Nothing Special   »   [go: up one dir, main page]

CN106714168B - Automatic authentication method and system based on distance activation - Google Patents

Automatic authentication method and system based on distance activation Download PDF

Info

Publication number
CN106714168B
CN106714168B CN201710013519.7A CN201710013519A CN106714168B CN 106714168 B CN106714168 B CN 106714168B CN 201710013519 A CN201710013519 A CN 201710013519A CN 106714168 B CN106714168 B CN 106714168B
Authority
CN
China
Prior art keywords
authentication
target
distance
authentication module
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710013519.7A
Other languages
Chinese (zh)
Other versions
CN106714168A (en
Inventor
马骏
郝天磊
邵洁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Weilai Energy Co ltd
Original Assignee
NIO Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NIO Co Ltd filed Critical NIO Co Ltd
Priority to CN201710013519.7A priority Critical patent/CN106714168B/en
Publication of CN106714168A publication Critical patent/CN106714168A/en
Application granted granted Critical
Publication of CN106714168B publication Critical patent/CN106714168B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60LPROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
    • B60L53/00Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles
    • B60L53/30Constructional details of charging stations
    • B60L53/31Charging columns specially adapted for electric vehicles
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60LPROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
    • B60L53/00Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles
    • B60L53/60Monitoring or controlling charging stations
    • B60L53/65Monitoring or controlling charging stations involving identification of vehicles or their battery types
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T10/00Road transport of goods or passengers
    • Y02T10/60Other road transportation technologies with climate change mitigation effect
    • Y02T10/70Energy storage systems for electromobility, e.g. batteries
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T10/00Road transport of goods or passengers
    • Y02T10/60Other road transportation technologies with climate change mitigation effect
    • Y02T10/7072Electromobility specific charging systems or methods for batteries, ultracapacitors, supercapacitors or double-layer capacitors
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T90/00Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02T90/10Technologies relating to charging of electric vehicles
    • Y02T90/12Electric charging stations
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T90/00Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02T90/10Technologies relating to charging of electric vehicles
    • Y02T90/16Information or communication technologies improving the operation of electric vehicles
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Transportation (AREA)
  • Mechanical Engineering (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Electric Propulsion And Braking For Vehicles (AREA)
  • Charge And Discharge Circuits For Batteries Or The Like (AREA)

Abstract

本发明属于安全认证领域,具体提供一种基于距离激活的自动鉴权方法和系统。本发明旨在解决现有技术中充换电设施对新能源汽车鉴权过程复杂、安全性差的问题。为此目的,本发明的方法主要包括以下步骤:获取第一目标和第二目标的位置;根据第一目标和第二目标的位置确定第一目标与第二目标之间的距离;将该距离与设定的阈值进行比较;当该距离小于或等于阈值时激活鉴权模块;通过鉴权模块对第一目标进行鉴权。优选地,第一目标是电动汽车,第二目标是充电桩。本发明的自动授权方法能够简化充换电设施对电动汽车的鉴权过程,并且不会因为鉴权凭证丢失而导致充换电设施被盗用,大幅度改善了用户的充换电体验。

Figure 201710013519

The invention belongs to the field of security authentication, and specifically provides an automatic authentication method and system based on distance activation. The invention aims to solve the problems in the prior art that the authentication process of the new energy vehicle by the charging and exchanging facility is complicated and the security is poor. For this purpose, the method of the present invention mainly includes the following steps: obtaining the positions of the first target and the second target; determining the distance between the first target and the second target according to the positions of the first target and the second target; Compare with the set threshold; activate the authentication module when the distance is less than or equal to the threshold; authenticate the first target through the authentication module. Preferably, the first target is an electric vehicle, and the second target is a charging pile. The automatic authorization method of the invention can simplify the authentication process of the electric vehicle by the charging and exchanging facilities, and will not cause the charging and exchanging facilities to be stolen due to the loss of the authentication certificate, thereby greatly improving the charging and exchanging experience of the user.

Figure 201710013519

Description

基于距离激活的自动鉴权方法和系统Automatic authentication method and system based on distance activation

技术领域technical field

本发明属于安全认证领域,具体提供一种基于距离激活的自动鉴权方法和系统。The invention belongs to the field of security authentication, and specifically provides an automatic authentication method and system based on distance activation.

背景技术Background technique

随着新能源汽车的不断研发与普及,现在拥有新能源汽车的用户也越来越多,与之相配套的充换电设施建设也越来越完善。为了防止充换电设施被其他人非法盗用,充换电设施需要对新能源汽车进行鉴权。但是,目前市面上的新能源汽车与充换电设施的授权过程比较繁琐复杂,用户体验较差。With the continuous development and popularization of new energy vehicles, there are more and more users owning new energy vehicles, and the construction of supporting charging and swapping facilities is also becoming more and more perfect. In order to prevent the charging and swapping facilities from being illegally stolen by others, the charging and swapping facilities need to authenticate new energy vehicles. However, the authorization process of new energy vehicles and charging and replacing facilities on the market is cumbersome and complicated, and the user experience is poor.

具体地,目前市面上的充换电设施与新能源汽车之间的自动鉴权方法主要有:物理锁、刷RFID卡、APP扫描/APP地图点选、指纹识别和虹膜识别等方式。对于物理锁的自动鉴权方法,需要将充电桩安装在带锁的箱子里,用户每次充电前用钥匙将箱子解锁打开,充完电再上锁,而且钥匙容易丢失;对于刷RFID卡的自动鉴权方法,需要用户每次充电都携带RFID卡,而且RFID卡也容易丢失;对于APP扫描/APP地图点选的自动鉴权方法,需要用户通过手机APP扫描充电桩上的二维码或APP地图点选,操作复杂;对于指纹识别和虹膜识别的自动鉴权方法,鉴权时间长而且操作复杂。Specifically, the current automatic authentication methods between charging and replacing facilities on the market and new energy vehicles mainly include: physical locks, swiping RFID cards, APP scanning/APP map selection, fingerprint recognition and iris recognition. For the automatic authentication method of physical locks, the charging pile needs to be installed in a box with a lock. The user unlocks and opens the box with a key before charging, and then locks the box after charging, and the key is easy to lose; The automatic authentication method requires the user to carry an RFID card every time they charge, and the RFID card is easy to lose; for the automatic authentication method of APP scanning/APP map selection, the user needs to scan the QR code on the charging pile through the mobile phone APP or APP map selection, the operation is complicated; for the automatic authentication method of fingerprint recognition and iris recognition, the authentication time is long and the operation is complicated.

相应地,本领域需要一种新的充换电设施授权方法来解决上述问题。Correspondingly, there is a need in the art for a new method for authorizing charging and replacing facilities to solve the above problems.

发明内容SUMMARY OF THE INVENTION

为了解决现有技术中的上述问题,即为了解决现有技术中充换电设施对新能源汽车鉴权过程复杂、安全性差的问题,本发明提供了一种基于距离激活的自动鉴权方法,该方法包括以下步骤:获取第一目标和第二目标的位置;根据所述第一目标和所述第二目标的位置确定所述第一目标与所述第二目标之间的距离;将所述距离与设定的阈值进行比较;当所述距离小于或等于所述阈值时激活鉴权模块;通过所述鉴权模块对所述第一目标进行鉴权。In order to solve the above-mentioned problems in the prior art, that is, in order to solve the problems in the prior art that the authentication process of charging and exchanging facilities for new energy vehicles is complex and the security is poor, the present invention provides an automatic authentication method based on distance activation, The method includes the following steps: acquiring the positions of the first target and the second target; determining the distance between the first target and the second target according to the positions of the first target and the second target; The distance is compared with a set threshold; the authentication module is activated when the distance is less than or equal to the threshold; the first target is authenticated by the authentication module.

在上述方法的优选技术方案中,所述鉴权模块设置在所述第二目标上。In a preferred technical solution of the above method, the authentication module is arranged on the second target.

在上述方法的优选技术方案中,所述鉴权模块包括设置在所述第一目标上的第一鉴权模块。In a preferred technical solution of the above method, the authentication module includes a first authentication module arranged on the first target.

在上述方法的优选技术方案中,所述鉴权模块还包括设置在所述第二目标上的第二鉴权模块。In a preferred technical solution of the above method, the authentication module further includes a second authentication module arranged on the second target.

在上述方法的优选技术方案中,“通过所述鉴权模块对所述第一目标进行鉴权”的步骤进一步包括:所述鉴权模块向所述第一目标发送鉴权邀请信息;所述第一目标在收到所述鉴权邀请信息时向所述鉴权模块发送鉴权请求信息;所述鉴权模块将所述鉴权请求信息与预存的合法鉴权信息进行匹配并根据匹配结果判断是否应当通过所述第一目标的鉴权请求。In a preferred technical solution of the above method, the step of "authenticating the first target by the authentication module" further includes: the authentication module sends authentication invitation information to the first target; the The first target sends authentication request information to the authentication module when receiving the authentication invitation information; the authentication module matches the authentication request information with the pre-stored legal authentication information and according to the matching result It is judged whether the authentication request of the first target should be passed.

在上述方法的优选技术方案中,“通过所述鉴权模块对所述第一目标进行鉴权”的步骤进一步包括:所述第一鉴权模块向所述第二鉴权模块发送鉴权请求信息;所述第二鉴权模块将所述鉴权请求信息与预存的合法鉴权信息进行匹配并根据匹配结果判断是否应当通过所述第一目标的鉴权请求。In a preferred technical solution of the above method, the step of "authenticating the first target through the authentication module" further includes: the first authentication module sends an authentication request to the second authentication module information; the second authentication module matches the authentication request information with the pre-stored legal authentication information and judges whether the authentication request of the first target should be passed according to the matching result.

在上述方法的优选技术方案中,“所述鉴权模块向所述第一目标发送鉴权邀请信息”的步骤进一步包括:所述鉴权模块通过无线通信方式或有线通信方式向所述第一目标发送鉴权邀请信息;并且/或者“所述第一目标向所述鉴权模块发送鉴权请求信息”的步骤进一步包括:所述第一目标通过无线通信方式或有线通信方式向所述鉴权模块发送鉴权请求信息。In a preferred technical solution of the above method, the step of "the authentication module sending authentication invitation information to the first target" further includes: the authentication module sends the authentication request to the first target through wireless communication or wired communication. The target sends authentication invitation information; and/or the step of “the first target sends authentication request information to the authentication module” further includes: the first target sends the authentication request information to the authentication module through wireless communication or wired communication. The right module sends authentication request information.

在上述方法的优选技术方案中,“所述第一鉴权模块向所述第二鉴权模块发送鉴权请求信息”的步骤进一步包括:所述第一鉴权模块通过无线通信方式或有线通信方式向所述第二鉴权模块发送鉴权请求信息。In a preferred technical solution of the above method, the step of "the first authentication module sends authentication request information to the second authentication module" further includes: the first authentication module communicates via wireless communication or wired communication way to send authentication request information to the second authentication module.

在上述方法的优选技术方案中,所述无线通信方式包括WIFI、蓝牙或ZIGBEE。In a preferred technical solution of the above method, the wireless communication method includes WIFI, Bluetooth or ZIGBEE.

在上述方法的优选技术方案中,所述有线通信方式包括电力线载波通信。In a preferred technical solution of the above method, the wired communication mode includes power line carrier communication.

在上述方法的优选技术方案中,所述第一目标是待充换电对象。In a preferred technical solution of the above method, the first target is an object to be charged and replaced.

在上述方法的优选技术方案中,所述第二目标是充换电设施。In a preferred technical solution of the above method, the second target is a charging and exchanging facility.

在上述方法的优选技术方案中,所述待充换电对象包括电动汽车、电动自行车和电动摩托车。In a preferred technical solution of the above method, the objects to be charged and replaced include electric vehicles, electric bicycles and electric motorcycles.

在上述方法的优选技术方案中,所述充换电设施包括直流充电桩、交流充电桩、直流充电机、交流充电机或移动充电车。In a preferred technical solution of the above method, the charging and exchanging facilities include a DC charging pile, an AC charging pile, a DC charger, an AC charger or a mobile charging vehicle.

在另一方面,本发明提供了一种基于距离激活的自动鉴权系统,该系统包括:定位模块,其用于获取第一目标和第二目标的位置以及根据所述第一目标和所述第二目标的位置确定所述第一目标与所述第二目标之间的距离;控制模块,其将所述距离与设定的阈值进行比较,并且当所述距离小于或等于所述阈值时激活鉴权模块;所述鉴权模块,所述自动鉴权系统能够通过所述鉴权模块对所述第一目标进行鉴权。In another aspect, the present invention provides an automatic authentication system based on distance activation, the system comprising: a positioning module for acquiring the positions of a first target and a second target and The position of the second target determines the distance between the first target and the second target; the control module compares the distance with a set threshold, and when the distance is less than or equal to the threshold The authentication module is activated; the authentication module, the automatic authentication system can authenticate the first target through the authentication module.

在上述自动鉴权系统的优选技术方案中,所述鉴权模块设置在所述第二目标上。In the preferred technical solution of the above automatic authentication system, the authentication module is arranged on the second target.

在上述自动鉴权系统的优选技术方案中,所述鉴权模块包括设置在所述第一目标上的第一鉴权模块。In the preferred technical solution of the above automatic authentication system, the authentication module includes a first authentication module arranged on the first target.

在上述自动鉴权系统的优选技术方案中,所述鉴权模块还包括设置在所述第二目标上的第二鉴权模块。In the preferred technical solution of the above automatic authentication system, the authentication module further includes a second authentication module arranged on the second target.

在上述自动鉴权系统的优选技术方案中,在对所述第一目标进行鉴权的过程中,所述鉴权模块向所述第一目标发送鉴权邀请信息,所述第一目标在收到所述鉴权邀请信息时向所述鉴权模块发送鉴权请求信息,然后所述鉴权模块将所述鉴权请求信息与预存的合法鉴权信息进行匹配并根据匹配结果判断是否应当通过所述第一目标的鉴权请求。In the preferred technical solution of the above automatic authentication system, in the process of authenticating the first target, the authentication module sends authentication invitation information to the first target, and the first target is receiving When the authentication invitation information arrives, the authentication request information is sent to the authentication module, and then the authentication module matches the authentication request information with the pre-stored legal authentication information and judges whether it should be passed according to the matching result. The authentication request of the first target.

在上述自动鉴权系统的优选技术方案中,在对所述第一目标进行鉴权的过程中,所述第一鉴权模块向所述第二鉴权模块发送鉴权请求信息,所述第二鉴权模块将所述鉴权请求信息与预存的合法鉴权信息进行匹配并根据匹配结果判断是否应当通过所述第一目标的鉴权请求。In the preferred technical solution of the above automatic authentication system, in the process of authenticating the first target, the first authentication module sends authentication request information to the second authentication module, and the first authentication module sends authentication request information to the second authentication module. The second authentication module matches the authentication request information with the pre-stored legal authentication information, and judges whether the authentication request of the first target should be passed according to the matching result.

在上述自动鉴权系统的优选技术方案中,所述鉴权模块通过无线通信方式或有线通信方式向所述第一目标发送鉴权邀请信息;并且/或者所述第一目标通过无线通信方式或有线通信方式向所述鉴权模块发送鉴权请求信息。In a preferred technical solution of the above automatic authentication system, the authentication module sends authentication invitation information to the first target through wireless communication or wired communication; and/or the first target uses wireless communication or The authentication request information is sent to the authentication module in a wired communication manner.

在上述自动鉴权系统的优选技术方案中,所述第一鉴权模块通过无线通信方式或有线通信方式向所述第二鉴权模块发送鉴权请求信息。In the preferred technical solution of the above automatic authentication system, the first authentication module sends authentication request information to the second authentication module through wireless communication or wired communication.

在上述自动鉴权系统的优选技术方案中,所述无线通信方式包括WIFI、蓝牙或ZIGBEE。In the preferred technical solution of the above automatic authentication system, the wireless communication method includes WIFI, Bluetooth or ZIGBEE.

在上述自动鉴权系统的优选技术方案中,所述有线通信方式包括电力线载波通信。In the preferred technical solution of the above automatic authentication system, the wired communication method includes power line carrier communication.

在上述自动鉴权系统的优选技术方案中,所述第一目标是待充换电对象。In the preferred technical solution of the above automatic authentication system, the first target is the object to be charged and replaced.

在上述自动鉴权系统的优选技术方案中,所述第二目标是充换电设施。In the preferred technical solution of the above automatic authentication system, the second target is a charging and replacing facility.

在上述自动鉴权系统的优选技术方案中,所述待充换电对象包括电动汽车、电动自行车和电动摩托车。In the preferred technical solution of the above automatic authentication system, the objects to be charged and replaced include electric vehicles, electric bicycles and electric motorcycles.

在上述自动鉴权系统的优选技术方案中,所述充换电设施包括直流充电桩、交流充电桩、直流充电机、交流充电机或移动充电车。In the preferred technical solution of the above automatic authentication system, the charging and exchanging facilities include a DC charging pile, an AC charging pile, a DC charger, an AC charger or a mobile charging vehicle.

本领域技术人员能够理解的是,在本发明的优选技术方案中,通过定位模块获取待充换电对象的位置,进而根据待充换电对象的位置和充换电设施的位置获取充换电设施与待充换电对象之间的距离。进一步,当该距离小于或等于设定的阈值时激活鉴权模块,进而借助鉴权模块来验证采集到的待充换电对象的鉴权请求信息是否与预存的合法鉴权信息相匹配,如果是,则待充换电对象被授权,充换电设施对其进行充电或换电。Those skilled in the art can understand that, in the preferred technical solution of the present invention, the position of the object to be charged and replaced is obtained through the positioning module, and then the charging and replacement device is obtained according to the position of the object to be charged and replaced and the position of the charging and replacing facility. The distance between the facility and the object to be charged and replaced. Further, activate the authentication module when the distance is less than or equal to the set threshold, and then verify whether the collected authentication request information of the object to be charged and exchanged matches the pre-stored legal authentication information by means of the authentication module, if If yes, the object to be charged and exchanged is authorized, and the charging and exchanging facility will charge or exchange it.

由此可见,本发明的自动授权方法不仅能够简化充换电设施对电动汽车的鉴权过程,并且不会因为鉴权凭证的丢失而导致充换电设施被盗用,大幅度改善了用户的充换电体验。It can be seen that the automatic authorization method of the present invention can not only simplify the authentication process of the electric vehicle by the charging and exchanging facilities, but also prevent the charging and exchanging facilities from being stolen due to the loss of the authentication certificate, which greatly improves the charging and exchanging facilities of users. battery swap experience.

方案1、一种基于距离激活的自动鉴权方法,其特征在于,所述方法包括以下步骤:Scheme 1, an automatic authentication method based on distance activation, characterized in that the method comprises the following steps:

获取第一目标和第二目标的位置;Get the position of the first target and the second target;

根据所述第一目标和所述第二目标的位置确定所述第一目标与所述第二目标之间的距离;determining the distance between the first target and the second target according to the positions of the first target and the second target;

将所述距离与设定的阈值进行比较;comparing the distance with a set threshold;

当所述距离小于或等于所述阈值时激活鉴权模块;Activate the authentication module when the distance is less than or equal to the threshold;

通过所述鉴权模块对所述第一目标进行鉴权。The first target is authenticated by the authentication module.

方案2、根据方案1所述的基于距离激活的自动鉴权方法,其特征在于,所述鉴权模块设置在所述第二目标上。Solution 2. The automatic authentication method based on distance activation according to solution 1, wherein the authentication module is arranged on the second target.

方案3、根据方案1所述的基于距离激活的自动鉴权方法,其特征在于,所述鉴权模块包括设置在所述第一目标上的第一鉴权模块。Solution 3. The automatic authentication method based on distance activation according to solution 1, wherein the authentication module includes a first authentication module disposed on the first target.

方案4、根据方案3所述的基于距离激活的自动鉴权方法,其特征在于,所述鉴权模块还包括设置在所述第二目标上的第二鉴权模块。Solution 4. The automatic authentication method based on distance activation according to solution 3, wherein the authentication module further includes a second authentication module disposed on the second target.

方案5、根据方案2所述的基于距离激活的自动鉴权方法,其特征在于,“通过所述鉴权模块对所述第一目标进行鉴权”的步骤进一步包括:Scheme 5. The automatic authentication method based on distance activation according to scheme 2, wherein the step of "authenticating the first target by the authentication module" further comprises:

所述鉴权模块向所述第一目标发送鉴权邀请信息;The authentication module sends authentication invitation information to the first target;

所述第一目标在收到所述鉴权邀请信息时向所述鉴权模块发送鉴权请求信息;The first target sends authentication request information to the authentication module when receiving the authentication invitation information;

所述鉴权模块将所述鉴权请求信息与预存的合法鉴权信息进行匹配并根据匹配结果判断是否应当通过所述第一目标的鉴权请求。The authentication module matches the authentication request information with the pre-stored legal authentication information, and judges whether the authentication request of the first target should be passed according to the matching result.

方案6、根据方案4所述的基于距离激活的自动鉴权方法,其特征在于,“通过所述鉴权模块对所述第一目标进行鉴权”的步骤进一步包括:Scheme 6. The automatic authentication method based on distance activation according to scheme 4, wherein the step of "authenticating the first target by the authentication module" further comprises:

所述第一鉴权模块向所述第二鉴权模块发送鉴权请求信息;The first authentication module sends authentication request information to the second authentication module;

所述第二鉴权模块将所述鉴权请求信息与预存的合法鉴权信息进行匹配并根据匹配结果判断是否应当通过所述第一目标的鉴权请求。The second authentication module matches the authentication request information with the pre-stored legal authentication information and judges whether the authentication request of the first target should be passed according to the matching result.

方案7、根据方案5所述的基于距离激活的自动鉴权方法,其特征在于,“所述鉴权模块向所述第一目标发送鉴权邀请信息”的步骤进一步包括:所述鉴权模块通过无线通信方式或有线通信方式向所述第一目标发送鉴权邀请信息;并且/或者Scheme 7. The automatic authentication method based on distance activation according to scheme 5, wherein the step of "the authentication module sends authentication invitation information to the first target" further comprises: the authentication module Send authentication invitation information to the first target through wireless communication or wired communication; and/or

“所述第一目标向所述鉴权模块发送鉴权请求信息”的步骤进一步包括:所述第一目标通过无线通信方式或有线通信方式向所述鉴权模块发送鉴权请求信息。The step of "the first target sends the authentication request information to the authentication module" further includes: the first target sends the authentication request information to the authentication module through wireless communication or wired communication.

方案8、根据方案7所述的基于距离激活的自动鉴权方法,其特征在于,所述无线通信方式包括WIFI、蓝牙或ZIGBEE。Solution 8. The automatic authentication method based on distance activation according to solution 7, wherein the wireless communication mode includes WIFI, Bluetooth or ZIGBEE.

方案9、根据方案7所述的基于距离激活的自动鉴权方法,其特征在于,所述有线通信方式包括电力线载波通信。Solution 9. The automatic authentication method based on distance activation according to solution 7, wherein the wired communication mode includes power line carrier communication.

方案10、根据方案6所述的基于距离激活的自动鉴权方法,其特征在于,“所述第一鉴权模块向所述第二鉴权模块发送鉴权请求信息”的步骤进一步包括:所述第一鉴权模块通过无线通信方式或有线通信方式向所述第二鉴权模块发送鉴权请求信息。Scheme 10. The automatic authentication method based on distance activation according to Scheme 6, wherein the step of "sending the first authentication module to the second authentication module with authentication request information" further comprises: The first authentication module sends authentication request information to the second authentication module through wireless communication or wired communication.

方案11、根据方案10所述的基于距离激活的自动鉴权方法,其特征在于,所述无线通信方式包括WIFI、蓝牙或ZIGBEE。Solution 11. The automatic authentication method based on distance activation according to solution 10, wherein the wireless communication mode includes WIFI, Bluetooth or ZIGBEE.

方案12、根据方案10所述的基于距离激活的自动鉴权方法,其特征在于,所述有线通信方式包括电力线载波通信。Solution 12. The automatic authentication method based on distance activation according to solution 10, wherein the wired communication mode includes power line carrier communication.

方案13、根据方案1至12中任一项所述的基于距离激活的自动鉴权方法,其特征在于,所述第一目标是待充换电对象。Solution 13: The automatic authentication method based on distance activation according to any one of solutions 1 to 12, wherein the first target is an object to be charged and replaced.

方案14、根据方案13所述的基于距离激活的自动鉴权方法,其特征在于,所述第二目标是充换电设施。Solution 14. The automatic authentication method based on distance activation according to solution 13, wherein the second target is a charging and replacing facility.

方案15、根据方案14所述的基于距离激活的自动鉴权方法,其特征在于,所述待充换电对象包括电动汽车、电动自行车和电动摩托车。Solution 15: The automatic authentication method based on distance activation according to solution 14, wherein the objects to be charged and replaced include electric vehicles, electric bicycles, and electric motorcycles.

方案16、根据方案15所述的基于距离激活的自动鉴权方法,其特征在于,所述充换电设施包括直流充电桩、交流充电桩、直流充电机、交流充电机或移动充电车。Solution 16: The automatic authentication method based on distance activation according to solution 15, wherein the charging and swapping facilities include a DC charging pile, an AC charging pile, a DC charger, an AC charger or a mobile charging vehicle.

方案17、一种基于距离激活的自动鉴权系统,其特征在于,所述系统包括:Scheme 17, an automatic authentication system based on distance activation, characterized in that the system comprises:

定位模块,其用于获取第一目标和第二目标的位置以及根据所述第一目标和所述第二目标的位置确定所述第一目标与所述第二目标之间的距离;a positioning module, configured to acquire the positions of the first target and the second target and determine the distance between the first target and the second target according to the positions of the first target and the second target;

控制模块,其将所述距离与设定的阈值进行比较,并且当所述距离小于或等于所述阈值时激活鉴权模块;a control module that compares the distance with a set threshold, and activates an authentication module when the distance is less than or equal to the threshold;

所述鉴权模块,所述自动鉴权系统能够通过所述鉴权模块对所述第一目标进行鉴权。The authentication module and the automatic authentication system can authenticate the first target through the authentication module.

方案18、根据方案17所述的基于距离激活的自动鉴权系统,其特征在于,所述鉴权模块设置在所述第二目标上。Solution 18. The automatic authentication system based on distance activation according to solution 17, wherein the authentication module is arranged on the second target.

方案19、根据方案17所述的基于距离激活的自动鉴权系统,其特征在于,所述鉴权模块包括设置在所述第一目标上的第一鉴权模块。Solution 19. The automatic authentication system based on distance activation according to solution 17, wherein the authentication module includes a first authentication module disposed on the first target.

方案20、根据方案19所述的基于距离激活的自动鉴权系统,其特征在于,所述鉴权模块还包括设置在所述第二目标上的第二鉴权模块。Solution 20. The automatic authentication system based on distance activation according to solution 19, wherein the authentication module further includes a second authentication module disposed on the second target.

方案21、根据方案18所述的基于距离激活的自动鉴权系统,其特征在于,在对所述第一目标进行鉴权的过程中,所述鉴权模块向所述第一目标发送鉴权邀请信息,所述第一目标在收到所述鉴权邀请信息时向所述鉴权模块发送鉴权请求信息,然后所述鉴权模块将所述鉴权请求信息与预存的合法鉴权信息进行匹配并根据匹配结果判断是否应当通过所述第一目标的鉴权请求。Scheme 21. The automatic authentication system based on distance activation according to scheme 18, characterized in that in the process of authenticating the first target, the authentication module sends the authentication to the first target Invitation information, the first target sends authentication request information to the authentication module when receiving the authentication invitation information, and then the authentication module combines the authentication request information with the pre-stored legal authentication information Matching is performed and according to the matching result, it is judged whether the authentication request of the first target should be passed.

方案22、根据方案20所述的基于距离激活的自动鉴权系统,其特征在于,在对所述第一目标进行鉴权的过程中,所述第一鉴权模块向所述第二鉴权模块发送鉴权请求信息,所述第二鉴权模块将所述鉴权请求信息与预存的合法鉴权信息进行匹配并根据匹配结果判断是否应当通过所述第一目标的鉴权请求。Scheme 22. The automatic authentication system based on distance activation according to scheme 20, wherein in the process of authenticating the first target, the first authentication module authenticates the second The module sends authentication request information, and the second authentication module matches the authentication request information with pre-stored legal authentication information and judges whether the authentication request of the first target should be passed according to the matching result.

方案23、根据方案21所述的基于距离激活的自动鉴权系统,其特征在于,所述鉴权模块通过无线通信方式或有线通信方式向所述第一目标发送鉴权邀请信息;并且/或者Scheme 23. The automatic authentication system based on distance activation according to scheme 21, wherein the authentication module sends authentication invitation information to the first target through wireless communication or wired communication; and/or

所述第一目标通过无线通信方式或有线通信方式向所述鉴权模块发送鉴权请求信息。The first target sends authentication request information to the authentication module through wireless communication or wired communication.

方案24、根据方案23所述的基于距离激活的自动鉴权系统,其特征在于,所述无线通信方式包括WIFI、蓝牙或ZIGBEE。Solution 24: The automatic authentication system based on distance activation according to solution 23, wherein the wireless communication mode includes WIFI, Bluetooth or ZIGBEE.

方案25、根据方案23所述的基于距离激活的自动鉴权系统,其特征在于,所述有线通信方式包括电力线载波通信。Solution 25: The automatic authentication system based on distance activation according to solution 23, wherein the wired communication mode includes power line carrier communication.

方案26、根据方案22所述的基于距离激活的自动鉴权系统,其特征在于,所述第一鉴权模块通过无线通信方式或有线通信方式向所述第二鉴权模块发送鉴权请求信息。Scheme 26. The automatic authentication system based on distance activation according to scheme 22, wherein the first authentication module sends the authentication request information to the second authentication module through wireless communication or wired communication .

方案27、根据方案26所述的基于距离激活的自动鉴权系统,其特征在于,所述无线通信方式包括WIFI、蓝牙或ZIGBEE。Solution 27: The automatic authentication system based on distance activation according to solution 26, wherein the wireless communication mode includes WIFI, Bluetooth or ZIGBEE.

方案28、根据方案26所述的基于距离激活的自动鉴权系统,其特征在于,所述有线通信方式包括电力线载波通信。Solution 28. The automatic authentication system based on distance activation according to solution 26, wherein the wired communication mode includes power line carrier communication.

方案29、根据方案17至28中任一项所述的基于距离激活的自动鉴权系统,其特征在于,所述第一目标是待充换电对象。Solution 29: The automatic authentication system based on distance activation according to any one of solutions 17 to 28, wherein the first target is an object to be charged and replaced.

方案30、根据方案29所述的基于距离激活的自动鉴权系统,其特征在于,所述第二目标是充换电设施。Solution 30. The automatic authentication system based on distance activation according to solution 29, wherein the second target is a charging and replacing facility.

方案31、根据方案30所述的基于距离激活的自动鉴权系统,其特征在于,所述待充换电对象包括电动汽车、电动自行车和电动摩托车。Solution 31: The automatic authentication system based on distance activation according to solution 30, wherein the objects to be charged and replaced include electric vehicles, electric bicycles, and electric motorcycles.

方案32、根据方案31所述的基于距离激活的自动鉴权系统,其特征在于,所述充换电设施包括直流充电桩、交流充电桩、直流充电机、交流充电机或移动充电车。Solution 32: The automatic authentication system based on distance activation according to solution 31, wherein the charging and swapping facilities include DC charging piles, AC charging piles, DC chargers, AC chargers or mobile charging vehicles.

附图说明Description of drawings

图1是本发明的基于距离激活的自动鉴权方法的步骤流程图。FIG. 1 is a flow chart of the steps of the automatic authentication method based on distance activation of the present invention.

具体实施方式Detailed ways

下面参照附图来描述本发明的优选实施方式。本领域技术人员应当理解的是,这些实施方式仅仅用于解释本发明的技术原理,并非用于限制本发明的保护范围。例如,虽然说明书是以电动汽车充电为例来对本发明的自动鉴权方法进行说明的,但是很明显本发明的方法也适用于其他鉴权场合,本领域技术人员可以根据需要对应用场景作出调整,这并不偏离本发明的基本原理,因此也将落入本发明的保护范围之内。Preferred embodiments of the present invention are described below with reference to the accompanying drawings. It should be understood by those skilled in the art that these embodiments are only used to explain the technical principle of the present invention, and are not used to limit the protection scope of the present invention. For example, although the description takes the charging of an electric vehicle as an example to describe the automatic authentication method of the present invention, it is obvious that the method of the present invention is also applicable to other authentication occasions, and those skilled in the art can make adjustments to the application scenarios as needed , which does not deviate from the basic principle of the present invention, and therefore also falls within the protection scope of the present invention.

本发明的基于距离激活的自动鉴权系统包括定位模块、鉴权模块和控制模块。其中,定位模块用于获取第一目标和第二目标的位置,进而根据第一目标和第二目标的位置确定第一目标与第二目标之间的距离。在优选实施方式中,第一目标是移动终端,例如电动汽车,其实时位置可通过定位模块来获取。但是,第二目标是固定终端,例如充电桩,其位置既可以通过定位模块来实时获取,也可以是预先存储好的,由定位模块直接调用即可。所以,本申请中的“获取”应作广义理解,其既可以是对移动目标的实时位置的获取,也可以是对固定目标的预存位置的直接或间接调用。此外,该定位模块既可以是现有系统的一部分,例如是现有车载导航系统的定位模块,也可以是独立于现有系统的单独的设备,这方面的变化和调整都不偏离本发明的基本原理,因此也将落入本发明的保护范围之内。The automatic authentication system based on distance activation of the present invention includes a positioning module, an authentication module and a control module. The positioning module is used to obtain the positions of the first target and the second target, and then determine the distance between the first target and the second target according to the positions of the first target and the second target. In a preferred embodiment, the first target is a mobile terminal, such as an electric vehicle, the real-time position of which can be obtained through a positioning module. However, the second target is a fixed terminal, such as a charging pile, the position of which can be acquired in real time through the positioning module, or can be stored in advance and called directly by the positioning module. Therefore, the "acquisition" in this application should be understood in a broad sense, which may be the acquisition of the real-time position of the moving target, or the direct or indirect call of the pre-stored position of the fixed target. In addition, the positioning module can be either a part of the existing system, such as the positioning module of the existing vehicle navigation system, or a separate device independent of the existing system, and the changes and adjustments in this respect do not deviate from the present invention. The basic principle, therefore, will also fall within the scope of protection of the present invention.

控制模块能够分别与定位模块和鉴权模块进行通信,控制模块用于将第一目标与第二目标之间的距离与设定的阈值进行比较,在该距离小于或等于设定的阈值时激活鉴权模块。同理,在物理形式上,控制模块既可以是现有系统的一部分,例如是车辆VCU本身或者其子模块,也可以是独立于现有系统的专用设备。The control module can communicate with the positioning module and the authentication module respectively, and the control module is used to compare the distance between the first target and the second target with a set threshold, and activate when the distance is less than or equal to the set threshold Authentication module. Similarly, in physical form, the control module can either be a part of the existing system, such as the vehicle VCU itself or its sub-modules, or it can be a dedicated device independent of the existing system.

鉴权模块用于对第一目标进行鉴权。当鉴权模块被激活时,第二目标通过鉴权模块对第一目标进行鉴权。进一步,当鉴权模块采集到的第一目标的鉴权请求信息与预存的合法鉴权信息相匹配时,第二目标对第一目标提供授权。The authentication module is used to authenticate the first target. When the authentication module is activated, the second target authenticates the first target through the authentication module. Further, when the authentication request information of the first target collected by the authentication module matches the pre-stored legal authentication information, the second target provides authorization to the first target.

进一步,鉴权模块优选地包括第一鉴权模块和第二鉴权模块。其中,第一鉴权模块设置在第一目标上,第二鉴权模块设置在第二目标上。当第一目标和第二目标的距离小于或等于设定的阈值时,第一鉴权模块和第二鉴权模块被同时激活(或者控制模块先激活一个鉴权模块,然后再由先激活的鉴权模块来激活另一个鉴权模块),并且第一鉴权模块向外发送鉴权请求信息,第二鉴权装置接收到鉴权请求信息后将其与预存的合法鉴权信息进行匹配,然后根据该匹配结果判断第二目标是否应当通过第一目标的鉴权请求。与定位模块和控制模块类似,第一鉴权模块和第二鉴权模块也是既可以与现有系统结合来实现,也可以设置成专用模块。Further, the authentication module preferably includes a first authentication module and a second authentication module. Wherein, the first authentication module is arranged on the first target, and the second authentication module is arranged on the second target. When the distance between the first target and the second target is less than or equal to the set threshold, the first authentication module and the second authentication module are activated at the same time (or the control module activates one authentication module first, and then the first authentication module is activated by the first authentication module. The authentication module activates another authentication module), and the first authentication module sends authentication request information to the outside, and the second authentication device matches the pre-stored legal authentication information after receiving the authentication request information, Then, according to the matching result, it is judged whether the second target should pass the authentication request of the first target. Similar to the positioning module and the control module, the first authentication module and the second authentication module can be implemented in combination with the existing system, or can be set as dedicated modules.

替代性地,本领域技术人员也可以根据需要只在第二目标上设置鉴权模块(如上述的第二鉴权模块)。当第一目标与第二目标之间的距离小于或等于设定的阈值时,第二鉴权模块被激活,并对外发送鉴权邀请信息。第一目标接收到鉴权邀请信息时向第二鉴权模块发送鉴权请求信息;第二鉴权模块将鉴权请求信息与预存的合法鉴权信息进行匹配并根据匹配结果判断是否应当通过第一目标的鉴权请求。Alternatively, those skilled in the art can also set an authentication module (such as the above-mentioned second authentication module) only on the second target as required. When the distance between the first target and the second target is less than or equal to the set threshold, the second authentication module is activated, and sends authentication invitation information to the outside. When the first target receives the authentication invitation information, it sends the authentication request information to the second authentication module; the second authentication module matches the authentication request information with the pre-stored legal authentication information and judges whether it should pass the first authentication request according to the matching result. An authentication request for a target.

再者,本领域技术人员还可以根据需要只在第一目标上设置鉴权模块(如上述的第一鉴权模块)。当第一鉴权模块被激活时,第一鉴权模块直接向外发送鉴权请求信息。当第二目标接收到鉴权请求信息后将其与预存的合法鉴权信息进行匹配,然后根据该匹配结果判断第二目标是否应当通过第一目标的鉴权请求。Furthermore, those skilled in the art can also set an authentication module (such as the above-mentioned first authentication module) only on the first target as required. When the first authentication module is activated, the first authentication module directly sends out authentication request information. When the second target receives the authentication request information, it matches the pre-stored legal authentication information, and then judges whether the second target should pass the authentication request of the first target according to the matching result.

在本发明的优选实施方案中,第一目标是待充换电对象,具体地,该待充换电对象可以是电动汽车、电动自行车等。第二目标是充换电设施,具体地,该充换电设施可以是直流充电桩、交流充电桩、直流充电机、交流充电机、移动充电车等。因此,第二目标对第一目标的授权是充换电设施对待充换电对象进行充电或换电授权,例如,充电桩对电动汽车进行充电授权,或移动充电车对电动汽车进行充电授权。In a preferred embodiment of the present invention, the first target is an object to be charged and exchanged, and specifically, the object to be charged and exchanged may be an electric vehicle, an electric bicycle, or the like. The second goal is a charging and exchanging facility. Specifically, the charging and exchanging facility may be a DC charging pile, an AC charging pile, a DC charger, an AC charger, a mobile charging vehicle, and the like. Therefore, the authorization of the second target to the first target is that the charging and swapping facility performs charging or power-swapping authorization for the object to be charged and swapped, for example, the charging pile authorizes the charging of the electric vehicle, or the mobile charging vehicle authorizes the charging of the electric vehicle.

下面参照附图并结合充电桩和电动汽车对本发明的基于距离激活的自动鉴权方法进行详细说明。The automatic authentication method based on distance activation of the present invention will be described in detail below with reference to the accompanying drawings and in conjunction with a charging pile and an electric vehicle.

如图1所示,本发明的基于距离激活的自动鉴权方法主要包括:步骤S110,获取充电桩和电动汽车的位置;步骤S120,根据充电桩和电动汽车的位置确定充电桩与电动汽车之间的距离;步骤S130,将该距离与设定的阈值进行比较;步骤S140,当该距离小于或等于设定的阈值时激活鉴权模块;步骤S150,通过鉴权模块对电动汽车进行鉴权。As shown in FIG. 1, the automatic authentication method based on distance activation of the present invention mainly includes: step S110, obtaining the positions of the charging pile and the electric vehicle; step S120, determining the relationship between the charging pile and the electric vehicle according to the positions of the charging pile and the electric vehicle step S130, compare the distance with the set threshold; step S140, activate the authentication module when the distance is less than or equal to the set threshold; step S150, authenticate the electric vehicle through the authentication module .

具体地,在步骤S110中,通过定位模块获取充电桩和电动汽车的位置。如前文所述,这里的“获取”既可以是实时定位-例如对电动汽车而言,也可以是对预存位置的调用-例如对充电桩而言。Specifically, in step S110, the location of the charging pile and the electric vehicle is acquired through the positioning module. As mentioned above, the "acquisition" here can be either real-time positioning—for example, for electric vehicles, or a call to a pre-stored location—for example, for charging piles.

具体地,在步骤S120中,定位模块通过步骤S110中获得的位置确定充电桩与电动汽车之间的距离。或者本领域技术人员也可以通过其他功能模块或功能单元根据充电桩和电动汽车的位置计算两者之间的实时距离,例如控制模块。Specifically, in step S120, the positioning module determines the distance between the charging pile and the electric vehicle according to the position obtained in step S110. Alternatively, those skilled in the art can also calculate the real-time distance between the charging pile and the electric vehicle through other functional modules or functional units, such as a control module, according to the positions of the charging pile and the electric vehicle.

具体地,在步骤S130中,将步骤S120中获得的实时距离与设定的阈值进行比较。需要说明的是,对于该阈值,本领域技术人员可根据实际情况或安全需求进行设定,例如该阈值可以是5m、10m、20m等。进一步需要说明的是,该阈值的取值不宜过大,避免充电桩频繁对路过的合法电动汽车进行鉴权;该阈值的取值也不宜过小,避免电动汽车临近充电桩时,充电桩还未对电动汽车进行授权,影响用户的充电体验。Specifically, in step S130, the real-time distance obtained in step S120 is compared with a set threshold. It should be noted that, for the threshold, those skilled in the art can set it according to the actual situation or security requirements, for example, the threshold can be 5m, 10m, 20m, and so on. It should be further noted that the value of this threshold should not be too large, to avoid frequent authentication of passing legal electric vehicles by the charging pile; the value of this threshold should not be too small, to avoid that when the electric vehicle approaches the charging pile, the charging pile will The electric vehicle is not authorized, which affects the user's charging experience.

具体地,在步骤S140中,当该实时距离小于或等于设定的阈值时,控制模块使鉴权模块被激活;实时距离大于设定的距离时,控制模块使鉴权模块保持待机或关闭状态。这种设置的技术效果是,即使他人非法盗用了鉴权密钥并向充电桩上的鉴权模块发起了鉴权请求,如果没有合法注册的电动汽车在该充电桩附近,鉴权模块就会保持不工作的状态,从而使非法电动汽车无法通过鉴权认证并因此无法获得充电。Specifically, in step S140, when the real-time distance is less than or equal to the set threshold, the control module activates the authentication module; when the real-time distance is greater than the set distance, the control module keeps the authentication module in a standby or off state . The technical effect of this setting is that even if others illegally steal the authentication key and initiate an authentication request to the authentication module on the charging pile, if there is no legally registered electric vehicle near the charging pile, the authentication module will remain inactive so that illegal EVs cannot pass authentication and therefore cannot be charged.

更进一步,确定充电桩与电动汽车之间的实时距离小于或等于设定阈值的方式除了采用上述定位模块外,还可以通过红外、超声波、激光、双摄等距离判定模块来判定。本领域技术人员能够理解的是,控制模块、定位模块和其他形式的距离判定模块既可以设置在电动汽车上,也可以设置在充电桩上,或者可以设置在远端,例如后台服务器或云端服务器上。Furthermore, in addition to using the above-mentioned positioning module, the method of determining that the real-time distance between the charging pile and the electric vehicle is less than or equal to the set threshold can also be determined by infrared, ultrasonic, laser, dual-camera and other distance determination modules. It can be understood by those skilled in the art that the control module, the positioning module and other forms of distance determination modules can be installed on the electric vehicle or the charging pile, or can be installed at a remote end, such as a background server or a cloud server superior.

具体地,在步骤S150中,充电桩通过鉴权模块对电动汽车进行鉴权。优选地,该鉴权模块包括第一鉴权模块和第二鉴权模块。其中,第一鉴权模块设置在电动汽车上,第二鉴权模块设置在充电桩上。当充电桩与电动汽车之间的距离小于或等于设定的阈值时,第一鉴权模块和第二鉴权模块被同时激活(或者先激活一个鉴权模块,然后再由先激活的鉴权模块来激活另一个鉴权模块),并且第一鉴权模块向外发送鉴权请求信息,第二鉴权装置接收到鉴权请求信息后将其与预存的合法鉴权信息进行匹配,然后根据该匹配结果判断充电桩是否应当通过电动汽车的鉴权请求。Specifically, in step S150, the charging pile authenticates the electric vehicle through the authentication module. Preferably, the authentication module includes a first authentication module and a second authentication module. Wherein, the first authentication module is set on the electric vehicle, and the second authentication module is set on the charging pile. When the distance between the charging pile and the electric vehicle is less than or equal to the set threshold, the first authentication module and the second authentication module are activated at the same time (or one authentication module is activated first, and then the first authentication module is activated by the first authentication module). module to activate another authentication module), and the first authentication module sends the authentication request information to the outside, and the second authentication device matches the pre-stored legal authentication information after receiving the authentication request information, and then according to The matching result determines whether the charging pile should pass the authentication request of the electric vehicle.

本领域技术人员也可以根据需要只在充电桩上设置鉴权模块(如上述的第二鉴权模块)。当充电桩与电动汽车的距离小于或等于设定的阈值时,第二鉴权模块被激活,并对外发送鉴权邀请信息。电动汽车接收到鉴权邀请信息时向第二鉴权模块发送鉴权请求信息;第二鉴权模块将鉴权请求信息与预存的合法鉴权信息进行匹配并根据匹配结果判断是否应当通过电动汽车的鉴权请求。Those skilled in the art can also set an authentication module (such as the above-mentioned second authentication module) only on the charging pile as required. When the distance between the charging pile and the electric vehicle is less than or equal to the set threshold, the second authentication module is activated and sends authentication invitation information to the outside. When the electric vehicle receives the authentication invitation information, it sends the authentication request information to the second authentication module; the second authentication module matches the authentication request information with the pre-stored legal authentication information and judges whether it should pass the electric vehicle according to the matching result. authentication request.

本领域技术人员还可以根据需要只在电动汽车上设置鉴权模块(如上述的第一鉴权模块)。当第一鉴权模块被激活时,第一鉴权模块直接向外发送鉴权请求信息。当充电桩接收到鉴权请求信息后将其与预存的合法鉴权信息进行匹配,然后根据该匹配结果判断充电桩是否应当通过电动汽车的鉴权请求。Those skilled in the art can also only set an authentication module (such as the above-mentioned first authentication module) on the electric vehicle as required. When the first authentication module is activated, the first authentication module directly sends out authentication request information. When the charging pile receives the authentication request information, it matches the pre-stored legal authentication information, and then judges whether the charging pile should pass the authentication request of the electric vehicle according to the matching result.

在优选实施例中,上述鉴权邀请信息和/或鉴权请求信息的发送和接收既可以通过无线通信方式进行,也可以通过有线通信方式进行。无线通信方式例如可以是WIFI、蓝牙或ZIGBEE等,有线通信方式例如可以是电力线载波通信(PLC)等。此外,鉴权邀请信息和鉴权请求信息的内容可以根据需要灵活设定。作为示例,鉴权邀请信息可包含充电桩的相关参数以及供电动汽车确认的充电询问信息等,鉴权请求信息可包含但不限于电动汽车的车架号(VIN码)、发动机编号(电动机编号)、电池编号、预设并存储在电动汽车里的专用识别编码、或其他可以识别电动汽车身份的编号等。对信息内容的改变和调整并不偏离本发明的基本原理,因此也将落入本发明的保护范围之内。In a preferred embodiment, the above-mentioned sending and receiving of the authentication invitation information and/or the authentication request information may be performed by wireless communication or wired communication. The wireless communication method may be, for example, WIFI, Bluetooth, or ZIGBEE, etc., and the wired communication method may be, for example, power line carrier communication (PLC) and the like. In addition, the content of the authentication invitation information and the authentication request information can be flexibly set as required. As an example, the authentication invitation information may include relevant parameters of the charging pile and the charging inquiry information confirmed by the electric vehicle, etc., and the authentication request information may include but not limited to the frame number (VIN code), engine number (motor number) of the electric vehicle. ), battery number, special identification code preset and stored in the electric vehicle, or other numbers that can identify the identity of the electric vehicle, etc. Changes and adjustments to the information content do not deviate from the basic principles of the present invention, and therefore also fall within the protection scope of the present invention.

进一步,为了执行本发明的方法,合法的电动汽车需要事先在充电桩或能够与充电桩进行通信的后台数据库或云端数据库中进行注册和认证,这是本发明技术方案的默认前提。换句话说,本发明的技术方案仅判断合法注册的电动汽车与充电桩之间的距离,因为其他电动汽车与本发明的系统没有通信联系,本发明的系统不需要也无法判断其与充电桩之间的距离。此外,取决于鉴权装置的设置位置,上述接收鉴权请求的操作既可以在充电桩处进行,也可以在远程端进行。再者,上述匹配和判断操作也是既可以在充电桩处由第二鉴权模块进行,也可以在远程端由后台服务器等进行。Further, in order to execute the method of the present invention, a legal electric vehicle needs to be registered and authenticated in advance in the charging pile or a background database or cloud database capable of communicating with the charging pile, which is the default premise of the technical solution of the present invention. In other words, the technical solution of the present invention only judges the distance between the legally registered electric vehicle and the charging pile, because other electric vehicles have no communication connection with the system of the present invention, the system of the present invention does not need and cannot judge the distance between the electric vehicle and the charging pile the distance between. In addition, depending on the installation location of the authentication device, the above-mentioned operation of receiving the authentication request can be performed either at the charging pile or at the remote end. Furthermore, the above matching and judging operations can also be performed at the charging pile by the second authentication module, or at the remote end by a background server or the like.

更进一步,在本发明的优选实施方案中,电动汽车上设置有能够与充电桩上的鉴权模块进行鉴权信息交互的鉴权装置,具体地,该鉴权装置可以是智能车钥匙、设置在汽车上的车载智能终端、手机等装置。或者本领域技术人员也可以根据需要使用其他不容易丢失且不容易被其他人冒用的装置作为鉴权装置。Further, in a preferred embodiment of the present invention, the electric vehicle is provided with an authentication device that can interact with the authentication module on the charging pile for authentication information. On-board smart terminals, mobile phones and other devices on the car. Alternatively, those skilled in the art can also use other devices that are not easily lost and are not easily used by others as the authentication device as required.

值得一提的是,当特定电动汽车是事先进行合法注册和认证的主体时,在步骤S140中,可以在电动汽车与充电桩之间的实时距离小于设定的距离阈值时,使充电桩直接对电动汽车提供授权,以便简化鉴权过程。It is worth mentioning that when the specific electric vehicle is the subject of legal registration and authentication in advance, in step S140, when the real-time distance between the electric vehicle and the charging pile is less than the set distance threshold, the charging pile can be directly activated. Provides authorization for electric vehicles to simplify the authentication process.

至此,已经结合附图所示的优选实施方式描述了本发明的技术方案,但是,本领域技术人员容易理解的是,本发明的保护范围显然不局限于这些具体实施方式。在不偏离本发明的原理的前提下,本领域技术人员可以对相关技术特征作出等同的更改或替换,这些更改或替换之后的技术方案都将落入本发明的保护范围之内。So far, the technical solutions of the present invention have been described with reference to the preferred embodiments shown in the accompanying drawings, however, those skilled in the art can easily understand that the protection scope of the present invention is obviously not limited to these specific embodiments. Without departing from the principle of the present invention, those skilled in the art can make equivalent changes or substitutions to the relevant technical features, and the technical solutions after these changes or substitutions will fall within the protection scope of the present invention.

Claims (32)

1. An automatic authentication method based on distance activation, characterized in that the method comprises the following steps:
acquiring the positions of a first target and a second target, specifically comprising: the position of the first target is obtained in real time through a positioning module, the position of the second target is obtained in real time through the positioning module, or the position of the second target which is stored in advance is called through the positioning module; the first target is legally registered and authenticated;
determining a distance between the first target and the second target according to the positions of the first target and the second target;
comparing the distance with a set threshold;
activating an authentication module when the distance is less than or equal to the threshold;
authenticating the first target through the authentication module, specifically including: the authentication module matches the authentication request information of the first target with prestored legal authentication information and judges whether the authentication request of the first target should be passed according to the matching result;
the authentication request information is information that the first target sends to the authentication module according to the authentication invitation information sent by the authentication module after being activated, or the authentication request information is information that the authentication module outputs after being activated.
2. The distance activation-based automatic authentication method as claimed in claim 1, wherein said authentication module is disposed on said second target.
3. The distance activation-based automatic authentication method as claimed in claim 1, wherein said authentication module comprises a first authentication module provided on said first object.
4. The distance-activation-based automatic authentication method as recited in claim 3, wherein the authentication module further comprises a second authentication module disposed on the second target.
5. The distance-activation-based automatic authentication method as claimed in claim 2, wherein the step of authenticating the first object by the authentication module further comprises:
the authentication module sends authentication invitation information to the first target;
the first target sends authentication request information to the authentication module when receiving the authentication invitation information;
and the authentication module matches the authentication request information with pre-stored legal authentication information and judges whether the authentication request of the first target should be passed or not according to a matching result.
6. The distance-activation-based automatic authentication method as claimed in claim 4, wherein the step of authenticating the first object by the authentication module further comprises:
the first authentication module sends authentication request information to the second authentication module;
and the second authentication module matches the authentication request information with pre-stored legal authentication information and judges whether the authentication request of the first target should be passed or not according to a matching result.
7. The automatic authentication method based on distance activation according to claim 5, wherein the step of the authentication module sending authentication invitation information to the first target further comprises: the authentication module sends authentication invitation information to the first target in a wireless communication mode or a wired communication mode; and/or
The step of the first target sending authentication request information to the authentication module further comprises: and the first target sends authentication request information to the authentication module in a wireless communication mode or a wired communication mode.
8. The method of claim 7, wherein the wireless communication means comprises WIFI, Bluetooth or ZIGBEE.
9. The automatic authentication method based on distance activation according to claim 7, wherein the wired communication means comprises power line carrier communication.
10. The distance-activation-based automatic authentication method according to claim 6, wherein the step of the first authentication module sending authentication request information to the second authentication module further comprises: and the first authentication module sends authentication request information to the second authentication module in a wireless communication mode or a wired communication mode.
11. The method of claim 10, wherein the wireless communication means comprises WIFI, bluetooth or ZIGBEE.
12. The automatic authentication method based on distance activation according to claim 10, wherein the wired communication means comprises power line carrier communication.
13. The automatic authentication method based on distance activation according to any one of claims 1 to 12, wherein the first target is an object to be charged.
14. The automatic authentication method based on distance activation according to claim 13, wherein the second target is a charging and battery replacing facility.
15. The automatic authentication method based on distance activation according to claim 14, wherein the objects to be charged comprise electric cars, electric bicycles and electric motorcycles.
16. The automatic authentication method based on distance activation according to claim 15, wherein the charging and replacing facility comprises a dc charging pile, an ac charging pile, a dc charger, an ac charger or a mobile charging vehicle.
17. An automatic authentication system activated based on distance, the system comprising:
the positioning module is used for acquiring the positions of a first target and a second target and determining the distance between the first target and the second target according to the positions of the first target and the second target;
a control module that compares the distance with a set threshold and activates an authentication module when the distance is less than or equal to the threshold;
the authentication module, the automatic authentication system can authenticate the first target through the authentication module, and the method specifically includes: the authentication module matches the authentication request information of the first target with prestored legal authentication information and judges whether the authentication request of the first target should be passed according to the matching result; the authentication request information is information sent by the first target to the authentication module according to the authentication invitation information sent by the authentication module after being activated, or the authentication request information is information output by the authentication module after being activated;
the positioning module is further used for acquiring the position of the first target in real time and acquiring the position of the second target in real time or calling the position of the second target which is stored in advance;
the first target is legally registered and authenticated.
18. The distance activation based automatic authentication system as recited in claim 17, wherein the authentication module is disposed on the second target.
19. The distance activation-based automatic authentication system as recited in claim 17, wherein the authentication module comprises a first authentication module disposed on the first object.
20. The distance activation-based automatic authentication system as recited in claim 19, wherein the authentication module further comprises a second authentication module disposed on the second object.
21. The distance activation based automatic authentication system as claimed in claim 18, wherein during the process of authenticating the first target, the authentication module sends an authentication invitation message to the first target, the first target sends an authentication request message to the authentication module when receiving the authentication invitation message, and then the authentication module matches the authentication request message with the pre-stored legal authentication message and determines whether the authentication request of the first target should be passed according to the matching result.
22. The distance-activation-based automatic authentication system as claimed in claim 20, wherein during the authentication of the first target, the first authentication module sends an authentication request message to the second authentication module, and the second authentication module matches the authentication request message with the pre-stored legal authentication information and determines whether the authentication request of the first target should be passed according to the matching result.
23. The automatic authentication system based on distance activation according to claim 21, wherein the authentication module sends authentication invitation information to the first target through wireless communication or wired communication; and/or
And the first target sends authentication request information to the authentication module in a wireless communication mode or a wired communication mode.
24. The automatic authentication system based on distance activation according to claim 23, wherein the wireless communication means comprises WIFI, bluetooth or ZIGBEE.
25. The automatic authentication system based on distance activation according to claim 23, wherein said wired communication means comprises power line carrier communication.
26. The automatic authentication system based on distance activation according to claim 22, wherein the first authentication module sends authentication request information to the second authentication module through wireless communication or wired communication.
27. The automatic authentication system based on distance activation according to claim 26, wherein the wireless communication means comprises WIFI, bluetooth or ZIGBEE.
28. The automatic authentication system based on distance activation according to claim 26, wherein said wired communication means comprises power line carrier communication.
29. The automatic authentication system based on distance activation according to any of the claims 17 to 28, wherein the first target is an object to be charged.
30. The automatic authentication system based on distance activation according to claim 29, wherein the second target is a charging and battery replacing facility.
31. The automatic authentication system based on distance activation according to claim 30, wherein the objects to be charged comprise electric cars, electric bicycles and electric motorcycles.
32. The distance activation based automatic authentication system according to claim 31, wherein the charging and replacing facility comprises a dc charging post, an ac charging post, a dc charger, an ac charger or a mobile charging vehicle.
CN201710013519.7A 2017-01-09 2017-01-09 Automatic authentication method and system based on distance activation Active CN106714168B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710013519.7A CN106714168B (en) 2017-01-09 2017-01-09 Automatic authentication method and system based on distance activation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710013519.7A CN106714168B (en) 2017-01-09 2017-01-09 Automatic authentication method and system based on distance activation

Publications (2)

Publication Number Publication Date
CN106714168A CN106714168A (en) 2017-05-24
CN106714168B true CN106714168B (en) 2020-12-08

Family

ID=58908079

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710013519.7A Active CN106714168B (en) 2017-01-09 2017-01-09 Automatic authentication method and system based on distance activation

Country Status (1)

Country Link
CN (1) CN106714168B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107696888A (en) * 2017-08-30 2018-02-16 芜湖恒天易开软件科技股份有限公司 Charging pile identifies the method and system of vehicle automatic charging
CN108621847A (en) * 2018-05-21 2018-10-09 武汉盛硕电子有限公司 A kind of charging battery of electric vehicle management method
CN114801845B (en) * 2018-07-23 2024-10-18 奥动新能源汽车科技有限公司 Electric vehicle power-changing encryption system and method
CN110901459B (en) * 2018-09-14 2021-05-14 比亚迪股份有限公司 Wireless charging equipment identification method and device
CN109228955A (en) * 2018-10-19 2019-01-18 恒大法拉第未来智能汽车(广东)有限公司 Charging method, charging method, charging equipment and vehicle
CN110481371B (en) * 2019-09-06 2022-07-29 广东好易点科技有限公司 Vehicle management method and system for charging pile
CN112550051A (en) * 2020-12-07 2021-03-26 中国联合网络通信集团有限公司 Charging indication method, MEC server and charging equipment
CN112706641B (en) * 2020-12-25 2022-10-18 环球车享汽车租赁有限公司 Charging control method and device for alternating-current charging pile and storage medium
CN113022362A (en) * 2021-04-16 2021-06-25 重庆长安新能源汽车科技有限公司 Alternating current charging method and system for realizing vehicle pile identification based on Bluetooth communication
CN114084023A (en) * 2021-12-03 2022-02-25 华为数字能源技术有限公司 Control method and device and charging pile

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5152644B2 (en) * 2008-01-25 2013-02-27 九州電力株式会社 Electric drive charging system and method
CN102299391A (en) * 2010-06-22 2011-12-28 崇越科技股份有限公司 Charging system and charging method thereof
CN103188223B (en) * 2011-12-29 2017-12-12 国民技术股份有限公司 Authentication method, apparatus and system
CN102593899B (en) * 2012-02-21 2014-03-12 北京联合大学 Midway charging system for electric vehicle

Also Published As

Publication number Publication date
CN106714168A (en) 2017-05-24

Similar Documents

Publication Publication Date Title
CN106714168B (en) Automatic authentication method and system based on distance activation
CN107627867B (en) Charging authorization method for object to be charged, automatic authorization method and system for charging equipment
US9283856B2 (en) Methods, systems and apparatus for authorizing operation of an electric vehicle that is being charged at a charging station
US10717409B2 (en) Method for a two-stage authorization of a charging process on a charging post
JP5803724B2 (en) Authentication system and authentication device
WO2015196943A1 (en) Vehicle control system, method and device, and computer readable storage medium
KR101623338B1 (en) Method and system for preventing electricity theft for charging electric vehicle
CN106912001B (en) Automatic authentication method and system based on WIFI broadcast
CN105882604B (en) A kind of electric vehicle control system
US20190291589A1 (en) Automatic Plug-And-Pay With Multi-Factor Authentication For Fueling Vehicles
CN107963057A (en) A kind of keyless access system based on mobile phone
CN104468582B (en) Authentication and authorization method and system for user information
US20170278330A1 (en) Method and apparatus for wireless vehicular access device authentication
CN106878279A (en) Charging and conversion electric facility and the automatic right-discriminating method and system for treating charging and conversion electric object
CN109840973B (en) Face recognition-based shared bicycle automatic unlocking method and control system
WO2018086310A1 (en) Method and system for sharing and exchanging information on private parking space in city
CN105480192A (en) Automobile use right sharing device, control device and intelligent automobile
CN105216718A (en) Based on Automobile intelligent key system and the control method of internet
CN104080658A (en) Vehicle remote operation information provision device, vehicle-mounted remote operation information acquisition device, and vehicle remote operation system comprising these devices
US10121295B2 (en) System and method for accessing a vehicle
CN107277033B (en) Charging and battery replacing equipment and authentication method and system for object to be charged and battery replaced
CN104627021A (en) Electric vehicle control system and method
CN107221973A (en) Object to be charged, the method for authenticating of charging equipment and system
CN108688619B (en) Method and system for controlling a vehicle
CN109927672A (en) Vehicle control system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 201804 room 115, 569 Anchi Road, Anting Town, Jiading District, Shanghai

Patentee after: NIO Co.,Ltd.

Country or region after: China

Address before: 201805 building 20, Lane 56, Antuo Road, Anting Town, Jiading District, Shanghai

Patentee before: NIO Co.,Ltd.

Country or region before: China

CP03 Change of name, title or address
TR01 Transfer of patent right

Effective date of registration: 20241224

Address after: No. 218, 2nd Floor, Building 6, Phase I, Optoelectronic Supporting Industrial Park, No. 117 Zuoling Road, Zuoling Town, Donghu New Technology Development Zone, Wuhan City, Hubei Province, 430078 (Wuhan Free Trade Zone Area)

Patentee after: Wuhan Weilai Energy Co.,Ltd.

Country or region after: China

Address before: 201804 room 115, 569 Anchi Road, Anting Town, Jiading District, Shanghai

Patentee before: NIO Co.,Ltd.

Country or region before: China

TR01 Transfer of patent right