Unauthorized connection detecting device, unauthorized connection detecting system, and unauthorized connection detecting method
a technology of detecting device and detecting system, which is applied in the direction of electrochemical generator, transportation and packaging, secondary cell servicing/maintenance, etc., can solve problems such as failure to prevent connection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
modification 1
[Modification 1]
[0179]Described next is a modification of how the unauthorized connection detecting device 100 detects an unauthorized charge / discharge device.
[0180]FIG. 12 depicts a flowchart exemplifying an operation of how the unauthorized connection detecting device 100 according to Modification 1 of the embodiment detects an unauthorized charge / discharge device.
[0181]As shown in FIG. 12, the communications unit 110 first receives the second charge / discharge information 373 from the power storage device 300 via the communications network 600 (S602). Then, the second charge / discharge information 373 received by the communications unit 110 is stored by the control unit 130 in the second charge / discharge information 144 in the storage unit 140 (S602).
[0182]Then, the unauthorization detecting unit 120 determines whether or not multiple position information items, included in the second connection information and associated with a single second identification information item include...
modification 2
[Modification 2]
[0189]In the above embodiment and Modification 1, the first identification information is information for identifying a public key certificate of a power storage device connectable to the charge / discharge device 200. In Modification 2, the first identification information is information for identifying a secret key of the power storage device. Moreover, in the above embodiment and Modification 1, the second identification information is information for identifying a public key certificate of a charge / discharge device connectable with the power storage device 300. In Modification 2, the second identification information is information for identifying a secret key of the charge / discharge device.
[0190]In other words, the charge / discharge device 200 stores in the storage unit 270 a list of information for identifying a secret key of a power storage device. With reference to the secret key list, the charge / discharge device 200 identifies the secret key of a power storage ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 