CN116014381A - Anti-counterfeiting battery pack, terminal capable of identifying counterfeit battery and battery authentication method - Google Patents

Anti-counterfeiting battery pack, terminal capable of identifying counterfeit battery and battery authentication method Download PDF

Info

Publication number
CN116014381A
CN116014381A CN202310014084.3A CN202310014084A CN116014381A CN 116014381 A CN116014381 A CN 116014381A CN 202310014084 A CN202310014084 A CN 202310014084A CN 116014381 A CN116014381 A CN 116014381A
Authority
CN
China
Prior art keywords
battery
chip
battery pack
terminal
firmware
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310014084.3A
Other languages
Chinese (zh)
Inventor
吴煌殿
李海鸥
谢素珍
沈敏亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Liandi Commercial Technology Co ltd
Original Assignee
Fujian Liandi Commercial Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Liandi Commercial Technology Co ltd filed Critical Fujian Liandi Commercial Technology Co ltd
Priority to CN202310014084.3A priority Critical patent/CN116014381A/en
Publication of CN116014381A publication Critical patent/CN116014381A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02EREDUCTION OF GREENHOUSE GAS [GHG] EMISSIONS, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
    • Y02E60/00Enabling technologies; Technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02E60/10Energy storage using batteries

Landscapes

  • Battery Mounting, Suspending (AREA)

Abstract

The invention relates to an anti-counterfeiting battery pack, a terminal capable of identifying a counterfeiting battery and a battery authentication method. The anti-counterfeiting battery pack comprises at least one battery and a battery protection board electrically connected with the battery, wherein the battery protection board comprises a first chip with a unique identity identification code and a second chip with a storage space, the storage space comprises a firmware area and a firmware signature area, wherein the firmware area stores battery related information, and the firmware signature area stores data obtained by signing the firmware area data and the unique identity identification code by using an encryption algorithm. Only the battery pack can be identified as a regular battery by the corresponding terminal through a battery authentication method, and the normal operation of the terminal is ensured, so that the benefit of terminal manufacturers is protected, and the safety risk brought by using a non-regular battery is reduced.

Description

Anti-counterfeiting battery pack, terminal capable of identifying counterfeit battery and battery authentication method
Technical Field
The present disclosure relates to the field of batteries, and more particularly, to an anti-counterfeit battery pack, a terminal capable of identifying a counterfeit battery, and a battery authentication method.
Background
Many terminals (e.g., POS, smart phones, computers, PADs, unmanned aerial vehicles, wearable devices, etc.) use batteries, especially lithium batteries, however, due to the availability of the graphics, there are a large number of counterfeit or counterfeit batteries that impersonate batteries produced by regular manufacturers (called genuine batteries, regular batteries, original batteries), which are generally of poor quality, which are prone to causing safety accidents, endangering the life and property safety of users, and also greatly compromising the interests of regular battery manufacturers, terminal manufacturers. In particular, in the POS machine industry, two 18650 cell lithium batteries are basically used by most POS manufacturers at present. The size of the battery produced by different factories is the same as that of the external interface, the battery can be used interchangeably, and a large number of forged inferior batteries occupy a part of markets, so that the POS machine sold by a certain POS machine manufacturer can use the battery produced by other factories, even the cheap forged battery, thereby not only causing potential safety hazard, but also damaging the benefits of the POS machine manufacturer. Accordingly, there is a need to provide a battery anti-counterfeiting scheme.
Disclosure of Invention
An object of the present application is to solve the above technical problem, namely to provide a battery anti-counterfeiting scheme.
According to one aspect of the application, there is provided an anti-counterfeiting battery pack comprising at least one battery and a battery protection board electrically connected with the at least one battery, wherein the battery protection board comprises a first chip with a unique identity code and a second chip with a storage space, the storage space comprises a firmware area and a firmware signature area, wherein the firmware area stores battery related information, and the firmware signature area stores data obtained by signing the firmware area data and the unique identity code by using an encryption algorithm. The regular battery pack with the anti-counterfeiting function is usually manufactured by a manufacturer of a terminal using the battery pack or a manufacturer authorized by the manufacturer, and is used for a corresponding terminal capable of identifying the counterfeit battery, the terminal can read a unique identity identification code and stored firmware area data carried by a chip on a battery protection board after being started, the unique identity identification code and the stored firmware area data are combined, then a hash value is calculated by using an encryption algorithm, and the calculated hash value and a firmware signature area on the battery pack chip are decrypted and checked by using an anti-counterfeiting public key stored on the terminal. Only the regular battery pack can pass the verification, and the terminal provided with the battery pack can be normally used, so that the benefit of terminal manufacturers is protected, and the safety risk brought by using the non-regular battery is reduced.
According to some embodiments of the present application, the first chip and the second chip are the same chip and are both fuel gauge chips, and the memory space is a programmable Flash space. In the embodiment, the battery protection board does not need to be additionally provided with other chips for storing the firmware area and the firmware signature area, and the anti-counterfeiting function can be realized by only utilizing the unique UID and the storage space of the fuel gauge chip, so that the cost is low.
According to some embodiments of the present application, the first chip is an electricity meter chip and the second chip is an EEPROM chip or a Flash chip. In such an embodiment, an EEPROM chip or Flash chip is added to the battery protection plate because the fuel gauge chip does not have a memory space that can store the firmware area and the firmware signature area. It should be understood that any chip having a memory function may be used, except for the preferred EEPROM chip or Flash chip.
According to some embodiments of the present application, the first chip and the second chip are the same chip and are each an EEPROM chip or a Flash chip, and the battery protection plate further includes an electricity meter chip. In such an embodiment, the fuel gauge chip does not have a unique UID, nor a memory space capable of storing the firmware area and the firmware signature area, and thus an EEPROM chip or Flash chip having a unique UID and a memory space is added.
According to some embodiments of the present application, the encryption algorithm is an asymmetric encryption algorithm or a symmetric encryption algorithm.
According to some embodiments of the application, the at least one battery is a lithium battery.
According to another aspect of the present application, there is provided a battery authentication method including the steps of:
reading a unique identity code carried by a first chip of a battery protection board of the battery pack and firmware area data stored on a second chip;
combining the unique identity identification code and the firmware area data, and calculating a hash value by using an encryption algorithm;
decrypting and checking the calculated hash value and the firmware signature area in the second chip by using the anti-counterfeiting public key;
if the signature verification is successful, prompting that the battery pack is normal and allowing the terminal provided with the battery pack to be used normally; and
if the verification fails, the battery pack is reminded to be counterfeit and the terminal with the battery pack is disabled.
The battery authentication method is simple and reliable, and can effectively identify the authenticity of the battery.
According to some embodiments of the present application, the encryption algorithm is an asymmetric encryption algorithm or a symmetric encryption algorithm.
According to yet another aspect of the present application, there is provided a terminal capable of identifying counterfeit batteries, comprising a battery compartment for accommodating a battery pack, and:
the module is used for reading the unique identification code carried by the first chip of the battery protection board of the battery pack and the firmware area data stored on the second chip;
a module for combining the unique identification code and the firmware area data and calculating a hash value using an encryption algorithm;
a module storing a battery anti-counterfeiting public key;
the module is used for decrypting and checking the signature by using the calculated hash value and the firmware signature area in the second chip and the battery anti-counterfeiting public key; and
and means for alerting the battery pack to counterfeiting and disabling the terminal when the verification fails.
According to some embodiments of the present application, the encryption algorithm is an asymmetric encryption algorithm or a symmetric encryption algorithm.
According to some embodiments of the present application, the terminal is a terminal that requires use of a lithium battery pack.
According to some embodiments of the present application, the terminal is a POS terminal.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention as claimed. Other features, objects, and advantages of the invention will be apparent from the description and drawings, and from the claims.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings that are required to be used in the description of the embodiments will be briefly described below. Those skilled in the art will readily appreciate that these drawings are for illustrative purposes only and are not intended to limit the scope of the present invention. For purposes of illustration, the figures may not be drawn to scale entirely.
Fig. 1 is a schematic block diagram of a structure of an anti-counterfeit battery pack according to an embodiment of the present application.
Fig. 2 is a schematic block diagram of a structure of an anti-counterfeit battery pack according to another embodiment of the present application.
Fig. 3 is a flowchart of a method of producing an anti-counterfeit battery pack according to an embodiment of the present application.
Fig. 4 is a flowchart of a battery authentication method according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus, methods, and so forth that are consistent with some aspects of the present application, as detailed in the accompanying claims.
The present application relates to an anti-counterfeit battery pack, a terminal capable of recognizing a counterfeit battery, and a battery authentication method.
Fig. 1 shows a schematic block diagram of an anti-counterfeit battery pack 10 according to an embodiment of the present application. The tamper battery pack 10 includes a battery 2 and a battery protection plate 3 electrically connected to the battery 2, which are enclosed in a case (not shown). In addition, the anti-counterfeit battery pack 10 further includes a communication interface 4 for communicating with the outside. It should be understood that only one battery 2 is schematically shown in the figures, but that the anti-counterfeit battery pack 10 may comprise two or more batteries to meet different power requirements. In the present embodiment, the battery 2 is a lithium battery, but may be another type of battery. In the embodiment shown in fig. 1, the battery protection plate 3 comprises a fuel gauge chip 31 for monitoring the battery charge, which chip is provided with a unique identification code (also called UID code) and with a memory space (e.g. a programmable Flash space) in which the unique identification code can be stored. In addition, the storage space further comprises a firmware area and a firmware signature area, wherein the firmware area stores battery related information (such as battery type, battery life, battery serial number and the like), and the firmware signature area stores encryption data which is obtained by signing the firmware area data and the unique identity code by using an encryption algorithm. In addition to the firmware area and the firmware signature area, the memory space may include a parameter area in which parameters generated during use of the battery are stored.
Fig. 2 shows a block diagram of a further exemplary embodiment of a battery pack 20, which likewise comprises at least one battery 2 enclosed in a housing (not shown) and a battery protection plate 3 electrically connected to the battery 2, and a communication interface 4 for communication with the outside. In this embodiment, the battery protection board 3 includes a fuel gauge chip 31 for monitoring the battery power and a memory chip 32 (for example, an EEPROM chip or a Flash chip) having a memory space, wherein the fuel gauge chip 31 has a unique UID code, the memory space of the memory chip 32 includes a firmware area and a firmware signature area, wherein the firmware area stores battery related information (for example, battery type, battery life, battery serial number, etc.), and the firmware signature area stores encrypted data obtained by signing the firmware area data and the unique UID code by an encryption algorithm.
According to a variant of the above-described embodiment, the battery protection plate 3 likewise comprises an electricity meter chip 31 and a memory chip 32 (for example an EEPROM chip or a Flash chip), but instead of the electricity meter chip 31 the memory chip 32 carries a unique UID code, which is stored in the memory space of the chip 32. The remaining features of this embodiment variant are the same as those of the above-described embodiment and will not be described again here.
The production method of the anti-counterfeit battery packs 10, 20 will be described below with reference to a flowchart shown in fig. 3. The method starts in step 101, and then in step 102, the production tool communicates with the anti-counterfeit battery packs 10, 20, and the information about the battery material number is collected and uploaded to the production system. In step 103, the production tool reads the unique UID information carried by the electricity meter chip 31 or the memory chip 32 and uploads it to the production system. It should be appreciated that step 102 and step 103 may occur simultaneously or sequentially. Thereafter, in step 104, the production system generates battery firmware zone contents based on the received battery charge number related information and unique UID information. Next, in step 105, the production system signs the generated firmware region content and the received unique UID with an encryption algorithm, which may be an asymmetric encryption algorithm such as SM2, RSA, DSA, ECC, or the like, or a symmetric encryption algorithm such as DES, 3DES, AES, or the like, to generate firmware signature region content. Preferably, the SM2 encryption algorithm is used, which has numerous advantages compared to the RSA algorithm: firstly, the security is high, and the SM2 password intensity of 192 bits is higher than that of RSA 2048 bits; secondly, the storage space is small, the password generated by the SM2 algorithm generally uses 192-256 bits, and the password of the RSA algorithm generally needs 2048-4096 bits; thirdly, the signature speed is high, and the speed of SM2 is far higher than that of RSA in private key operation; finally, SM2 is a domestic algorithm, and a national password management department makes a specification, so that an unpublishable password does not exist, and no foreign available backdoor is ensured. In step 106, the production system transmits the generated firmware area content and firmware signature area content to the production tooling, and the production tooling is written into the storage space of the fuel gauge chip 31 or the storage chip 32 of the battery pack 10, 20, thereby obtaining the battery pack with anti-counterfeiting function.
The application also relates to a terminal capable of identifying counterfeit batteries. In one embodiment, the terminal is a POS terminal, but it should be understood that the terminal may also be any other terminal requiring the use of a battery pack, in particular a lithium battery pack, such as a smart phone, a computer, a PAD, a drone, a wearable device, etc. The terminal comprises a battery compartment for accommodating the battery pack, a module for reading the unique identification code of the battery protection board of the battery pack and the firmware area data stored on the first chip (the fuel gauge chip 31 or the storage chip 32) and the second chip (the fuel gauge chip 31 or the storage chip 32), a module for combining the unique identification code and the firmware area data and calculating a hash value by using an encryption algorithm, a module for storing a battery anti-counterfeiting public key, a module for decrypting the calculated hash value and the firmware signature area in the second chip by using the battery anti-counterfeiting public key, and a module for reminding that the battery pack is counterfeit and disabling the terminal when the verification fails. The storage medium of the terminal includes a program that can be executed after the terminal is powered on to implement the battery authentication method as shown in fig. 4.
The battery authentication method comprises the following steps:
-a step 201 in which the terminal is powered on;
step 202, in which the data reading module reads the unique UID and firmware area data of the chip in the battery pack, if the data is not read, the user is prompted that the battery pack used is non-regular, the battery pack should be replaced immediately, and normal use of the terminal can be prohibited in order to ensure use safety;
-a step 203 in which the calculation module combines the UID and the firmware zone data read by the data reading module, calculates a hash value using an encryption algorithm, wherein the encryption algorithm may be an asymmetric encryption algorithm such as SM2, RSA, DSA, ECC, etc. or a symmetric encryption algorithm such as DES, 3DES, AES, etc.;
step 204, in which the decryption and verification module decrypts and verifies the hash value calculated in step 203 and the firmware signature area in the chip by using the anti-counterfeit public key stored in the terminal;
step 205, in which it is determined whether the verification is successful, and if successful, it goes to step 206 in which it is confirmed that the battery pack used is normal, the terminal is allowed to be used normally, and if failed, it goes to step 207 in which it is prompted to the user that the battery pack used is not normal, it should be replaced immediately, and normal use of the terminal may be prohibited in order to secure use safety.
Therefore, the battery used by the terminal can be ensured to be a regular battery authenticated by a terminal manufacturer, the benefit of the manufacturer is protected, and the safety risk brought by the forged inferior battery is reduced.
Unless defined otherwise, technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used in the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
As used herein, the terms "comprises," "comprising," or the like are intended to cover the inclusion of a stated element or article that is "comprising" or "comprises," but not the exclusion of other elements or articles that may be listed thereafter or equivalents thereof.
It should be noted that, the terms "mounted," "connected," "fixed," and the like should be understood in a broad sense, and for example, may be fixedly connected, detachably connected, or integrated; may be mechanically connected, may be electrically connected or may be in communication with each other; either directly or indirectly, through intermediaries, or both, may be in communication with each other or in interaction with each other, unless expressly defined otherwise.
It should be appreciated that the terms "first," "second," and the like, as used herein, do not denote any order, quantity, or importance, but rather are used to distinguish one element from another. "plurality" or "multiple layers" and the like mean two and more than two numbers.
The foregoing description of the preferred embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, alternatives, and improvements that fall within the spirit and scope of the invention.

Claims (12)

1. The battery protection board comprises a first chip with a unique identity code and a second chip with a storage space, wherein the storage space comprises a firmware area and a firmware signature area, the firmware area stores battery related information, and the firmware signature area stores data obtained by signing the firmware area data and the unique identity code by using an encryption algorithm.
2. The anti-counterfeiting battery pack according to claim 1, wherein the first chip and the second chip are the same chip and are each an electricity meter chip, and the storage space is a programmable Flash space.
3. The anti-counterfeiting battery pack according to claim 1, wherein the first chip is an electricity meter chip and the second chip is an EEPROM chip or a Flash chip.
4. The anti-counterfeit battery pack of claim 1, wherein the first chip and the second chip are the same chip and are each an EEPROM chip or a Flash chip, and the battery protection plate further comprises an electricity meter chip.
5. The anti-counterfeiting battery pack according to any one of claims 1-4, wherein the encryption algorithm is an asymmetric encryption algorithm or a symmetric encryption algorithm.
6. The anti-counterfeiting battery according to any one of claims 1-4, wherein the at least one battery is a lithium battery.
7. A battery authentication method, comprising the steps of:
reading a unique identity code carried by a first chip of a battery protection board of the battery pack and firmware area data stored on a second chip;
combining the unique identity identification code and the firmware area data, and calculating a hash value by using an encryption algorithm;
decrypting and checking the calculated hash value and the firmware signature area in the second chip by using the anti-counterfeiting public key;
if the signature verification is successful, prompting that the battery pack is normal and allowing the terminal provided with the battery pack to be used normally; and
if the verification fails, the battery pack is reminded to be counterfeit and the terminal with the battery pack is disabled.
8. The battery authentication method according to claim 7, wherein the encryption algorithm is an asymmetric encryption algorithm or a symmetric encryption algorithm.
9. A terminal capable of identifying counterfeit batteries, comprising a battery compartment for receiving a battery pack, the terminal further comprising:
the module is used for reading the unique identification code carried by the first chip of the battery protection board of the battery pack and the firmware area data stored on the second chip;
a module for combining the unique identification code and the firmware area data and calculating a hash value using an encryption algorithm;
a module storing a battery anti-counterfeiting public key;
the module is used for decrypting and checking the signature by using the calculated hash value and the firmware signature area in the second chip and the battery anti-counterfeiting public key; and
and means for alerting the battery pack to counterfeiting and disabling the terminal when the verification fails.
10. The terminal capable of identifying counterfeit batteries according to claim 9, wherein the encryption algorithm is an asymmetric encryption algorithm or a symmetric encryption algorithm.
11. A terminal capable of identifying counterfeit batteries according to claim 9 or 10, wherein the terminal is a terminal requiring the use of a lithium battery pack.
12. The terminal capable of identifying counterfeit batteries according to claim 11, wherein the terminal is a POS terminal.
CN202310014084.3A 2023-01-05 2023-01-05 Anti-counterfeiting battery pack, terminal capable of identifying counterfeit battery and battery authentication method Pending CN116014381A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310014084.3A CN116014381A (en) 2023-01-05 2023-01-05 Anti-counterfeiting battery pack, terminal capable of identifying counterfeit battery and battery authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310014084.3A CN116014381A (en) 2023-01-05 2023-01-05 Anti-counterfeiting battery pack, terminal capable of identifying counterfeit battery and battery authentication method

Publications (1)

Publication Number Publication Date
CN116014381A true CN116014381A (en) 2023-04-25

Family

ID=86019151

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310014084.3A Pending CN116014381A (en) 2023-01-05 2023-01-05 Anti-counterfeiting battery pack, terminal capable of identifying counterfeit battery and battery authentication method

Country Status (1)

Country Link
CN (1) CN116014381A (en)

Similar Documents

Publication Publication Date Title
KR101210631B1 (en) Anti-fake battery pack and identification system thereof
US8417946B2 (en) Method and apparatus for accessing an electronic device by a data terminal
US8621212B2 (en) Systems and methods for cryptographically enhanced automatic blacklist management and enforcement
US20150156022A1 (en) Critical security parameter generation and exchange system and method for smart-card memory modules
CN108055236A (en) A kind of data processing method, mobile unit and electronic equipment
TW200825930A (en) Component authentication for computer systems
CN108573296B (en) Anti-counterfeiting device, anti-counterfeiting system and anti-counterfeiting method
JP2011113972A5 (en)
CN103684786A (en) Method and system for storing digital certificate and binding digital certificate to hardware carrier
CN102045167A (en) Systems and methods for asymmetric cryptographic accessory authentication
WO2010052722A1 (en) Secure storage device
CN102855574A (en) Method and system for identifying commodity information based on NFC (Near Field Communication)
CN113420049B (en) Data circulation method, device, electronic equipment and storage medium
CN101527021A (en) RFID electronic tag reading and writing device used for product truth verification
CN109903052A (en) A kind of block chain endorsement method and mobile device
CN202870900U (en) NFC (Near Field Communication)-based commodity information identification system
JP2006114423A (en) Battery certification system, battery pack, and application apparatus
CN112019326A (en) Vehicle charging safety management method and system
CN108082723B (en) Anti-counterfeiting bottle cap based on CPU (Central processing Unit) password chip and working method thereof
JP2005094128A (en) Authentication system
CN101164048B (en) Safety system applied in memory card
CN104022886A (en) Safety authentication method applied to parking lot as well as related device and system
CN111814132A (en) Security authentication method and device, security authentication chip and storage medium
CN102202057B (en) System and method for safely dumping data of mobile memory
CN102176227B (en) Signing testifying method and auxiliary signing testifying system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Floor 3-4, Building 3A, Zone A, Fuzhou Software Park, No. 89, Software Avenue, Gulou District, Fuzhou City, Fujian Province, 350001

Applicant after: Yinjie Nico (Fujian) Technology Co.,Ltd.

Address before: Floor 3-4, Building 3A, Zone A, Fuzhou Software Park, No. 89, Software Avenue, Gulou District, Fuzhou City, Fujian Province, 350001

Applicant before: Fujian Liandi Commercial Technology Co.,Ltd.