Unlock instant, AI-driven research and patent intelligence for your innovation.

Security method and apparatus for electric vehicle power transfer

a security method and electric vehicle technology, applied in the field of electric vehicle security technology, can solve the problems of inability to identify the case in which a stolen controller is installed in a different car, and achieve the effects of reducing the risk of theft, and enhancing the reliability and stability of privacy information and financial information stored in the in-vehicle controller

Active Publication Date: 2019-08-08
HYUNDAI MOTOR CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patent describes a method and apparatus for ensuring security in an EV wireless power transfer system. The invention verifies the identity of the vehicle's controller before starting the charging process, preventing unauthorized charging or theft of private information. Additionally, an authentication apparatus can be used to further prevent abuse of the controller, reducing the risk of theft and abuse of the charging system. Overall, this technology enhances the reliability and stability of the vehicle's controller and prevents unscrupulous individuals from abusing the charging system.

Problems solved by technology

Meanwhile, theft or loss of a controller in the vehicle, access by unauthorized persons, or abuse of the controller in the aftermarket may result in cases in which the controller of a specific user can be used in other cars.
However, even when an in-vehicle controller is authenticated before starting a charging process between an EV and an external charger, it is impossible to identify a case in which a stolen controller is installed in a different car.
Also, the method may further comprise, after the authenticating, blocking the charging process when the authentication is determined as failed.
Also, the method may further comprise, after the authenticating, blocking the charging process when the authentication is determined as failed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security method and apparatus for electric vehicle power transfer
  • Security method and apparatus for electric vehicle power transfer
  • Security method and apparatus for electric vehicle power transfer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040]Example embodiments of the present disclosure are disclosed herein. However, specific structural and functional details disclosed herein are merely representative for purposes of describing example embodiments of the present disclosure, however, example embodiments of the present disclosure may be embodied in many alternate forms and should not be construed as limited to example embodiments of the present disclosure set forth herein. While describing the respective drawings, like reference numerals designate like elements. It will be understood that although the terms “first”, “second”, etc. may be used herein to describe various components, these components should not be limited by these terms.

[0041]These terms are used merely to distinguish one element from another. For example, without departing from the scope of the present disclosure, a first component may be designated as a second component, and similarly, the second component may be designated as the first component. Th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A security method and apparatus for an electric vehicle (EV) power transfer system can prevent abuse of privacy information or financial information which is stored in an in-vehicle controller, and block fee charging and authentication. A security method for the EV power transfer system, performed by a charging controller installed in an EV, includes steps of: receiving an authentication request from a communication controller installed in the EV; authenticating second key information included in the authentication request based on first key information which is learned or stored beforehand; and when the authentication succeeds, starting a charging process.

Description

CROSS-REFERENCE TO RELATED APPLICATION[0001]This application claims under 35 U.S.C. §119(a) the benefit of Korean Patent Application No. 2015-0145922 filed on Oct. 20, 2015 in the Korean Intellectual Property Office (KIPO), the entire contents of which are incorporated by reference herein.BACKGROUND1. Technical Field[0002]The present disclosure relates to security technology for a vehicle, and more particularly, to a security method and apparatus for an electric vehicle (EV) power transfer system, which can prevent charging and authentication of an EV by unauthorized persons, thus protecting privacy information and financial information stored in a controller installed in the EV.2. Description of the Related Art[0003]Various tasks are undertaken for preparing charging and authentication in a next-generation vehicle charging system used for environment-friendly vehicles such as electric vehicles (EV), plug-in EVs, and plug-in hybrid EVs. With regard to an EV charging system, there is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L29/06G06F21/62H04W12/06H04W12/02G06Q30/02G06Q50/06B60L11/18
CPCB60L2250/16B60L53/65H04L63/083G06F21/62H04W12/06H04W12/02G06Q50/06G06Q30/0283B60L2250/10B60L2270/32B60L2270/38B60L53/12B60L53/665Y04S50/14Y02T90/16Y02T10/7072Y02T90/14Y04S30/14B60L53/126B60L53/122Y02T90/12Y02T90/167Y02T10/70H04W12/033H04W12/069
Inventor KIM, DO HOONLEE, KANG HOON
Owner HYUNDAI MOTOR CO LTD