WO2023245356A1 - Procédé et appareil de charge pour un dispositif électronique, et dispositif électronique et support de stockage - Google Patents

Procédé et appareil de charge pour un dispositif électronique, et dispositif électronique et support de stockage Download PDF

Info

Publication number
WO2023245356A1
WO2023245356A1 PCT/CN2022/099918 CN2022099918W WO2023245356A1 WO 2023245356 A1 WO2023245356 A1 WO 2023245356A1 CN 2022099918 W CN2022099918 W CN 2022099918W WO 2023245356 A1 WO2023245356 A1 WO 2023245356A1
Authority
WO
WIPO (PCT)
Prior art keywords
battery
authentication
encryption
charging
electronic device
Prior art date
Application number
PCT/CN2022/099918
Other languages
English (en)
Chinese (zh)
Inventor
田富涛
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to CN202280004266.6A priority Critical patent/CN117616658A/zh
Priority to PCT/CN2022/099918 priority patent/WO2023245356A1/fr
Publication of WO2023245356A1 publication Critical patent/WO2023245356A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/36Arrangements for testing, measuring or monitoring the electrical condition of accumulators or electric batteries, e.g. capacity or state of charge [SoC]
    • G01R31/385Arrangements for measuring battery or accumulator variables
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J7/00Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries

Definitions

  • the present disclosure relates to the field of electronic technology, and in particular, to a charging method for electronic equipment, a charging device for electronic equipment, electronic equipment, and a storage medium.
  • the present disclosure provides a charging method for electronic equipment, a charging device for electronic equipment, electronic equipment and a storage medium.
  • a first aspect of an embodiment of the present disclosure provides a charging method for an electronic device.
  • the battery of the electronic device has an encryption unit.
  • the charging method includes:
  • the charging mode of the electronic device is determined, wherein the charging power for charging the battery is different in different charging modes.
  • the first encryption authentication is determined to be encryption authentication of the battery based on a first encryption method
  • sending authentication information to the cloud server includes:
  • the battery is encrypted and authenticated based on a second encryption method to generate the authentication information; the second encryption method is different from the first encryption method.
  • performing encryption authentication on the battery based on the first encryption method includes:
  • Encryption authentication is performed on the battery based on a first public key and a first private key, where the first public key is stored in the authentication system of the electronic device, and the first private key is stored in the encryption unit of the battery ;
  • the encryption and authentication of the battery based on the second encryption method includes:
  • Encryption authentication is performed on the battery based on the second public key and the second private key, where the public key is stored in the cloud server and the second private key is stored in the encryption unit of the battery; The first public key is different from the second public key, and the first private key is different from the second private key.
  • performing encryption authentication on the battery based on the first public key and the first private key includes:
  • the second character code is encrypted based on the first private key to obtain a second ciphertext
  • the first character code matches the third character code, it is determined that the first encryption authentication of the battery is passed.
  • performing encryption authentication on the battery based on the second public key and the second private key includes:
  • the encryption unit encrypts the second character code based on the second private key to obtain the authentication information.
  • determining the charging mode of the electronic device according to the authentication result includes:
  • the authentication result determines that the battery is an authorized battery, it is determined to charge the electronic device in the first charging mode
  • the authentication result determines that the battery is an unauthorized battery, it is determined to charge the electronic device in a second charging mode; wherein the first charging mode corresponds to the first charging power, and the second charging mode The mode corresponds to a second charging power, the first charging power being greater than the second charging power.
  • determining to charge the electronic device in the first charging mode includes:
  • the authentication result determines that the battery is an authorized battery, charge the battery with the first charging power within a predetermined time;
  • the predetermined time After the predetermined time, re-certify whether the battery is an authorized battery, including: updating the second public key and the second private key used for encryption authentication; wherein the predetermined time is when the battery is certified as authorized by the cloud server The length of time the battery is valid after being charged in the first charging mode.
  • the charging method further includes:
  • the cloud server determines that the battery is an unauthorized battery, the first public key and the first private key are updated.
  • sending authentication information to the cloud server includes:
  • the authentication information is sent to the cloud server.
  • the charging method includes:
  • the electronic device does not establish a communication connection with the cloud server, it is determined to charge the electronic device with the third charging power.
  • determining the charging mode of the electronic device includes:
  • the authentication result fed back by the cloud server determines that the battery is an unauthorized battery, then the battery is marked as a disguised battery;
  • the charging method further includes:
  • the cloud server determines that the battery is an authorized battery and the battery is charged for the second time, it is determined whether the time to pass the verification exceeds a predetermined time;
  • a second aspect of the embodiment of the present disclosure provides a charging method for an electronic device, which is applied to a cloud server that is communicatively connected to the electronic device.
  • the charging method includes:
  • verifying whether the battery of the electronic device is an authorized battery through the authentication information, and obtaining the authentication result includes:
  • the authentication result is determined based on the matching result of the fourth character code and the first character code; the first character code is generated when the electronic device performs first encryption authentication on the battery.
  • determining the authentication result based on the matching result of the fourth character code and the first character code includes:
  • the fourth character code does not match the first character code, it is determined that the battery is an unauthorized battery.
  • a third aspect of an embodiment of the present disclosure provides a charging device for an electronic device.
  • the battery of the electronic device has an encryption unit.
  • the charging device includes:
  • a first processing unit configured to perform first encryption authentication on the battery through the encryption unit, wherein the first encryption authentication is used to authenticate whether the battery is an authorized battery;
  • a second processing unit configured to send authentication information to the cloud server when the first encryption authentication passes, wherein the authentication information is associated with the battery;
  • a third processing unit configured to receive an authentication result fed back by the cloud server, where the authentication result is determined based on the authentication information, and the authentication result is used to indicate whether the battery is an authorized battery;
  • the fourth processing unit is configured to determine the charging mode of the electronic device according to the authentication result, wherein the charging power for charging the battery is different in different charging modes.
  • the first encryption authentication is determined to be encryption authentication of the battery based on a first encryption method
  • the second processing unit is used to calculate the second processing unit.
  • the battery is encrypted and authenticated based on a second encryption method to generate the authentication information; the second encryption method is different from the first encryption method.
  • the first processing unit is used to calculate the first processing unit.
  • Encryption authentication is performed on the battery based on a first public key and a first private key, where the first public key is stored in the authentication system of the electronic device, and the first private key is stored in the encryption unit of the battery ;
  • the second processing unit is used to calculate the second processing unit.
  • Encryption authentication is performed on the battery based on the second public key and the second private key, where the public key is stored in the cloud server and the second private key is stored in the encryption unit of the battery; The first public key is different from the second public key, and the first private key is different from the second private key.
  • the first processing unit is used to calculate the first processing unit.
  • the second character code is encrypted based on the first private key to obtain a second ciphertext
  • the first character code matches the third character code, it is determined that the first encryption authentication of the battery is passed.
  • the second processing unit is used to calculate the second processing unit.
  • the encryption unit encrypts the second character code based on the second private key to obtain the authentication information.
  • the fourth processing unit is used to calculate the fourth processing unit.
  • the authentication result determines that the battery is an authorized battery, it is determined to charge the electronic device in the first charging mode
  • the authentication result determines that the battery is an unauthorized battery, it is determined to charge the electronic device in a second charging mode; wherein the first charging mode corresponds to the first charging power, and the second charging mode The mode corresponds to a second charging power, the first charging power being greater than the second charging power.
  • the fourth processing unit is used to calculate the fourth processing unit.
  • the authentication result determines that the battery is an authorized battery, charge the battery with the first charging power within a predetermined time;
  • the predetermined time After the predetermined time, re-certify whether the battery is an authorized battery, including: updating the second public key and the second private key used for encryption authentication; wherein the predetermined time is when the battery is certified as authorized by the cloud server The length of time the battery is valid after being charged in the first charging mode.
  • the fourth processing unit is used to calculate the fourth processing unit.
  • the cloud server determines that the battery is an unauthorized battery, the first public key and the first private key are updated.
  • the second processing unit is used to calculate the second processing unit.
  • the authentication information is sent to the cloud server.
  • the second processing unit is used to calculate the second processing unit.
  • the electronic device does not establish a communication connection with the cloud server, it is determined to charge the electronic device with the third charging power.
  • the fourth processing unit is used to calculate the fourth processing unit.
  • the authentication result fed back by the cloud server determines that the battery is an unauthorized battery, then the battery is marked as a disguised battery;
  • the fourth processing unit is used to calculate the fourth processing unit.
  • the cloud server determines that the battery is an authorized battery and the battery is charged for the second time, it is determined whether the time to pass the verification exceeds a predetermined time;
  • a fourth aspect of the embodiment of the present disclosure provides a charging device for electronic equipment, applied to a cloud server that is communicatively connected to the electronic equipment.
  • the charging device includes:
  • a first processing unit configured to receive authentication information transmitted by the electronic device
  • a second processing unit configured to verify whether the battery of the electronic device is an authorized battery through the authentication information, and obtain an authentication result
  • a third processing unit configured to feed back the authentication result to the electronic device.
  • the second processing unit is used to calculate the second processing unit.
  • the authentication result is determined based on the matching result of the fourth character code and the first character code; the first character code is generated when the electronic device performs first encryption authentication on the battery.
  • the second processing unit is used to calculate the second processing unit.
  • the fourth character code does not match the first character code, it is determined that the battery is an unauthorized battery.
  • a fifth aspect of the embodiment of the present disclosure provides an electronic device, including:
  • a processor and memory for storing a computer program capable of running on the processor
  • a battery the battery of the electronic device has an encryption unit; wherein the processor is used to execute the steps of the method described in the first aspect or the second aspect when running the computer program.
  • a sixth aspect of the embodiments of the present disclosure provides a computer-readable storage medium on which a computer program is stored, and the computer program is executed by a processor to perform the steps of the method described in the first aspect or the second aspect.
  • the battery of the electronic device has an encryption unit.
  • the charging method includes: performing a first encryption authentication on the battery through an encryption unit, where the first encryption authentication is used to authenticate whether the battery is an authorized battery; when the first encryption authentication is passed, sending authentication information to the cloud server, Among them, the authentication information is associated with the battery; the authentication result fed back by the cloud server is received, where the authentication result is determined based on the authentication information, and the authentication result is used to indicate whether the battery is an authorized battery; and the charging mode of the electronic device is determined according to the authentication result, wherein the different The charging power for charging the battery in charging mode is different.
  • the second encryption authentication when the first encryption authentication is passed, the second encryption authentication is performed, which includes sending authentication information to the cloud server, and determining the charging mode of the electronic device through the authentication result of the authentication information by the cloud server. Since the second encryption authentication authenticates the authentication information in the cloud server, the corresponding information used in the authentication process is not easily cracked by the calculator, thereby reducing the probability of the battery encryption being cracked.
  • Figure 1 is a flowchart 1 of a charging method for an electronic device according to an exemplary embodiment.
  • Figure 2 is a flowchart 2 of a charging method for an electronic device according to an exemplary embodiment.
  • FIG. 3 is a schematic diagram of an application scenario of a charging method for an electronic device according to an exemplary embodiment.
  • Figure 4 is a flow chart 3 of a charging method for an electronic device according to an exemplary embodiment.
  • Figure 5 is a flow chart 4 of a charging method for an electronic device according to an exemplary embodiment.
  • FIG. 6 is a schematic structural diagram of a charging device for electronic equipment according to an exemplary embodiment.
  • FIG. 7 is a schematic structural diagram 2 of a charging device for electronic equipment according to an exemplary embodiment.
  • FIG. 8 is a device block diagram of an electronic device according to an exemplary embodiment.
  • first, second, third, etc. may be used to describe various information in the embodiments of the present disclosure, the information should not be limited to these terms. These terms are only used to distinguish information of the same type from each other.
  • first information may also be called second information, and similarly, the second information may also be called first information.
  • word “if” as used herein may be interpreted as "when” or "when” or "in response to determining.”
  • FIG. 1 illustrates a charging method for an electronic device provided by an embodiment of the present disclosure.
  • the battery of the electronic device has an encryption unit.
  • Figure 1 is a flowchart 1 of a charging method for an electronic device according to an exemplary embodiment. As shown in Figure 1, the charging method includes:
  • Step 10 Perform a first encryption authentication on the battery through the encryption unit, where the first encryption authentication is used to authenticate whether the battery is an authorized battery;
  • Step 11 If the first encryption authentication passes, send authentication information to the cloud server, where the authentication information is associated with the battery;
  • Step 12 Receive the authentication result fed back by the cloud server, wherein the authentication result is determined based on the authentication information, and the authentication result is used to indicate whether the battery is an authorized battery;
  • Step 13 Determine the charging mode of the electronic device according to the authentication result, wherein the charging power for charging the battery is different in different charging modes.
  • the first encryption authentication may be performed in the authentication system of the electronic device.
  • the authentication system can be a device system. Because the device system may be an open source system.
  • performing the second encryption authentication includes sending authentication information associated with the battery to the cloud server and receiving the authentication result fed back by the cloud server.
  • the charging mode of the electronic device is determined.
  • the cloud server can authenticate the authentication information and obtain an authentication result indicating whether the battery is an authorized battery.
  • Electronic devices can include mobile phones, tablets, laptops and other electronic devices. Device systems include mobile operating systems such as Android systems.
  • the battery of the electronic device has an encryption unit.
  • the charging method includes: performing a first encryption authentication on the battery through the encryption unit, wherein the first encryption authentication is used to determine whether the battery is an authorized battery. Perform authentication; when the first encryption authentication passes, send authentication information to the cloud server, where the authentication information is associated with the battery; receive the authentication result fed back by the cloud server, where the authentication result is determined based on the authentication information, and the authentication result is used Indicates whether the battery is an authorized battery; based on the authentication result, the charging mode of the electronic device is determined.
  • the charging power for charging the battery is different in different charging modes.
  • the second encryption authentication when the first encryption authentication is passed, the second encryption authentication is performed, which includes sending authentication information to the cloud server, and determining the charging mode of the electronic device through the authentication result of the authentication information by the cloud server. Since the second encryption authentication authenticates the authentication information in the cloud server, the corresponding information used in the authentication process is not easily cracked by the calculator, thereby reducing the probability of the battery encryption being cracked.
  • the first encryption authentication is determined to be encryption authentication of the battery based on a first encryption method
  • sending authentication information to the cloud server includes:
  • the battery is encrypted and authenticated based on a second encryption method to generate the authentication information; the second encryption method is different from the first encryption method.
  • the first encryption method and the second encryption method are different, which may include: the encryption unit or encryption address of the first encryption method is different from the encryption unit or encryption address of the second encryption method, which may also include the first encryption method.
  • the public key and private key used for encryption and decryption in the second encryption method are different from the public key and private key used for encryption and decryption in the second encryption method.
  • performing encryption authentication on the battery based on the first encryption method includes:
  • Encryption authentication is performed on the battery based on a first public key and a first private key, where the first public key is stored in the authentication system of the electronic device, and the first private key is stored in the encryption unit of the battery ;
  • the encryption and authentication of the battery based on the second encryption method includes:
  • Encryption authentication is performed on the battery based on the second public key and the second private key, where the public key is stored in the cloud server and the second private key is stored in the encryption unit of the battery; The first public key is different from the second public key, and the first private key is different from the second private key.
  • the first public key and the first private key used in the first encryption method are different from the second public key and the second private key used in the second encryption method. That is, the first public key is different from the second public key, and the first private key is different from the second private key.
  • the first public key is stored in the authentication system of the electronic device, and the first private key is stored in the encryption unit of the battery.
  • the public key is stored in the cloud server, and the second private key is stored in the encryption unit of the battery.
  • performing the second encryption authentication includes performing encryption authentication on the battery based on the second public key and the second private key. Since the second encryption authentication is performed on the cloud server through the second public key, and the second public key is stored in the cloud, and only the administrator has the authority to know it, the second public key used in the authentication process is not easily cracked by the calculator, so It can reduce the probability of battery encryption being cracked.
  • performing encryption authentication on the battery based on the first public key and the first private key includes:
  • the second character code is encrypted based on the first private key to obtain a second ciphertext
  • the first character code matches the third character code, it is determined that the first encryption authentication of the battery is passed.
  • the first character code may be a string containing data and letters, and may be randomly generated by the device system.
  • the first public key and the first private key may correspond based on the first encryption rule.
  • the first public key encryption can be performed on the first character code to obtain the first ciphertext.
  • the encryption unit of the battery can decrypt the first ciphertext through the first private key decryption to obtain the second character code, where the second character code is different from the first character code.
  • the first character code matches the third character code it is determined that the first encryption authentication of the battery has passed. At this time, it means that the battery may be an authorized battery, or it may be because the first encryption authentication has been deciphered. . Therefore, a second encryption authentication is required.
  • the matching of the third character code and the first character code may include: the third character code and the first character code are both character codes that comply with the same predetermined rule, for example, both have the same order of letters and numbers. character code. If the third character code does not match the first character code, then the third character code and the first character code are character codes that do not comply with the same predetermined rule.
  • the predetermined rule is that the character code is 6, which is a string, and the order is the interval setting between letters and numbers.
  • q1w1e3, and a1s2f3 are both 6 is a string, and the order is the interval setting between letters and numbers. At this time, it can be considered that q1w1e3, and a1s2f3 conforms to the character code under the same predetermined rule.
  • performing encryption authentication on the battery based on the second public key and the second private key includes:
  • the encryption unit encrypts the second character code based on the second private key to obtain the authentication information.
  • the encryption unit when the battery is encrypted and authenticated based on the second public key and the second private key, the encryption unit can be used to authenticate the third private key based on the second private key stored in the encryption unit.
  • the two-character code is encrypted to obtain the authentication information.
  • the authentication information is transmitted to the cloud server through the authentication system.
  • determining the charging mode of the electronic device according to the authentication result includes:
  • the authentication result determines that the battery is an authorized battery, it is determined to charge the electronic device in the first charging mode
  • the authentication result determines that the battery is an unauthorized battery, it is determined to charge the electronic device in a second charging mode; wherein the first charging mode corresponds to the first charging power, and the second charging mode The mode corresponds to a second charging power, the first charging power being greater than the second charging power.
  • the authentication result when the charging mode of the electronic device is determined through the authentication result, the authentication result may indicate that the battery is an authorized battery or an unauthorized battery. If the authentication result determines that the battery is an authorized battery, it is determined to charge the electronic device in the first charging mode; if the authentication result determines that the battery is an unauthorized battery, it is determined to charge the electronic device in the second charging mode.
  • the electronic device is charged.
  • the first charging mode can be understood as a fast charging mode, and its corresponding charging power is the first charging power.
  • the second charging mode can be understood as a normal charging mode, and its corresponding charging power is the second charging power. Determining the charging mode through the certification results can help reduce the situation of rapid charging of disguised batteries (i.e. unauthorized batteries), thereby reducing the risk of battery fires caused by non-compliant charging.
  • determining to charge the electronic device in the first charging mode includes:
  • the authentication result determines that the battery is an authorized battery, charge the battery with the first charging power within a predetermined time;
  • the predetermined time After the predetermined time, re-certify whether the battery is an authorized battery, including: updating the second public key and the second private key used for encryption authentication; wherein the predetermined time is when the battery is certified as authorized by the cloud server The length of time the battery is valid after being charged in the first charging mode.
  • the predetermined time is the length of the validity period of the battery being charged in the first charging mode after being authenticated by the cloud server as an authorized battery.
  • the authentication result determines that the battery is an authorized battery
  • the battery can be charged directly with the first charging power within a predetermined time, and there is no need to perform authorization verification on the battery. But after a predetermined time, re-certify whether the battery is an authorized battery.
  • the predetermined time has elapsed, before re-certifying whether the battery is an authorized battery, the second public key and the second private key used for encryption authentication are updated to increase the effectiveness of the re-certification.
  • the charging method further includes:
  • the cloud server determines that the battery is an unauthorized battery, the first public key and the first private key are updated.
  • the cloud server determines that the battery is an unauthorized battery, it can be determined that the first encryption authentication of the battery has been cracked.
  • the first public key and the first private key need to be updated to increase the effectiveness of the first encryption authentication.
  • sending authentication information to the cloud server includes:
  • the authentication information is sent to the cloud server.
  • the electronic device since the second encryption authentication requires sending authentication information to the cloud server, the electronic device needs to determine whether the electronic device has established communication with the cloud server before performing the second encryption authentication after passing the first encryption authentication. connect. After the electronic device establishes a communication connection with the cloud server, the authentication information is sent to the cloud server.
  • the charging method includes:
  • the electronic device does not establish a communication connection with the cloud server, it is determined to charge the electronic device with the third charging power.
  • the third charging power is smaller than the first charging power, but the third charging power is larger than the second charging power.
  • the first charging power is a fast charging power of 120 watts
  • the second charging power is a slow charging power of 5 watts
  • the third charging power may be 15 watts.
  • determining the charging mode of the electronic device includes:
  • the authentication result fed back by the cloud server determines that the battery is an unauthorized battery, then the battery is marked as a disguised battery;
  • the battery when the authentication result fed back by the cloud server determines that the battery is an unauthorized battery, the battery can be marked as a disguised battery.
  • Tag information may include tag number, tag barcode, etc. Mark the disguised battery with a specific marking number or marking barcode for identification by the authentication system, and upload the marking information of the disguised battery to the cloud server for recording.
  • the charging method further includes:
  • the cloud server determines that the battery is an authorized battery and the battery is charged for the second time, it is determined whether the time to pass the verification exceeds a predetermined time;
  • the predetermined time is determined to be one month, and when the battery determined to be authorized is charged for the second time, as long as the authorization time to the second charging time is within one month, it is determined that the time to pass the verification does not exceed the predetermined time. At this time The validity of said verification pass may be delayed. That is, no authorization verification is required when charging for the second time.
  • FIG. 1 An embodiment of the present disclosure provides a charging method for an electronic device, which is applied to a cloud server that is communicatively connected to the electronic device.
  • Figure 2 is a flowchart 2 of a charging method for an electronic device according to an exemplary embodiment. As shown in Figure 2, charging methods include:
  • Step 20 Receive the authentication information transmitted by the electronic device
  • Step 21 Verify whether the battery of the electronic device is an authorized battery through the authentication information, and obtain the authentication result
  • Step 22 Feed back the authentication result to the electronic device.
  • the cloud server can authenticate the received authentication information to verify whether the battery of the electronic device is an authorized battery. For example, if the cloud server can authenticate the received authentication information successfully, then it can be verified that the battery of the electronic device is an authorized battery; or if the cloud server cannot authenticate the received authentication information, it can be verified that the battery of the electronic device is an authorized battery. Unauthorized battery. Feeding back the authentication result to the electronic device means feeding back the result of whether the battery is an authorized battery to the electronic device. In this application, since the authentication work of the authentication information is completed by the cloud server, the corresponding information used in the authentication process stored in the cloud server is not easily cracked by the calculator, thereby reducing the probability of the battery encryption being cracked.
  • verifying whether the battery of the electronic device is an authorized battery through the authentication information, and obtaining the authentication result includes:
  • the authentication result is determined based on the matching result of the fourth character code and the first character code; the first character code is generated when the electronic device performs first encryption authentication on the battery.
  • the authentication information when the cloud server authenticates the authentication information, the authentication information can be decrypted using the second public key in the cloud server to obtain the fourth character code.
  • determining the authentication result based on the matching result of the fourth character code and the first character code includes:
  • the fourth character code does not match the first character code, it is determined that the battery is an unauthorized battery.
  • the matching of the fourth character code and the first character code may include: the fourth character code and the first character code are both character codes that comply with the same predetermined rule, for example, both are character codes with the same order of letters and numbers. If the fourth character code does not match the first character code, then the fourth character code and the first character code are character codes that do not comply with the same predetermined rule.
  • the predetermined rule is that the character code is 6, which is a string, and the order is the interval setting between letters and numbers.
  • q1w1e3, and a1s2f3 are both 6 is a string, and the order is the interval setting between letters and numbers. At this time, it can be considered that q1w1e3, and a1s2f3 conforms to the character code under the same predetermined rule.
  • FIG. 3 is a schematic diagram of an application scenario of a charging method for an electronic device according to an exemplary embodiment.
  • the battery of the mobile phone contains an encryption IC chip as the encryption unit of the battery.
  • Encryption IC chips can be used to encrypt and decrypt character codes.
  • the encryption IC chip is built with a first private key corresponding to the first public key and a second private key corresponding to the second public key.
  • the first public key is located in the mobile phone authentication system, and the second public key is located in the cloud server.
  • the first encryption authentication and the encryption and decryption in the second encryption authentication based on the first private key and the second private key can be realized between the mobile phone system side and the battery IC; the battery encryption IC can transmit the second ciphertext to the cloud through the mobile phone system side
  • the second ciphertext and the matching result of the second character code and the first character code can be transmitted between the server, the cloud server and the mobile phone system; the cloud server authorizes the mobile phone to adjust the charging power of the battery based on the relevant communication protocol based on the matching result.
  • FIG. 4 is a flow chart 3 of a charging method for an electronic device according to an exemplary embodiment. As shown in Figure 4, the process includes:
  • Step 41 Start, obtain electronic equipment
  • Step 42 Initialize the electronic device system
  • Step 43 Before charging the battery, perform encryption verification to verify whether the first encryption authentication is passed. If yes, perform step 44. Otherwise, set the battery charging power to the minimum power;
  • Step 44 Verify whether the electronic device is connected to the network, if so, proceed to step 45, otherwise limit the power to 15 watts;
  • Step 45 Verify whether the second encryption authentication is passed. If yes, proceed to step 46. Otherwise, mark the battery as a disguised battery, upload the cloud verification result, and limit the charging power to the minimum power;
  • Step 46 The fast charging power limit is lifted
  • Step 47 Check whether the cloud's fast charging authorization for the electronic device system has expired. If so, re-execute step 43 for an encryption verification. Otherwise, delay and continue to authorize the fast charging permission for the electronic device system.
  • FIG. 5 is a flow chart 4 of a charging method for an electronic device according to an exemplary embodiment. As shown in Figure 5, the process includes:
  • Step 30 The equipment system generates the first character code
  • Step 31 The device system performs first public key encryption on the first character code to obtain the first ciphertext
  • Step 32 The device system transmits the first ciphertext to the encryption unit of the battery;
  • Step 33 The battery encryption unit decrypts the first ciphertext using the first private key to obtain the second character code
  • Step 34 The battery encryption unit sends the second character code to the device system
  • Step 35 The device system verifies whether the first character code and the second character code match, and if not, limits the charging power of the battery;
  • Step 36 If the first character code matches the second character code, the battery encryption unit encrypts the second character code through the second private key to obtain the second ciphertext;
  • Step 37 The encryption unit transmits the second ciphertext to the cloud server through the device system;
  • Step 38 The cloud server decrypts the second ciphertext through the second public key to obtain the third character code
  • Step 39 When the first character code matches the third character code, the cloud server can authorize the device system to charge the battery in the fast charge mode, otherwise the charging power of the battery is limited; where both the cloud server and the device system can perform the first character code. Matching work between code and third character code; battery charging power in fast charging mode is much greater than that in normal charging mode;
  • Step 40 When the number of batteries with limited charging power reaches a predetermined number, the cloud server can remotely update the first public key and the first private key;
  • Step 41 When the authorization time reaches the predetermined time, the cloud server can remotely update the second public key and the second private key;
  • Step 42 The device system can charge the battery according to the matching result of the first character code and the third character code.
  • FIG. 6 is a schematic structural diagram of a charging device for electronic equipment according to an exemplary embodiment. As shown in Figure 6, the charging device includes:
  • the first processing unit 51 is configured to perform first encryption authentication on the battery through the encryption unit, wherein the first encryption authentication is used to authenticate whether the battery is an authorized battery;
  • the second processing unit 52 is configured to send authentication information to the cloud server when the first encryption authentication passes, where the authentication information is associated with the battery;
  • the third processing unit 53 is configured to receive an authentication result fed back by the cloud server, where the authentication result is determined based on the authentication information, and the authentication result is used to indicate whether the battery is an authorized battery;
  • the fourth processing unit 54 is configured to determine the charging mode of the electronic device according to the authentication result, wherein the charging power for charging the battery is different in different charging modes.
  • the first encryption authentication may be performed in the authentication system of the electronic device.
  • the authentication system can be a device system. Because the device system may be an open source system.
  • performing the second encryption authentication includes sending authentication information associated with the battery to the cloud server and receiving the authentication result fed back by the cloud server.
  • the charging mode of the electronic device is determined.
  • the cloud server can authenticate the authentication information and obtain an authentication result indicating whether the battery is an authorized battery.
  • Electronic devices can include mobile phones, tablets, laptops and other electronic devices. Device systems include mobile operating systems such as Android systems.
  • the charging device of the electronic device in the embodiment of the present disclosure is used to: perform first encryption authentication on the battery through the encryption unit, wherein the first encryption authentication is used to authenticate whether the battery is an authorized battery; in the case where the first encryption authentication is passed Next, send authentication information to the cloud server, where the authentication information is associated with the battery; receive the authentication result fed back by the cloud server, where the authentication result is determined based on the authentication information, and the authentication result is used to indicate whether the battery is an authorized battery; according to the authentication result, Determine the charging mode of the electronic device, wherein the charging power for charging the battery is different in different charging modes.
  • the second encryption authentication when the first encryption authentication is passed, the second encryption authentication is performed, which includes sending authentication information to the cloud server, and determining the charging mode of the electronic device through the authentication result of the authentication information by the cloud server. Since the second encryption authentication authenticates the authentication information in the cloud server, the corresponding information used in the authentication process is not easily cracked by the calculator, thereby reducing the probability of the battery encryption being cracked.
  • the first encryption authentication is determined to be encryption authentication of the battery based on a first encryption method
  • the second processing unit is used to calculate the second processing unit.
  • the battery is encrypted and authenticated based on a second encryption method to generate the authentication information; the second encryption method is different from the first encryption method.
  • the first encryption method and the second encryption method are different, which may include: the encryption unit or encryption address of the first encryption method is different from the encryption unit or encryption address of the second encryption method, which may also include the first encryption method.
  • the public key and private key used for encryption and decryption in the second encryption method are different from the public key and private key used for encryption and decryption in the second encryption method.
  • the first processing unit is used to calculate the first processing unit.
  • Encryption authentication is performed on the battery based on a first public key and a first private key, where the first public key is stored in the authentication system of the electronic device, and the first private key is stored in the encryption unit of the battery ;
  • the second processing unit is used to calculate the second processing unit.
  • Encryption authentication is performed on the battery based on the second public key and the second private key, where the public key is stored in the cloud server and the second private key is stored in the encryption unit of the battery; The first public key is different from the second public key, and the first private key is different from the second private key.
  • the first public key and the first private key used in the first encryption method are different from the second public key and the second private key used in the second encryption method. That is, the first public key is different from the second public key, and the first private key is different from the second private key.
  • the first public key is stored in the authentication system of the electronic device, and the first private key is stored in the encryption unit of the battery.
  • the public key is stored in the cloud server, and the second private key is stored in the encryption unit of the battery.
  • performing the second encryption authentication includes performing encryption authentication on the battery based on the second public key and the second private key. Since the second encryption authentication is performed on the cloud server through the second public key, and the second public key is stored in the cloud, and only the administrator has the authority to know it, the second public key used in the authentication process is not easily cracked by the calculator, so It can reduce the probability of battery encryption being cracked.
  • the first processing unit is used to calculate the first processing unit.
  • the second character code is encrypted based on the first private key to obtain a second ciphertext
  • the first character code matches the third character code, it is determined that the first encryption authentication of the battery is passed.
  • the first character code may be a string containing data and letters, and may be randomly generated by the device system.
  • the first public key and the first private key may correspond based on the first encryption rule.
  • the first public key encryption can be performed on the first character code to obtain the first ciphertext.
  • the encryption unit of the battery can decrypt the first ciphertext through the first private key decryption to obtain the second character code, where the second character code is different from the first character code.
  • the first character code matches the third character code it is determined that the first encryption authentication for the battery has passed. At this time, it means that the battery may be an authorized battery, or it may be because the first encryption authentication has been deciphered. . Therefore, a second encryption authentication is required.
  • the matching of the third character code and the first character code may include: the third character code and the first character code are both character codes that comply with the same predetermined rule, for example, both have the same order of letters and numbers. character code. If the third character code does not match the first character code, then the third character code and the first character code are character codes that do not comply with the same predetermined rule.
  • the predetermined rule is that the character code is 6 as a string, and the order is the interval setting between letters and numbers.
  • q1w1e3, and a1s2f3 are both 6 as a string, and the order is the interval setting between letters and numbers. At this time, it can be considered that q1w1e3, and a1s2f3 conforms to the character code under the same predetermined rule.
  • the second processing unit is used to calculate the second processing unit.
  • the encryption unit encrypts the second character code based on the second private key to obtain the authentication information.
  • the encryption unit when the battery is encrypted and authenticated based on the second public key and the second private key, the encryption unit can be used to authenticate the third private key based on the second private key stored in the encryption unit.
  • the two-character code is encrypted to obtain the authentication information.
  • the authentication information is transmitted to the cloud server through the authentication system.
  • the fourth processing unit is used to calculate the fourth processing unit.
  • the authentication result determines that the battery is an authorized battery, it is determined to charge the electronic device in the first charging mode
  • the authentication result determines that the battery is an unauthorized battery, it is determined to charge the electronic device in a second charging mode; wherein the first charging mode corresponds to the first charging power, and the second charging mode The mode corresponds to a second charging power, the first charging power being greater than the second charging power.
  • the authentication result when the charging mode of the electronic device is determined through the authentication result, the authentication result may indicate that the battery is an authorized battery or an unauthorized battery. If the authentication result determines that the battery is an authorized battery, it is determined to charge the electronic device in the first charging mode; if the authentication result determines that the battery is an unauthorized battery, it is determined to charge the electronic device in the second charging mode.
  • the electronic device is charged.
  • the first charging mode can be understood as a fast charging mode, and its corresponding charging power is the first charging power.
  • the second charging mode can be understood as a normal charging mode, and its corresponding charging power is the second charging power. Determining the charging mode through the certification results can help reduce the situation of rapid charging of disguised batteries (i.e. unauthorized batteries), thereby reducing the risk of battery fires caused by non-compliant charging.
  • the fourth processing unit is used to calculate the fourth processing unit.
  • the authentication result determines that the battery is an authorized battery, charge the battery with the first charging power within a predetermined time;
  • the predetermined time After the predetermined time, re-certify whether the battery is an authorized battery, including: updating the second public key and the second private key used for encryption authentication; wherein the predetermined time is when the battery is certified as authorized by the cloud server The length of time the battery is valid after being charged in the first charging mode.
  • the predetermined time is the length of the validity period of the battery being charged in the first charging mode after being authenticated by the cloud server as an authorized battery.
  • the authentication result determines that the battery is an authorized battery
  • the battery can be charged directly with the first charging power within a predetermined time, and there is no need to perform authorization verification on the battery. But after a predetermined time, re-certify whether the battery is an authorized battery.
  • the predetermined time has elapsed, before re-certifying whether the battery is an authorized battery, the second public key and the second private key used for encryption authentication are updated to increase the effectiveness of the re-certification.
  • the fourth processing unit is used to calculate the fourth processing unit.
  • the cloud server determines that the battery is an unauthorized battery, the first public key and the first private key are updated.
  • the cloud server determines that the battery is an unauthorized battery, it can be determined that the first encryption authentication of the battery has been cracked.
  • the first public key and the first private key need to be updated to increase the effectiveness of the first encryption authentication.
  • the second processing unit is used to calculate the second processing unit.
  • the authentication information is sent to the cloud server.
  • the electronic device since the second encryption authentication requires sending authentication information to the cloud server, the electronic device needs to determine whether the electronic device has established communication with the cloud server before performing the second encryption authentication after passing the first encryption authentication. connect. After the electronic device establishes a communication connection with the cloud server, the authentication information is sent to the cloud server.
  • the second processing unit is used to calculate the second processing unit.
  • the electronic device does not establish a communication connection with the cloud server, it is determined to charge the electronic device with the third charging power.
  • the third charging power is smaller than the first charging power, but the third charging power is larger than the second charging power.
  • the first charging power is a fast charging power of 120 watts
  • the second charging power is a slow charging power of 5 watts
  • the third charging power may be 15 watts.
  • the fourth processing unit is used to calculate the fourth processing unit.
  • the authentication result fed back by the cloud server determines that the battery is an unauthorized battery, then the battery is marked as a disguised battery;
  • the battery when the authentication result fed back by the cloud server determines that the battery is an unauthorized battery, the battery can be marked as a disguised battery.
  • Tag information may include tag number, tag barcode, etc. Mark the disguised battery with a specific marking number or marking barcode for identification by the authentication system, and upload the marking information of the disguised battery to the cloud server for recording.
  • the fourth processing unit is used to calculate the fourth processing unit.
  • the cloud server determines that the battery is an authorized battery, and the battery is charged for the second time, it is determined whether the time to pass the verification exceeds a predetermined time;
  • the predetermined time is determined to be one month, and when the battery determined to be authorized is charged for the second time, as long as the authorization time to the second charging time is within one month, it is determined that the time to pass the verification does not exceed the predetermined time. At this time The validity of said verification pass may be delayed. That is, no authorization verification is required when charging for the second time.
  • FIG. 7 is a schematic structural diagram of a charging device for electronic equipment according to an exemplary embodiment. As shown in Figure 7, the charging device includes:
  • the first processing unit 61 is configured to receive authentication information transmitted by the electronic device
  • the second processing unit 62 is configured to use the authentication information to verify whether the battery of the electronic device is an authorized battery and obtain an authentication result;
  • the third processing unit 63 is used to feed back the authentication result to the electronic device.
  • the cloud server can authenticate the received authentication information to verify whether the battery of the electronic device is an authorized battery. For example, if the cloud server can authenticate the received authentication information successfully, then it can be verified that the battery of the electronic device is an authorized battery; or if the cloud server cannot authenticate the received authentication information, it can be verified that the battery of the electronic device is an authorized battery. Unauthorized battery. Feeding back the authentication result to the electronic device means feeding back the result of whether the battery is an authorized battery to the electronic device. In this application, since the authentication work of the authentication information is completed by the cloud server, the corresponding information used in the authentication process stored in the cloud server is not easily cracked by the calculator, thereby reducing the probability of the battery encryption being cracked.
  • the second processing unit is used to calculate the second processing unit.
  • the authentication result is determined based on the matching result of the fourth character code and the first character code; the first character code is generated when the electronic device performs first encryption authentication on the battery.
  • the authentication information when the cloud server authenticates the authentication information, the authentication information can be decrypted using the second public key in the cloud server to obtain the fourth character code.
  • determining the authentication result based on the matching result of the fourth character code and the first character code includes:
  • the fourth character code does not match the first character code, it is determined that the battery is an unauthorized battery.
  • the second processing unit is used to calculate the second processing unit.
  • the fourth character code does not match the first character code, it is determined that the battery is an unauthorized battery.
  • the matching of the fourth character code and the first character code may include: the fourth character code and the first character code are both character codes that comply with the same predetermined rule, for example, both are character codes with the same order of letters and numbers. If the fourth character code does not match the first character code, then the fourth character code and the first character code are character codes that do not comply with the same predetermined rule.
  • the predetermined rule is that the character code is 6, which is a string, and the order is the interval setting between letters and numbers.
  • q1w1e3, and a1s2f3 are both 6 is a string, and the order is the interval setting between letters and numbers. At this time, it can be considered that q1w1e3, and a1s2f3 conforms to the character code under the same predetermined rule.
  • An embodiment of the present disclosure provides an electronic device, including:
  • a processor and memory for storing a computer program capable of running on the processor
  • a battery the battery of the electronic device has an encryption unit; wherein the processor is used to execute the steps of the methods described in the above embodiments when running the computer program.
  • Embodiments of the present disclosure provide a computer-readable storage medium on which a computer program is stored, and the computer program is used by a processor to execute the steps of the methods described in the above embodiments.
  • FIG. 8 is a device block diagram of an electronic device according to an exemplary embodiment.
  • the electronic device may be a mobile phone, a computer, a digital broadcast electronic device, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, etc.
  • the electronic device may include one or more of the following components: a processing component 802, a memory 804, a power component 806, a multimedia component 808, an audio component 810, an input/output (I/O) interface 812, a sensor component 814, and communications component 816.
  • a processing component 802 a memory 804
  • a power component 806 a multimedia component 808, an audio component 810, an input/output (I/O) interface 812, a sensor component 814, and communications component 816.
  • I/O input/output
  • Processing component 802 generally controls the overall operation of the electronic device, such as operations associated with touch, phone calls, data communications, camera operations, and recording operations.
  • the processing component 802 may include one or more processors 820 to execute instructions to complete all or part of the steps of the above method.
  • processing component 802 may include one or more modules that facilitate interaction between processing component 802 and other components.
  • processing component 802 may include a multimedia module to facilitate interaction between multimedia component 808 and processing component 802.
  • Memory 804 is configured to store various types of data to support operations in the electronic device. Examples of such data include instructions for any application or method operating on the electronic device, contact data, phonebook data, messages, pictures, videos, etc.
  • Memory 804 may be implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EEPROM), Programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read-only memory
  • EEPROM erasable programmable read-only memory
  • EPROM Programmable read-only memory
  • PROM programmable read-only memory
  • ROM read-only memory
  • magnetic memory flash memory, magnetic or optical disk.
  • Power component 806 provides power to various components of the electronic device.
  • Power components 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power to electronic devices.
  • Multimedia component 808 includes a screen that provides an output interface between the electronic device and the user.
  • the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from the user.
  • the touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. A touch sensor can not only sense the boundaries of a touch or swipe action, but also detect the duration and pressure associated with the touch or swipe action.
  • multimedia component 808 includes a front-facing camera and/or a rear-facing camera.
  • the front camera and/or the rear camera can receive external multimedia data.
  • Each front-facing camera and rear-facing camera can be a fixed optical lens system or have a focal length and optical zoom capabilities.
  • Audio component 810 is configured to output and/or input audio signals.
  • audio component 810 includes a microphone (MIC) configured to receive external audio signals when the electronic device is in operating modes, such as call mode, recording mode, and voice recognition mode. The received audio signal may be further stored in memory 804 or sent via communication component 816 .
  • audio component 810 also includes a speaker for outputting audio signals.
  • the I/O interface 812 provides an interface between the processing component 802 and a peripheral interface module, which may be a keyboard, a click wheel, a button, etc. These buttons may include, but are not limited to: Home button, Volume buttons, Start button, and Lock button.
  • Sensor component 814 includes one or more sensors for providing various aspects of status assessment for the electronic device.
  • the sensor component 814 can detect the open/closed state of the electronic device, the relative positioning of components, such as the display and keypad of the electronic device, the sensor component 814 can also detect the position change of the electronic device or a component of the electronic device, the user The presence or absence of contact with the electronic device, the orientation or acceleration/deceleration of the electronic device and the temperature changes of the electronic device.
  • Sensor assembly 814 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
  • Sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
  • the sensor component 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
  • Communication component 816 is configured to facilitate wired or wireless communications between electronic devices and other devices. Electronic devices can access wireless networks based on communication standards, such as WiFi, 4G or 5G, or a combination thereof. In one exemplary embodiment, the communication component 816 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In one exemplary embodiment, communications component 816 includes a near field communications (NFC) module to facilitate short-range communications.
  • NFC near field communications
  • the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology and other technologies.
  • RFID radio frequency identification
  • IrDA infrared data association
  • UWB ultra-wideband
  • Bluetooth Bluetooth
  • the electronic device may be configured by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable Gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are implemented for executing the above method.
  • ASICs application specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGA field programmable Gate array
  • controller microcontroller, microprocessor or other electronic components are implemented for executing the above method.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Charge And Discharge Circuits For Batteries Or The Like (AREA)

Abstract

La présente divulgation concerne un procédé et un appareil de charge pour un dispositif électronique, ainsi qu'un dispositif électronique et un support de stockage. Le procédé de charge pour un dispositif électronique consiste à : effectuer une première authentification de chiffrement sur une batterie au moyen d'une unité de chiffrement, la première authentification de chiffrement étant utilisée pour authentifier si la batterie est une batterie autorisée ; lorsque la première authentification de chiffrement est réussie, envoyer des informations d'authentification à un serveur en nuage, les informations d'authentification étant associées à la batterie ; recevoir un résultat d'authentification, qui est renvoyé par le serveur en nuage, le résultat d'authentification étant déterminé en fonction des informations d'authentification, et le résultat d'authentification étant utilisé pour indiquer si la batterie est une batterie autorisée ; et déterminer un mode de charge d'un dispositif électronique en fonction du résultat d'authentification, la batterie étant chargée avec différentes puissances de charge dans différents modes de charge. Dans la présente demande, étant donné qu'une seconde authentification de chiffrement est effectuée dans un serveur en nuage pour authentifier des informations d'authentification, des informations correspondantes utilisées pendant le processus d'authentification ne sont pas susceptibles d'être craquées au moyen d'un ordinateur, de telle sorte que la probabilité d'un craquage du chiffrement d'une batterie peut être réduite.
PCT/CN2022/099918 2022-06-20 2022-06-20 Procédé et appareil de charge pour un dispositif électronique, et dispositif électronique et support de stockage WO2023245356A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202280004266.6A CN117616658A (zh) 2022-06-20 2022-06-20 电子设备的充电方法、充电装置、电子设备及存储介质
PCT/CN2022/099918 WO2023245356A1 (fr) 2022-06-20 2022-06-20 Procédé et appareil de charge pour un dispositif électronique, et dispositif électronique et support de stockage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/099918 WO2023245356A1 (fr) 2022-06-20 2022-06-20 Procédé et appareil de charge pour un dispositif électronique, et dispositif électronique et support de stockage

Publications (1)

Publication Number Publication Date
WO2023245356A1 true WO2023245356A1 (fr) 2023-12-28

Family

ID=89378904

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/099918 WO2023245356A1 (fr) 2022-06-20 2022-06-20 Procédé et appareil de charge pour un dispositif électronique, et dispositif électronique et support de stockage

Country Status (2)

Country Link
CN (1) CN117616658A (fr)
WO (1) WO2023245356A1 (fr)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101331707A (zh) * 2005-12-20 2008-12-24 松下电器产业株式会社 认证系统及认证装置
CN102255109A (zh) * 2011-04-06 2011-11-23 宇龙计算机通信科技(深圳)有限公司 一种对移动终端电池的认证方法及移动终端
CN107483184A (zh) * 2017-07-19 2017-12-15 北京摩拜科技有限公司 电池管理方法、设备、电池、物品及系统
CN110545535A (zh) * 2018-05-28 2019-12-06 中兴通讯股份有限公司 一种认证方法、装置及计算机可读存储介质
CN113759259A (zh) * 2020-06-04 2021-12-07 北京小米移动软件有限公司 电池识别方法、识别设备、电池、识别装置及存储介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101331707A (zh) * 2005-12-20 2008-12-24 松下电器产业株式会社 认证系统及认证装置
CN102255109A (zh) * 2011-04-06 2011-11-23 宇龙计算机通信科技(深圳)有限公司 一种对移动终端电池的认证方法及移动终端
CN107483184A (zh) * 2017-07-19 2017-12-15 北京摩拜科技有限公司 电池管理方法、设备、电池、物品及系统
CN110545535A (zh) * 2018-05-28 2019-12-06 中兴通讯股份有限公司 一种认证方法、装置及计算机可读存储介质
CN113759259A (zh) * 2020-06-04 2021-12-07 北京小米移动软件有限公司 电池识别方法、识别设备、电池、识别装置及存储介质

Also Published As

Publication number Publication date
CN117616658A (zh) 2024-02-27

Similar Documents

Publication Publication Date Title
EP3657370B1 (fr) Procédés et dispositifs pour l'authentification d'une carte intelligente
KR101693130B1 (ko) 정보 인터랙션 방법 및 디바이스
US11196553B2 (en) Command transmission method and apparatus, electronic device
CN104219058B (zh) 身份认证、身份授权方法及装置
WO2016050037A1 (fr) Procédé et dispositif d'autorisation d'opération
CN108269334A (zh) 开锁方法、终端设备以及智能锁
CN109146470B (zh) 生成付款码的方法及装置
US10129228B1 (en) Authenticated communication between devices
CN104955031A (zh) 信息传输方法及装置
CN113132091B (zh) 一种分享设备的方法及电子设备
TWI761843B (zh) 門禁控制方法及裝置、電子設備和儲存介質
US9892249B2 (en) Methods and devices for authorizing operation
CN104093119B (zh) 解锁方法及装置
WO2016011739A1 (fr) Procédé, dispositif et système pour une vérification anti-contrefaçon
CN111917728A (zh) 一种密码验证方法及装置
CN112115464B (zh) 解锁处理方法、装置、电子设备及存储介质
CN114221764A (zh) 基于区块链的公钥更新方法、装置和设备
CN106534083B (zh) 刷机工具验证方法及装置
WO2023245356A1 (fr) Procédé et appareil de charge pour un dispositif électronique, et dispositif électronique et support de stockage
CN107302519B (zh) 一种终端设备的身份认证方法、装置和终端设备、服务器
CN107294985A (zh) 信息验证方法、装置及系统
WO2023230768A1 (fr) Circuit de chiffrement de batterie, procédé et appareil de vérification de batterie, dispositif et support d'enregistrement
CN116032504A (zh) 数据解密方法、装置及存储介质
CN115333728A (zh) 一种数据解密方法、数据解密装置及存储介质
CN114139134A (zh) 终端设备的程序升级方法、装置和设备

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 202280004266.6

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22947137

Country of ref document: EP

Kind code of ref document: A1