WO2023018071A1 - 배터리 데이터 관리 시스템 및 그것의 동작 방법 - Google Patents
배터리 데이터 관리 시스템 및 그것의 동작 방법 Download PDFInfo
- Publication number
- WO2023018071A1 WO2023018071A1 PCT/KR2022/011064 KR2022011064W WO2023018071A1 WO 2023018071 A1 WO2023018071 A1 WO 2023018071A1 KR 2022011064 W KR2022011064 W KR 2022011064W WO 2023018071 A1 WO2023018071 A1 WO 2023018071A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- message
- battery
- key
- terminal
- encrypted
- Prior art date
Links
- 238000013523 data management Methods 0.000 title claims abstract description 39
- 238000000034 method Methods 0.000 title claims abstract description 20
- 238000004891 communication Methods 0.000 claims description 21
- 238000011017 operating method Methods 0.000 claims description 10
- 230000005540 biological transmission Effects 0.000 claims description 2
- 238000007726 management method Methods 0.000 description 18
- 238000012545 processing Methods 0.000 description 14
- 238000010586 diagram Methods 0.000 description 12
- HBBGRARXTFLTSG-UHFFFAOYSA-N Lithium ion Chemical compound [Li+] HBBGRARXTFLTSG-UHFFFAOYSA-N 0.000 description 4
- 229910001416 lithium ion Inorganic materials 0.000 description 4
- 238000012795 verification Methods 0.000 description 4
- 238000007599 discharging Methods 0.000 description 2
- 229920000642 polymer Polymers 0.000 description 2
- OJIJEKBXJYRIBZ-UHFFFAOYSA-N cadmium nickel Chemical compound [Ni].[Cd] OJIJEKBXJYRIBZ-UHFFFAOYSA-N 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000002950 deficient Effects 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 229910052739 hydrogen Inorganic materials 0.000 description 1
- 239000001257 hydrogen Substances 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 229910052759 nickel Inorganic materials 0.000 description 1
- PXHVJJICTQNCMI-UHFFFAOYSA-N nickel Substances [Ni] PXHVJJICTQNCMI-UHFFFAOYSA-N 0.000 description 1
- -1 nickel hydrogen Chemical class 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/40—Business processes related to the transportation industry
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/20—Administration of product repair or maintenance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/06—Energy or water supply
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0877—Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/84—Vehicles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02T—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
- Y02T10/00—Road transport of goods or passengers
- Y02T10/60—Other road transportation technologies with climate change mitigation effect
- Y02T10/70—Energy storage systems for electromobility, e.g. batteries
Definitions
- Embodiments disclosed in this document relate to a battery data management system and an operating method thereof.
- Electric vehicles receive power from the outside to charge the battery, and then drive the motor with the voltage charged in the battery to obtain power.
- Electric vehicle batteries can generate heat due to chemical reactions that occur during the process of charging and discharging electricity, and this heat can damage the performance and lifespan of the battery.
- a battery management system monitors battery data including temperature, voltage, and current of the battery and manages the battery.
- One object of the embodiments disclosed in this document is to provide a battery data management system capable of directly obtaining battery data through a wired/wireless network and creating a battery data communication environment with enhanced security and an operating method thereof. .
- a terminal transmits battery-related information to an authentication server to obtain a public key and a first message, encrypt the first message with the public key, and Transmitting an encrypted first message to a battery authentication module, wherein the battery authentication module decrypts the encrypted first message using a pre-stored first key to obtain the first message, and obtains the first message based on random number information.
- the operating method of the battery data management system may further include obtaining, by the terminal, the second key by decrypting the encrypted second key using the public key.
- the operating method of the battery data management system may further include encrypting the battery data with the second key by the battery authentication module and transmitting the encrypted battery data to the terminal.
- the battery authentication module obtains the first message by decrypting the encrypted first message using a pre-stored first key, generates a second message based on random number information, and In the step of encrypting the second message with 1 key and transmitting the encrypted second message to the terminal, a message corresponding to the first message is generated, and the first message and the message corresponding to the first message are identical. It is possible to verify the stability of the terminal by determining whether or not.
- the battery authentication module obtains the first message by decrypting the encrypted first message using a pre-stored first key, generates a second message based on random number information, and In the step of encrypting the second message with 1 key and transmitting the encrypted second message to the terminal, the second message may be generated using OTP information.
- the step of generating and transmitting, by the authentication server, a third message based on the random number information to the terminal corresponds to the second message based on the random number information when the inferred battery serial number information is suitable.
- stability of the battery authentication module may be verified by generating a message corresponding to the second message and determining whether the second message and a message corresponding to the second message are identical.
- the third message in the step of generating and transmitting, by the authentication server, a third message based on the random number information to the terminal, the third message may be generated using OTP information.
- the battery authentication module obtains the third message by decrypting the encrypted third message using the first key, generates a second key that is a shared session key, and uses the second key
- the step of encrypting with the first key and transmitting the encrypted second key to the terminal generates a message corresponding to the third message based on the random number information, and generates a message corresponding to the third message and the third message.
- the third message may be verified by determining whether the messages are identical.
- the terminal transmits battery-related information to an authentication server to obtain a public key and a first message, encrypts the first message with the public key, and transmits the encrypted first message to a battery authentication module.
- the terminal may acquire the battery-related information by scanning the battery.
- the battery-related information may include vehicle information or vehicle identification number of the vehicle in which the battery is mounted.
- a battery data management system obtains a public key and a first message based on battery-related information, encrypts the first message with the public key, and obtains battery data based on the encrypted first message.
- a terminal requesting transmission of, obtaining the first message by decrypting the encrypted first message with a pre-stored first key, generating a second message based on random number information, and sending the second message with the first key
- a battery authentication module that encrypts and transmits the encrypted second message to the terminal to verify stability of the terminal, and generates a third message based on the random number information and transmits the third message to the terminal to verify stability of the battery authentication module It may include an authentication server that
- the terminal receives the encrypted second message from the battery authentication module, decrypts the second message with the public key to obtain the second message, and obtains the first message and the second message. may be transmitted to the authentication server.
- the terminal may receive the third message from the authentication server, encrypt the third message with the public key, and transmit the encrypted third message to the battery authentication module.
- the battery authentication module obtains the third message by decrypting the encrypted third message using the first key, generates a second key that is a shared session key, and uses the second key It is possible to encrypt with the first key and transmit the encrypted second key to the terminal.
- the terminal obtains the second key by decrypting the encrypted second key using the public key, and the terminal and the battery authentication module encrypt the battery data with the second key and Data communication can be performed by decoding.
- battery data can be directly obtained through a wired or wireless network, and a battery data communication environment with enhanced security can be created.
- FIG. 1 is a diagram showing the configuration of a battery pack according to an embodiment disclosed in this document.
- FIG. 2 is a block diagram showing the configuration of a battery data management system according to an embodiment disclosed in this document.
- FIG. 3 is a block diagram showing the configuration of a battery authentication module according to an embodiment disclosed in this document.
- FIG. 4 is a block diagram showing the configuration of a terminal according to an embodiment disclosed in this document.
- FIG. 5 is a block diagram showing the configuration of an authentication server according to an embodiment disclosed in this document.
- FIG. 6 is a flowchart illustrating an operating method of a battery data management system according to an embodiment disclosed in this document.
- FIGS. 7A and 7B are diagrams for generally describing a battery data management system according to an embodiment disclosed in this document.
- FIG. 1 is a diagram showing a battery pack according to an embodiment disclosed in this document.
- a battery pack 100 may include a battery module 110, a battery management device 120, a battery authentication module 130, and a relay 140.
- the battery module 110 may include a first battery cell 111 , a second battery cell 112 , a third battery cell 113 , and a fourth battery cell 114 . Although the number of battery cells is illustrated in FIG. 1 as four, it is not limited thereto, and the battery module 110 may include n (n is a natural number equal to or greater than 2) battery cells.
- the battery module 110 may supply power to a target device (not shown). To this end, the battery module 110 may be electrically connected to the target device.
- the target device may include an electrical, electronic, or mechanical device operating by receiving power from the battery pack 100 including the plurality of battery cells 111, 112, 113, and 114, for example , the target device may be an electric vehicle (EV), but is not limited thereto.
- EV electric vehicle
- the plurality of battery cells 111, 112, 113, and 114 include a lithium ion (Li-iOn) battery, a lithium ion polymer (Li-iOn polymer) battery, a nickel cadmium (Ni-Cd) battery, a nickel hydrogen (Ni-MH) It may be a battery or the like, but is not limited thereto. Meanwhile, although FIG. 1 shows a case in which one battery module 110 is provided, a plurality of battery modules 110 may be configured according to embodiments.
- the battery management system (BMS) 120 may manage and/or control the state and/or operation of the battery module 110 .
- the battery management device 120 may manage and/or control states and/or operations of the plurality of battery cells 111, 112, 113, and 114 included in the battery module 110.
- the battery management device 120 may manage charging and/or discharging of the battery module 110 .
- the battery management device 120 may monitor the battery module 110 and/or the voltage, current, temperature, etc. of each of the plurality of battery cells 111, 112, 113, and 114 included in the battery module 110. there is.
- sensors or various measuring modules may be additionally installed in the battery module 110, a charge/discharge path, or an arbitrary position such as the battery module 110.
- the battery management device 120 determines a parameter indicating the state of the battery module 110, for example, SOC (State of Charge) or SOH (State of Health), based on measured values such as monitored voltage, current, and temperature. can be calculated
- the battery management device 120 may control the operation of the relay 140 .
- the battery management device 120 may short the relay 140 to supply power to the target device.
- the battery management device 120 may short-circuit the relay 140 when a charging device is connected to the battery pack 100 .
- the battery management device 120 may calculate the cell balancing time of each of the plurality of battery cells 111 , 112 , 113 , and 114 .
- the cell balancing time may be defined as a time required for balancing battery cells.
- the battery management device 120 may calculate a cell balancing time based on a state of charge (SOC), battery capacity, and balancing efficiency of each of the plurality of battery cells 111, 112, 113, and 114.
- SOC state of charge
- the battery authentication module 130 may transmit battery data to the external device by verifying stability of an external device requesting battery data.
- the battery authentication module 130 may be electrically connected to the battery management device 120 or mounted inside the battery management device 120 to obtain battery data from the battery management device 120 .
- the battery module 110 may include a plurality of battery cells 111 , 112 , 113 , and 114 , the first battery cell 111 will be described as an example.
- the battery data management system 1000 may include a battery authentication module 130 , a terminal 200 and an authentication server 300 .
- the battery authentication module 130 may verify the stability of the terminal 200 by receiving and transmitting an encrypted message with the terminal 200 .
- Conventional data communication applies encryption to ensure confidentiality of important messages. This is because if the message received during data communication is not verified without a separate encryption/decryption process, it can pose a fatal threat to users by allowing manipulated external intrusion messages on the network.
- the terminal 200 may obtain battery data of the first battery cell 111 by communicating with the battery authentication module 130 .
- the terminal 200 requests battery data of the first battery cell 111 from the battery authentication module 130 and performs a mutual stability verification process with the battery authentication module 130 to verify the first battery cell 111 ) of the encrypted battery data can be obtained.
- the terminal 200 may be implemented in the form of a portable terminal or a stationary terminal.
- the authentication server 300 may support a mutual stability verification process of the terminal 200 and the battery authentication module 130 .
- the authentication server 300 may verify the stability of the battery authentication module 130 by verifying the message received by the terminal 200 from the battery authentication module 130 .
- the authentication server 300 may generate a message necessary for the terminal 200 to receive safety certification from the battery authentication module 130 and transmit the message to the terminal 200 .
- the battery authentication module 130 may include a first information storage unit 131 , a first communication unit 132 and a first processing unit 133 .
- the first information storage unit 131 may store battery-related information of the first battery cell. Also, the first information storage unit 131 may store authentication information required to generate a message corresponding to the message received from the terminal 200 .
- the authentication information may include at least one of serial information of the first battery cell 111 , serial information of the battery module 110 , an address of the authentication server 300 , or a random number generating algorithm.
- the first communication unit 132 may receive an encrypted message from the terminal 200 and transmit the encrypted message to the terminal 200 . Specifically, the first communication unit 132 may transmit an encrypted second message or an encrypted second key to the terminal 200 .
- the first communication unit 132 may transmit the encrypted battery data to the terminal 200 through a wired or wireless network.
- the first communication unit 132 may transmit encrypted battery data to the terminal 200 through BlueTooth, Wi-Fi, or ZigBee.
- the first processor 133 may verify the stability of the terminal 200 by generating a message corresponding to the message received from the terminal 200 .
- the first processing unit 133 may obtain the first message by decrypting the encrypted first message using a pre-stored first key.
- the first processing unit 133 can verify the stability of the terminal 200 by generating a message corresponding to the first message and determining whether the first message and the message corresponding to the first message are the same.
- the first processing unit 133 may generate a second message when the first message and the message corresponding to the first message are the same.
- the first processor 133 may generate an encrypted second message by encrypting the second message with the first key.
- the first processing unit 133 may decrypt the encrypted third message using the first key to obtain the third message.
- the first processor 133 may generate a message corresponding to the third message and verify the third message by determining whether the third message and the message corresponding to the third message are the same.
- the first processing unit 133 may encrypt battery data obtained from the battery management device 120 and transmit the encrypted battery data to the terminal 200 .
- the battery data may include, for example, voltage, current, temperature, SOC, and the like of the first battery cell 111 .
- the first processor 133 may generate a second key that is a shared session key and encrypt battery data with the second key.
- the terminal 200 may include a battery scan unit 210 , a second communication unit 220 and a second processing unit 230 .
- the battery scan unit 210 may acquire battery-related information of the first battery cell 111 by scanning the first battery cell 111 . In addition, the battery scan unit 210 may directly receive battery-related information of the first battery cell 111 from a user and store the information.
- the battery-related information is information including battery-related data, which is disclosed to the outside and can be acquired by the terminal 200 without a separate verification process.
- the battery-related information may include vehicle information or a VIN of the vehicle in which the battery is installed.
- the second communication unit 220 may transmit the encrypted first message to the battery authentication module 130 . Also, the second communication unit 220 may transmit the first message and the second message to the authentication server 300 . The second communication unit 220 may transmit the encrypted third message to the battery authentication module 130 .
- the second processing unit 230 may generate an encrypted message or decrypt an encrypted message. Specifically, the second processing unit 230 may encrypt the first message or the third message using the public key. Also, the second processing unit 230 may obtain the second message by decrypting the second message using the public key.
- the authentication server 300 may include a third information storage unit 310 , a third communication unit 320 and a third processing unit 330 .
- the third information storage unit 310 may store battery-related information of the first battery cell.
- the third information storage unit 310 may store authentication information required to generate a message corresponding to the message received from the terminal 200 .
- the authentication information may include at least one of serial information of the first battery cell 111 , serial information of the battery module 110 , an address of the authentication server 300 , or a random number generating algorithm.
- the third communication unit 320 may transmit the public key and the first message to the terminal 200. Also, the third communication unit 320 may transmit a message corresponding to the second message to the terminal 200.
- the third processor 330 may verify the stability of the battery authentication module 130 by generating a message corresponding to the message generated by the battery authentication module 130 .
- the third processing unit 330 may generate a message corresponding to the second message.
- the third processing unit 330 may verify the stability of the battery authentication module 130 by determining whether the second message and the message corresponding to the second message are the same.
- the third processing unit 330 may generate a third message when the second message and the message corresponding to the second message are the same.
- battery data can be directly acquired through a wired or wireless network, and a battery data communication environment with enhanced security can be created. .
- One object of the embodiments disclosed in this document is to directly obtain battery data through a wired/wireless network, and to provide a battery data management system and an operation method thereof.
- the battery data management system 1000 may detect an external intruder attempting to infiltrate using a manipulated message by performing communication to decrypt an encrypted message.
- the battery data management system 1000 may transmit battery cell data to the outside in real time so that a battery data manager or a battery producer can immediately determine whether a battery cell is defective.
- the battery data management system 1000 acquires and transmits battery data without transporting the battery pack 100 as a separate device after manufacturing the battery pack 100 or detaching/attaching the battery pack 100 from the vehicle. management efficiency can be improved.
- FIG. 6 is a flowchart illustrating an operating method of a battery data management system according to an embodiment disclosed in this document.
- a terminal 200 transmits battery-related information to an authentication server 300 to obtain a public key and a first message, Encrypting the first message with the public key and transmitting the encrypted first message to the battery authentication module 130 (S101), the battery authentication module 130 sends the encrypted first message using the pre-stored first key Obtaining a first message by decryption, generating a second message based on random number information, encrypting the second message with the first key, and transmitting the encrypted second message to the terminal 200 (S102), the terminal ( 200) decrypts the second message with the public key to obtain the second message, and transmits the first message and the second message to the authentication server 300 (S103), wherein the authentication server 300 is based on random number information Generating and transmitting a third message to the terminal 200 (S104), encrypting the third message with the public key by the terminal 200, and transmitting the encrypted third message to the battery authentication module 130
- the terminal 200 may obtain battery-related information by scanning the battery. Also, for example, the terminal 200 may directly receive battery-related information from a user and store the battery-related information.
- step S101 the terminal 200 may transmit the obtained battery-related information to the authentication server 300.
- the authentication server 300 may transmit the public key and the first message to the terminal 200.
- step S101 the terminal 200 may encrypt the first message with the public key and transmit the encrypted first message to the battery authentication module 130 .
- the battery authentication module 130 may obtain a first message by decrypting the encrypted first message using a pre-stored first key.
- step S102 the battery authentication module 130 may generate a second message.
- the battery authentication module 130 may encrypt the second message with the first key and transmit the encrypted second message to the terminal 200 .
- step S103 the terminal 200 may obtain the second message by decrypting the second message with the public key.
- step S103 the terminal 200 may transmit the first message and the second message to the authentication server 300.
- step S104 the authentication server 300 may generate a third message and transmit it to the terminal 200.
- step S105 the terminal 200 may encrypt the third message with the public key received from the authentication server 300 and transmit the encrypted third message to the battery authentication module 130 .
- the battery authentication module 130 may obtain a third message by decrypting the encrypted third message using the first key.
- the battery authentication module 130 may generate a second key that is a shared session key.
- the second key is a shared key that the terminal 200 and the battery authentication module 130 can use for data communication by encrypting and decrypting battery data or messages.
- step S106 the battery authentication module 130 may encrypt the second key with the first key and transmit the encrypted second key to the terminal 200 .
- FIGS. 7A and 7B are diagrams for generally describing a battery data management system according to an embodiment disclosed in this document.
- FIG. 7B may be viewed as showing operations following a series of operations (S201 to S214) of the battery data management system 1000 shown in FIG. 7A.
- the terminal 200 may obtain battery-related information by scanning the battery.
- step S202 the terminal 200 may transmit the obtained battery-related information to the authentication server 300.
- the authentication server 300 may check the battery-related information received from the terminal 200 to determine suitability of the battery-related information.
- the authentication server 300 may transmit the public key and the first message to the terminal 200.
- step S205 the terminal 200 may encrypt the first message with the public key.
- step S206 the terminal 200 may transmit the encrypted first message to the battery authentication module 130.
- the battery authentication module 130 may obtain the first message by decrypting the encrypted first message using the pre-stored first key.
- the battery authentication module 130 may generate a message corresponding to the first message. For example, in step S208, the battery authentication module 130 performs at least one of the previously stored serial information of the first battery cell 111, the serial information of the battery module 110, the address of the authentication server 300, or a random number generation algorithm. A message corresponding to the first message may be generated using any one.
- the battery authentication module 130 may verify the stability of the terminal 200 by determining whether the first message and the message corresponding to the first message are the same.
- the battery authentication module 130 may generate a second message based on random number information when the first message and the message corresponding to the first message are the same. For example, in step S210, the battery authentication module 130 may generate a second message using OTP information.
- the battery authentication module 130 may generate an encrypted second message by encrypting the second message with the first key.
- step S212 the battery authentication module 130 may transmit an encrypted second message to the terminal 200 .
- the terminal 200 may obtain the second message by decrypting the second message with the public key. For example, in step S213, the terminal 200 may determine suitability of the second message by checking basic information of the second message, such as the number of digits or the data length of the second message.
- step S214 the terminal 200 may transmit the first message and the second message to the authentication server 300 when the second message is appropriate.
- the authentication server 300 may infer battery serial number information based on the received first message, and determine whether the inferred battery serial number information is appropriate.
- the authentication server 300 may generate a message corresponding to the second message based on random number information when the inferred battery serial number information is suitable. For example, in step S216, the authentication server 300 performs at least one of the previously stored serial information of the first battery cell 111, the serial information of the battery module 110, the address of the authentication server 300, or a random number generation algorithm. A message corresponding to the second message can be created using one.
- the authentication server 300 may verify the stability of the battery authentication module 130 by determining whether the second message and the message corresponding to the second message are the same.
- the authentication server 300 may generate a third message based on random number information when the two messages and the message corresponding to the second message are the same. For example, in step S218, the authentication server 300 may generate a third message using OTP information.
- step S219 the authentication server 300 may transmit a message corresponding to the second message to the terminal 200 .
- step S220 the terminal 200 may encrypt the third message with the public key received from the authentication server 300.
- step S221 the terminal 200 may transmit an encrypted third message to the battery authentication module 130.
- the battery authentication module 130 may obtain a third message by decrypting the encrypted third message using the first key.
- the battery authentication module 130 may generate a message corresponding to the third message based on the random number information.
- the battery authentication module 130 may verify the third message by determining whether the third message and a message corresponding to the third message are the same.
- the battery authentication module 130 may generate a second key that is a shared session key when the third message and the message corresponding to the third message are the same.
- the battery authentication module 130 may generate an encrypted second key by encrypting the second key with the first key.
- step S227 the battery authentication module 130 may transmit the encrypted second key to the terminal 200.
- step S228, the terminal 200 may obtain the second key by decrypting the encrypted second key using the public key.
- the battery authentication module 130 may encrypt battery data with the second key.
- the battery authentication module 130 may transmit encrypted battery data to the terminal 200 .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Economics (AREA)
- Tourism & Hospitality (AREA)
- Health & Medical Sciences (AREA)
- Marketing (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- General Health & Medical Sciences (AREA)
- Primary Health Care (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Entrepreneurship & Innovation (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- Public Health (AREA)
- Water Supply & Treatment (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Finance (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Computing Systems (AREA)
- Charge And Discharge Circuits For Batteries Or The Like (AREA)
Abstract
Description
Claims (16)
- 단말이 배터리 연관 정보를 인증 서버에 전송하여 공개 키 및 제1 메시지를 획득하고, 상기 공개 키로 상기 제1 메시지를 암호화하고, 상기 암호화된 제1 메시지를 배터리 인증 모듈에 전송하는 단계;상기 배터리 인증 모듈이 기 저장된 제1 키를 이용하여 상기 암호화된 제1 메시지를 복호화하여 상기 제1 메시지를 획득하고, 난수 정보에 기초하는 제2 메시지를 생성하고, 상기 제1 키로 상기 제2 메시지를 암호화하여 상기 암호화된 제2 메시지를 상기 단말로 전송하는 단계;상기 단말이 상기 공개 키로 상기 제2 메시지를 복호화하여 상기 제2 메시지를 획득하고, 상기 제1 메시지 및 제2 메시지를 상기 인증 서버에 전송하는 단계;상기 인증 서버가 상기 난수 정보에 기초하는 제3 메시지를 생성하여 상기 단말로 전송하는 단계;상기 단말이 상기 공개 키로 상기 제3 메시지를 암호화하고, 상기 암호화된 제3 메시지를 상기 배터리 인증 모듈에 전송하는 단계; 및상기 배터리 인증 모듈이 상기 제1 키를 이용하여 상기 암호화된 제3 메시지를 복호화하여 상기 제3 메시지를 획득하고, 공유 세션 키인 제2 키를 생성하고, 상기 제2 키를 상기 제1 키로 암호화하여 상기 암호화된 제2 키를 상기 단말에 전송하는 단계를 포함하는 배터리 데이터 관리 시스템의 동작 방법.
- 제1 항에 있어서,상기 단말이 상기 공개 키를 이용하여 상기 암호화된 제2 키를 복호화 하여 상기 제2 키를 획득하는 단계를 더 포함하는 것을 특징으로 하는 배터리 데이터 관리 시스템의 동작 방법.
- 제2 항에 있어서,상기 배터리 인증 모듈이 상기 제2 키로 상기 배터리 데이터를 암호화 하고, 상기 암호화된 배터리 데이터를 상기 단말에 전송하는 단계를 더 포함하는 것을 특징으로 하는 배터리 데이터 관리 시스템의 동작 방법.
- 제1 항에 있어서,상기 배터리 인증 모듈이 기 저장된 제1 키를 이용하여 상기 암호화된 제1 메시지를 복호화하여 상기 제1 메시지를 획득하고, 난수 정보에 기초하는 제2 메시지를 생성하고, 상기 제1 키로 상기 제2 메시지를 암호화하여 상기 암호화된 제2 메시지를 상기 단말로 전송하는 단계는 상기 제1 메시지에 대응되는 메시지를 생성하고, 상기 제1 메시지와 상기 제1 메시지에 대응되는 메시지의 동일 여부를 판단하여 상기 단말의 안정성을 검증하는 것을 특징으로 하는 배터리 데이터 관리 시스템의 동작 방법.
- 제1 항에 있어서,상기 배터리 인증 모듈이 기 저장된 제1 키를 이용하여 상기 암호화된 제1 메시지를 복호화하여 상기 제1 메시지를 획득하고, 난수 정보에 기초하는 제2 메시지를 생성하고, 상기 제1 키로 상기 제2 메시지를 암호화하여 상기 암호화된 제2 메시지를 상기 단말로 전송하는 단계는 OTP 정보를 이용하여 상기 제2 메시지를 생성하는 것을 특징으로 하는 배터리 데이터 관리 시스템의 동작 방법
- 제1 항에 있어서,상기 인증 서버가 상기 난수 정보에 기초하는 제3 메시지를 생성하여 상기 단말로 전송하는 단계는 상기 제1 메시지에 기초하여 상기 배터리의 연번 정보를 유추하고, 상기 유추된 배터리 연번 정보가 적합한지 판단하는 것을 특징으로 하는 배터리 데이터 관리 시스템의 동작 방법.
- 제5 항에 있어서,상기 인증 서버가 상기 난수 정보에 기초하는 제3 메시지를 생성하여 상기 단말로 전송하는 단계는 상기 유추된 배터리 연번 정보가 적합한 경우 상기 난수 정보에 기초하는 상기 제2 메시지에 대응되는 메시지를 생성하고, 상기 제2 메시지와 상기 제2 메시지에 대응되는 메시지의 동일 여부를 판단하여 상기 배터리 인증 모듈의 안정성을 검증하는 것을 특징으로 하는 배터리 데이터 관리 시스템의 동작 방법.
- 제1 항에 있어서,상기 인증 서버가 상기 난수 정보에 기초하는 제3 메시지를 생성하여 상기 단말로 전송하는 단계는 OTP 정보를 이용하여 상기 제3 메시지를 생성하는 것을 특징으로 하는 배터리 데이터 관리 시스템의 동작 방법
- 제1 항에 있어서,상기 배터리 인증 모듈이 상기 제1 키를 이용하여 상기 암호화된 제3 메시지를 복호화하여 상기 제3 메시지를 획득하고, 공유 세션 키인 제2 키를 생성하고, 상기 제2 키를 상기 제1 키로 암호화하여 상기 암호화된 제2 키를 상기 단말에 전송하는 단계는 상기 난수 정보에 기초하는 상기 제3 메시지에 대응되는 메시지를 생성하고, 상기 제3 메시지와 상기 제3 메시지에 대응되는 메시지의 동일 여부를 판단하여 상기 제3 메시지를 검증하는 것을 특징으로 하는 배터리 데이터 관리 시스템의 동작 방법.
- 제1 항에 있어서,상기 단말이 배터리 연관 정보를 인증 서버에 전송하여 공개 키 및 제1 메시지를 획득하고, 상기 공개 키로 상기 제1 메시지를 암호화하고, 상기 암호화된 제1 메시지를 배터리 인증 모듈에 전송하는 단계는 상기 단말이 상기 배터리를 스캔하여 상기 배터리 연관 정보를 획득하는 것을 특징으로 하는 배터리 데이터 관리 시스템의 동작 방법.
- 제1 항에 있어서,상기 배터리 연관 정보는 상기 배터리가 탑재된 차량의 정보 또는 상기 차량의 차대 번호를 포함하는 것을 특징으로 하는 배터리 데이터 관리 시스템의 동작 방법.
- 배터리 연관 정보를 기초로 공개 키 및 제1 메시지를 획득하고, 상기 공개 키로 상기 제1 메시지를 암호화하여 상기 암호화된 제1 메시지 기초로 배터리 데이터의 전송을 요청하는 단말;상기 암호화된 제1 메시지를 기 저장된 제1 키로 복호화하여 상기 제1 메시지를 획득하고, 난수 정보에 기초하는 제2 메시지를 생성하고, 상기 제1 키로 상기 제2 메시지를 암호화하여 상기 암호화된 제2 메시지를 상기 단말로 전송하여 상기 단말의 안정성을 검증하는 배터리 인증 모듈; 및상기 난수 정보에 기초하는 제3 메시지를 생성하여 상기 단말로 전송하여 상기 배터리 인증 모듈의 안정성을 검증하는 인증 서버를 포함하는 배터리 데이터 관리 시스템.
- 제12 항에 있어서,상기 단말은 상기 배터리 인증 모듈로부터 상기 암호화된 제2 메시지를 수신하고, 상기 공개 키로 상기 제2 메시지를 복호화하여 상기 제2 메시지를 획득하고, 상기 제1 메시지 및 제2 메시지를 상기 인증 서버에 전송하는 것을 특징으로 하는 배터리 데이터 관리 시스템.
- 제13 항에 있어서,상기 단말은 상기 인증 서버로부터 상기 제3 메시지를 수신하고, 상기 공개 키로 상기 제3 메시지를 암호화하고, 상기 암호화된 제3 메시지를 상기 배터리 인증 모듈에 전송하는 것을 특징으로 하는 배터리 데이터 관리 시스템.
- 제14 항에 있어서,상기 배터리 인증 모듈은 상기 제1 키를 이용하여 상기 암호화된 제3 메시지를 복호화하여 상기 제3 메시지를 획득하고, 공유 세션 키인 제2 키를 생성하고, 상기 제2 키를 상기 제1 키로 암호화하여 상기 암호화된 제2 키를 상기 단말에 전송하는 것을 특징으로 하는 배터리 데이터 관리 시스템.
- 제15 항에 있어서,상기 단말은 상기 공개 키를 이용하여 상기 암호화된 제2 키를 복호화 하여 상기 제2 키를 획득하고, 상기 단말 및 상기 배터리 인증 모듈은 상기 제2 키로 상기 배터리 데이터를 암호화 및 복호화하여 데이터 통신을 수행하는 것을 특징으로 하는 배터리 데이터 관리 시스템의 동작 방법.
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/254,561 US20240012914A1 (en) | 2021-08-13 | 2022-07-27 | Battery Data Management System and Operating Method Thereof |
EP22856070.2A EP4228201A4 (en) | 2021-08-13 | 2022-07-27 | BATTERY DATA MANAGEMENT SYSTEM AND OPERATING METHODS THEREFOR |
JP2023519981A JP7586401B2 (ja) | 2021-08-13 | 2022-07-27 | 電池データ管理システムおよびその動作方法 |
CN202280007658.8A CN116491099A (zh) | 2021-08-13 | 2022-07-27 | 电池数据管理系统及其操作方法 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2021-0107251 | 2021-08-13 | ||
KR1020210107251A KR20230025131A (ko) | 2021-08-13 | 2021-08-13 | 배터리 데이터 관리 시스템 및 그것의 동작 방법 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2023018071A1 true WO2023018071A1 (ko) | 2023-02-16 |
Family
ID=85200247
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2022/011064 WO2023018071A1 (ko) | 2021-08-13 | 2022-07-27 | 배터리 데이터 관리 시스템 및 그것의 동작 방법 |
Country Status (5)
Country | Link |
---|---|
US (1) | US20240012914A1 (ko) |
EP (1) | EP4228201A4 (ko) |
KR (1) | KR20230025131A (ko) |
CN (1) | CN116491099A (ko) |
WO (1) | WO2023018071A1 (ko) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110099144A1 (en) * | 2009-10-24 | 2011-04-28 | Levy Paul S | Method and process of administrating recharging of electric vehicles using low cost charge stations |
US20110270480A1 (en) * | 2010-04-30 | 2011-11-03 | Sony Corporation | Battery module, electric vehicle, authentication apparatus, and discharging control method for battery module |
US20150123619A1 (en) * | 2013-11-02 | 2015-05-07 | AT&T Intellectual I, L.P. | Methods, Systems, and Products for Charging Batteries |
KR20160073087A (ko) * | 2014-12-16 | 2016-06-24 | 중소기업은행 | 배터리 관리시스템(bms) 및 인증 서버에서 배터리 인증을 위한 방법 및 장치 |
WO2021035298A1 (en) * | 2019-08-27 | 2021-03-04 | Janus Electric Pty Ltd | Electric vehicle battery network management system, method and vehicle |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5064003B2 (ja) * | 2005-12-20 | 2012-10-31 | パナソニック株式会社 | 認証システム、及び認証装置 |
JP5490473B2 (ja) * | 2009-09-15 | 2014-05-14 | ルネサスエレクトロニクス株式会社 | データ処理システム、電気自動車及びメンテナンスサービスシステム |
WO2016075865A1 (ja) * | 2014-11-12 | 2016-05-19 | パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ | 更新管理方法、更新管理装置及び制御プログラム |
CN114946101A (zh) * | 2020-01-17 | 2022-08-26 | 松下电器(美国)知识产权公司 | 电池数据管理方法、电池数据管理系统及程序 |
-
2021
- 2021-08-13 KR KR1020210107251A patent/KR20230025131A/ko unknown
-
2022
- 2022-07-27 US US18/254,561 patent/US20240012914A1/en active Pending
- 2022-07-27 WO PCT/KR2022/011064 patent/WO2023018071A1/ko active Application Filing
- 2022-07-27 CN CN202280007658.8A patent/CN116491099A/zh active Pending
- 2022-07-27 EP EP22856070.2A patent/EP4228201A4/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110099144A1 (en) * | 2009-10-24 | 2011-04-28 | Levy Paul S | Method and process of administrating recharging of electric vehicles using low cost charge stations |
US20110270480A1 (en) * | 2010-04-30 | 2011-11-03 | Sony Corporation | Battery module, electric vehicle, authentication apparatus, and discharging control method for battery module |
US20150123619A1 (en) * | 2013-11-02 | 2015-05-07 | AT&T Intellectual I, L.P. | Methods, Systems, and Products for Charging Batteries |
KR20160073087A (ko) * | 2014-12-16 | 2016-06-24 | 중소기업은행 | 배터리 관리시스템(bms) 및 인증 서버에서 배터리 인증을 위한 방법 및 장치 |
WO2021035298A1 (en) * | 2019-08-27 | 2021-03-04 | Janus Electric Pty Ltd | Electric vehicle battery network management system, method and vehicle |
Non-Patent Citations (1)
Title |
---|
See also references of EP4228201A4 * |
Also Published As
Publication number | Publication date |
---|---|
US20240012914A1 (en) | 2024-01-11 |
CN116491099A (zh) | 2023-07-25 |
JP2023543885A (ja) | 2023-10-18 |
KR20230025131A (ko) | 2023-02-21 |
EP4228201A4 (en) | 2024-05-29 |
EP4228201A1 (en) | 2023-08-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2015126035A1 (ko) | 전압 측정을 통한 배터리 랙 파손 방지 장치, 시스템 및 방법 | |
WO2015012460A1 (ko) | 배터리 스웰링 감지 장치 및 방법 | |
WO2018225921A1 (ko) | 배터리 팩 및 배터리 팩의 제어 방법 | |
WO2013147494A1 (ko) | 배터리의 절연 저항 측정 장치 및 방법 | |
WO2020166827A1 (ko) | 슬레이브 bms 점검 시스템 및 방법 | |
WO2017094983A1 (ko) | 배터리 팩 및 이러한 배터리 팩을 포함하는 자동차 | |
WO2020159300A1 (ko) | 배터리 시스템 및 슬레이브 배터리 관리 시스템 | |
WO2020022844A1 (ko) | 배터리 모듈 및 이러한 배터리 모듈을 포함하는 배터리 팩 | |
WO2022015025A1 (ko) | 배터리 밸브 및 이를 포함하는 배터리 | |
WO2022019481A1 (ko) | 통신 오류의 원인을 진단하기 위한 슬레이브 bms, 마스터 bms 및 배터리 팩 | |
WO2020085722A1 (ko) | 중대형 셀 모듈의 폭발 압력 예측 시스템 및 이를 이용한 중대형 셀 모듈의 폭발 압력 예측 방법 | |
WO2016064171A1 (ko) | 배터리의 soc 보정 시스템 및 방법 | |
WO2018186529A1 (ko) | 지상변압기를 이용한 전기차 충전 장치 및 전기차 충전 방법 | |
WO2023063625A1 (ko) | 배터리 진단 장치, 배터리 팩, 전기 차량, 및 배터리 진단 방법 | |
WO2022158948A2 (ko) | 배터리 관리 장치 및 방법 | |
WO2015002379A1 (ko) | 배터리 팩 보호 장치 및 방법 | |
WO2023018071A1 (ko) | 배터리 데이터 관리 시스템 및 그것의 동작 방법 | |
WO2020166840A1 (ko) | 배터리 셀 이상 판단 장치 및 방법 | |
WO2019172655A1 (ko) | 배터리 팩의 균열을 진단하기 위한 장치와, 그것을 포함하는 배터리 팩 및 자동차 | |
KR20210051462A (ko) | 배터리 관리 시스템 및 그 통신 방법 | |
WO2018105884A1 (en) | Control unit for a battery system | |
WO2015111987A1 (ko) | 통신 에러로부터 잘못된 제어 알고리즘의 수행을 방지하는 배터리 관리 장치 | |
WO2022059906A1 (ko) | 상호 인증 방법 및 그 방법을 제공하는 인증장치 | |
WO2021049760A1 (ko) | 통신 장치, 통신 방법 및 전기 차량 | |
JP7586401B2 (ja) | 電池データ管理システムおよびその動作方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22856070 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2023519981 Country of ref document: JP Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2022856070 Country of ref document: EP Effective date: 20230509 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 202317034966 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 202280007658.8 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 18254561 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |