CN111160890A - Charging pile system storage method based on chain data structure encryption technology - Google Patents
Charging pile system storage method based on chain data structure encryption technology Download PDFInfo
- Publication number
- CN111160890A CN111160890A CN201911246534.1A CN201911246534A CN111160890A CN 111160890 A CN111160890 A CN 111160890A CN 201911246534 A CN201911246534 A CN 201911246534A CN 111160890 A CN111160890 A CN 111160890A
- Authority
- CN
- China
- Prior art keywords
- charging
- data
- charging pile
- transaction
- central server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 238000005516 engineering process Methods 0.000 title claims abstract description 23
- 230000009471 action Effects 0.000 claims abstract description 11
- 230000003993 interaction Effects 0.000 claims abstract description 11
- 238000012790 confirmation Methods 0.000 claims abstract description 7
- 230000002452 interceptive effect Effects 0.000 claims description 10
- 230000006399 behavior Effects 0.000 claims description 9
- 238000007599 discharging Methods 0.000 claims description 3
- 230000005611 electricity Effects 0.000 claims description 3
- 238000012795 verification Methods 0.000 abstract 1
- 230000008569 process Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/18—Payment architectures involving self-service terminals [SST], vending machines, kiosks or multimedia terminals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/06—Energy or water supply
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S30/00—Systems supporting specific end-user applications in the sector of transportation
- Y04S30/10—Systems supporting the interoperability of electric or hybrid vehicles
- Y04S30/14—Details associated with the interoperability, e.g. vehicle recognition, authentication, identification or billing
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Finance (AREA)
- Economics (AREA)
- Computer Security & Cryptography (AREA)
- Public Health (AREA)
- Water Supply & Treatment (AREA)
- General Health & Medical Sciences (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Tourism & Hospitality (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides a charging pile system storage method based on a chain data structure encryption technology, which comprises the following steps: receiving a charging demand from a user side, carrying out matching transaction selective charging action on a charging pile group through each charging pile, carrying out identity verification on a user and checking with a central server through the charging piles, carrying out charging transaction action on the charging piles, and storing data information packets generated by interaction with the user in a data block storage mode through the charging piles; the central server issues the whole chained data information to all charging pile nodes for confirmation and consensus achievement, the central server approves the charging interaction transaction, and encryption storage of the chained data structure technology of the charging data is completed; according to the invention, all information of user transaction charging is encrypted and stored in the charging pile through the data block in a chain data structure, so that the problems that the existing charging pile system is simple in information algorithm, and data information is easy to steal, decipher or unsafe to transmit are solved.
Description
Technical Field
The invention belongs to the technical field of electric vehicle charging pile systems, and particularly relates to a charging pile system storage method based on a chained data structure encryption technology.
Background
In recent years, with the rapid development of the new energy automobile market and the increasing strictness of each country in terms of energy saving and emission reduction laws and regulations, the new energy automobile has an increasing dependence on the charging demand of the charging pile.
According to the latest data of the national power grid and the Chinese electric vehicle charging infrastructure promotion alliance, the amount of the Chinese charging piles is over 100 ten thousand by 6 months in 2019, and China also becomes one of the largest global new energy vehicle markets.
Along with the increase of the number of the charging piles, the safety guarantee problem of the charging transaction data of the charging piles is gradually highlighted, and the problem of data safety of the charging piles, which is interacted with users and interconnected and intercommunicated with the users, is also particularly critical.
The defects and shortcomings of the prior art are as follows:
at present, a plurality of data encryption technologies are applied to a charging pile system, but most of the data encryption technologies have some defects in solving the practical engineering problems: at present, conventional data transmission and algorithms, such as CRC check encryption, MD5 algorithm, AES algorithm, DES algorithm, etc., are subject to encryption algorithm and encryption key agreed by both parties, and once the algorithm or key is stolen or cracked, data transmission and storage have no security effect.
Disclosure of Invention
The invention provides a charging pile system storage method based on a chain data structure encryption technology, aiming at solving the problems that the existing charging pile system information algorithm is simple, and data information is easy to steal, decipher or unsafe to transmit.
The technical scheme adopted by the invention for solving the technical problems is as follows:
a charging pile system storage method based on a chained data structure encryption technology comprises at least one charging pile group, at least one charging pile group is configured with at least one charging pile, and the at least one charging pile is configured with a plurality of data blocks, and the method comprises the following steps:
receiving a charging demand from a user side, and carrying out matching transaction selective charging action on the charging pile group through each charging pile to prepare for carrying out charging transaction with the charging pile;
based on the charging transaction information of the charging pile, the charging pile performs identity authentication on the user and checks the user with the central server;
responding to the central server to check the user identity information, and performing charging transaction action on the charging pile;
based on the central server checking the passing users, the charging pile stores data information packets generated by interaction with the users in a data block storage mode; and
each data block of the storage data generates integral chained data information through a chained data structure encryption technology;
based on the integral chained data information, the central server issues the integral chained data information to all charging pile nodes to determine whether the charging pile nodes succeed or not and to achieve consensus;
and responding to successful confirmation and consensus achievement of the charging pile nodes, and approving the charging interaction transaction by the central server, wherein the central server stores and deploys the whole chained data information after the consensus achievement of each node and the data information generated before the consensus achievement into the central server according to the time sequence and the chained data structure of the data blocks, and the encrypted storage of the chained data structure technology of the charging data is completed.
Preferably, the method comprises:
and responding to the situation that the central server fails to check the user identity information, and refusing the charging transaction action by the charging pile.
Preferably, the method comprises:
and responding to unsuccessful confirmation and consensus achievement of the charging pile nodes, reporting the abnormity to a central server by the charging pile, rejecting the synchronously changed data packet data, rejecting the charging transaction behavior by the central server, and keeping the original chain data structure unchanged.
Preferably, the method of the chained data structure technique includes:
based on each data block which is fully stored with the data information packet, the data block is encrypted through an encryption algorithm to generate a secret message after the data block is encrypted;
responding to the secret message after the data block is encrypted, distributing the secret message to the head of the next data block, receiving the interactive transaction information data of each charging pile behind the secret message by the central server according to the time sequence until the next data block is fully stored, carrying out data block encryption on the data block with the secret message and the normal information data again, generating the next secret message and distributing the next secret message to the head of the next data block, so as to form a mode of encrypting the data block and the data block, and completing the one-time chain data structure encryption technology.
Preferably, the method comprises: the transaction selective charging behavior at least comprises charging and discharging behaviors, storage, interaction and backup of transaction data, and deployment of various central server software.
Preferably, the method comprises: the data information at least comprises charging starting time, charging ending time, electricity charge of the current charging time period, total charge of the current charging, the current charging pile ID number, current user information, current user starting SOC, current user ending SOC and transaction price.
Preferably, the method comprises: the central server provides consultation of transaction, and can be a single server host or a distributed server cluster.
Compared with the prior art, the invention has the following beneficial effects: the invention provides a chain data structure encryption technology in the charging pile system, and in the charging interactive transaction process of the user and the charging pile, the charging pile system sequentially connects and combines the data of the interactive transactions in a time sequence and a block mode to form a chain data structure, compared with other traditional encryption algorithm methods, the encryption method based on the chain data structure has the encryption advantage that the data cannot be tampered in the charging transaction in the charging pile system, once the data is tampered or stolen and other unsafe problems occur, the corresponding data block in the chain data structure is reported to the central server abnormally, the data information packet data after synchronous change is rejected by the corresponding charging pile node, so that the safety of the data information can be ensured, the data information is prevented from changing, the original information record is kept unchanged, and the safety and the stability of the interactive transaction charging data information are ensured.
Drawings
The invention is further illustrated with reference to the following figures and examples.
FIG. 1 is a flow chart of an interactive transaction process according to an embodiment of the present invention;
FIG. 2 is a block diagram of a database partition data block according to an embodiment of the present invention;
fig. 3 is a diagram illustrating a structure of a data block chain type encrypted data according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example one
As shown in fig. 1 to 3, a method for storing a charging pile system based on a chained data structure encryption technology includes at least one charging pile group, where the at least one charging pile group is configured with at least one charging pile, and the at least one charging pile is configured with a plurality of data blocks, where the method includes:
receiving a charging demand from a user side, and carrying out matching transaction selective charging action on the charging pile group through each charging pile to prepare for carrying out charging transaction with the charging pile;
based on the charging transaction information of the charging pile, the charging pile performs identity authentication on the user and checks the user with the central server;
responding to the central server to check the user identity information, and performing charging transaction action on the charging pile;
based on the central server checking the passing users, the charging pile stores data information packets generated by interaction with the users in a data block storage mode; and
each data block of the storage data generates integral chained data information through a chained data structure encryption technology;
based on the integral chained data information, the central server issues the integral chained data information to all charging pile nodes to determine whether the charging pile nodes succeed or not and to achieve consensus;
and responding to successful confirmation and consensus achievement of the charging pile nodes, and approving the charging interaction transaction by the central server, wherein the central server stores and deploys the whole chained data information after the consensus achievement of each node and the data information generated before the consensus achievement into the central server according to the time sequence and the chained data structure of the data blocks, and the encrypted storage of the chained data structure technology of the charging data is completed.
The method comprises the following steps:
and responding to the situation that the central server fails to check the user identity information, and refusing the charging transaction action by the charging pile.
The method comprises the following steps:
and responding to unsuccessful confirmation and consensus achievement of the charging pile nodes, reporting the abnormity to a central server by the charging pile, rejecting the synchronously changed data packet data, rejecting the charging transaction behavior by the central server, and keeping the original chain data structure unchanged.
The method of the chained data structure technology comprises the following steps:
based on each data block which is fully stored with the data information packet, the data block is encrypted through an encryption algorithm to generate a secret message after the data block is encrypted;
responding to the secret message after the data block is encrypted, distributing the secret message to the head of the next data block, receiving the interactive transaction information data of each charging pile behind the secret message by the central server according to the time sequence until the next data block is fully stored, carrying out data block encryption on the data block with the secret message and the normal information data again, generating the next secret message and distributing the next secret message to the head of the next data block, so as to form a mode of encrypting the data block and the data block, and completing the one-time chain data structure encryption technology.
The method comprises the following steps: the transaction selective charging behavior at least comprises charging and discharging behaviors, storage, interaction and backup of transaction data, and deployment of various central server software.
The method comprises the following steps: the data information at least comprises charging starting time, charging ending time, electricity charge of the current charging time period, total charge of the current charging, the current charging pile ID number, current user information, current user starting SOC, current user ending SOC and transaction price.
The method comprises the following steps: the central server provides consultation of transaction, and can be a single server host or a distributed server cluster.
The invention provides a chain data structure encryption technology in the charging pile system, and in the charging interactive transaction process of the user and the charging pile, the charging pile system sequentially connects and combines the data of the interactive transactions in a time sequence and a block mode to form a chain data structure, compared with other traditional encryption algorithm methods, the encryption method based on the chain data structure has the encryption advantage that the data cannot be tampered in the charging transaction in the charging pile system, once the data is tampered or stolen and other unsafe problems occur, the corresponding data block in the chain data structure is reported to the central server abnormally, the data information packet data after synchronous change is rejected by the corresponding charging pile node, so that the safety of the data information can be ensured, the data information is prevented from changing, the original information record is kept unchanged, and the safety and the stability of the interactive transaction charging data information are ensured.
In light of the foregoing description of the preferred embodiment of the present invention, many modifications and variations will be apparent to those skilled in the art without departing from the spirit and scope of the invention. The technical scope of the present invention is not limited to the content of the specification, and must be determined according to the scope of the claims.
Claims (7)
1. A charging pile system storage method based on a chained data structure encryption technology is characterized by comprising at least one charging pile group, at least one charging pile group is configured with at least one charging pile, and the at least one charging pile is configured with a plurality of data blocks, and the method comprises the following steps:
receiving a charging demand from a user side, and carrying out matching transaction selective charging action on the charging pile group through each charging pile to prepare for carrying out charging transaction with the charging pile;
based on the charging transaction information of the charging pile, the charging pile performs identity authentication on the user and checks the user with the central server;
responding to the central server to check the user identity information, and performing charging transaction action on the charging pile;
based on the central server checking the passing users, the charging pile stores data information packets generated by interaction with the users in a data block storage mode; and
each data block of the storage data generates integral chained data information through a chained data structure encryption technology;
based on the integral chained data information, the central server issues the integral chained data information to all charging pile nodes to determine whether the charging pile nodes succeed or not and to achieve consensus;
and responding to successful confirmation and consensus achievement of the charging pile nodes, and approving the charging interaction transaction by the central server, wherein the central server stores and deploys the whole chained data information after the consensus achievement of each node and the data information generated before the consensus achievement into the central server according to the time sequence and the chained data structure of the data blocks, and the encrypted storage of the chained data structure technology of the charging data is completed.
2. The method according to claim 1, characterized in that it comprises:
and responding to the situation that the central server fails to check the user identity information, and refusing the charging transaction action by the charging pile.
3. The method of claim 2, wherein the method comprises:
and responding to unsuccessful confirmation and consensus achievement of the charging pile nodes, reporting the abnormity to a central server by the charging pile, rejecting the synchronously changed data packet data, rejecting the charging transaction behavior by the central server, and keeping the original chain data structure unchanged.
4. The method of claim 3, wherein the method of the chained data structure technique comprises:
based on each data block which is fully stored with the data information packet, the data block is encrypted through an encryption algorithm to generate a secret message after the data block is encrypted;
responding to the secret message after the data block is encrypted, distributing the secret message to the head of the next data block, receiving the interactive transaction information data of each charging pile behind the secret message by the central server according to the time sequence until the next data block is fully stored, carrying out data block encryption on the data block with the secret message and the normal information data again, generating the next secret message and distributing the next secret message to the head of the next data block, so as to form a mode of encrypting the data block and the data block, and completing the one-time chain data structure encryption technology.
5. The method of claim 4, wherein the method comprises:
the transaction selective charging behavior at least comprises charging and discharging behaviors, storage, interaction and backup of transaction data, and deployment of various central server software.
6. The method of claim 5, wherein the method comprises:
the data information at least comprises charging starting time, charging ending time, electricity charge of the current charging time period, total charge of the current charging, the current charging pile ID number, current user information, current user starting SOC, current user ending SOC and transaction price.
7. The system of claim 6, wherein the method comprises:
the central server provides consultation of transaction, and can be a single server host or a distributed server cluster.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911246534.1A CN111160890B (en) | 2019-12-09 | 2019-12-09 | Charging pile system storage method based on chain data structure encryption technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911246534.1A CN111160890B (en) | 2019-12-09 | 2019-12-09 | Charging pile system storage method based on chain data structure encryption technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111160890A true CN111160890A (en) | 2020-05-15 |
CN111160890B CN111160890B (en) | 2022-08-23 |
Family
ID=70556528
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911246534.1A Active CN111160890B (en) | 2019-12-09 | 2019-12-09 | Charging pile system storage method based on chain data structure encryption technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111160890B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101098225A (en) * | 2006-06-29 | 2008-01-02 | ***股份有限公司 | Safety data transmission method and paying method, paying terminal and paying server |
CN101145233A (en) * | 2006-09-12 | 2008-03-19 | 中国农业银行 | Data ciphered-mortgage transaction system, teller identification system, trans-center transaction system and method |
CN101593333A (en) * | 2008-05-28 | 2009-12-02 | 北京中食新华科技有限公司 | E-commerce information security processing method |
-
2019
- 2019-12-09 CN CN201911246534.1A patent/CN111160890B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101098225A (en) * | 2006-06-29 | 2008-01-02 | ***股份有限公司 | Safety data transmission method and paying method, paying terminal and paying server |
CN101145233A (en) * | 2006-09-12 | 2008-03-19 | 中国农业银行 | Data ciphered-mortgage transaction system, teller identification system, trans-center transaction system and method |
CN101593333A (en) * | 2008-05-28 | 2009-12-02 | 北京中食新华科技有限公司 | E-commerce information security processing method |
Also Published As
Publication number | Publication date |
---|---|
CN111160890B (en) | 2022-08-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111464518B (en) | Method and device for sending and verifying cross-link communication data | |
US11177962B2 (en) | Optimizations for verification of interactions system and method | |
Kim et al. | Mobile charger billing system using lightweight Blockchain | |
CN109493204B (en) | Service accounting method based on block chain and terminal equipment | |
CN110958110A (en) | Block chain private data management method and system based on zero knowledge proof | |
CN111612455A (en) | Power consumption information protection-oriented Byzantine fault-tolerant alliance chain consensus method, system and storage medium | |
CN103259650A (en) | Fair and rational multi-secret sharing method for honest participants | |
CN110910139B (en) | Trusted hardware and high-performance decentralized anonymous encryption method based on block chain | |
CN105812366A (en) | Server, anti-crawler system and anti-crawler verification method | |
CN110930153B (en) | Block chain privacy data management method and system based on hidden third party account | |
CN109743182B (en) | Intelligent contract approval method and system based on block chain | |
CN112019326A (en) | Vehicle charging safety management method and system | |
CN111461799B (en) | Data processing method, data processing device, computer equipment and medium | |
CN111163109A (en) | Block chain center-removing type node anti-counterfeiting method | |
CN104579659A (en) | Device for safety information interaction | |
CN111865595B (en) | Block chain consensus method and device | |
CN113852628A (en) | Decentralized single sign-on method, decentralized single sign-on device and storage medium | |
KR101919693B1 (en) | Anonymous payment method to provide location privacy for wireless charging of electrical vehicles and system therefor | |
Belkaaloul et al. | Anonymous authentication protocol for efficient communications in vehicle to grid networks | |
CN112926983A (en) | Block chain-based deposit certificate transaction encryption system and method | |
CN117614707A (en) | Block chain transaction method, system, electronic equipment and medium based on intelligent contract | |
CN111160890B (en) | Charging pile system storage method based on chain data structure encryption technology | |
CN111600701A (en) | Private key storage method and device based on block chain and storage medium | |
CN109816525A (en) | A kind of data processing method and its device, medium, terminal | |
CN109389398A (en) | A kind of generation method and system of transaction certificate |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 213100 5-a201, Chuangyan port, Changzhou science and Education City, No. 18, Changwu Middle Road, Wujin District, Changzhou City, Jiangsu Province Applicant after: Guochuang mobile energy innovation center (Jiangsu) Co.,Ltd. Address before: Room 354, No. 18, Xinya Road, Wujin national high tech Industrial Development Zone, Changzhou, Jiangsu 213100 Applicant before: National innovation energy automobile intelligent energy equipment innovation center (Jiangsu) Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |