Movatterモバイル変換


[0]ホーム

URL:


CN109064153A - The method and system that the user equipment of a kind of pair of charging station is authorized - Google Patents

The method and system that the user equipment of a kind of pair of charging station is authorized
Download PDF

Info

Publication number
CN109064153A
CN109064153ACN201810884472.6ACN201810884472ACN109064153ACN 109064153 ACN109064153 ACN 109064153ACN 201810884472 ACN201810884472 ACN 201810884472ACN 109064153 ACN109064153 ACN 109064153A
Authority
CN
China
Prior art keywords
user equipment
charging
charging station
authorization
session
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810884472.6A
Other languages
Chinese (zh)
Inventor
刘聪玲
李熙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Foshan Tianmu Chain Technology Co Ltd
Original Assignee
Foshan Tianmu Chain Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Foshan Tianmu Chain Technology Co LtdfiledCriticalFoshan Tianmu Chain Technology Co Ltd
Priority to CN201810884472.6ApriorityCriticalpatent/CN109064153A/en
Publication of CN109064153ApublicationCriticalpatent/CN109064153A/en
Withdrawnlegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The invention discloses the methods that the user equipment of a kind of pair of charging station is authorized, comprising: charging session is carried out by the firmware authorization of user equipment, to use the cryptographic handshake between user equipment and charging station to carry out charging to user equipment;Pre-authorization charging with the charging capacity for allowing the chargeable session of unauthorized to be charged to the predetermined percentage including user equipment to user equipment before authorization limits;Wherein, after authorization, when the firmware of user equipment detects that the power charge source of unauthorized has been coupled to user equipment, allow the charging session of unauthorized.The present invention is able to verify that charging equipment, preferably realizes the matching of charging equipment and charging station, promotes the security performance of charging.

Description

The method and system that the user equipment of a kind of pair of charging station is authorized
Technical field
The present invention relates to charging security technology areas, award in particular to the user equipment of a kind of pair of charging stationThe method and system of power.
Background technique
In today's society, consumer, businessman, educator is carried out in real time with other people by various media, at a distance, moreThe exchange on secondary non-boundary or boundary.The appearance of computer and network technologies is so that phase intercommunication of the people from the world one end to the other endLetter is possibly realized.Some electronic equipments be specially designed for portability and it is mobile use, including for example mobile phone is (such as intelligentPhone), laptop computer, portable music player or MP3 player, tablet computer, portable game unit, camera etc..The portability of these electronic equipments is lost, and is stolen or misplaced risk increases.But each of these equipment all needWant frequent charge.
Summary of the invention
The invention proposes the methods that the user equipment of a kind of pair of charging station is authorized, comprising:
Charging session is carried out by the firmware authorization of user equipment, to use the encryption between user equipment and charging station to holdHand carries out charging to user equipment;With
The chargeable session of unauthorized is allowed to be charged to the predetermined percentage including user equipment to user equipment before authorizationThe pre-authorization charging of the charging capacity of ratio limits;Wherein, after authorization, the electricity of unauthorized is detected in the firmware of user equipmentWhen power charging source has been coupled to user equipment, allow the charging session of unauthorized.
The method further includes identifying token from the user equipment to the charging station password for inquiry.
The method, further includes:
Charging station is added in the approval list of authorization charging station of user equipment;With
Charging is verified according to the approval list for the authorization charging station being stored in database associated with user equipmentIt stands.
The method further includes that unique password is input in the application program of user equipment, by the charging stationIt is added to approved authorization charging station list.
The method further includes keeping database and the charging station that is added to approved authorization charging station list sameStep, wherein the approved authorization charging station list is encrypted.
The method, further includes: it is required that the firmware of the user equipment authorizes subsequent charging session again, to examineIt charges when measuring the termination or disconnection of the charging session to the user equipment.
The system that the user equipment of a kind of pair of charging station is authorized, comprising:
Hardware processor:
Charging session is carried out by the firmware authorization of user equipment, to use the encryption between user equipment and charging station to holdHand carries out charging to user equipment;With
Before authorization, the chargeable session of unauthorized is allowed to be charged to the predetermined percentage including user equipment to user equipmentThe pre-authorization charging of the charging capacity of ratio limits;Wherein, after authorization, the electricity of unauthorized is detected in the firmware of user equipmentWhen power charging source has been coupled to user equipment, allow the charging session of unauthorized.
The system, the processor identify token from the user equipment to the charging station password for inquiry;It is describedProcessor:
Charging station is added in the approval list of authorization charging station of user equipment;With
Charging is verified according to the approval list for the authorization charging station being stored in database associated with user equipmentIt stands;
Unique password is input in the application of the user equipment, fills described by the system, the processorPower station is added to approved authorization charging station list;The processor makes database and is added to approved authorization charging stationThe charging station of list is synchronous, wherein the approved authorization charging station list is encrypted;Described in the processor requirementThe firmware of user equipment authorizes subsequent charging session again, with detect it is described charging session termination or disconnection when to instituteUser equipment is stated to charge.
The present invention is able to verify that charging equipment, preferably realizes the matching of charging equipment and charging station, promotes the peace of chargingFull performance.
Detailed description of the invention
From following description with reference to the accompanying drawings it will be further appreciated that the present invention.Component in figure is not drawn necessarily to scale,But it focuses on and shows in the principle of embodiment.In the figure in different views, identical appended drawing reference is specified to be corresponded toPart.
Fig. 1 is the schematic diagram for the method that the user equipment of the invention to charging station is authorized.
Specific embodiment
In order to enable the objectives, technical solutions, and advantages of the present invention are more clearly understood, below in conjunction with embodiment, to thisInvention is further elaborated;It should be appreciated that described herein, the specific embodiments are only for explaining the present invention, and does not have toIt is of the invention in limiting.To those skilled in the art, after access is described in detail below, other systems of the present embodimentSystem, method and/or feature will become obvious.All such additional systems, method, feature and advantage are intended to be included inIt in this specification, is included within the scope of the invention, and by the protection of the appended claims.In description described in detail belowThe other feature of the disclosed embodiments, and these characteristic roots will be apparent according to described in detail below.
Embodiment one:
As shown in Figure 1, for the schematic diagram of method that is authorized of user equipment of a kind of pair of charging station of the invention, comprising:
Charging session is carried out by the firmware authorization of user equipment, to use the encryption between user equipment and charging station to holdHand carries out charging to user equipment;With
The chargeable session of unauthorized is allowed to be charged to the predetermined percentage including user equipment to user equipment before authorizationThe pre-authorization charging of the charging capacity of ratio limits;Wherein, after authorization, the electricity of unauthorized is detected in the firmware of user equipmentWhen power charging source has been coupled to user equipment, allow the charging session of unauthorized.
The method further includes identifying token from the user equipment to the charging station password for inquiry.
The method, further includes:
Charging station is added in the approval list of authorization charging station of user equipment;With
Charging is verified according to the approval list for the authorization charging station being stored in database associated with user equipmentIt stands.
The method further includes that unique password is input in the application program of user equipment, by the charging stationIt is added to approved authorization charging station list.
The method further includes keeping database and the charging station that is added to approved authorization charging station list sameStep, wherein the approved authorization charging station list is encrypted.
The method, further includes: it is required that the firmware of the user equipment authorizes subsequent charging session again, to examineIt charges when measuring the termination or disconnection of the charging session to the user equipment.
Embodiment two:
A kind of system for using electricity bill control authorization to the user equipment with safe charging station, comprising:
Hardware processor:
Charging session is carried out by the firmware authorization of user equipment, to use the encryption between user equipment and charging station to holdHand carries out charging to user equipment;With
Before authorization, the chargeable session of unauthorized is allowed to be charged to the predetermined percentage including user equipment to user equipmentThe pre-authorization charging of the charging capacity of ratio limits;Wherein, after authorization, the electricity of unauthorized is detected in the firmware of user equipmentWhen power charging source has been coupled to user equipment, allow the charging session of unauthorized.
The system, wherein the processor identifies token from the user equipment to the charging station password for inquiry.
The system, wherein the processor:
Charging station is added in the approval list of authorization charging station of user equipment;With
Charging is verified according to the approval list for the authorization charging station being stored in database associated with user equipmentIt stands.
The system, wherein unique password is input in the application of the user equipment by the processor, by instituteIt states charging station and is added to approved authorization charging station list.
The system, wherein the processor makes database and is added to the described of approved authorization charging station listCharging station is synchronous, wherein the approved authorization charging station list is encrypted.
The system, wherein the firmware of user equipment described in the processor requirement authorizes subsequent charging meeting againWords, to charge when detecting the termination or disconnection of the charging session to the user equipment.
Embodiment three:
A kind of computer program product, for (being used by user equipment of the processor to the safe charging station with userFamily equipment) Charge Management authorization is used, the computer program product includes the non-transitory meter with computer-readable programThe code section that calculation machine readable storage medium storing program for executing is stored therein, computer readable program code part include:
Executable part, carries out charging session by the firmware authorization of user equipment, to use user equipment and chargingCryptographic handshake between standing carries out charging to user equipment;With
Executable part allows the chargeable session of unauthorized before authorization, by user equipment be charged to including withThe pre-authorization charging of the charging capacity of the predetermined percentage of family equipment limits;Wherein, after authorization, in the firmware of user equipmentWhen detecting that the power charge source of unauthorized has been coupled to user equipment, allow the charging session of unauthorized.
The computer program product, further includes executable part, the executable part from the user equipment toThe charging station inquiry encryption identification token.
The computer program product further includes executable part:
Charging station is added in the approval list of authorization charging station of user equipment;
By the application program of unique password input user equipment, charging station is added to the authorization charging station list of approvalIn;?
Charging is verified according to the approval list for the authorization charging station being stored in database associated with user equipmentIt stands.
The computer program product further includes executable part, and the executable part makes database and is added toThe charging station of approved authorization charging station list is synchronous, wherein the approved authorization charging station list is encrypted.
The computer program product, further includes: executable part, it is required that the firmware of the user equipment is awarded againSubsequent charging session is weighed, to charge when detecting the termination or disconnection of the charging session to the user equipment.
Although describing the present invention by reference to various embodiments above, but it is to be understood that of the invention not departing fromIn the case where range, many changes and modifications can be carried out.That is methods discussed above, system or equipment etc. showExample.Various configurations can be omitted suitably, replace or add various processes or component.For example, in alternative configuration, can withDescribed order in a different order executes method, and/or can add, and omits and/or combine the various stages.Moreover, aboutThe feature of certain configuration descriptions can be combined with various other configurations.Can combine in a similar way configuration different aspect andElement.In addition, many elements are only range of the example without limiting the disclosure or claims with the development of technology.
Give detail in the description to provide to the thorough understanding for including the exemplary configuration realized.However,Configuration can be practiced without these specific details for example, having been illustrated with well-known circuit, process, calculationMethod, structure and technology are without unnecessary details, to avoid fuzzy configuration.The description only provides example arrangement, and unlimitedThe scope of the claims processed, applicability or configuration.It is used on the contrary, front will provide the description of configuration for those skilled in the artRealize the enabled description of described technology.It, can be to the function of element without departing from the spirit or the scope of the present disclosureIt can and arrange and carry out various changes.
In addition, many operations can be in parallel or concurrently although each operation can describe the operations as sequential processIt executes.Furthermore it is possible to rearrange the sequence of operation.One process may have other steps.Furthermore, it is possible to pass through hardware, softPart, firmware, middleware, code, hardware description language or any combination thereof carry out the example of implementation method.When software, firmware, inBetween when realizing in part or code, program code or code segment for executing necessary task can store in such as storage mediumIn non-transitory computer-readable medium, and described task is executed by processor.
To sum up, be intended to foregoing detailed description be considered as it is illustrative and not restrictive, and it is to be understood that describedClaim (including all equivalents) is intended to limit the spirit and scope of the present invention.The above embodiment is interpreted as only usingIn illustrating the present invention rather than limit the scope of the invention.After the content for having read record of the invention, technologyPersonnel can make various changes or modifications the present invention, these equivalence changes and modification equally fall into the claims in the present invention and limitedFixed range.

Claims (9)

CN201810884472.6A2018-08-062018-08-06The method and system that the user equipment of a kind of pair of charging station is authorizedWithdrawnCN109064153A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201810884472.6ACN109064153A (en)2018-08-062018-08-06The method and system that the user equipment of a kind of pair of charging station is authorized

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201810884472.6ACN109064153A (en)2018-08-062018-08-06The method and system that the user equipment of a kind of pair of charging station is authorized

Publications (1)

Publication NumberPublication Date
CN109064153Atrue CN109064153A (en)2018-12-21

Family

ID=64833068

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201810884472.6AWithdrawnCN109064153A (en)2018-08-062018-08-06The method and system that the user equipment of a kind of pair of charging station is authorized

Country Status (1)

CountryLink
CN (1)CN109064153A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20070145945A1 (en)*2005-12-282007-06-28Mcginley James WMethod and apparatus to authenticate battery charging device
CN102341987A (en)*2009-01-062012-02-01捷通国际有限公司 Metered Delivery of Wireless Power
US9898626B1 (en)*2016-10-312018-02-20International Business Machines CorporationLocation defined power charger management authorization for a user equipment
US20180121684A1 (en)*2016-10-312018-05-03International Business Machines CorporationPower charger authorization for a user equipment via a cryptographic handshake

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20070145945A1 (en)*2005-12-282007-06-28Mcginley James WMethod and apparatus to authenticate battery charging device
CN102341987A (en)*2009-01-062012-02-01捷通国际有限公司 Metered Delivery of Wireless Power
US9898626B1 (en)*2016-10-312018-02-20International Business Machines CorporationLocation defined power charger management authorization for a user equipment
US20180121684A1 (en)*2016-10-312018-05-03International Business Machines CorporationPower charger authorization for a user equipment via a cryptographic handshake

Similar Documents

PublicationPublication DateTitle
WO2020251597A1 (en)Dynamic off-chain digital currency transaction processing
CN103138921A (en)Method and system for verifying identity information
TW202020769A (en)Payment processing method for offline scenario, server, and readable storage medium
CN105868970B (en)authentication method and electronic equipment
CN104901805B (en)A kind of identification authentication methods, devices and systems
CN104753675B (en)Information Authentication method, electric paying method, terminal, server and system
CN110378695A (en)Bank card payment method, device, equipment and computer storage medium
WO2020155839A1 (en)Blockchain-based method and device for performing scene-based deposition on face information
CN106533685B (en)Identity authentication method, device and system
CN113656497B (en) A data verification method and device based on blockchain
CN104346550A (en)Information processing method and electronic equipment
CN105306202B (en)Auth method, device and server
CN104935548B (en)Auth method, apparatus and system based on intelligent equipment of tatooing
CN103369456A (en)Mobile phone antitheft system and method thereof
CN103401277A (en)Intelligent power supply and method for realizing mobile payment by utilizing intelligent power supply
CN109905366B (en)Terminal equipment safety verification method and device, readable storage medium and terminal equipment
JPWO2012001768A1 (en) Mobile communication terminal, activation method thereof, and network communication system
CN104935550A (en)Intelligent electronic commerce user management system technique and operating method thereof
CN111626726A (en)Life payment method, device, equipment and storage medium
CN108052831A (en)Image watermarking and display methods, mobile terminal and storage medium
CN103957104A (en)Dynamic token anti-phishing method and device
CN109064153A (en)The method and system that the user equipment of a kind of pair of charging station is authorized
CN103973644B (en)Authentication method, device and system
CN101986684A (en)Processing system and method for rechargeable paying
CN109658083A (en) Memory, broadband payment method, device and equipment based on WeChat applet

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
WW01Invention patent application withdrawn after publication

Application publication date:20181221

WW01Invention patent application withdrawn after publication

[8]ページ先頭

©2009-2025 Movatter.jp