Unlock instant, AI-driven research and patent intelligence for your innovation.

Unauthorized connection detecting device, unauthorized connection detecting system, and unauthorized connection detecting method

a technology of detecting device and detecting system, which is applied in the direction of electrochemical generator, transportation and packaging, secondary cell servicing/maintenance, etc., can solve problems such as failure to prevent connection

Active Publication Date: 2016-02-23
PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO LTD
View PDF52 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The present invention is about a device, system, and method that can detect unauthorized connections of power storage devices or charge / discharge devices that have a cryptographic module of an authentic product introduced in an unauthorized manner.

Problems solved by technology

The above conventional techniques have a problem in that the techniques cannot detect such an unauthorized power storage device or an unauthorized charge / discharge device, and thus fail to prevent the connection to the unauthorized power storage device or the unauthorized charge / discharge device.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unauthorized connection detecting device, unauthorized connection detecting system, and unauthorized connection detecting method
  • Unauthorized connection detecting device, unauthorized connection detecting system, and unauthorized connection detecting method
  • Unauthorized connection detecting device, unauthorized connection detecting system, and unauthorized connection detecting method

Examples

Experimental program
Comparison scheme
Effect test

modification 1

[Modification 1]

[0179]Described next is a modification of how the unauthorized connection detecting device 100 detects an unauthorized charge / discharge device.

[0180]FIG. 12 depicts a flowchart exemplifying an operation of how the unauthorized connection detecting device 100 according to Modification 1 of the embodiment detects an unauthorized charge / discharge device.

[0181]As shown in FIG. 12, the communications unit 110 first receives the second charge / discharge information 373 from the power storage device 300 via the communications network 600 (S602). Then, the second charge / discharge information 373 received by the communications unit 110 is stored by the control unit 130 in the second charge / discharge information 144 in the storage unit 140 (S602).

[0182]Then, the unauthorization detecting unit 120 determines whether or not multiple position information items, included in the second connection information and associated with a single second identification information item include...

modification 2

[Modification 2]

[0189]In the above embodiment and Modification 1, the first identification information is information for identifying a public key certificate of a power storage device connectable to the charge / discharge device 200. In Modification 2, the first identification information is information for identifying a secret key of the power storage device. Moreover, in the above embodiment and Modification 1, the second identification information is information for identifying a public key certificate of a charge / discharge device connectable with the power storage device 300. In Modification 2, the second identification information is information for identifying a secret key of the charge / discharge device.

[0190]In other words, the charge / discharge device 200 stores in the storage unit 270 a list of information for identifying a secret key of a power storage device. With reference to the secret key list, the charge / discharge device 200 identifies the secret key of a power storage ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An unauthorized connection detecting device, which detects whether or not a power storage device is an unauthorized power storage device, includes: a communications unit receiving first charge / discharge information in which first identification information and first connection information are associated each other, the first identification information identifying an encryption key of the power storage device used for mutual authentication between a charge / discharge device and the power storage device, and the first connection information being on the power storage device and obtained when the power storage device is connected to the charge / discharge device; and an unauthorization detecting unit detecting whether or not the power storage device is the unauthorized power storage device, by determining, using the first identification information and the first connection information, whether or not two or more power storage devices associated with a single first identification information item are present.

Description

TECHNICAL FIELD[0001]The present invention relates to an unauthorized connection detecting device, an unauthorized connection detecting system, and an unauthorized connection detecting method for detecting whether or not a power storage device connectable to a charge / discharge device for charging or discharging with power is an unauthorized power storage device or whether or not the charge / discharge device is an unauthorized charge / discharge device.BACKGROUND OF INVENTIONBackground Art[0002]In recent years, secondary batteries are used for various purposes such as electric vehicles. The secondary batteries are included in a device (hereinafter referred to as power storage device), such as an electric vehicle. The power storage device is connected to a charge / discharge device to be charged or discharged. In relation to the above technique, some conventional techniques have been proposed to prevent a connection to an unauthorized power storage device or an unauthorized charge / discharg...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H02J7/00B60L11/18H04L9/32H01M10/42
CPCH04L9/32B60L11/1816B60L11/1825B60L11/1838B60L11/1846H02J7/0004H02J7/0027B60L2230/10B60L2230/16B60L2230/40B60L2240/70B60L2270/32H01M2010/4278H04L9/3268Y02T10/7005Y02T30/14Y02T90/121Y02T90/128Y02T90/14Y02T90/16Y02T90/163Y02T90/169Y04S30/14Y04S30/12B60L53/31B60L53/60B60L53/65B60L53/305B60L53/68H02J7/00036H02J7/00047Y02T10/7072Y02T10/72Y02T90/12Y02T90/167Y02T10/70Y02E60/10H02J2310/48Y02T30/00
Inventor UNAGAMI, YUJIMATSUZAKI, NATSUMEOHMORI, MOTOJI
Owner PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO LTD