Battery uses verification method, battery system and automobileTechnical field
The present invention relates to cell art, more particularly to a kind of battery to use verification method, battery system and automobile.
Background technology
In New-energy electric vehicle industry and new energy storing technology, battery plays the effect of key.At present, people coupleThe demand of battery is also increasing, reasonably using battery, the security being related to during electric car use, and battery systemThe service life of system.The use for battery (such as charging, electric discharge, obtain battery status etc.) mostly of battery system in vehicleIt is not provided with encrypted authentication function so that battery system can be dismantled arbitrarily, and confusion uses;Also, the battery in some vehiclesAlthough system is provided with encrypted authentication function, do not have battery product uniqueness identification function, password or ID can be obtained by the external worldTake and change, it is poor to the integrality recognition effect of battery, battery modules easily occur with battery manager by artificially dismounting etc.Problem, cause battery problem safe to use and battery bag manufacturer to be lost in, while be also unfavorable for battery bag secondary recovery and echelon profitWith.
The content of the invention
In view of this, the embodiment of the present invention provides a kind of battery and uses verification method, battery system and automobile, can be rightThe use of battery carries out safety verification.
One side according to embodiments of the present invention, there is provided a kind of battery uses verification method, including:Receive for electricityThe use request in pond, obtains the first key value corresponding with the battery;The identification information of the battery is obtained, using defaultAES the identification information is encrypted calculating, obtain the second key value;By the first key value and described theTwo key values are compared, and determine described use asks whether pass through checking based on comparison result;If it is determined that described use pleaseAsk by checking, then battery is performed and the operation corresponding using request.
Alternatively, if it is determined that described pass through checking using request, then second key is stored in block chain nodeValue;Wherein, when being verified next time to the use request, using second key value as the first key value.
Alternatively, the acquisition first key value corresponding with the battery includes:Obtained in the block chain nodeIt relative to current point in time is newest key value as the first key value to take storage time.
Alternatively, if the battery uses to be first, the first key value obtained is in the block chain linkDefault key value in point.
Alternatively, the identification information for obtaining the battery:Obtain battery modules ID and battery manager ID;It is based onThe battery modules ID and battery manager ID generation battery IDs.
Alternatively, the battery modules ID that battery modules generate according to the data related to the battery is obtained;Wherein,The data related to the battery include:Battery manufacture manufacturer, device name, sequence number, build date.
Alternatively, the battery modules ID and battery manager ID is combined, generates the battery ID;Using defaultAES the battery ID is encrypted calculating, obtain second key value;Wherein, the default AESIncluding:MD5 algorithms.
Alternatively, calculating is encrypted to the battery ID using MD5 algorithms, using the MD5 values of acquisition as described secondKey value;Wherein, the computations include:Enter row information filling to the battery ID, to filling result interpolation data, being based onThe magic number of standard is handled addition result, carries out loop computation to result.
Alternatively, second key value includes:Binary numeral that regular length is 128, regular length are 3216 binary values.
Alternatively, the first key value and the second key value step-by-step are contrasted one by one, if described firstEach is all identical corresponding for key value and second key value, it is determined that described to pass through checking using request.
According to another aspect of the present invention, there is provided a kind of battery system, including:Battery manager, battery manager include:Data reception module, for receiving the use request for battery;Key Acquisition Module is relative with the battery for obtainingThe first key value answered;Cipher key calculation module, for obtaining the identification information of the battery, using default AES to instituteState identification information and calculating is encrypted, obtain the second key value;Key verification module, for by the first key value with it is describedSecond key value is compared, and determines described use asks whether pass through checking based on comparison result;Battery control module, it is used forIf it is determined that described pass through checking using request, then to battery execution and the operation corresponding using request.
Alternatively, data memory module, for if it is determined that described pass through checking using request, then in block chain nodeStore second key value;Wherein, next time to it is described using request verify when, using second key value asThe first key value.
Alternatively, the Key Acquisition Module, for obtaining storage time in the block chain node relative to currentTime point is newest key value as the first key value.
Alternatively, if the battery uses to be first, the first key value that the Key Acquisition Module obtainsFor the default key value in the block chain node.
Alternatively, the cipher key calculation module, for obtaining battery modules ID and battery manager ID from battery modules,Based on the battery modules ID and battery manager ID generation battery IDs.
Alternatively, the cipher key calculation module, generated for obtaining battery modules according to the data related to the batteryThe battery modules ID;Wherein, the data related to the battery include:Battery manufacture manufacturer, device name, sequenceNumber, build date.
Alternatively, the cipher key calculation module, it is raw for the battery modules ID and battery manager ID to be combinedInto the battery ID;Calculating is encrypted to the battery ID using default AES, obtains second key value;ItsIn, the default AES includes:MD5 algorithms.
Alternatively, the cipher key calculation module, for calculating to be encrypted to the battery ID using MD5 algorithms, will obtainThe MD5 values obtained are used as second key value;Wherein, the computations include:Enter row information to the battery ID fill, be rightFilling result interpolation data, measured magic number are handled addition result, carry out loop computation to result.
Alternatively, second key value includes:Binary numeral that regular length is 128, regular length are 3216 binary values.
Alternatively, the key verification module, for by the first key value and the second key value step-by-step one by oneContrasted, if each is all identical corresponding for the first key value and second key value, it is determined that described to makePass through checking with request.
Alternatively, vehicle-mounted Tbox modules;The battery manager is communicated by the vehicle-mounted Tbox with other parts,Wherein, other parts include:On-vehicle parts, APP applications.
According to another aspect of the invention, there is provided a kind of automobile, including battery system as described above.
The battery of the present invention uses verification method, battery system and automobile, using default AES to batteryCalculating is encrypted in identification information, obtains the second key value, and request is used to battery using first key value and the second key valueCarry out than checking, if by checking, corresponding operate is performed to battery;Use for battery is provided with secret key verification ringSection, it can just be provided reliable guarantee with normal use battery for the identification of battery uniqueness, prevent making after verifying successfullyPotential safety hazard caused by battery is disassembled during, battery modules and battery manager are used separately etc.;Using block chainTechnology stores to data such as secret keys, ensures that secret key will not be changed and stolen, and is advantageous to exclude cell safety hidden danger, realizesProtection to battery user's personal safety as well as the property safety, and it is beneficial to management of the battery bag manager to battery, it is remarkably improved productionThe security performance of product.
The additional aspect of the embodiment of the present invention and advantage will be set forth in part in the description, and these will be retouched from followingBecome obvious in stating, or recognized by the practice of the present invention.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existingThere is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are onlySome embodiments of the present invention, for those of ordinary skill in the art, without having to pay creative labor, alsoOther accompanying drawings can be obtained according to these accompanying drawings:
Fig. 1 is the flow chart of one embodiment that verification method is used according to the battery of the present invention;
Fig. 2 is the module diagram according to one embodiment of the battery system of the present invention;
Fig. 3 is the module diagram of the battery manager in one embodiment according to the battery system of the present invention.
Embodiment
The various exemplary embodiments of the present invention are described in detail now with reference to accompanying drawing.It should be noted that:Unless have in additionBody illustrates that the unlimited system of part and the positioned opposite of step, numerical expression and the numerical value otherwise illustrated in these embodiments is originallyThe scope of invention.
Simultaneously, it should be appreciated that for the ease of description, the size of the various pieces shown in accompanying drawing is not according to realityProportionate relationship draw.
The description only actually at least one exemplary embodiment is illustrative to be never used as to the present invention belowAnd its application or any restrictions that use.
It may be not discussed in detail for technology, method and apparatus known to person of ordinary skill in the relevant, but suitableIn the case of, the technology, method and apparatus should be considered as part for specification.
It should be noted that:Similar label and letter represents similar terms in following accompanying drawing, therefore, once a certain Xiang YiIt is defined, then it need not be further discussed in subsequent accompanying drawing in individual accompanying drawing.
The embodiment of the present invention can apply to computer system/server, and it can be with numerous other universal or special calculatingSystem environments or configuration operate together.Suitable for be used together with computer system/server well-known computing system, ringThe example of border and/or configuration includes but is not limited to:Personal computer system, server computer system, thin client, thick clientMachine, hand-held or laptop devices, the system based on microprocessor, set top box, programmable consumer electronics, NetPC Network PC,Minicomputer system, large computer system and distributed cloud computing technology environment including any of the above described system, etc..
Computer system/server can be in computer system executable instruction (such as journey performed by computer systemSequence module) general linguistic context under describe.Generally, program module can include routine, program, target program, component, logic, numberAccording to structure etc., they perform specific task or realize specific abstract data type.Computer system/server can be withImplement in distributed cloud computing environment, in distributed cloud computing environment, task is by by the long-range of communication network linksManage what equipment performed.In distributed cloud computing environment, program module can be located at the Local or Remote meter for including storage deviceIn calculation system storage medium.
" first ", " second " hereinafter is only used for distinguishing in description, not other special implications.
Fig. 1 is the flow chart of one embodiment that verification method is used according to the battery of the present invention, as shown in Figure 1:
Step 101, the use request for battery is received.It can also be asked using request for the use for battery bagAsk, will hereafter be illustrated by taking battery as an example.
The first key value corresponding with battery is obtained, and caches first key value.
Use request for battery includes:Charge, discharge, reading battery data, checking that battery status etc. is asked.UseRequest can be that part, other parts of automobile in battery system are sent, and other parts of automobile include:ECU(Electronic Control Unit, electronic control unit) etc., it can also be answered using request for the APP in mobile phoneWith transmission.
Step 102, the identification information of battery is obtained, identification information is encrypted calculating using default AES,The second key value is obtained, and caches first key value.The identification information of battery can have a variety of, and default AES can alsoHave a variety of, can be set according to specific design requirement.
Step 103, first key value is compared with the second key value, determines whether use request based on comparison resultPass through checking.
Step 104, if it is determined that request is used by verifying, then the operation corresponding with using request is performed to battery,Control battery fills point, electric discharge, reads battery data, checks battery status operation etc., can be completed by sending control instructionOperation.If it is determined that using request not over checking, then battery can not be used.
Battery in above-described embodiment uses verification method, it is determined that to the secret key of storage and the secret key verification that newly calculates intoIn the case of work(, battery could be used, it is achieved thereby that the cryptographic operation to battery system, it is ensured that battery it is uniqueProperty, reduce battery system is dismantled and the chaotic hidden danger used wantonly, while can also safeguard battery management person and cell tubeThe interests of reason company.
In one embodiment, first key value, second key value etc. can be stored by block chain node, can utilizedBlock chain node itself has the characteristics of encryption, ensures that secret key will not be changed and stolen.Block chain be Distributed Storage,Point-to-point transmission, common recognition mechanism, the new application pattern of the computer technology such as AES, it have decentralization, opening,The features such as autonomy, information can not distort.First, second key value etc. is stored by block chain technology, the number of storageAccording to immutable and other people can not steal battery secret key data, effectively record and store key value, there is very strong practicality.
If it is determined that the second key value is then stored in block chain node by checking using request.Next time to makingWhen being verified with request, using the second key value as first key value, mark of the default AES to battery is reusedKnow information and calculating is encrypted, obtain the second new key value, and carry out comparison.When being verified, in block chain linkIt is newest key value as first key value that storage time is obtained in point relative to current point in time.If battery is to make for the first timeWith the first key value then obtained is the default key value in block chain node.For example, to one piece of new battery, first keyValue carries out storage operation of dispatching from the factory by producer, is stored in block chain node.
In one embodiment, battery modules ID and battery manager ID is obtained, based on battery modules ID and cell tubeManage device ID generation battery IDs.Battery modules ID can have a variety of generation methods, for example, generated according to the data related to batteryBattery modules ID, the data related to battery include:Battery manufacture manufacturer, device name, sequence number, build date etc..Will be withThe related data of battery carry out sequential combination, generation battery modules ID.
Battery ID has a variety of generation methods.For example, battery modules ID and battery manager ID is combined, battery ID is generated.Battery modules ID and battery manager ID sequential combinations can be formed battery ID.Using default AES to battery IDCalculating is encrypted, obtains the second key value.AES can have a variety of, for example, MD5 algorithms.
MD5 is the algorithms of Message Digest Algorithm 5, is Message Digest Algorithm 5, is widely usedA kind of hash function, to provide the integrity protection of message.When AES uses MD5 algorithms, using MD5 algorithms to electricityCalculating is encrypted in pond ID, using the MD5 values of acquisition as the second key value.Second key value includes:Regular length is 128Binary numeral, 16 binary values that regular length is 32 etc..
Md5 encryption algorithm for encryption, which calculates, to be included:Enter row information filling to battery ID, to filling result interpolation data, being based onThe magic number of standard is handled addition result, carries out the steps such as loop computation to result.Battery ID data are passed through into MD516 binary values that regular length after AES encryption is the binary numeral of 128 or regular length is 32, oftenThe secondary MD5 values used are the values after being encrypted by same MD5 algorithms.
First key value (MD5 values) and the second key value (MD5 values) step-by-step are contrasted one by one, if first key valueEach is all identical corresponding for (MD5 values) and the second key value (MD5 values), then first key value (MD5 values) and the second keyValue (MD5 values) is identical, illustrates that battery is complete, it is determined that using request by verifying, battery may be used, otherwise batteryIt can not be used.
For example, the primary ID of battery modules is 123456, the primary ID of battery manager is 654321, then corresponding batteryID is 123456654321, and battery ID is entered into encryption by MD5 algorithms for 123456654321.
The first step, battery ID is filled, filling one 1 and n 0 below so that the message length of filling is to 512 complementationsAs a result it is equal to 448.Second step, behind the data for having carried out first step processing plus 64 are stored, and length is 512 multipleNumber.3rd step, the result of second step is encased in standard magic number:The magic number (physical sequential) of standard is (A=(01234567) 16, B=(89ABCDEF) 16, C=(FEDCBA98) 16, D=(76543210) 16).
4th step, the result data Jing Guo three step process is divided into 16 groups, then carries out four-wheel loop computation, setFour nonlinear functions:F (X, Y, Z)=(X&Y) | ((~X) &Z), G (X, Y, Z)=(X&Z) | (Y& (~Z)), H (X, Y, Z)=X ∧ Y ∧ Z, I (X, Y, Z)=Y ∧ (X | (~Z)), then by A, B, C, 3 in D copy a, b, c, d are through F, G, H, I computingsResult afterwards is added with the 4th, along with 32 words and the additive constant of 32 word, and by the value ring shift left of gainedSome positions, acquired results are finally added into one of a, b, c, d, and be recycled to A, B, C, D, thus complete one cycle, wherein addingMethod constant T [i] (i is the value among the 64 of 1) is equal to the 4294967296 integer part (i for being multiplied by abs (sin (i)) acquired resultsRepresented with radian).For example, the MD5 values of battery ID generation are cd6bfc8505b54cee, it is close as the uniqueness of batterySpoon, when there is battery artificially to be dismantled, not for it is original-pack when, the result after encryption differs with original secret key.
When battery system is sent using order, data newest in block chain are read, decrypt the first secret key thereinIt is worth (the first MD5 values), such as the first MD5 values are cd6bfc8505b54cee, storage is in a register.Block chain itself is to storageData there is very powerful encryption function, it is ensured that battery system secret key is not modified and is unique, and the first MD5 is suitableIn battery fingerprint.
Current battery modules ID and battery manager ID are read, generates battery ID, and added by md5 encryption algorithmIt is close.For example, the 2nd MD5 values after encryption are cd6bfc8505b54cee, by the first MD5 values cd6bfc8505b54cee and secondMD5 values cd6bfc8505b54cee is contrasted by turn, if identical, for galvanic cell system, battery can enter to exerciseWith otherwise, battery can not be used.The MD5 values (SK2) that battery bag ID is encrypted are stored and arrive block chain by contrast verification after passing throughIn.
Battery in above-described embodiment uses verification method, and the use for battery is provided with secret key calibration link, works as schoolIt can just be provided reliable guarantee with normal use battery for the identification of battery uniqueness, prevent using process after testing successfullyPotential safety hazard caused by middle battery is disassembled, battery modules and battery manager are used separately etc.;Using block chain technology pairThe data such as secret key are stored, and cause the secret key related to battery equivalent to fingerprint, to ensure secret key not using the characteristic of block chainIt can be changed and be stolen, be advantageous to exclude cell safety hidden danger, realize the protection to battery user's personal safety as well as the property safety, andBeneficial to management of the battery bag manager to battery, the security performance of product is remarkably improved, and can be applied to various vehicles.
As shown in Fig. 2 the present invention provides a kind of battery system 20, including battery manager 21, battery modules 22 and TboxModule 23.Battery modules 22 are used to produce battery modules ID.Block chain 24 stores to the secret key of battery system, can be electricityA node of the data memory module of pool manager 22 as block chain.Battery modules 22 can be one with battery manager 21One is correspondingly arranged.Vehicle-mounted Tbox (Telematics BOX) module 23 is the part in car networking system, is mainly used in afterPlatform system/cell phone application communication.Battery manager 21 is communicated by vehicle-mounted Tbox modules 23 with other parts, other portionsPart includes:On-vehicle parts, APP applications etc..
As shown in figure 3, battery manager 21 includes:Data reception module 211, Key Acquisition Module 212, cipher key calculation mouldBlock 213, cipher key calculation module 214, key verification module 215 and data memory module 216.The reception pair of data reception module 211Asked in the use of battery.Key Acquisition Module 212 obtains the first key value corresponding with battery.Cipher key calculation module 213The identification information of battery is obtained, calculating is encrypted to identification information using default AES, obtains the second key value.It is closeFirst key value is compared key authentication module 214 with the second key value, determines whether lead to using request based on comparison resultCross checking.If it is determined that using request by checking, then Battery control module 215 is corresponding with using request to battery executionOperation.
If it is determined that using request by checking, then it is close to store second in block chain node 24 for data memory module 216Key value, when next time to being verified using request, using the second key value as first key value.Key Acquisition Module 212It is newest key value as first key value that storage time is obtained in block chain node 24 relative to current point in time.IfBattery uses to be first, then the first key value that Key Acquisition Module 212 obtains is the default key value in block chain node.Key verification module 215 is contrasted first key value and the second key value step-by-step one by one, if first key value and secondEach is all identical corresponding for key value, it is determined that passes through checking using request.
Cipher key calculation module 213 obtains battery modules ID and battery manager ID from battery modules, based on battery modulesID and battery manager ID generation battery IDs.Cipher key calculation module 213 obtains battery modules 22 according to the data related to batteryThe battery modules ID of generation, the data related to battery include:Battery manufacture manufacturer, device name, sequence number, build dateDeng.Cipher key calculation module 213 combines battery modules ID and battery manager ID, generates battery ID, is calculated using default encryptionMethod battery ID is encrypted calculating, obtains the second key value.Default AES includes:MD5 algorithms etc..
Cipher key calculation module 213 battery ID is encrypted calculating using MD5 algorithms, using the MD5 values of acquisition as secondKey value, computations include:Enter row information filling to battery ID, to filling result interpolation data, measured magic number pairAddition result is handled, carries out loop computation to result.Second key value includes:Regular length is 128 and two enteredNumerical value processed, 16 binary values that regular length is 32 etc..
In one embodiment, the present invention provides a kind of automobile, including the as above battery system of any one embodiment.
Battery in above-described embodiment uses verification method, battery system and automobile, obtains the corresponding with battery of storageFirst key value, be encrypted calculating to the identification information of battery using default AES, obtain the second key value, makeBattery is carried out than checking using request with first key value and the second key value, if by checking, to battery execution pairThe operation answered;Use for battery is provided with secret key calibration link, can be with normal use battery just after verifying successfullyThe identification of battery uniqueness provides reliable guarantee, prevents that battery is disassembled in use, battery modules and battery managementPotential safety hazard caused by device is used separately etc.;The data such as secret key are stored using block chain technology, utilize block chainCharacteristic causes the secret key related to battery equivalent to fingerprint, to ensure that secret key will not be changed and stolen, be advantageous to exclude battery peaceFull hidden danger, the protection to battery user's personal safety as well as the property safety is realized, and be beneficial to management of the battery bag manager to battery, canThe security performance of product is significantly improved, and can be applied to various vehicles.
Methods and apparatus of the present invention, equipment may be achieved in many ways.For example, software, hardware, firmware can be passed throughOr any combinations of software, hardware, firmware realize methods and apparatus of the present invention, equipment.The step of for methodOrder is stated merely to illustrate, order described in detail above is not limited to the step of method of the invention, unless with otherMode illustrates.In addition, in certain embodiments, the present invention can be also embodied as recording program in the recording medium, thisA little programs include being used for the machine readable instructions for realizing the method according to the invention.Thus, the present invention also covering storage is used to holdThe recording medium of the program of row the method according to the invention.
Description of the invention provides for the sake of example and description, and is not exhaustively or by the present inventionIt is limited to disclosed form.Many modifications and variations are obvious for the ordinary skill in the art.Select and retouchState embodiment and be to more preferably illustrate the principle and practical application of the present invention, and one of ordinary skill in the art is managedThe present invention is solved so as to design the various embodiments with various modifications suitable for special-purpose.
The embodiment provides A1, a kind of battery to use verification method, wherein, including:Receive for batteryUse request, obtain the first key value corresponding with the battery;The identification information of the battery is obtained, use is defaultAES the identification information is encrypted calculating, obtains the second key value;By the first key value and described secondKey value is compared, and determines described use asks whether pass through checking based on comparison result;If it is determined that described use requestBy checking, then battery is performed and the operation corresponding using request.
A2, the method as described in A1, wherein, in addition to:If it is determined that described pass through checking using request, then in block chainSecond key value is stored in node;Wherein, when being verified next time to the use request, by second keyValue is used as the first key value.
A3, the method as described in A2, wherein, the acquisition first key value corresponding with the battery includes:InstituteIt is newest key value as the first key value to state and storage time is obtained in block chain node relative to current point in time.
A4, the method as described in A3, wherein, if the battery uses to be first, the first key value obtainedFor the default key value in the block chain node.
A5, the method as described in A1, wherein, the identification information for obtaining the battery:Obtain battery modules ID andBattery manager ID;Based on the battery modules ID and battery manager ID generation battery IDs.
A6, the method as described in A5, wherein, battery modules are obtained according to the data generation related to the batteryBattery modules ID;Wherein, the data related to the battery include:Battery manufacture manufacturer, device name, sequence number, systemMake the date.
A7, the method as described in A5, wherein, in addition to:The battery modules ID and battery manager ID is combined,Generate the battery ID;Calculating is encrypted to the battery ID using default AES, obtains second key value;Wherein, the default AES includes:MD5 algorithms.
A8, the method as described in A7, wherein, in addition to:Calculating is encrypted to the battery ID using MD5 algorithms, willThe MD5 values of acquisition are used as second key value;Wherein, the computations include:The battery ID is entered row information filling,Filling result interpolation data, measured magic number are handled addition result, to result progress loop computation.
A9, the method as described in A7, wherein, second key value includes:Regular length is the binary number of 128Value, 16 binary values that regular length is 32.
A10, the method as described in A1, wherein, in addition to:By the first key value and the second key value step-by-step byOne is contrasted, if each is all identical corresponding for the first key value and second key value, it is determined that describedPass through checking using request.
B11, a kind of battery system, wherein also including:Battery manager, including:Data reception module, for receiving pairAsked in the use of battery;Key Acquisition Module, for obtaining the first key value corresponding with the battery;Cipher key calculation mouldBlock, for obtaining the identification information of the battery, calculating is encrypted to the identification information using default AES, obtainedObtain the second key value;Key verification module, for the first key value to be compared with second key value, based on thanDetermine described use asks whether pass through checking to result;Battery control module, for if it is determined that described passed through using requestChecking, then battery is performed and the operation corresponding using request.
B12, the system as described in B11, wherein, in addition to:Data memory module, for if it is determined that described use requestBy checking, then second key value is stored in block chain node;Wherein, tested next time using request describedDuring card, using second key value as the first key value.
B13, the system as described in B12, wherein, the Key Acquisition Module, for being obtained in the block chain nodeStorage time is newest key value as the first key value relative to current point in time.
B14, the system as described in B13, wherein, if the battery uses to be first, the Key Acquisition Module obtainsThe first key value taken is the default key value in the block chain node.
B15, the system as described in B11, wherein, the cipher key calculation module, for obtaining battery modules from battery modulesID and battery manager ID, based on the battery modules ID and battery manager ID generation battery IDs.
B16, the system as described in B15, wherein, the cipher key calculation module, for obtain battery modules according to it is describedThe battery modules ID of the related data generation of battery;Wherein, the data related to the battery include:Battery manufactureManufacturer, device name, sequence number, build date.
B17, the system as described in B15, wherein, the cipher key calculation module, for by the battery modules ID and describedBattery manager ID is combined, and generates the battery ID;Calculating is encrypted to the battery ID using default AES, obtainedObtain second key value;Wherein, the default AES includes:MD5 algorithms.
B18, the system as described in B17, wherein, in addition to:The cipher key calculation module, for using MD5 algorithms to instituteState battery ID and calculating is encrypted, using the MD5 values of acquisition as second key value;Wherein, the computations include:It is rightThe battery ID enter row information filling, to filling result interpolation data, measured magic number to addition result handled, it is rightResult carries out loop computation.
B19, the system as described in B17, wherein, second key value includes:Regular length is the binary number of 128Value, 16 binary values that regular length is 32.
B20, the system as described in B11, wherein, the key verification module, for by the first key value with it is describedSecond key value step-by-step is contrasted one by one, if the first key value and second key value it is corresponding each allIt is identical, it is determined that described to pass through checking using request.
B21, the system as described in B11, wherein, in addition to:Vehicle-mounted Tbox modules;The battery manager passes through the carTbox is carried to be communicated with other parts, wherein, other parts include:On-vehicle parts, APP applications.
C22, a kind of automobile, wherein, including the battery system as described in B11 to any one of B21.