The method and system that the user equipment of a kind of pair of charging station is authorizedTechnical field
The present invention relates to charging security technology areas, award in particular to the user equipment of a kind of pair of charging stationThe method and system of power.
Background technique
In today's society, consumer, businessman, educator is carried out in real time with other people by various media, at a distance, moreThe exchange on secondary non-boundary or boundary.The appearance of computer and network technologies is so that phase intercommunication of the people from the world one end to the other endLetter is possibly realized.Some electronic equipments be specially designed for portability and it is mobile use, including for example mobile phone is (such as intelligentPhone), laptop computer, portable music player or MP3 player, tablet computer, portable game unit, camera etc..The portability of these electronic equipments is lost, and is stolen or misplaced risk increases.But each of these equipment all needWant frequent charge.
Summary of the invention
The invention proposes the methods that the user equipment of a kind of pair of charging station is authorized, comprising:
Charging session is carried out by the firmware authorization of user equipment, to use the encryption between user equipment and charging station to holdHand carries out charging to user equipment;With
The chargeable session of unauthorized is allowed to be charged to the predetermined percentage including user equipment to user equipment before authorizationThe pre-authorization charging of the charging capacity of ratio limits;Wherein, after authorization, the electricity of unauthorized is detected in the firmware of user equipmentWhen power charging source has been coupled to user equipment, allow the charging session of unauthorized.
The method further includes identifying token from the user equipment to the charging station password for inquiry.
The method, further includes:
Charging station is added in the approval list of authorization charging station of user equipment;With
Charging is verified according to the approval list for the authorization charging station being stored in database associated with user equipmentIt stands.
The method further includes that unique password is input in the application program of user equipment, by the charging stationIt is added to approved authorization charging station list.
The method further includes keeping database and the charging station that is added to approved authorization charging station list sameStep, wherein the approved authorization charging station list is encrypted.
The method, further includes: it is required that the firmware of the user equipment authorizes subsequent charging session again, to examineIt charges when measuring the termination or disconnection of the charging session to the user equipment.
The system that the user equipment of a kind of pair of charging station is authorized, comprising:
Hardware processor:
Charging session is carried out by the firmware authorization of user equipment, to use the encryption between user equipment and charging station to holdHand carries out charging to user equipment;With
Before authorization, the chargeable session of unauthorized is allowed to be charged to the predetermined percentage including user equipment to user equipmentThe pre-authorization charging of the charging capacity of ratio limits;Wherein, after authorization, the electricity of unauthorized is detected in the firmware of user equipmentWhen power charging source has been coupled to user equipment, allow the charging session of unauthorized.
The system, the processor identify token from the user equipment to the charging station password for inquiry;It is describedProcessor:
Charging station is added in the approval list of authorization charging station of user equipment;With
Charging is verified according to the approval list for the authorization charging station being stored in database associated with user equipmentIt stands;
Unique password is input in the application of the user equipment, fills described by the system, the processorPower station is added to approved authorization charging station list;The processor makes database and is added to approved authorization charging stationThe charging station of list is synchronous, wherein the approved authorization charging station list is encrypted;Described in the processor requirementThe firmware of user equipment authorizes subsequent charging session again, with detect it is described charging session termination or disconnection when to instituteUser equipment is stated to charge.
The present invention is able to verify that charging equipment, preferably realizes the matching of charging equipment and charging station, promotes the peace of chargingFull performance.
Detailed description of the invention
From following description with reference to the accompanying drawings it will be further appreciated that the present invention.Component in figure is not drawn necessarily to scale,But it focuses on and shows in the principle of embodiment.In the figure in different views, identical appended drawing reference is specified to be corresponded toPart.
Fig. 1 is the schematic diagram for the method that the user equipment of the invention to charging station is authorized.
Specific embodiment
In order to enable the objectives, technical solutions, and advantages of the present invention are more clearly understood, below in conjunction with embodiment, to thisInvention is further elaborated;It should be appreciated that described herein, the specific embodiments are only for explaining the present invention, and does not have toIt is of the invention in limiting.To those skilled in the art, after access is described in detail below, other systems of the present embodimentSystem, method and/or feature will become obvious.All such additional systems, method, feature and advantage are intended to be included inIt in this specification, is included within the scope of the invention, and by the protection of the appended claims.In description described in detail belowThe other feature of the disclosed embodiments, and these characteristic roots will be apparent according to described in detail below.
Embodiment one:
As shown in Figure 1, for the schematic diagram of method that is authorized of user equipment of a kind of pair of charging station of the invention, comprising:
Charging session is carried out by the firmware authorization of user equipment, to use the encryption between user equipment and charging station to holdHand carries out charging to user equipment;With
The chargeable session of unauthorized is allowed to be charged to the predetermined percentage including user equipment to user equipment before authorizationThe pre-authorization charging of the charging capacity of ratio limits;Wherein, after authorization, the electricity of unauthorized is detected in the firmware of user equipmentWhen power charging source has been coupled to user equipment, allow the charging session of unauthorized.
The method further includes identifying token from the user equipment to the charging station password for inquiry.
The method, further includes:
Charging station is added in the approval list of authorization charging station of user equipment;With
Charging is verified according to the approval list for the authorization charging station being stored in database associated with user equipmentIt stands.
The method further includes that unique password is input in the application program of user equipment, by the charging stationIt is added to approved authorization charging station list.
The method further includes keeping database and the charging station that is added to approved authorization charging station list sameStep, wherein the approved authorization charging station list is encrypted.
The method, further includes: it is required that the firmware of the user equipment authorizes subsequent charging session again, to examineIt charges when measuring the termination or disconnection of the charging session to the user equipment.
Embodiment two:
A kind of system for using electricity bill control authorization to the user equipment with safe charging station, comprising:
Hardware processor:
Charging session is carried out by the firmware authorization of user equipment, to use the encryption between user equipment and charging station to holdHand carries out charging to user equipment;With
Before authorization, the chargeable session of unauthorized is allowed to be charged to the predetermined percentage including user equipment to user equipmentThe pre-authorization charging of the charging capacity of ratio limits;Wherein, after authorization, the electricity of unauthorized is detected in the firmware of user equipmentWhen power charging source has been coupled to user equipment, allow the charging session of unauthorized.
The system, wherein the processor identifies token from the user equipment to the charging station password for inquiry.
The system, wherein the processor:
Charging station is added in the approval list of authorization charging station of user equipment;With
Charging is verified according to the approval list for the authorization charging station being stored in database associated with user equipmentIt stands.
The system, wherein unique password is input in the application of the user equipment by the processor, by instituteIt states charging station and is added to approved authorization charging station list.
The system, wherein the processor makes database and is added to the described of approved authorization charging station listCharging station is synchronous, wherein the approved authorization charging station list is encrypted.
The system, wherein the firmware of user equipment described in the processor requirement authorizes subsequent charging meeting againWords, to charge when detecting the termination or disconnection of the charging session to the user equipment.
Embodiment three:
A kind of computer program product, for (being used by user equipment of the processor to the safe charging station with userFamily equipment) Charge Management authorization is used, the computer program product includes the non-transitory meter with computer-readable programThe code section that calculation machine readable storage medium storing program for executing is stored therein, computer readable program code part include:
Executable part, carries out charging session by the firmware authorization of user equipment, to use user equipment and chargingCryptographic handshake between standing carries out charging to user equipment;With
Executable part allows the chargeable session of unauthorized before authorization, by user equipment be charged to including withThe pre-authorization charging of the charging capacity of the predetermined percentage of family equipment limits;Wherein, after authorization, in the firmware of user equipmentWhen detecting that the power charge source of unauthorized has been coupled to user equipment, allow the charging session of unauthorized.
The computer program product, further includes executable part, the executable part from the user equipment toThe charging station inquiry encryption identification token.
The computer program product further includes executable part:
Charging station is added in the approval list of authorization charging station of user equipment;
By the application program of unique password input user equipment, charging station is added to the authorization charging station list of approvalIn;?
Charging is verified according to the approval list for the authorization charging station being stored in database associated with user equipmentIt stands.
The computer program product further includes executable part, and the executable part makes database and is added toThe charging station of approved authorization charging station list is synchronous, wherein the approved authorization charging station list is encrypted.
The computer program product, further includes: executable part, it is required that the firmware of the user equipment is awarded againSubsequent charging session is weighed, to charge when detecting the termination or disconnection of the charging session to the user equipment.
Although describing the present invention by reference to various embodiments above, but it is to be understood that of the invention not departing fromIn the case where range, many changes and modifications can be carried out.That is methods discussed above, system or equipment etc. showExample.Various configurations can be omitted suitably, replace or add various processes or component.For example, in alternative configuration, can withDescribed order in a different order executes method, and/or can add, and omits and/or combine the various stages.Moreover, aboutThe feature of certain configuration descriptions can be combined with various other configurations.Can combine in a similar way configuration different aspect andElement.In addition, many elements are only range of the example without limiting the disclosure or claims with the development of technology.
Give detail in the description to provide to the thorough understanding for including the exemplary configuration realized.However,Configuration can be practiced without these specific details for example, having been illustrated with well-known circuit, process, calculationMethod, structure and technology are without unnecessary details, to avoid fuzzy configuration.The description only provides example arrangement, and unlimitedThe scope of the claims processed, applicability or configuration.It is used on the contrary, front will provide the description of configuration for those skilled in the artRealize the enabled description of described technology.It, can be to the function of element without departing from the spirit or the scope of the present disclosureIt can and arrange and carry out various changes.
In addition, many operations can be in parallel or concurrently although each operation can describe the operations as sequential processIt executes.Furthermore it is possible to rearrange the sequence of operation.One process may have other steps.Furthermore, it is possible to pass through hardware, softPart, firmware, middleware, code, hardware description language or any combination thereof carry out the example of implementation method.When software, firmware, inBetween when realizing in part or code, program code or code segment for executing necessary task can store in such as storage mediumIn non-transitory computer-readable medium, and described task is executed by processor.
To sum up, be intended to foregoing detailed description be considered as it is illustrative and not restrictive, and it is to be understood that describedClaim (including all equivalents) is intended to limit the spirit and scope of the present invention.The above embodiment is interpreted as only usingIn illustrating the present invention rather than limit the scope of the invention.After the content for having read record of the invention, technologyPersonnel can make various changes or modifications the present invention, these equivalence changes and modification equally fall into the claims in the present invention and limitedFixed range.