) to the storage unit 122 when it determines that the storage unit 122 needs to process a request from at least one of the user 40 and the management server 140 . ).
- the above first command may be an example of a command.
- communication unit 126 If communication unit 126 is capable of processing requests from user 40 and/or management server 140 without cooperating with storage unit 122, communication unit 126 sends commands to storage unit 122. It doesn't have to be. This simplifies information processing in the storage unit 122 .
- the communication unit 126 can execute, for example, communication control processing with the outside of the battery station 120 , authentication processing of the user 40 , selection processing of the slot 124 , etc. without cooperating with the storage unit 122 .
- the communication unit 126 is formed independently of the storage unit 122 in this embodiment.
- the storage unit 122 may be installed separately from the communication unit 126 or may be installed in contact with the communication unit 126 .
- the communication interface 128 is configured to be able to communicate with an information processing device external to the battery station 120 .
- the communication interface 128 may support multiple communication schemes.
- the communication interface 128 may be compatible with a wired communication system or may be compatible with a wireless communication system.
- communication interface 128 sends and receives information to and from communication terminal 42 utilized by user 40 .
- communication interface 128 sends and receives information to and from management server 140 .
- the management server 140 is arranged outside the battery station 120 .
- the management server 140 can also transmit and receive information to and from the communication unit 126 of the battery station 120 via the communication network 14 .
- the management server 140 manages one or more mobile batteries 20. For example, the management server 140 manages each state of one or more mobile batteries 20 . The management server 140 may manage returning and dispensing of one or more mobile batteries 20 . The management server 140 may send various requests for managing the mobile battery 20 to at least one of the one or more battery stations 120 .
- the management server 140 may manage one or more battery stations 120. Management server 140 may manage the status of each of one or more battery stations 120 .
- the state of the battery station 120 includes the external power supply state, the number of mobile batteries 20 that can be accepted, the number of mobile batteries 20 that can be dispensed, the presence or absence of the mobile batteries 20 that can be used as an uninterruptible power supply, the number, or the number of mobile batteries 20 Examples include identification information and the state of charge of the mobile battery 20 described above.
- the management server 140 may send various requests for managing the battery stations 120 to at least one of the one or more battery stations 120 .
- the management server 140 may determine, for at least some of the one or more battery stations 120, a payout condition regarding the mobile battery 20 to be paid out.
- the payout conditions include the order of payout priority for each of the plurality of mobile batteries 20 housed in the battery station 120, the identification information of the mobile battery 20 to be paid out preferentially, and the characteristics of the mobile battery 20 to be paid out preferentially. exemplified.
- the management server 140 may be used for distribution processing of various keys such as the public key 74 for authentication.
- the management server 140 may have a database that associates and stores the battery ID and the various keys described above for each of the one or more mobile batteries 20 .
- the database may store the battery IDs of the one or more mobile batteries 20 and the authentication public keys 74 of the one or more mobile batteries 20 in association with each other.
- the management server 140 extracts the authentication public key 74 of the mobile battery 20 indicated by the request, and transmits the extracted authentication public key 74. good.
- the management server 140 may be configured to be able to wirelessly communicate with one or more battery stations 120 .
- the management server 140 may be an information processing device that has confirmed that at least one of the one or more battery stations 120 is legitimate.
- Management server 140 may be a trusted information processing device for one or more battery stations 120 .
- the management server 140 may be configured to be able to wirelessly communicate with one or more mobile batteries 20 .
- the management server 140 may be an information processing device that has confirmed that at least one of the one or more mobile batteries 20 is legitimate.
- the management server 140 may be a reliable information processing device for one or more mobile batteries 20 .
- the mobile battery 20 may be an example of a device to be confirmed, a second power device, or a power storage device.
- the key issuer 50 may be an example of the manufacturer or transferor of the verification device, the manufacturer or transferor of the device to be verified, or the issuer of the second and fourth information.
- the communication terminal 52 may be an example of a first external device or a second external device.
- Battery management system 100 may be an example of a verification device or verification system.
- Battery station 120 may be an example of a verification device, a primary power device, or a storage device.
- Storage unit 122 may be an example of a first power device or storage device.
- Slot 124 may be an example of a first power device, storage device, or mounting portion.
- the management server 140 may be an example of a first external device or a second external device.
- the authentication code may be an example of the first information.
- the authentication public key 74 may be an example of the second information.
- the authentication code encrypted with the authentication public key 74 may be an example of the third information.
- a challenge code may be an example of the third information.
- the authentication private key 72 may be an example of the fourth information.
- the decrypted authentication code may be an example of the fifth information.
- the first processing value of the decrypted authentication code may be an example of the sixth information.
- the first processed value of the authentication code generated by the battery station 120 may be an example of the seventh information.
- the second processing value of the restored authentication code may be an example of the eighth information.
- Information used for the encryption processing of the first algorithm may be an example of the ninth information.
- Information used for the decoding process of the second algorithm may be an example of the ninth information or the tenth information.
- Encryption may be an example of information conversion.
- Decoding may be an example of inverse transformation of information.
- the authorized mobile battery 20 may be an example of an authorized device.
- a whitelist may be an example of shared use identification information.
- a method of authenticating the mobile battery 20 may be an example of a method of confirming the mobile battery 20 .
- the details of the battery management system 100 have been described by taking as an example the case where the battery management system 100 provides the mobile battery 20 sharing service.
- the services provided by the battery management system 100 are not limited to this embodiment.
- the battery management system 100 may provide the mobile battery 20 charging service to the user 40 of the mobile battery 20 .
- the details of the battery station 120 have been described by taking as an example the case where the battery station 120 operates using power received from the power system 12 .
- the battery station 120 is not limited to this embodiment.
- battery station 120 may be stored in battery station 120, for example, if at least one of the one or more slots 124 disposed in battery station 120 includes a bi-directional DC/DC converter. At least one of the one or more mobile batteries 20 may operate using the discharged power.
- the details of the battery management system 100 have been described by taking as an example the case where the battery station 120 includes one or more storage units 122 and a single communication unit 126 .
- the battery station 120 is not limited to this embodiment.
- the battery station 120 may comprise multiple storage units 122 and multiple communication units 126 .
- the number of storage units 122 may be greater than the number of communication units 126 .
- each of the one or more battery stations 120 acquires the authentication public key 74 of one or more mobile batteries 20 from the key issuer 50, the communication terminal 52, or the management server 140.
- the details of the battery management system 100 have been described.
- the method of obtaining the authentication public key 74 in the battery station 120 is not limited to this embodiment.
- each of the one or more battery stations 120 may obtain the authentication public key 74 of the mobile battery 20 attached to the slot 124 .
- the battery station 120 generates an authentication code
- the battery station 120 encrypts the generated authentication code with the authentication public key 74 to generate a challenge code
- an example of a method for authenticating the mobile battery 20 in which the mobile battery 20 decrypts the encrypted authentication code included in the challenge code with the authentication private key 72 to generate a response code. was explained.
- the method of authenticating mobile battery 20 is not limited to this embodiment.
- electronic signatures are used to authenticate mobile battery 20 .
- the mobile battery 20 For example, (i) the mobile battery 20 generates an authentication code, (ii) the mobile battery 20 signs the generated authentication code (or the generated authentication code and battery ID) using a private key, ( iii) The mobile battery 20 transmits the generated authentication code (plaintext), battery ID (plaintext), and data signed with the private key (ciphertext) to the battery station 120 . After that, (iv) the battery station 120 acquires the public key associated with the battery ID of the mobile battery 20, and (v) the battery station 120 verifies the signature using the public key. According to this embodiment, when the validity of the signature is confirmed, the authenticity of the mobile battery 20 can also be confirmed.
- the mobile battery 20 includes a power connector 212 , a communication connector 214 , a power storage unit 220 , a control unit 230 , an authentication support unit 232 , a sense unit 240 and a storage unit 250 .
- the storage unit 250 has a battery ID storage unit 252 and an authentication private key storage unit 254 .
- the power connector 212 includes electrical terminals for transmitting power to and from the slot 124 or the electric bike 30 .
- communication connector 214 includes a communication terminal for transmitting information to and receiving information from slot 124 or electric bike 30 .
- the power storage unit 220 includes power storage cells that store electrical energy.
- control unit 230 controls the operation of the mobile battery 20.
- Control unit 230 may transmit and receive information to and from storage unit 122 when mobile battery 20 is stored in slot 124 .
- the authentication handling unit 232 handles authentication response requests from the battery station 120 .
- the authentication support unit 232 receives a challenge code and an authentication response request from the battery station 120 .
- the authentication handling unit 232 transmits a response code to the battery station 120 in response to the authentication response request. Details of the authentication support unit 232 will be described later.
- the sensing unit 240 acquires information indicating the state of the mobile battery 20.
- the sense portion 240 may include multiple types of sensors. A temperature sensor, a voltage sensor, a current sensor, and the like are exemplified as sensors included in the sensing unit 240 .
- the storage unit 250 stores various information related to the mobile battery 20.
- the storage unit 250 stores identification information of the mobile battery 20 .
- the storage unit 250 may store identification information of the electric motorcycle 30 electrically connected to the mobile battery 20, the battery station 120, or the slot 124.
- the storage unit 250 may store the operation history of the mobile battery 20 .
- the storage unit 250 associates the time and the measurement result of the sensing unit 240 and stores them as the operation history of the mobile battery 20 .
- the battery ID storage unit 252 stores the battery ID of the mobile battery 20.
- the authentication private key storage unit 254 stores the authentication private key 72 of the mobile battery 20 .
- the power connector 212 may be an example of an electrical terminal or second terminal.
- Power storage unit 220 may be an example of a power storage device.
- the authentication private key storage unit 254 may be an example of a storage unit.
- the authentication handling unit 232 may be an example of a third information acquisition unit, a fifth information generation unit, or a response unit.
- the battery station 120 comprises one or more storage units 122 , a communication unit 126 , a communication line 310 , an uninterruptible power supply 312 and a router 314 .
- each of the one or more storage units 122 has a housing 320 and an onboard equipment 330 .
- the onboard equipment 330 includes one or more slots 124 , a sense unit 332 , a settings storage unit 334 and a control unit 336 .
- the communication unit 126 has a housing 360 and an on-board device 370 .
- the on-board equipment 370 includes a communication interface 128 , a user interface 372 , a user identification section 374 , a control section 376 and a battery authentication section 378 .
- each of the one or more slots 124 is configured to be detachable from the mobile battery 20 . Also, each of the one or more slots 124 supplies power to the mobile battery 20 to charge the power storage unit 220 of the mobile battery 20 . Each of the one or more slots 124 may receive power output by the mobile battery 20 .
- the communication line 310 connects each of the one or more storage units 122 and the communication unit 126 to each other.
- uninterruptible power supply 312 is disposed between power system 12 and communication unit 126 .
- the uninterruptible power supply 312 supplies power to the communication unit 126 when, for example, an abnormality occurs in the power supply from the power grid 12 .
- router 314 relays or forwards communications between communication unit 126 and communication network 14 .
- the housing 320 holds the mounted device 330 .
- the shape and material of the housing 320 are not particularly limited.
- the housing 320 may have a box shape, a plate shape, or a frame shape.
- the mounted equipment 330 is mounted on the housing 320 .
- the mounting mode of the mounting device 330 is not particularly limited. Mounted device 330 may be housed inside housing 320 or may be mounted on the surface of housing 320 .
- the sensing unit 332 acquires information indicating the state of the slot 124 or the mobile battery 20 stored in the slot 124 .
- the sense portion 332 may include multiple types of sensors. A temperature sensor, a voltage sensor, a current sensor, and the like are exemplified as sensors included in the sensing unit 240 .
- the setting storage section 334 stores various settings related to the storage unit 122 .
- the setting storage unit 334 may have a physical switch, and may have any type of storage medium such as memory and hard disk.
- the above settings may be (i) indicated by ON/OFF of a physical switch, and (ii) stored as electronic data in a storage medium. Examples of the above settings include settings related to the ID of the storage unit 122, settings related to the installation position of the storage unit 122, settings related to whether various operations in the storage unit 122 can be executed, and the like.
- control section 336 controls the operation of the storage unit 122 .
- Examples of the above operations include attaching or detaching the mobile battery 20 to or from the slot 124, charging or discharging the mobile battery 20, and the like.
- the controller 336 controls attachment or detachment of the mobile battery 20 to/from the slot 124 .
- the above controls include lock control of the shutter (not shown) arranged in the slot 124, control of the pull-out prevention member (not shown) arranged in the slot 124, and mobile shutter arranged in the slot 124. Examples include control of a mechanism (not shown) for restraining the battery 20, control of a movable connector (not shown) arranged in the slot 124, and the like.
- the movable connector may be a mechanical connector or an electric connector.
- control unit 336 controls charging or discharging of the mobile battery 20 stored in the slot 124.
- Examples of the above control include confirmation of connection of electrical terminals, adjustment of charging voltage, adjustment of charging current, adjustment of discharging voltage, and adjustment of discharging current. Thereby, charging or discharging of the mobile battery 20 via the electrical terminals can be controlled.
- the controller 336 may control the operation of the storage unit 122 based on commands received from the controller 376 .
- Controller 336 generates a process flow including one or more processes for controlling operation of at least one of plurality of slots 124 based on instructions received from controller 376, for example.
- the control unit 336 determines whether or not each process can be executed for each of the one or more processes.
- Control unit 336 generates a command for the process determined to be executable, and transmits the command to slot 124 to be controlled.
- the above instructions are not generated and sent for processes that are determined to be non-executable.
- the control unit 336 may transmit to the control unit 376 information indicating the execution result of the operation based on the command received from the control unit 376. For example, the controller 336 transmits information to the controller 376 indicating whether or not the storage unit 122 has performed the operation according to the command received from the controller 376 .
- the housing 360 holds the mounted device 370 .
- the shape and material of the housing 360 are not particularly limited.
- the housing 360 may have a box shape, a plate shape, or a frame shape.
- the mounted device 370 is mounted on the housing 360 .
- the mounting mode of the mounting device 370 is not particularly limited. Mounted device 370 may be housed inside housing 360 or may be mounted on the surface of housing 360 .
- the user interface 372 provides various types of information to the user 40 who uses the battery station 120 .
- User interface 372 also accepts input from user 40 who uses battery station 120 .
- Examples of the user interface 372 include a display, speaker, keyboard, pointing device, touch panel, microphone, camera, voice input system, gesture input system, and the like.
- the user identification unit 374 identifies the user 40 who uses the battery station 120.
- a known method can be adopted as a method for identifying the user 40 .
- the user identification unit 374 identifies the user 40 by analyzing the image of the user 40 and executing authentication processing for the user 40 .
- the user identification unit 374 may identify the user 40 by executing authentication processing for the user 40 using an ID card possessed by the user 40 .
- the user identification unit 374 may identify the user 40 by executing authentication processing for the user 40 using the communication terminal 42 possessed by the user 40 .
- control unit 376 is in charge of information processing involving at least one of the user 40 and the management server 140 among the information processing in the battery station 120 .
- the control unit 376 receives a request from at least one of the user 40 and the management server 140 and responds to the request.
- the control unit 376 determines that the storage unit 122 needs to process a request from at least one of the user 40 and the management server 140, the control unit 376 issues a command (for example, the first command described above) to the storage unit 122. .).
- the controller 376 can process a request from at least one of the user 40 and the management server 140 without cooperating with the storage unit 122, the controller 376 sends a command to the storage unit 122. It doesn't have to be.
- the control unit 376 can execute, for example, communication control processing with the outside of the battery station 120 , authentication processing of the user 40 , selection processing of the slot 124 , etc., without cooperating with the storage unit 122 .
- control unit 376 when the control unit 376 receives a request from at least one of the user 40 and the management server 140, the control unit 376 first creates a processing flow including one or more processes for processing the request. Generate. Next, the control unit 376 extracts processes including processing in the storage unit 122 from the above one or more processes. Control unit 376 generates a command indicating the content of processing in storage unit 122 for each of the extracted processes.
- the above command may include information indicating the storage unit 122 to be controlled (sometimes referred to as a target unit).
- the above command may include information indicating the slot 124 to be controlled (sometimes referred to as a target slot).
- the above command may include identification information of the target slot and information indicating the content of the operation in the target slot.
- control unit 376 transmits the above command to the storage unit 122 that is the target of the command.
- the control section 376 may acquire information indicating the result of execution of the above command from the storage unit 122 that received the above command.
- the battery authentication unit 378 executes authentication processing of the mobile battery 20. For example, the battery authentication unit 378 confirms whether the mobile battery 20 attached to the slot 124 is an authorized mobile battery 20 or not. Details of the battery authentication unit 378 will be described later.
- the battery authentication unit 378 may be an example of a verification device.
- Slot 124 may be an example of a charging device.
- FIG. FIG. 4 schematically shows an example of an authentication procedure for the mobile battery 20.
- FIG. 5 schematically shows an example internal configuration of the battery authenticator 378 for implementing the authentication procedure described with reference to FIG.
- FIG. 6 schematically shows an example of the internal configuration of the authentication handling section 232 for implementing the authentication procedure described with reference to FIG. It should be noted that the authentication processing of the mobile battery 20 in the battery station 120, the authentication support unit 232, and the battery authentication unit 378 are not limited to this embodiment.
- the step of the mobile battery 20 acquiring the authentication private key 72 of the mobile battery 20 from the key issuer 50, the communication terminal 52, or the management server 140 has already been completed.
- An example of the authentication processing of the mobile battery 20 will be described by taking a case where the mobile battery 20 is authenticated.
- the mobile battery 20 stores the authentication private key 72 in, for example, the authentication private key storage unit 254 .
- the battery station 120 receives from the key issuer 50, the communication terminal 52, or the management server 140 the authentication public key 74 of one or more of the mobile batteries 20 described above.
- An example of the authentication process of the mobile battery 20 will be described, taking as an example a case where the step of acquiring the database related to has already been completed.
- the battery station 120 stores a database of the authentication public keys 74 of one or more mobile batteries 20 in, for example, a storage device provided in the battery authentication unit 378 or the on-board device 370 .
- the authentication private key 72 of the mobile battery 20 is stored in the authentication private key storage unit 254 at the stage when the authentication process of the mobile battery 20 is started.
- the battery authentication unit 378 of the battery station 120 has a database of authentication public keys 74 of one or more mobile batteries 20 .
- step 420 the step may be abbreviated as S
- the battery authentication unit 378 of the battery station 120 detects that the mobile battery 20 is in the slot 124. Detects when worn.
- the battery authentication unit 378 of the battery station 120 detects that the mobile battery 20 is attached to the slot 124
- the battery authentication unit 378 of the battery station 120 transmits an activation signal to the mobile battery 20 .
- control unit 230 of the mobile battery 20 when the control unit 230 of the mobile battery 20 receives the activation signal, the control unit 230 and the authentication support unit 232 are activated, for example. At this time, control unit 230 may transmit to battery station 120 an activation confirmation signal indicating that authentication response unit 232 has been activated.
- the battery authentication unit 378 transmits to the mobile battery 20 a signal requesting transmission of the battery ID (sometimes referred to as an ID transmission request).
- a signal requesting transmission of the battery ID (sometimes referred to as an ID transmission request).
- the control unit 230 of the mobile battery 20 receives the ID transmission request signal, the control unit 230 transmits the battery ID stored in the battery ID storage unit 252 to the battery station 120 .
- the battery authentication unit 378 when the battery authentication unit 378 acquires the battery ID of the mobile battery 20, the battery authentication unit 378 refers to the database regarding the authentication public key 74 described above using the battery ID as a key to An authentication public key 74 that matches the ID is extracted. If the authentication public key 74 that matches the battery ID is not extracted, the battery authentication unit 378 accesses the communication terminal 52 or the management server 140 to acquire the authentication public key 74 that matches the battery ID. good too.
- the battery authentication unit 378 prepares an authentication code. For example, the battery authentication unit 378 generates a random number and determines to use the random number as the authentication code.
- the battery authentication unit 378 converts the authentication code based on the authentication public key 74 of the mobile battery 20 and generates a challenge code including the converted authentication code. For example, the battery authentication unit 378 uses the authentication public key 74 of the mobile battery 20 to encrypt the authentication code. Battery authentication unit 378 also generates a challenge code including an encrypted authentication code.
- the battery authentication unit 378 prepares a verification code. For example, the battery authentication unit 378 performs arithmetic processing using a hash function to generate a hash value of the authentication code. Battery authentication unit 378 determines to use the generated hash value as a verification code.
- the battery authentication unit 378 transmits the challenge code to the mobile battery 20.
- Battery authenticator 378 may transmit a challenge code and an authentication response request to battery station 120 .
- the authentication handling unit 232 uses the authentication private key 72 stored in the authentication private key storage unit 254 to generate the encrypted encrypted data included in the challenge code. Reverse the authorization code. Specifically, the authentication support unit 232 uses the authentication private key 72 stored in the authentication private key storage unit 254 to decrypt the encrypted authentication code included in the challenge code. Since the authentication private key 72 is paired with the authentication public key 74, if the mobile battery 20 is a legitimate mobile battery 20, the authentication support unit 232 will succeed in decrypting the encrypted authentication code.
- the authentication handling unit 232 generates a response code including information indicating that the mobile battery 20 has successfully decrypted the authentication code encrypted with the authentication public key 74. For example, the authentication handling unit 232 performs arithmetic processing using a hash function to generate a hash value of the decrypted authentication code. The authentication handling unit 232 generates a response code including the hash value of the decrypted authentication code. Also, the authentication handling unit 232 transmits the response code to the battery station 120 .
- the battery authentication unit 378 compares the hash value included in the response code with the hash value generated as the verification code. Also, in S440, it is determined whether or not the mobile battery 20 is a legitimate mobile battery 20 based on the above comparison result.
- the battery authentication unit 378 may determine whether or not to replace the mobile battery 20 based on the determination result at S440. For example, if the mobile battery 20 is not determined to be a regular mobile battery 20, it is determined not to mount the mobile battery 20 to the slot 124. FIG.
- the battery authentication unit 378 may determine whether or not to replace the mobile battery 20 based on the determination result in S440 and the whitelist described above. For example, when it is determined that the mobile battery 20 is a legitimate mobile battery 20 , the battery authentication unit 378 determines whether the mobile battery 20 is a mobile battery 20 that can be used by multiple users 40 .
- the battery authentication unit 378 confirms whether or not the battery ID of the mobile battery 20 is listed in the whitelist. When the battery ID of the mobile battery 20 is listed in the whitelist, the battery authentication unit 378 determines that the mobile battery 20 can be used by multiple users 40 . On the other hand, if the battery ID of the mobile battery 20 is not listed in the whitelist, the battery authentication unit 378 determines that the mobile battery 20 is not usable by multiple users 40 .
- the battery authentication unit 378 may decide not to mount the mobile battery 20 in the slot 124. As a result, for example, even if the mobile battery 20 is a regular mobile battery 20, if the user 40 of the mobile battery 20 does not subscribe to the charging service of the mobile battery 20 or the replacement service of the mobile battery 20 by the battery management system 100 In addition, storage of the mobile battery 20 in the battery station 120 is suppressed.
- the battery station 120 does not allow the mobile battery 20 to be attached to the slot 124 in order to perform authentication processing for the mobile battery 20 .
- the battery 20 may be detached and the mobile battery 20 returned to the user 40 .
- the manner in which the mobile battery 20 is attached to the slot 124 is not particularly limited.
- the mobile battery 20 may be housed inside the slot 124 , or the mobile battery 20 may be placed on the slot 124 .
- the battery authentication unit 378 may determine whether the mobile battery 20 should be charged and/or discharged based on the determination at S440. For example, if the mobile battery 20 is not determined to be a legitimate mobile battery 20, it is determined not to charge and/or discharge the mobile battery 20 to the slot 124. FIG. As a result, power input/output between the slot 124 and the mobile battery 20 can be prohibited or suppressed.
- the battery authentication unit 378 may determine whether or not the mobile battery 20 should be charged and/or discharged based on the determination result in S440 and the above-described whitelist in a procedure similar to that described above.
- the processing in mobile battery 20 may be executed by a single processor, or may be executed by cooperation of multiple processors.
- the processing in battery station 120 may be performed by a single processor, or may be performed by a plurality of processors working together. This further improves security.
- the mobile battery 20 includes a control CPU for controlling various operations of the mobile battery 20 and a secure IC for executing encryption processing and decryption processing.
- S422 and S426 are executed by the above control CPU.
- the control CPU receives the challenge code
- the control CPU transfers the challenge code to the secure IC.
- the secure IC decrypts the challenge code at S434 and generates a response code at S436.
- the secure IC outputs the generated response code to the control CPU.
- the control CPU transmits the response code generated by the secure IC to the battery station 120 .
- the battery authentication unit 378 includes a storage unit 520, a battery ID acquisition unit 530, an authentication code generation unit 540, a verification code generation unit 550, and a challenge code generation unit 560. , a challenge code transmission unit 562 , a response code acquisition unit 570 , a comparison unit 582 , and a determination unit 584 .
- the storage unit 520 has a public key database 522 and a whitelist 524 .
- the storage unit 520 stores various information.
- the public key database 522 associates the battery IDs of the one or more mobile batteries 20 managed by the battery management system 100 with the authentication public keys 74 of the one or more mobile batteries 20. and store it.
- Whitelist 524 stores battery IDs of one or more mobile batteries 20 managed by battery management system 100 . Note that in other embodiments, public key database 522 may be used as whitelist 524 .
- battery authenticator 378 obtains public key database 522 from key issuer 50 .
- Battery authentication unit 378 stores public key database 522 acquired from key issuer 50 in storage unit 520 .
- battery authenticator 378 obtains public key database 522 from communication terminal 52 or management server 140 .
- Battery authentication unit 378 stores public key database 522 acquired from communication terminal 52 or management server 140 in storage unit 520 .
- the battery ID acquisition unit 530 acquires the battery ID of the mobile battery 20 accommodated in the slot 124 or the battery ID of the mobile battery 20 accommodated in the slot 124.
- the battery ID acquisition unit 530 may acquire the battery ID of the mobile battery 20 attached to the slot 124 .
- the battery ID acquisition unit 530 may acquire the battery ID of the mobile battery 20 from the communication terminal 42 or the mobile battery 20 .
- the authentication code generation unit 540 generates the authentication code 502.
- the authentication code generator 540 may generate the authentication code 502 by generating random numbers.
- the verification code generation unit 550 generates a verification code.
- the verification code generation unit 550 generates a verification code according to the rules for the mobile battery 20 to generate a response code.
- the verification code generation unit 550 does not need to generate the verification code and decides to use the verification code as the verification code. You may
- the verification code generation unit 550 executes arithmetic processing using a hash function 552 to generate the hash value 504 of the authentication code 502 .
- the verification code generator 550 determines to use the generated hash value 504 as the verification code.
- Verification code generation unit 550 outputs hash value 504 to comparison unit 582 as a verification code.
- the challenge code generation unit 560 generates the challenge code 512.
- the challenge code generator 560 uses the authentication public key 74 of the mobile battery 20 to encrypt the authentication code 502 . This allows battery authenticator 378 to generate challenge code 512 including encrypted authentication code 502 .
- the challenge code transmission section 562 transmits the challenge code 512 generated by the challenge code transmission section 562 to the battery station 120 .
- the challenge code sending unit 562 may send the challenge code 512 and the authentication response request to the battery station 120 .
- the response code acquisition unit 570 acquires the response code 516 corresponding to the challenge code 512 from the mobile battery 20.
- response code 516 includes hash value 506 of authentication code 502 restored in mobile battery 20 .
- Response code acquisition section 570 outputs hash value 506 of restored authentication code 502 to comparison section 582 .
- the comparison unit 582 acquires the hash value 504 as the verification code from the verification code generation unit 550.
- the comparison unit 582 also acquires the hash value 506 included in the response code 516 from the response code acquisition unit 570 .
- the comparison unit 582 compares the hash value 504 as the verification code with the hash value 506 included in the response code 516 .
- the comparison section 582 outputs information indicating the comparison result to the determination section 584 .
- the determination unit 584 acquires information indicating the comparison result of the comparison unit 582.
- the determination unit 584 determines whether or not the mobile battery 20 is a legitimate mobile battery 20 based on the comparison result of the comparison unit 582 .
- the determination unit 584 may determine whether or not to replace the mobile battery 20 based on the determination result as to whether the mobile battery 20 is a legitimate mobile battery 20 or not. The determining unit 584 may determine whether or not to replace the mobile battery 20 based on the result of determining whether the mobile battery 20 is the authorized mobile battery 20 and the whitelist 524 .
- the determination unit 584 may determine whether the mobile battery 20 should be charged and/or discharged based on the determination result as to whether the mobile battery 20 is a legitimate mobile battery 20 or not. As a result, power input/output between the slot 124 and the mobile battery 20 can be prohibited or suppressed. The determination unit 584 may determine whether the mobile battery 20 should be charged and/or discharged based on the result of determination as to whether the mobile battery 20 is the authorized mobile battery 20 and the whitelist 524 .
- the storage unit 520 may be an example of a first storage device.
- the challenge code generator 560 may be an example of a third information generator.
- the challenge code transmitter 562 may be an example of a third information transmitter.
- the response code acquisition unit 570 may be an example of a response reception unit.
- the comparing section 582 may be an example of a comparing section.
- the authentication support unit 232 includes a request reception unit 620, an ID transmission unit 630, a challenge code acquisition unit 640, a challenge code decryption unit 650, and a response code generation unit 660. , and a response code transmission unit 670 .
- the request receiving unit 620 receives various requests from the battery station 120. Examples of the request include an ID transmission request, an authentication response request, and the like.
- the ID transmitting section 630 transmits the battery ID of the mobile battery 20 to the battery station 120 when the request receiving section 620 receives an ID transmission request from the battery station 120 .
- the challenge code acquisition section 640 acquires the challenge code 512 transmitted by the battery station 120 when the request reception section 620 receives an authentication response request from the battery station 120 .
- the challenge code decryption unit 650 decrypts the encrypted authentication code 502 included in the challenge code 512 using the authentication private key 72 to generate the authentication code 502 .
- challenge code decryption section 650 outputs decrypted authentication code 502 to response code generation section 660 .
- the response code generation unit 660 generates the response code 516 based on the decrypted authentication code 502.
- Response code generator 660 may generate response code 516 in any format according to the rules described above.
- the response code generation unit 660 performs arithmetic processing using the hash function 662 to generate the hash value 506 of the restored authentication code 502 .
- the response code generator 660 generates a response code 516 containing the hash value 506 of the restored authentication code 502 .
- the response code transmission section 670 transmits the response code 516 to the battery station 120 .
- the challenge code acquisition unit 640 may be an example of a third information acquisition unit.
- the challenge code decoding section 650 may be an example of a fifth information generating section.
- the response code transmission section 670 may be an example of a response section.
- the battery authentication unit 378 An example of information processing in the battery station 120 has been described, taking as an example a case where it is determined not to mount the mobile battery 20 to the slot 124 or not to charge or discharge the mobile battery 20 .
- information processing when it is determined that the mobile battery 20 is not usable by a plurality of users 40 is not limited to this embodiment.
- the battery authentication unit 378 when it is determined that the mobile battery 20 is not usable by a plurality of users 40, the battery authentication unit 378 performs the process of attaching the mobile battery 20 to the slot 124 according to a predetermined first rule.
- the charging process or the discharging process of the mobile battery 20 may be executed according to a predetermined second rule.
- the first rule is that the user 40 other than the user 40 who has installed the mobile battery 20 in the slot 124 is not allowed to remove the mobile battery 20, although the installation of the mobile battery 20 in the slot 124 is allowed.
- Rules are exemplified.
- the charging or discharging of the mobile battery 20 is permitted until the number of attachments of the mobile battery 20 to the slot 124 reaches a predetermined number or frequency.
- a rule is exemplified that charging or discharging of the mobile battery 20 is not permitted when the number of times exceeds the above number or frequency.
- the battery station 120 acquires the authentication public key 74 of the mobile battery 20 from the key issuer 50, the communication terminal 52, or the management server 140 as an example of authentication processing of the mobile battery 20. was explained.
- the method of obtaining the authentication public key 74 in the battery station 120 is not limited to this embodiment. In another embodiment, the battery station 120 may obtain the authentication public key 74 from the mobile battery 20 .
- the verification code generated from the authentication code is compared with the response code to perform the comparison processing of the authentication code and the response code.
- An example was described.
- the comparison processing of the authentication code and the response code is not limited to this embodiment.
- the authorization code and response code may be compared by various methods described in connection with FIG.
- FIG. 7 schematically shows an example of the internal configuration of the on-board equipment 330.
- FIG. 7 schematically shows an example of the internal configuration of the on-board equipment 330.
- FIG. 7 for the purpose of simplifying the explanation, details of the on-board device 330 will be explained by taking as an example the case where the slot 124 does not have the function of discharging the mobile battery 20 .
- the slot 124 can be configured to charge and discharge the mobile battery 20 .
- onboard equipment 330 includes one or more slots 124, breakers 710, power lines 712, AC/DC power supplies 714, splitters 716, power lines 718, main control board 730, and communication hub 732. , a communication line 734 , a temperature control section 742 , a buzzer 744 , a sensing section 746 and a maintenance door 748 .
- the slot 124 includes an AC/DC charger 760, a power connector 762, a slot control board 770, a communications connector 772, a driver 774, a shutter 776, a lock 778, and a temperature controller. 782 , a state display section 784 and a sense section 786 .
- the breaker 710 receives power from the power grid 12 .
- Breaker 710 supplies power received from power grid 12 via power line 712 to AC/DC chargers 760 in each of one or more slots 124 .
- Breaker 710 supplies power received from power grid 12 to AC/DC power supply 714 .
- Examples of the breaker 710 include a circuit breaker and a residual current circuit breaker with overcurrent protection.
- the AC/DC power supply 714 functions as a power supply that supplies control power.
- AC/DC power supply 714 converts AC power received from breaker 710 to DC power having an appropriate voltage.
- AC/DC power supply 714 provides converted DC power to each slot control board 770 of one or more slots 124 via distributor 716 and power line 718 .
- AC/DC power supply 714 also supplies converted DC power to main control board 730 .
- the main control board 730 controls the operation of each part of the storage unit 122.
- the main control board 730 is connected to the CPU board 820 via the communication line 310 .
- Main control board 730 may function as controller 336 .
- Main control board 730 may function as controller 336 in cooperation with slot control board 770 .
- the main control board 730 sends and receives information to and from slot control boards 770 of each of the one or more slots 124 via communication hubs 732 and communication lines 734 .
- Main control board 730 may control the operation of temperature control unit 742 , buzzer 744 , sense unit 746 and maintenance door 748 .
- the main control board 730 may acquire information indicating the states of the temperature control section 742 , the buzzer 744 , the sensing section 746 and the maintenance door 748 .
- the main control board 730 acquires information indicating the measurement result of the sensing section 746 from the sensing section 746 .
- the main control board 730 also acquires information indicating the open/closed state of the maintenance door 748 from the maintenance door 748 .
- the temperature adjustment section 742 adjusts the temperature inside the housing 320 of the storage unit 122 .
- Examples of the temperature control unit 742 include a fan and a water-cooled cooler.
- the buzzer 744 notifies the user 40 of the state of the storage unit 122 .
- Buzzer 744 may output a warning sound.
- the buzzer 744 may output a warning designated by the main control board 730 among a plurality of warning sounds with different warning patterns.
- the sensing section 746 acquires information indicating the state of the storage unit 122 .
- Sense portion 746 may include multiple types of sensors. A temperature sensor, a vibration sensor, an electric leakage sensor, and the like are exemplified as sensors included in the sensing unit 746 . Sense portion 746 may form at least a portion of sense portion 332 .
- the maintenance door 748 is arranged in an opening (not shown) of the housing 320 and used for maintenance and management of the battery station 120 by maintenance personnel of the battery station 120 .
- the maintenance door 748 may output information indicating its open/closed state to the main control board 730 . For example, when the maintenance door 748 is opened, the maintenance door 748 outputs a signal indicating that the maintenance door 748 has been opened.
- AC/DC charger 760 charges mobile battery 20 electrically connected to power connector 762 .
- AC/DC charger 760 adjusts at least one of voltage and current applied to mobile battery 20 electrically connected to power connector 762 according to instructions from slot control board 770 .
- the power connector 762 includes electrical terminals that are electrically connected to the power connector 212 of the mobile battery 20 when the mobile battery 20 is accommodated in the slot 124 .
- power connector 762 is configured to be movable by drive portion 774 .
- power connector 762 may be secured within slot 124 .
- the slot control board 770 controls the operation of each section of the slot 124 .
- Slot control board 770 may control the operation of slot 124 according to instructions from main control board 730 .
- Slot control board 770 may function as controller 336 .
- Slot control board 770 may function as controller 336 in cooperation with main control board 730 .
- the slot control board 770 may transmit and receive information to and from the controller 230 of the mobile battery 20 stored in the slot 124 via the communication connector 772 .
- the slot control board 770 can read information stored in the storage unit 250 of the mobile battery 20 .
- the slot control board 770 can also write information to the storage section 250 of the mobile battery 20 .
- the communication connector 772 includes a communication terminal communicably connected to the communication connector 214 of the mobile battery 20 when the mobile battery 20 is accommodated in the slot 124 .
- the communication connector 772 is configured to be movable by the driving section 774 .
- communication connector 772 may be secured within slot 124 .
- the driving section 774 drives various movable members arranged in the slot 124 .
- the drive section 774 may drive the movable member according to instructions from the slot control board 770 .
- Examples of movable members include the power connector 762, the communication connector 772, the shutter 776, the locking portion 778, the withdrawal prevention member arranged in the slot 124, the mechanism for restraining the mobile battery 20 arranged in the slot 124, and the like. .
- the shutter 776 is arranged at the opening (not shown) of the slot 124 and controls whether or not the user 40 can use the mobile battery 20 .
- Shutter 776 may control opening and closing according to instructions from slot control board 770 .
- the user 40 can insert the mobile battery 20 into the slot 124 or remove the mobile battery 20 from the slot 124 .
- the shutter 776 is closed, the mobile battery 20 cannot be inserted into the slot 124 or removed from the slot 124 .
- the lock portion 778 switches between the locked state and the unlocked state of the shutter 776 .
- the lock section 778 may switch between the locked state and the unlocked state of the shutter 776 according to instructions from the slot control board 770 .
- the temperature control section 782 controls the temperature inside the slot 124 .
- the temperature adjuster 782 may adjust the temperature inside the slot 124 according to instructions from the slot control board 770 .
- Examples of the temperature control unit 782 include a fan, a water-cooled cooler, and the like.
- the state display unit 784 notifies the user 40 of the state of the slot 124 .
- the state of the slot 124 include the presence or absence of the mobile battery 20 and the presence or absence of an abnormality.
- the state display unit 784 notifies the user 40 of the state of the slot 124 by, for example, a lighting pattern, a blinking pattern, or a display pattern designated by the slot control board 770 among a plurality of lighting patterns, blinking patterns, or display patterns. good.
- Examples of the status display unit 784 include an LED and a display.
- the sense unit 786 acquires information indicating the state of the slot 124 .
- the sense portion 786 may include multiple types of sensors. A temperature sensor, a voltage sensor, a current sensor, and the like are exemplified as sensors included in the sense unit 786 .
- the sensing unit 786 may include (i) a temperature sensor that measures the temperature inside the slot 124, the mobile battery 20, or near the mobile battery 20, (ii) a voltage sensor that measures the voltage at the power connector 762, and (iii) ) includes at least one current sensor that measures the current flowing through the power connector 762 .
- Sense portion 786 may form at least part of sense portion 332 .
- the main control board 730 may be an example of a verification device.
- Power connector 762 may be an example of a first terminal.
- Slot control board 770 may be an example of a verification device.
- FIG. 8 schematically shows an example of the internal configuration of the on-board equipment 370.
- the on-board device 370 includes an AC/DC power supply 814, a service outlet 816, a CPU board 820, an Ethernet (registered trademark) communication interface 830, an NFC reader 842, and a camera 844. , a touch panel 852 , a display 854 , and a speaker 856 .
- the AC/DC power supply 814 and the AC/DC power supply 714 function as power supplies that supply power for control.
- AC/DC power supply 814 receives power from power grid 12 , eg, via uninterruptible power supply 312 .
- AC/DC power supply 814 converts AC power received from power grid 12 to DC power having a suitable voltage.
- AC/DC power supply 814 supplies converted DC power to CPU board 820 .
- the service outlet 816 supplies power to equipment external to the communication unit 126 .
- a router 314 is exemplified as an external device.
- the service outlet 816 receives power from the power grid 12 via the uninterruptible power supply 312, for example.
- the service outlet 816 may control power supply to external devices according to instructions from the CPU board 820 .
- Service outlet 816 may send information to CPU board 820 regarding power supplied to external equipment.
- the CPU board 820 controls the operation of each part of the communication unit 126.
- CPU board 820 is connected to main control board 730 via communication line 310 .
- the CPU board 820 may function as the controller 376 .
- Ethernet interface 830 is connected to the communication network 14 via the router 314.
- Ethernet interface 830 may function as communication interface 128 .
- the NFC reader 842 transmits and receives information to and from the communication terminal 42 via short-range wireless communication.
- NFC reader 842 may function as communication interface 128 .
- NFC reader 842 may function as user identifier 374 .
- the camera 844 images the user 40 .
- Camera 844 may function as user interface 372 .
- Camera 844 may function as user identifier 374 .
- the touch panel 852 receives touch input from the user 40 .
- Touch panel 852 may function as user interface 372 .
- display 854 presents information to user 40 by outputting images.
- Display 854 may function as user interface 372 .
- speaker 856 presents information to user 40 by outputting audio.
- Speaker 856 may function as user interface 372 .
- the CPU board 820 may be an example of a confirmation device.
- Touch panel 852 may be an example of the input device described above.
- FIG. 9 schematically shows an example of the internal configuration of mobile battery 920 .
- FIG. 10 schematically shows an example of a procedure for obtaining the public key 74 for authentication.
- FIG. 11 schematically shows an example of a procedure for obtaining the public key 74 for authentication.
- the battery station 120 stores the authentication public keys 74 of one or more mobile batteries 20 from the key issuer 50, the communication terminal 52, or the management server 140.
- the details of the battery management system 100 have been described by taking the case of obtaining the database that has been stored as an example.
- the battery station 120 obtains the authentication public key 74 of the mobile battery 20 from the mobile battery 20 attached to the slot 124. It differs from the embodiment described in connection with FIGS. 1 to 6 in that respect.
- the embodiments described in connection with Figures 9, 10 and 11 have similar configurations to the embodiments described in connection with Figures 1-6. good.
- the storage unit 250 includes a battery ID storage unit 252, an authentication private key storage unit 254, an authentication public key storage unit 955, and a signature secret key storage unit 252. It differs from the mobile battery 20 in that it includes a key storage unit 956 and a signature verification public key storage unit 957 .
- Mobile battery 920 may have the same configuration as mobile battery 20 with respect to features other than the differences described above. Note that in the embodiment described with reference to FIG. 10 , the mobile battery 920 does not have to include the signature verification public key storage unit 957 .
- the authentication public key storage unit 955 stores the authentication public key 74.
- the signature private key storage unit 956 stores the signature private key 82 used by the mobile battery 20 to apply an electronic signature.
- the signature verification public key storage unit 957 stores the signature verification public key 84 used by the battery station 120 to verify the authenticity of the electronic signature of the mobile battery 20 .
- the signature verification public key 84 is sometimes called an electronic certificate.
- FIG. 10 schematically shows an example of the procedure for obtaining the public key 74 for authentication.
- the battery authentication unit 378 has already acquired the signature verification public key 84 of the mobile battery 20 from the key issuer 50, the communication terminal 52, or the management server 140, for example.
- storage unit 520 stores a database that stores battery IDs of one or more mobile batteries 20 and signature verification public keys 84 of one or more mobile batteries 20 in correspondence.
- the signature verification public keys 84 of the plurality of mobile batteries 20 may be the same, or the signature verification public keys 84 of all the mobile batteries 20 may be the same.
- the authentication support unit 232 further includes a public key transmission unit 1012.
- Battery authentication unit 378 further includes public key acquisition unit 1014 .
- the public key acquisition unit 1014 of the battery station 120 detects that the mobile battery 20 is attached to the slot 124.
- public key acquisition unit 1014 detects that mobile battery 20 is attached to slot 124
- public key acquisition unit 1014 transmits an activation signal to mobile battery 20 .
- public key transmission section 1012 may transmit an activation confirmation signal indicating that authentication support section 232 has been activated to battery station 120 .
- the public key acquisition unit 1014 sends a signal requesting the mobile battery 20 to transmit the battery ID and the authentication public key 74 (sometimes referred to as a public key transmission request). to send.
- the public key transmission unit 1012 encrypts the authentication public key 74 using the signature private key 82.
- the public key transmission unit 1012 uses the battery ID stored in the battery ID storage unit 252, the unencrypted authentication public key 74, and the authentication public key encrypted with the signature private key 82. and the key 74 to the battery station 120 .
- the public key acquisition unit 1014 receives the battery ID, the unencrypted authentication public key 74, and the authentication public key 74 encrypted with the signature private key 82 from the public key transmission unit 1012.
- the public key acquisition unit 1014 refers to a database that stores the battery IDs of one or more mobile batteries 20 and the signature verification public keys 84 of one or more mobile batteries 20 in association with each other, and obtains the public key
- the signature verification public key 84 corresponding to the battery ID transmitted by the transmission unit 1012 is extracted.
- the public key acquisition unit 1014 uses the extracted signature verification public key 84 to decrypt the authentication public key 74 encrypted with the signature private key 82 . If the signature verification public keys 84 of all the mobile batteries 20 are the same, the step in which the public key acquisition unit 1014 refers to the database and extracts the signature verification public keys 84 may be omitted.
- the public key acquisition unit 1014 compares the unencrypted authentication public key 74 transmitted by the public key transmission unit 1012 with the authentication public key 74 decrypted in S1040. If the unencrypted authentication public key 74 transmitted by the public key transmission unit 1012 matches the authentication public key 74 decrypted in S1040, in S1044 the public key acquisition unit 1014 sends the public key transmission unit
- the authentication public key 74 sent by 1012 is stored in the storage unit 520 or the public key database 522 as the authentic authentication public key 74 of the mobile battery 20 .
- the authentication public key 74 may be an example of the eleventh information.
- the signature private key 82 may be an example of the twelfth information.
- the authentication public key 74 encrypted using the signature private key 82 may be an example of the thirteenth information.
- the signature verification public key 84 may be an example of the fourteenth information.
- the authentication public key 74 decrypted using the signature verification public key 84 may be an example of the fifteenth information.
- FIG. 11 schematically shows an example of the procedure for obtaining the public key 74 for authentication.
- S1132 is performed instead of S1032
- S1134 is performed. It is different from the acquisition procedure of the authentication public key 74 described above.
- the procedure for acquiring the authentication public key 74 described with reference to FIG. 11 has the same configuration as the procedure for acquiring the authentication public key 74 described with reference to FIG. may have
- the public key transmission unit 1012 encrypts the battery ID stored in the battery ID storage unit 252, the unencrypted authentication public key 74, and the signature private key 82.
- the authentication public key 74 and the signature verification public key 84 thus obtained are transmitted to the battery station 120 .
- the public key acquisition unit 1014 requests confirmation of validity or authenticity of the signature verification public key 84 from a reliable certificate authority (not shown). Then, when the validity or authenticity of the signature verification public key 84 is confirmed, the public key acquisition section 1014 executes S1040, S1042 and S1044.
- FIG. 12 illustrates an example computer 3000 in which aspects of the present invention may be embodied in whole or in part.
- At least part of battery management system 100 may be implemented by computer 3000 .
- the control unit 230 or part thereof is implemented by the computer 3000 .
- controller 336 or part thereof may be implemented by computer 3000 .
- controller 376 or part thereof may be implemented by computer 3000 .
- Programs installed on the computer 3000 cause the computer 3000 to function as one or more "parts" of operations or one or more "parts” of an apparatus according to embodiments of the invention, or to and/or cause the computer 3000 to perform processes or steps of processes according to embodiments of the present invention.
- Such programs may be executed by CPU 3012 to cause computer 3000 to perform certain operations associated with some or all of the blocks in the flowcharts and block diagrams described herein.
- a computer 3000 includes a CPU 3012, a RAM 3014, a GPU 3016, and a display device 3018, which are interconnected by a host controller 3010.
- Computer 3000 also includes input/output units such as communication interface 3022 , hard disk drive 3024 , DVD-ROM drive 3026 and IC card drive, which are connected to host controller 3010 via input/output controller 3020 .
- the computer also includes legacy input/output units such as ROM 3030 and keyboard 3042 , which are connected to input/output controller 3020 via input/output chip 3040 .
- the CPU 3012 operates according to programs stored in the ROM 3030 and RAM 3014, thereby controlling each unit.
- the GPU 3016 retrieves image data generated by the CPU 3012 into itself, such as a frame buffer provided in RAM 3014 , and causes the image data to be displayed on the display device 3018 .
- a communication interface 3022 communicates with other electronic devices via a network.
- Hard disk drive 3024 stores programs and data used by CPU 3012 within computer 3000 .
- DVD-ROM drive 3026 reads programs or data from DVD-ROM 3001 and provides programs or data to hard disk drive 3024 via RAM 3014 .
- the IC card drive reads programs and data from IC cards and/or writes programs and data to IC cards.
- ROM 3030 stores therein programs such as a boot program executed by computer 3000 upon activation and/or programs dependent on the hardware of computer 3000 .
- Input/output chip 3040 may also connect various input/output units to input/output controller 3020 via parallel ports, serial ports, keyboard ports, mouse ports, and the like.
- a program is provided by a computer-readable storage medium such as a DVD-ROM 3001 or an IC card.
- the program is read from a computer-readable storage medium, installed in hard disk drive 3024 , RAM 3014 , or ROM 3030 , which are also examples of computer-readable storage media, and executed by CPU 3012 .
- the information processing described within these programs is read by computer 3000 to provide coordination between the programs and the various types of hardware resources described above.
- An apparatus or method may be configured by implementing information operations or processing according to the use of computer 3000 .
- the CPU 3012 executes a communication program loaded into the RAM 3014 and sends communication processing to the communication interface 3022 based on the processing described in the communication program. you can command.
- the communication interface 3022 reads the transmission data stored in the transmission buffer area provided in the recording medium such as the RAM 3014, the hard disk drive 3024, the DVD-ROM 3001, or the IC card. Data is transmitted to the network, or received data received from the network is written in a receive buffer area or the like provided on the recording medium.
- the CPU 3012 causes the RAM 3014 to read all or necessary portions of files or databases stored in external recording media such as a hard disk drive 3024, a DVD-ROM drive 3026 (DVD-ROM 3001), an IC card, etc. Various types of processing may be performed on the data in RAM 3014 . CPU 3012 may then write back the processed data to an external recording medium.
- external recording media such as a hard disk drive 3024, a DVD-ROM drive 3026 (DVD-ROM 3001), an IC card, etc.
- Various types of processing may be performed on the data in RAM 3014 .
- CPU 3012 may then write back the processed data to an external recording medium.
- CPU 3012 performs various types of operations on data read from RAM 3014, information processing, conditional decisions, conditional branching, unconditional branching, and information retrieval as specified throughout this disclosure and by instruction sequences of programs. Various types of processing may be performed, including /replace, etc., and the results written back to RAM 3014 . Also, the CPU 3012 may search for information in a file in a recording medium, a database, or the like.
- the CPU 3012 selects the first attribute from among the plurality of entries. search for an entry that matches the specified condition of the attribute value of the attribute, read the attribute value of the second attribute stored in the entry, and thereby determine the first attribute that satisfies the predetermined condition An attribute value of the associated second attribute may be obtained.
- the programs or software modules described above may be stored in a computer-readable storage medium on or near the computer 3000 .
- a recording medium such as a hard disk or RAM provided in a server system connected to a dedicated communication network or the Internet can be used as a computer-readable storage medium, whereby the above program can be transferred via a network. provided to the computer 3000;
Landscapes
- Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Transportation (AREA)
- Mechanical Engineering (AREA)
- Computer Security & Cryptography (AREA)
- Chemical & Material Sciences (AREA)
- Manufacturing & Machinery (AREA)
- General Chemical & Material Sciences (AREA)
- Electrochemistry (AREA)
- Chemical Kinetics & Catalysis (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Charge And Discharge Circuits For Batteries Or The Like (AREA)
Abstract
Description
[先行技術文献]
[特許文献]
[特許文献1] 国際公開第2019/181661号
[特許文献2] 国際公開第2020/059833号
図1は、バッテリ管理システム100のシステム構成の一例を概略的に示す。本実施形態において、バッテリ管理システム100は、1又は複数の(単に、1以上と称される場合がある。)バッテリステーション120と、管理サーバ140とを備える。本実施形態において、バッテリステーション120は、1以上の保管ユニット122と、通信ユニット126とを有する。本実施形態において、保管ユニット122は、1以上のスロット124を含む。本実施形態において、通信ユニット126は、通信インターフェース128を含む。
本実施形態において、バッテリステーション120は、施錠可能な建屋内又は敷地内に配されてもよく、無施錠の状態で屋外に配されてもよい。ユーザ40の利便性を考慮すると、バッテリステーション120は、多数のユーザ40が自由に利用可能な環境に配されることが好ましい。一方、バッテリステーション120は多数のユーザ40が自由に利用可能な環境に配されると、バッテリ管理システム100の管理下にないモバイルバッテリ20(非正規のモバイルバッテリ20と称される場合がある。)が、バッテリステーション120のスロット124に挿入される可能性がある。
本実施形態において、通信ネットワーク14は、情報を伝達する。通信ネットワーク14は、有線通信の伝送路であってもよく、無線通信の伝送路であってもよく、無線通信の伝送路及び有線通信の伝送路の組み合わせであってもよい。通信ネットワーク14は、無線パケット通信網、インターネット、P2Pネットワーク、専用回線、VPN、電力線通信回線などを含んでもよい。
本実施形態においては、バッテリ管理システム100が、モバイルバッテリ20のシェアリングサービスを提供する場合を例として、バッテリ管理システム100の詳細が説明された。しかしながら、バッテリ管理システム100により提供されるサービスは、本実施形態に限定されない。他の実施形態において、バッテリ管理システム100は、モバイルバッテリ20のユーザ40に、モバイルバッテリ20の充電サービスを提供してよい。
本実施形態においては、図4のS450において、スロット124に装着されたモバイルバッテリ20が、複数のユーザ40により利用可能なモバイルバッテリ20ではないと判定された場合、バッテリ認証部378は、モバイルバッテリ20のスロット124への装着を行わないこと、又は、モバイルバッテリ20の充電若しくは放電を行わないことを決定する場合を例として、バッテリステーション120における情報処理の一例が説明された。しかしながら、複数のユーザ40により利用可能なモバイルバッテリ20ではないと判定された場合の情報処理は、本実施形態に限定されない。他の実施形態において、複数のユーザ40により利用可能なモバイルバッテリ20ではないと判定された場合、バッテリ認証部378は、予め定められた第1規則に従ってモバイルバッテリ20のスロット124への装着処理を実行してもよく、予め定められた第2規則に従ってモバイルバッテリ20の充電処理又は放電処理を実行してもよい。
Claims (20)
- 確認装置が、被確認装置が正規装置であるか否かを確認するための確認方法であって、
第1情報を第2情報に基づいて変換し、第3情報を生成するステップと、
前記第3情報を前記被確認装置に送信するステップと、
前記被確認装置から、(i)前記被確認装置が、前記第2情報と対になる第4情報に基づいて前記第3情報を逆変換することで生成した第5情報、又は、(ii)前記被確認装置が、予め定められた第1アルゴリズムに従って前記第5情報を情報処理することで生成した第6情報を受信するステップと、
(a)前記第5情報が受信された場合に、前記第1情報と、前記第5情報とを比較する、又は、(b)前記第6情報が受信された場合に、(i)前記第1情報が前記第1アルゴリズムに従って情報処理されることで生成される第7情報と、前記第6情報とを比較する、若しくは、(ii)前記第1情報と、前記第6情報が前記第1アルゴリズムに関連する第2アルゴリズムに従って情報処理されることで生成される第8情報とを比較するステップと、
を有する、確認方法。 - 前記第1アルゴリズムは、第1関数を用いた演算処理に関するアルゴリズム、又は、第9情報を用いた暗号化処理に関するアルゴリズムであり、
前記第2アルゴリズムは、前記第1関数の逆関数である第2関数を用いた演算処理に関するアルゴリズム、又は、前記第9情報若しくは前記第9情報と対になる第10情報を用いた復号処理に関するアルゴリズムである、
請求項1に記載の確認方法。 - (i)前記確認装置の製造者若しくは譲渡者、若しくは、前記第2情報及び前記第4情報の発行者から、前記第2情報を取得する、又は、(ii)前記確認装置と無線通信可能に構成され、前記確認装置が正規であることを確認した第1外部装置から、前記第2情報を取得するステップと、
取得された前記第2情報を、前記確認装置に配された第1記憶装置に格納するステップと、
をさらに有する、
請求項1又は請求項2に記載の確認方法。 - 前記被確認装置から、第11情報と、前記第11情報が第12情報に基づいて変換されることで生成された第13情報とを受信するステップと、
前記第12情報と対になる第14情報に基づいて前記第13情報を逆変換することで生成される第15情報と、前記第11情報とを比較するステップと、
前記第11情報及び前記第15情報が一致する場合に、前記第11情報を前記第2情報として取得するステップと、
をさらに有する、
請求項1又は請求項2に記載の確認方法。 - 前記第1情報及び前記第5情報の比較結果、前記第6情報及び前記第7情報の比較結果、又は、前記第1情報及び前記第8情報の比較結果に基づいて、前記被確認装置が前記正規装置であるか否かを判定するステップ、
をさらに有する、
請求項1から請求項4までの何れか一項に記載の確認方法。 - 前記第1情報及び前記第5情報が一致しない、前記第6情報及び前記第7情報が一致しない、又は、前記第1情報及び前記第8情報が一致しない場合に、前記被確認装置が正規ではないこと、又は、前記被確認装置が非正規であることを確認するステップ、
をさらに有する、
請求項5に記載の確認方法。 - 前記第2情報は、公開鍵であり、
前記第4情報は、前記公開鍵に対応する秘密鍵である、
請求項1から請求項6までの何れか一項に記載の確認方法。 - 乱数を発生させるステップと、
前記乱数に基づいて前記第1情報を生成するステップと、
をさらに有する、
請求項1から請求項7までの何れか一項に記載の確認方法。 - 前記被確認装置は、蓄電装置を備え、
前記確認装置は、前記被確認装置の前記蓄電装置と着脱自在に構成され、前記蓄電装置を充電する充電装置を備える、
請求項1から請求項8までの何れか一項に記載の確認方法。 - 前記被確認装置が、前記確認装置から前記第3情報を受信するステップと、
前記被確認装置が、前記第3情報及び前記第4情報に基づいて前記第5情報を生成するステップと、
前記被確認装置が、生成された前記第5情報を前記確認装置に送信するステップと、
をさらに有する、
請求項1から請求項9までの何れか一項に記載の確認方法。 - (i)前記被確認装置の製造者若しくは譲渡者、若しくは、前記第2情報及び前記第4情報の発行者から、前記第4情報を取得する、又は、(ii)前記被確認装置と無線通信可能に構成され、前記被確認装置が正規であることを確認した第2外部装置から、前記第4情報を取得するステップと、
取得された前記第4情報を、前記被確認装置に配された第2記憶装置に格納するステップと、
をさらに有する、
請求項1から請求項10までの何れか一項に記載の確認方法。 - (i)前記被確認装置の製造者若しくは譲渡者、若しくは、前記第2情報及び前記第4情報の発行者から、前記第2情報及び前記第4情報を取得する、又は、(ii)前記被確認装置と無線通信可能に構成され、前記被確認装置が正規であることを確認した第2外部装置から、前記第2情報及び前記第4情報を取得するステップと、
取得された前記第2情報を前記第12情報に基づいて変換し、前記第13情報を生成するステップと、
生成された前記第13情報を前記確認装置に送信するステップと、
前記第2情報を前記第11情報として前記確認装置に送信するステップと、
をさらに有する、
請求項4に記載の確認方法。 - 前記確認装置は、前記被確認装置を被保管装置として保管する保管装置であり、
前記保管装置は、前記被保管装置が装着される装着部を有し、
前記確認方法は、
前記第1情報及び前記第5情報が一致しない、前記第6情報及び前記第7情報が一致しない、又は、前記第1情報及び前記第8情報が一致しない場合に、前記被保管装置の前記装着部への装着を行わないことを決定するステップ、
をさらに有する、
請求項1から請求項12までの何れか一項に記載の確認方法。 - 前記保管装置は、複数の前記被保管装置の少なくとも1つを保管可能に構成され、
前記確認方法は、
複数の前記被保管装置のうち、複数の利用者が共同で利用可能な前記被保管装置を識別するための共同利用識別情報を取得するステップと、
前記第1情報及び前記第5情報が一致する、前記第6情報及び前記第7情報が一致する、又は、前記第1情報及び前記第8情報が一致する場合に、前記共同利用識別情報に基づいて、前記被確認装置が、前記複数の利用者が共同で利用可能な前記被保管装置であるか否かを判定するステップと、
前記被確認装置が、前記複数の利用者が共同で利用可能な前記被保管装置でないと判定された場合に、前記被保管装置の前記装着部への装着を行わないことを決定するステップと、
をさらに有する、
請求項13に記載の確認方法。 - 前記確認装置は、第1端子を有する第1電力装置であり、
前記被確認装置は、前記第1端子と装着可能に構成される第2端子を有する第2電力装置であり、
前記確認方法は、
前記第1情報及び前記第5情報が一致しない、前記第6情報及び前記第7情報が一致しない、又は、前記第1情報及び前記第8情報が一致しない場合に、前記第1電力装置及び前記第2電力装置の間における電力の出入力を禁止又は抑制することを決定するステップ、
をさらに有する、
請求項1から請求項14までの何れか一項に記載の確認方法。 - 被確認装置が正規装置であるか否かを確認する確認装置であって、
第1情報を第2情報に基づいて変換し、第3情報を生成する第3情報生成部と、
前記第3情報を前記被確認装置に送信する第3情報送信部と、
前記被確認装置から、(i)前記被確認装置が、前記第2情報と対になる第4情報に基づいて前記第3情報を逆変換することで生成した第5情報、又は、(ii)前記被確認装置が、予め定められた第1アルゴリズムに従って前記第5情報を情報処理することで生成した第6情報を受信する応答受信部と、
(a)前記第5情報が受信された場合に、前記第1情報と、前記第5情報とを比較する、又は、(b)前記第6情報が受信された場合に、(i)前記第1情報が前記第1アルゴリズムに従って情報処理されることで生成される第7情報と、前記第6情報とを比較する、若しくは、(ii)前記第1情報と、前記第6情報が予め定められた第2アルゴリズムに従って情報処理されることで生成される第8情報とを比較する比較部と、
を備える、確認装置。 - 電気エネルギーを蓄積する蓄電部と、
前記蓄電部を充電する、又は、前記蓄電部が放電した電力を利用する第1電力装置との間で電力を送受するための電気端子と、
第4情報を格納する格納部と、
前記第1電力装置から、第3情報を取得する第3情報取得部と、
前記格納部に格納された前記第4情報に基づいて、前記第3情報取得部が取得した前記第3情報を逆変換することで第5情報を生成する第5情報生成部と、
前記第5情報、又は、前記第5情報が予め定められた第1アルゴリズムに従って情報処理されることで生成される第6情報を、前記第1電力装置に送信する応答部と、
を備える、蓄電装置。 - 請求項17に記載の蓄電装置と、
請求項16に記載の確認装置を有する電力装置と、
を備え、
前記確認装置は、前記確認装置の確認対象である被確認装置としての前記蓄電装置が正規装置であることを確認する、
確認システム。 - コンピュータに、請求項1から請求項8までの何れか一項に記載の確認方法を実行させるための、プログラム。
- 請求項19に記載のプログラムを格納したコンピュータ読み取り可能な記憶媒体。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2023502474A JPWO2022181673A1 (ja) | 2021-02-25 | 2022-02-24 | |
US18/547,699 US20240227614A9 (en) | 2021-02-25 | 2022-02-24 | Verification method, verification device, verification system, program and computer readable medium |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2021-029272 | 2021-02-25 | ||
JP2021029272 | 2021-02-25 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022181673A1 true WO2022181673A1 (ja) | 2022-09-01 |
Family
ID=83048973
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2022/007553 WO2022181673A1 (ja) | 2021-02-25 | 2022-02-24 | 確認方法、確認装置、確認システム、プログラム及びコンピュータ可読記憶媒体 |
Country Status (2)
Country | Link |
---|---|
JP (1) | JPWO2022181673A1 (ja) |
WO (1) | WO2022181673A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2024047821A1 (ja) * | 2022-08-31 | 2024-03-07 | 本田技研工業株式会社 | 確認方法、確認装置、蓄電装置、確認システム、プログラム及びコンピュータ可読記憶媒体 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000011113A (ja) * | 1998-06-18 | 2000-01-14 | Ntt Data Corp | 記録媒体の受け渡し方法、発行システム及びその構成部品 |
JP2008152446A (ja) * | 2006-12-15 | 2008-07-03 | Mitsubishi Electric Corp | プログラム修正システム及びプログラム修正装置 |
JP2016192840A (ja) * | 2015-03-31 | 2016-11-10 | ルネサスエレクトロニクス株式会社 | バッテリ制御ic、バッテリパック及びその認証方法 |
US20180203377A1 (en) * | 2017-01-19 | 2018-07-19 | Kabushiki Kaisha Toshiba | Image forming apparatus and method for acquiring information of toner container |
-
2022
- 2022-02-24 WO PCT/JP2022/007553 patent/WO2022181673A1/ja active Application Filing
- 2022-02-24 JP JP2023502474A patent/JPWO2022181673A1/ja active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000011113A (ja) * | 1998-06-18 | 2000-01-14 | Ntt Data Corp | 記録媒体の受け渡し方法、発行システム及びその構成部品 |
JP2008152446A (ja) * | 2006-12-15 | 2008-07-03 | Mitsubishi Electric Corp | プログラム修正システム及びプログラム修正装置 |
JP2016192840A (ja) * | 2015-03-31 | 2016-11-10 | ルネサスエレクトロニクス株式会社 | バッテリ制御ic、バッテリパック及びその認証方法 |
US20180203377A1 (en) * | 2017-01-19 | 2018-07-19 | Kabushiki Kaisha Toshiba | Image forming apparatus and method for acquiring information of toner container |
Non-Patent Citations (1)
Title |
---|
SHIRAHASHI, AKIHIRO: "Proxy in the network, certification and encryption technology Chapter 2. Protocol technology for security", INTAFESU -INTERFACE, CO SHUPPAN, TOKYO, JP, vol. 23, no. 9, 1 June 1997 (1997-06-01), JP , pages 109 - 115, XP009539318, ISSN: 0387-9569 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2024047821A1 (ja) * | 2022-08-31 | 2024-03-07 | 本田技研工業株式会社 | 確認方法、確認装置、蓄電装置、確認システム、プログラム及びコンピュータ可読記憶媒体 |
Also Published As
Publication number | Publication date |
---|---|
JPWO2022181673A1 (ja) | 2022-09-01 |
US20240131954A1 (en) | 2024-04-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2221742B1 (en) | Authenticated communication between security devices | |
TWI536285B (zh) | 用於公共事業應用程式之實體安全授權的控制方法,及用於公共事業網路的認證系統 | |
US9363079B2 (en) | Method of generating message authentication code and authentication device and authentication request device using the method | |
Busold et al. | Smart keys for cyber-cars: Secure smartphone-based NFC-enabled car immobilizer | |
CN113032763A (zh) | 智能边缘设备上的隐私和数据保护 | |
CN109379387B (zh) | 一种物联网设备间的安全认证和数据通信系统 | |
CN106027251B (zh) | 一种身份证读卡终端与云认证平台数据传输方法和系统 | |
CN102065148A (zh) | 基于通信网络的存储系统访问授权方法 | |
CN102855446A (zh) | 资源管理系统及相应方法 | |
WO2012027058A1 (en) | Method and device for challenge - response authentication | |
WO2009020920A1 (en) | Apparatus and method for securing digital data with a security token | |
JP2009124520A (ja) | データ送付方法および電子機器 | |
CN109041021A (zh) | 一种基于蓝牙的文件传输方法、终端设备及存储介质 | |
CN106027473B (zh) | 身份证读卡终端与云认证平台数据传输方法和系统 | |
KR20090058736A (ko) | 보안모듈 프로그램을 보호하기 위한 디지털 케이블 시스템및 그 방법 | |
WO2012108869A1 (en) | Systems, methods, and apparatus to authenticate communications modules | |
US20100310069A1 (en) | System and method for secure communication of components inside self-service automats | |
WO2022181673A1 (ja) | 確認方法、確認装置、確認システム、プログラム及びコンピュータ可読記憶媒体 | |
CN110401613A (zh) | 一种认证管理方法和相关设备 | |
JP5451445B2 (ja) | 認証システム及び認証方法 | |
TW201032606A (en) | Spectrum authorization and related communications methods and apparatus | |
WO2011120974A1 (en) | Exchanging authentication information between a cartridge and an electronic device | |
CN110807854B (zh) | 一种开锁策略配置方法及设备 | |
CN112822021A (zh) | 一种密钥管理方法和相关装置 | |
WO2024047821A1 (ja) | 確認方法、確認装置、蓄電装置、確認システム、プログラム及びコンピュータ可読記憶媒体 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22759708 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2023502474 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 18547699 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 22759708 Country of ref document: EP Kind code of ref document: A1 |