Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for communication authentication between client terminal and charging device under security mechanism

A client terminal and charging device technology, which is applied in the field of communication authentication under the security mechanism, can solve the problems of key information leakage, loss of users and charging device enterprises, etc., to achieve high security, good experience, and solve the problem of identity authentication.

Active Publication Date: 2016-12-07
SHANGHAI POWERSHARE TECH LTD
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in this process, the security issue of communication between the customer terminal and the charging device is often ignored. Network hackers use various loopholes to launch attacks on the entire communication link, resulting in the leakage of many key information, which will cause serious damage to both users and charging device companies. huge loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for communication authentication between client terminal and charging device under security mechanism
  • Method for communication authentication between client terminal and charging device under security mechanism
  • Method for communication authentication between client terminal and charging device under security mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] Embodiment one: as attached figure 1 The charging facility shown is composed of a user terminal (usually a mobile phone), a charging device (charging pile) and a server. Before the user connects to the charging device through the client terminal to charge, the user needs to register through the client terminal. The registration process is attached figure 2 As shown in , since the client terminals often use mobile phones, the registration process is as follows:

[0030] 1) The user enters the phone number in the client terminal and sends it to the server;

[0031] 2) The server requests a verification code from the SMS gateway;

[0032] 3) The SMS gateway sends the verification code to the client terminal;

[0033] 4) After receiving the text message containing the verification code, the client terminal sends the verification code to the server;

[0034] 5) The server completes the verification according to the verification code sent by the client terminal, and crea...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for communication authentication between a client terminal and a charging device under a security mechanism. For the client terminal, the method comprises the following steps that the client terminal sends a final ciphertext, which is at least partially encrypted by a public key only corresponding to the client terminal, to the charging device through a manner of Internet of Things, and the client terminal receives information, which is forwarded by the charging device and is used for judging whether a request content is legal, through the manner of Internet of Things, so that a communication authentication process is completed. For the charging device, the method comprises the following steps that after the charging device sends the final ciphertext, which is sent by the client terminal and is at least partially encrypted by the public key only corresponding to the client terminal, through the manner of Internet of Things, the charging device forwards the final ciphertext to a server, and the charging device forwards the information, which is obtained by the server and is used for judging whether the request content is legal, to the client terminal through the manner of Internet of Things, so that the communication authentication process is completed. The method utilizes the only SID, public key and private key of the client terminal to realize the communication authentication between the client terminal and the charging device, and has higher security.

Description

technical field [0001] The invention relates to a method for realizing communication authentication between a client terminal and a charging device, especially a communication authentication method under a security mechanism. Background technique [0002] The existing charging pile solution based on cloud platform includes three parts: cloud server platform, charging device and client terminal. During normal use, the client terminal is first connected to the charging device, and then the charging device sends the client terminal information to the cloud server platform through the network for matching; the cloud server platform performs identity verification and matching after receiving the client terminal information, if successful Then send the information of successful matching to the charging device, thereby completing the communication authentication, and the charging device can carry out the subsequent operation with the client terminal in the next step only after rece...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30H04W12/06
CPCH04L9/30H04L9/3297H04W12/06
Inventor 辛丹朱卓敏
Owner SHANGHAI POWERSHARE TECH LTD