CN116363801A - Offline payment method, charging pile and payment terminal - Google Patents

Offline payment method, charging pile and payment terminal Download PDF

Info

Publication number
CN116363801A
CN116363801A CN202111632699.XA CN202111632699A CN116363801A CN 116363801 A CN116363801 A CN 116363801A CN 202111632699 A CN202111632699 A CN 202111632699A CN 116363801 A CN116363801 A CN 116363801A
Authority
CN
China
Prior art keywords
charging
data
wallet
payment terminal
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111632699.XA
Other languages
Chinese (zh)
Inventor
王海
林锋
刘广达
董芸
陶振宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Capitek Co ltd
Original Assignee
Beijing Capitek Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Capitek Co ltd filed Critical Beijing Capitek Co ltd
Priority to CN202111632699.XA priority Critical patent/CN116363801A/en
Publication of CN116363801A publication Critical patent/CN116363801A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F15/00Coin-freed apparatus with meter-controlled dispensing of liquid, gas or electricity
    • G07F15/003Coin-freed apparatus with meter-controlled dispensing of liquid, gas or electricity for electricity
    • G07F15/005Coin-freed apparatus with meter-controlled dispensing of liquid, gas or electricity for electricity dispensed for the electrical charging of vehicles
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/325Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application provides an offline payment method, a charging pile and a payment terminal, and relates to the field of charging of new energy automobiles. The offline payment method comprises the following steps: receiving wallet data of a payment terminal in response to a charging start request instruction; if the payment terminal meets the charging condition based on the wallet data, the estimated charging amount information and charging pile data corresponding to the charging pile are sent to the payment terminal; receiving first transaction verification data sent by a payment terminal, and starting charging operation; responding to a charging stop request instruction, stopping charging operation, and receiving second transaction verification data sent by the payment terminal; and if the second transaction verification data is consistent with the first transaction verification data, sending a deduction instruction to the payment terminal. The offline payment method can realize the starting and stopping of charging and the deduction of charging fees when the charging pile and the payment terminal are in a single or double offline state under a trusted mechanism.

Description

Offline payment method, charging pile and payment terminal
Technical Field
The application relates to the technical field of charging, in particular to an offline payment method, a charging pile and a payment terminal.
Background
In recent years, along with the continuous improvement of people's environmental awareness and the strong promotion of the nation to new energy automobiles, more and more consumers choose to purchase new energy automobiles to meet daily travel demands, and meanwhile, public charging piles in matched resources are gradually scaled.
In the charging mode, from the entity card swiping mode to the new energy electric vehicle starting charging, the new energy electric vehicle is charged through the mobile phone code scanning mode, and the new energy vehicle owner feels the convenience brought by the technical improvement. However, when the charging pile or the mobile terminal is in an offline state, the code scanning charging mode cannot be performed.
Disclosure of Invention
The present application has been made in order to solve the above technical problems. The embodiment of the application provides an offline payment method, a charging pile and a payment terminal, which solve the problem that operations such as starting charging, stopping charging, deducting charging cost and the like cannot be performed under a trusted mechanism when the charging pile or the payment terminal is in an offline state.
In a first aspect, an embodiment of the present application provides an offline payment method, applied to a charging pile, including: receiving wallet data of a payment terminal in response to a charging start request instruction; if the payment terminal meets the charging condition based on the wallet data, the estimated charging amount information and charging pile data corresponding to the charging pile are sent to the payment terminal; receiving first transaction verification data sent by a payment terminal, and starting charging operation; responding to a charging stop request instruction, stopping charging operation, and receiving second transaction verification data sent by the payment terminal; and if the second transaction verification data is consistent with the first transaction verification data, sending a deduction instruction to the payment terminal.
With reference to the first aspect, in certain implementations of the first aspect, the charging initiation request instruction is generated based on a first near field wireless communication between the charging stake and the payment terminal; and/or the charging stop request instruction is generated based on the second time of short-range wireless communication between the charging stake and the payment terminal.
With reference to the first aspect, in certain implementation manners of the first aspect, the charging stake is configured with a security module, the charging stake data includes PSAM terminal number data, terminal transaction count data, random number data, and charging gun number data, the wallet data includes a wallet card number, a wallet balance, a wallet state, a wallet public key certificate, and wallet transaction data, and the charging stake data corresponding to the charging stake and the estimated charging amount information is sent to the payment terminal, including: obtaining a wallet public key based on the CA public key and the wallet public key certificate by utilizing the security module; acquiring PSAM terminal number data, terminal transaction count data, random number data, charging gun number data and estimated charging amount information by utilizing a safety module; encrypting PSAM terminal number data, terminal transaction count data, random number data, charging gun number data and estimated charging amount information by using an AES key by using a security module to obtain a first encrypted data packet; encrypting the first encrypted data packet by using the security module by using the money Bao Gongyao to obtain a second encrypted data packet; signing the second encrypted data packet by using the PSAM private key by utilizing the security module to obtain a signed second encrypted data packet; and transmitting the signed second encrypted data packet and the PSAM public key certificate to the payment terminal by utilizing a security module.
With reference to the first aspect, in some implementation manners of the first aspect, before determining that the payment terminal meets the charging condition based on the wallet data, sending the estimated charging amount information and charging pile data corresponding to the charging pile to the payment terminal, the method further includes: judging whether the payment terminal meets the charging condition or not based on wallet data; and if the payment terminal is determined not to meet the charging condition based on the wallet data, sending charging prohibition information to the payment terminal.
With reference to the first aspect, in certain implementation manners of the first aspect, the first transaction verification data includes first wallet verification data and first charging stake verification data, the second transaction verification data includes second wallet verification data and second charging stake verification data, and if the second transaction verification data is consistent with the first transaction verification data, sending a deduction instruction to the payment terminal includes: if the first wallet verification data is consistent with the second wallet verification data, and the first charging pile verification data is consistent with the second charging pile verification data, a deduction instruction is generated, the deduction instruction is encrypted by using an AES secret key, the deduction instruction encrypted by the AES secret key is signed by using a PSAM private key, and the signed deduction instruction is sent to the payment terminal.
In a second aspect, an embodiment of the present application provides an offline payment method, applied to a payment terminal, where the method includes: transmitting wallet data to a charging stake in response to a charging start request instruction; receiving charging pile data and estimated charging amount information sent by a charging pile; based on the estimated charge amount information, freezing the wallet balance, and sending first transaction verification data to the charging stake; transmitting second transaction verification data to the charging pile in response to the charging stop request instruction; and receiving a deduction instruction sent by the charging pile, and deducting the charging amount from the balance of the wallet based on the deduction instruction.
With reference to the second aspect, in certain implementations of the second aspect, the charging stake data includes PSAM terminal number data, terminal transaction count data, random number data, and charging gun number data, the wallet data includes a wallet card number, a wallet balance, a wallet status, a wallet public key certificate, and wallet transaction data, and receiving charging stake data and estimated charging amount information sent by the charging stake includes: receiving a signed second encrypted data packet sent by the charging pile and a PSAM public key certificate; based on the CA public key and the PSAM public key certificate, a PSAM public key is obtained; verifying the signed second encrypted data packet based on the PSAM public key to obtain a second encrypted data packet; decrypting the second encrypted data packet based on the purse private key to obtain a first encrypted data packet; and decrypting the first encrypted data packet based on the AES secret key to obtain PSAM terminal number data, terminal transaction count data, random number data, charging gun number data and estimated charging amount information.
With reference to the second aspect, in some implementations of the second aspect, receiving a deduction instruction sent by the charging post, deducting a charging amount from a wallet balance based on the deduction instruction, including: signing is checked on the basis of the PSAM public key deduction instruction; decrypting the deduction instruction encrypted by the AES key based on the AES key; and deducting the charging amount from the balance of the wallet based on the decrypted deduction instruction.
In a third aspect, an embodiment of the present application provides a charging pile, including: a processor; a memory for storing processor-executable instructions; a processor configured to perform the method according to the first aspect.
In a fourth aspect, an embodiment of the present application provides a payment terminal, including: a processor; a memory for storing processor-executable instructions; a processor configured to perform the method according to the second aspect.
According to the offline payment method, when the charging start request instruction is responded, wallet data of the payment terminal are received, reliable and effective identity authentication is conducted, and the problems that communication with a cloud platform cannot be conducted, identity authentication with the payment terminal cannot be conducted, and normal charging service cannot be provided due to the fact that the charging pile and the payment terminal are in a single and/or double offline state due to factors such as network stability are solved. By comparing the first transaction verification data with the second transaction verification data, the trusted authentication of the charging pile equipment and the trusted confirmation of the user identity are realized, and further correct execution of the charging stop instruction is ensured.
Drawings
The foregoing and other objects, features and advantages of the present application will become more apparent from the following more particular description of embodiments of the present application, as illustrated in the accompanying drawings. The accompanying drawings are included to provide a further understanding of embodiments of the application and are incorporated in and constitute a part of this specification, illustrate the application and not constitute a limitation to the application. In the drawings, like reference numerals generally refer to like parts or steps.
Fig. 1 is a flow chart illustrating an offline payment method at a charging pile side according to an embodiment of the present application.
Fig. 2 is a schematic flow chart of sending estimated charging amount information and charging pile data corresponding to a charging pile to a payment terminal according to an embodiment of the present application.
Fig. 3 is a flowchart illustrating an offline payment method at a charging pile side according to another embodiment of the present application.
Fig. 4 is a schematic flow chart of sending a deduction instruction to a payment terminal according to an embodiment of the present application.
Fig. 5 is a flowchart illustrating an offline payment method at a payment terminal according to an embodiment of the present application.
Fig. 6 is a schematic flow chart of receiving charging pile data and estimated charging amount information sent by a charging pile according to an embodiment of the present application.
Fig. 7 is a schematic diagram illustrating data transmission when a payment terminal and a charging pile provided in an embodiment of the present application perform first near field wireless communication.
Fig. 8 is a schematic diagram of data transmission when the payment terminal and the charging pile perform the second short-range wireless communication according to an embodiment of the present application.
Fig. 9 is a schematic flow chart of deducting a charging amount from a wallet balance according to an embodiment of the present application.
Fig. 10 is a schematic structural diagram of a charging pile according to an embodiment of the present disclosure.
Fig. 11 is a schematic structural diagram of a payment terminal according to an embodiment of the present application.
Detailed Description
The following description of the technical solutions in the embodiments of the present application will be made clearly and completely with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
With the development of society and the progress of life, more and more consumers choose to purchase new energy automobiles to meet daily travel demands. When the new energy automobile is charged, the mobile phone code scanning mode is used for starting charging, account information of a user, user amount information, health state of a charging pile, charging transaction order information and the like can be synchronized to an operation background in real time, and the background system can perform online verification on the user information. Once the charging pile or the payment terminal is disconnected, the user information cannot be synchronized to the background system in real time, so that the user data cannot be checked, and the whole charging process cannot be started.
Fig. 1 is a flow chart illustrating an offline payment method at a charging pile side according to an embodiment of the present application. The offline payment method may be executed in a processor of the charging pile side or in a related server, for example.
As shown in fig. 1, the offline payment method provided in the embodiment of the present application includes the following steps.
And step 110, receiving wallet data of the payment terminal in response to the charging start request instruction.
In particular, wallet data includes, but is not limited to, wallet card number, wallet balance, wallet status, wallet public key certificate, and wallet transaction data.
The charging start request instruction is generated based on the first near field communication between the charging post and the payment terminal. Namely, the payment terminal is provided with a near field communication (Near Field Communication, NFC) module, and the charging pile side is provided with an NFC card reading module. When a user has a charging requirement, the payment terminal performs a first card sticking operation on the charging pile side to generate a charging starting request instruction. At this time, the NFC module of the payment terminal communicates with the NFC card reading module of the charging post, and the charging post side receives wallet data of the payment terminal, including, but not limited to, information such as a virtual charging card number, a wallet balance, the wallet being in a locked state or an unlocked state, and a wallet public key certificate.
And 140, if the payment terminal meets the charging condition based on the wallet data, sending estimated charging amount information and charging pile data corresponding to the charging pile to the payment terminal.
Specifically, a service module, a safety module and a control module are deployed on the charging pile side. And the service module at the charging pile side receives wallet data of the payment terminal, and if the service module detects that the wallet in the payment terminal is in an unlocking state, the wallet balance is greater than or equal to the minimum deduction amount, the virtual charging card number is not a black household, and no unpaid transaction order is available under the virtual charging card number, the service module at the charging pile side determines that the payment terminal meets charging conditions, and the charging pile side sends estimated charging amount information and charging pile data corresponding to the charging pile to the payment terminal.
And 150, receiving first transaction verification data sent by the payment terminal, and starting a charging operation.
Specifically, the first transaction verification data includes first wallet transaction verification data and first charging stake transaction verification data. Illustratively, the first wallet transaction verification data includes a wallet card number and at least one of a wallet raw balance, a wallet frozen balance, and a wallet number of transactions. The first charging stake transaction verification data includes a charging gun number and at least one of a point-of-sale terminal secure access module (Purchase Secure Access Module, PSAM) terminal number, a terminal transaction counter, and a random number.
The security module at the charging pile side receives the first transaction verification data sent by the payment terminal, uses the wallet public key to check the received first transaction verification data, uses an advanced encryption standard (Advanced Encryption Standard, AES) secret key to decrypt the checked first transaction verification data, records the decrypted first transaction verification data, and verifies whether the PSAM terminal number and the random number in the decrypted first transaction verification data are consistent with the PSAM terminal number and the random number in the charging pile data in step 140. And if the charging pile side service module is consistent with the charging pile side service module, sending a starting charging instruction to the charging pile side control module, receiving the starting charging instruction by the charging pile side control module, and controlling the charging pile to start charging. If the charging pile sides are inconsistent, the charging pile sides cannot start charging.
In some embodiments, the AES encryption algorithm may be replaced by the national encryption algorithm SM4, and the two encryption algorithms have the same effect, and any one of the two encryption algorithms may be selected to operate according to the actual situation.
And step 160, in response to the charging stop request instruction, stopping the charging operation and receiving the second transaction verification data sent by the payment terminal.
Specifically, the charging stop request instruction is generated based on the second-time short-range wireless communication between the charging stake and the payment terminal. Namely, the payment terminal is provided with an NFC module, and the charging pile side is provided with an NFC card reading module. When a user has a charging stopping requirement, the payment terminal performs a second card sticking operation on the charging pile side to generate a charging stopping request instruction. The charging stake side responds to the charging stop request instruction to stop the charging operation. And the business module at the charging device side calculates the deduction amount. And then, the NFC module of the payment terminal is communicated with the NFC card reading module of the charging pile, the security module at the charging pile side requests the payment terminal to acquire the basic and transaction information, the payment terminal encrypts the basic and transaction information through AES after acquiring the basic and transaction information, and signs by using a wallet private key to generate second transaction verification data, and the security module at the charging pile side receives the second transaction verification data sent by the payment terminal.
Specifically, the second transaction verification data includes second wallet transaction verification data and second charging stake transaction verification data. Illustratively, the second wallet transaction verification data includes a wallet card number and at least one of a wallet raw balance, a wallet frozen balance, and a wallet number of transactions. The second charging stake transaction verification data includes a charging gun number and at least one of a PSAM terminal number, a terminal transaction counter, and a random number.
The security module at the charging stake side uses the wallet public key to check the received second transaction verification data, uses the AES key to decrypt the checked second transaction verification data,
step 170, if the second transaction verification data is consistent with the first transaction verification data, sending a deduction instruction to the payment terminal.
Specifically, the service module at the charging pile side compares the second transaction verification data with the first transaction verification data, if the second transaction verification data is completely consistent with the first transaction verification data, the identity information at the payment terminal side is considered to be accurately verified, the service module at the charging pile side generates a deduction instruction, and the deduction instruction is sent to the payment terminal.
Further, the deduction instruction includes a virtual charging card number, a deduction amount, and the like.
In some embodiments, the charging stake side also receives charging transaction data sent by the payment terminal.
Specifically, the charging transaction data includes transaction time, charging deduction amount, PSAM terminal number, virtual charging card number, terminal transaction counter, charging gun number, and the like.
And the security module at the charging stake side receives the charging transaction data sent by the payment terminal, uses the money Bao Gongyao to check the charging transaction data, and uses the AES secret key to decrypt the charging transaction data checked by the wallet public key. And after decryption, the charging pile side safety module updates the transaction state and stores the transaction credentials, and after networking of the subsequent charging piles, the transaction data is uploaded.
First, through the technical scheme in this embodiment, combine NFC technique, effectively avoided originally through the entity card mode of charging, caused raw materials cost and the environmental pollution problem that the preparation entity card brought, increased the optional mode of charging of new energy vehicle, have wide application space and good market prospect. Secondly, when the charging pile and the payment terminal carry out the first near field communication, the charging pile side firstly judges whether the payment terminal has access and use authority to the charging pile resource according to the received wallet data information, and judges identity correctness in payment according to the received first transaction verification data and the second transaction verification data, thereby solving the problem that the charging pile and the payment terminal are in single or double off-line state, cannot communicate with a cloud platform and cannot carry out identity authentication and order settlement with the payment terminal due to the influence of factors such as network stability and the like, and further cannot provide normal charging service.
Fig. 2 is a schematic flow chart of sending estimated charging amount information and charging pile data corresponding to a charging pile to a payment terminal according to an embodiment of the present application. The embodiment shown in fig. 2 is extended from the embodiment shown in fig. 1, and differences between the embodiment shown in fig. 2 and the embodiment shown in fig. 1 are described in the following, and the details of the differences are not repeated.
As shown in fig. 2, the step of sending the estimated charging amount information and charging pile data corresponding to the charging pile to the payment terminal includes the following steps.
Step 141, obtaining the wallet public key based on the certificate authority (Certificate Authority, CA) public key and the wallet public key certificate using the security module.
Specifically, a development board is additionally arranged on the charging pile side and connected with the NFC card reading module, and a service module and a safety module are deployed on the development board. The service module, the safety module and the charging pile control module interact data with the cloud platform and the payment terminal, so that the following functions can be realized: the electronic wallet application adaptation in the payment terminal and the charging pile control interface adaptation are realized through the interface, so that request messages between the electronic wallet in the payment terminal and the service module and between the electronic wallet in the payment terminal and the control module are ensured to be reachable; identity authentication data can be requested to the security module, so that user identity verification and settlement data verification are realized; and under the condition that the charging pile and the payment terminal are single or double off-line, the charging transaction management is realized.
Further, the service module uses Socket, interface adaptation, graphic interface, data cache and other technologies to meet the requirements of charging pile equipment management and configuration, data communication, charging management, offline order management, data synchronization and the like, and supports the charging pile to safely apply offline payment service. The specific functions of the service module are as follows: calculating the charging amount by the charging degree of the charging pile, and generating a deduction instruction; accessing the cloud platform side through a TCP/IP protocol to realize data reporting, configuration issuing and the like; realizing the communication service function of the simulation center platform, and interfacing with the charging pile control system through a TCP protocol interface; invoking the capabilities of the security module through the messaging interface; the edge device service layer as the core service layer is realized in a modularization manner, and performs interface adaptation processing on a charging pile control module, a PSAM card application, an electronic wallet control application and the like.
Further, the security module includes two parts, an electronic wallet control program and a PSAM card application program. The specific functions of the security module are as follows: the electronic wallet control program obtains data transmitted by a payment terminal side through the NFC card reading module; the PSAM card application program is installed in a Security Element (SE) of the charging pile side and is used for storing keys and key service data and providing encryption and decryption and signature functions of the data. The security module provides a messaging interface to the business module to support notification of offline funds freeze or deduction.
The security module verifies the wallet public key certificate in wallet data transmitted from the payment terminal based on the CA public key to obtain the wallet public key.
And 142, acquiring PSAM terminal number data, terminal transaction count data, random number data, charging gun number data and estimated charging amount information by utilizing a security module.
Specifically, the PSAM card application program in the security module is utilized to obtain charging pile data, namely PSAM terminal number data, terminal transaction count data, random number data and charging gun number data.
PSAM is terminal hardware of charging pile side, PSAM terminal number data is PSAM's identity data.
The terminal transaction count data records the charging transaction serial number.
The random number may be any data used to verify whether the data transmitted between the charging stake and the payment terminal has been tampered with.
Step 143, encrypt the PSAM terminal number data, the terminal transaction count data, the random number data, the charging gun number data, and the estimated charging amount information by using the AES key with the security module, to obtain a first encrypted data packet.
AES is a symmetric encryption algorithm, used for encrypting and decrypting data, i.e., the AES keys are the same, regardless of whether they are charging posts or payment terminals, and the same set of AES keys is used for encrypting and decrypting data.
Specifically, the security module first assembles PSAM terminal number data, terminal transaction count data, random number data, charging gun number data, and estimated charging amount information. Illustratively, the security module generates a data string according to the PSAM terminal number data, the terminal transaction count data, the random number data, the charging gun number data, and the estimated charging amount information, where a certain segment of data in the data string represents a specific data, for example, the 10 th to 20 th data in the data string represent the PSAM terminal number data, the 3 rd to 5 th data in the data string represent the random number data, and so on.
Further, an AES key is used for encrypting a data string generated by PSAM terminal number data, terminal transaction count data, random number data, charging gun number data and estimated charging amount information, and a first encrypted data packet is obtained.
Step 144, encrypt the first encrypted data packet using the security module using the value Bao Gongyao to obtain a second encrypted data packet.
Specifically, the security module encrypts the AES encryption algorithm in the first encrypted data packet using the value Bao Gongyao, thereby obtaining the second encrypted data packet.
And 145, signing the second encrypted data packet by using the PSAM private key by utilizing the security module to obtain a signed second encrypted data packet.
And step 146, transmitting the signed second encrypted data packet and the PSAM public key certificate to the payment terminal by utilizing a security module.
Specifically, the signed second encrypted data packet and the PSAM public key certificate are sent to the payment terminal by using an electronic wallet control program in the security module. Further, the electronic wallet control program is used for communicating with the electronic wallet in the payment terminal through the NFC card reading module at the charging stake side.
Through the technical scheme in the embodiment, the data transmitted between the charging pile and the payment terminal can be effectively prevented from being tampered, so that the charging pile can normally provide charging service for a user when the charging pile or the payment terminal is in an offline state.
Fig. 3 is a flowchart illustrating an offline payment method at a charging pile side according to another embodiment of the present application. The embodiment shown in fig. 3 is extended from the embodiment shown in fig. 1, and differences between the embodiment shown in fig. 3 and the embodiment shown in fig. 1 are mainly described below, and are not repeated.
As shown in fig. 3, before the estimated charge amount information and the charging post data corresponding to the charging post are sent to the payment terminal if it is determined that the payment terminal satisfies the charging condition based on the wallet data, the following steps are further included.
And step 120, judging whether the payment terminal meets the charging condition or not based on the wallet data.
Specifically, the service module at the charging pile side judges that the payment terminal is enough to meet the charging condition based on wallet data.
Illustratively, whether the user to which the wallet belongs is a blacklisted user is judged according to the wallet card number, whether the balance meets the minimum balance configuration requirement is judged according to the wallet balance, whether the wallet is in an unlocking state is judged according to the wallet state, and whether the wallet has unfinished transaction information is judged according to wallet transaction data.
If the user is a non-blacklist user, the balance of the wallet meets the minimum balance configuration, the wallet is in an unlocking state, and the wallet has no unfinished transaction information, the payment terminal meets the charging condition.
For example, in the practical application process, if the determination result of step 120 is yes, that is, the payment terminal satisfies the charging condition, step 140 is executed, and if the determination result of step 120 is no, that is, the payment terminal does not satisfy the charging condition, step 130 is executed.
And step 130, if the payment terminal is determined to not meet the charging condition based on the wallet data, the charging prohibition information is sent to the payment terminal.
Specifically, if the user is at least one of a blacklist user, a wallet balance is lower than a minimum balance configuration, the wallet is in a locked state, and the wallet has incomplete transaction information, the payment terminal does not meet a charging condition, a service module at a charging pile side generates charging prohibition information, a security module at the charging pile side encrypts the charging prohibition information by using an AES secret key, a PSAM secret key signs the charging prohibition information encrypted by the AES secret key, and the service module at the charging pile side sends the signed charging prohibition information to the payment terminal.
Through the technical scheme in the embodiment, under the condition that the charging pile and the payment terminal are single or double off-line, the reliable and effective identity authentication is carried out on the payment terminal, whether the payment terminal has corresponding access and use permission to the charging pile resource or not is further determined, and the normal running of the subsequent charging service and order settlement is ensured.
Fig. 4 is a schematic flow chart of sending a deduction instruction to a payment terminal according to an embodiment of the present application. The embodiment shown in fig. 4 is extended from the embodiment shown in fig. 1, and differences between the embodiment shown in fig. 4 and the embodiment shown in fig. 1 are mainly described below, and are not repeated.
As shown in fig. 4, if the second transaction verification data is consistent with the first transaction verification data, a deduction instruction is sent to the payment terminal, which includes the following steps.
Step 171, determining whether the first wallet authentication data and the second wallet authentication data, and the first charging pile authentication data and the second charging pile authentication data are identical.
Specifically, the second transaction verification data includes second wallet transaction verification data and second charging stake transaction verification data.
Illustratively, the second wallet transaction verification data includes a wallet card number and at least one of a wallet raw balance, a wallet frozen balance, and a wallet number of transactions. The second charging stake transaction verification data includes a charging gun number and at least one of a PSAM terminal number, a terminal transaction counter, and a random number.
Further, whether the first wallet authentication data and the second wallet authentication data are completely identical, and whether the first charging pile authentication data and the second charging pile authentication data are completely identical are compared.
For example, in the practical application process, if the determination result of step 171 is yes, that is, the first wallet authentication data and the second wallet authentication data, and the first charging pile authentication data and the second charging pile authentication data are both consistent, step 172 is executed, and if the determination result of step 171 is no, that is, the first wallet authentication data and the second wallet authentication data are inconsistent and/or the first charging pile authentication data and the second charging pile authentication data are inconsistent, step 173 is executed.
In step 172, an error instruction is generated.
Specifically, the security module at the charging pile side encrypts the error instruction by using the AES secret key, signs the error instruction encrypted by the AES secret key by using the PSAM secret key, and the service module sends the signed error instruction to the payment terminal.
Step 173, generate a deduction instruction.
And step 174, encrypting the deduction instruction by using the AES key, and signing the deduction instruction encrypted by using the AES key by using the PSAM private key.
And step 175, sending the signed deduction instruction to the payment terminal.
Through the technical scheme in the embodiment, whether the situation that the payment terminal and the charging pile are not corresponding exists or not when the charging pile and the payment terminal carry out the second short-distance wireless communication can be verified, and normal operation of charging service and correct operation of deduction transaction are ensured.
Fig. 5 is a flowchart illustrating an offline payment method according to an embodiment of the present application. The offline payment method may be executed in a processor on the payment terminal side or in an associated server, for example.
As shown in fig. 5, the offline payment method provided in the embodiment of the present application includes the following steps.
And step 510, transmitting wallet data to the charging pile in response to the charging start request instruction.
Specifically, the specific generation manner of the charge start request instruction is referred to the above embodiment. When a user has a charging requirement, the payment terminal performs a first card sticking operation on the charging pile side to generate a charging starting request instruction, and at the moment, the payment terminal sends wallet data to the charging pile.
In particular, the wallet data includes, but is not limited to, virtual charging card number, wallet balance, wallet in locked or unlocked state, wallet public key certificate, and the like.
And step 520, receiving charging pile data and estimated charging amount information sent by the charging pile.
Step 530, based on the estimated charge amount information, freezing the wallet balance, and sending first transaction verification data to the charging stake.
Specifically, the payment terminal freezes the balance of the wallet based on the estimated charging amount information, and locks the wallet.
The first transaction verification data includes first wallet transaction verification data and first charging stake transaction verification data. Illustratively, the first wallet transaction verification data includes an electronic wallet card number and at least one of an electronic wallet raw balance, an electronic wallet frozen balance, and an electronic wallet number of transactions. The first charging stake transaction verification data includes a charging gun number and at least one of a PSAM terminal number, a terminal transaction counter, and a random number.
The payment terminal encrypts the first transaction verification data by using the AES secret key, signs the first transaction verification data encrypted by using the AES secret key by using the wallet secret key, and sends the signed first transaction verification data to the charging pile.
Step 540, in response to the charging stop request instruction, sends second transaction verification data to the charging stake.
Specifically, the charging stop request instruction is generated based on the second-time short-range wireless communication between the charging stake and the payment terminal. When the user has a charging stopping requirement, the payment terminal performs a second card sticking operation on the charging pile side, and a charging stopping request instruction is generated. At this time, the NFC module of the payment terminal communicates with the NFC card reading module of the charging stake, and the payment terminal sends second transaction verification data to the charging stake side.
Specifically, the second transaction verification data includes second wallet transaction verification data and second charging stake transaction verification data. Illustratively, the second wallet transaction verification data includes wallet card number and at least one of wallet raw balance, wallet frozen balance, and wallet number of transactions. The second charging stake transaction verification data includes a charging gun number and at least one of a PSAM terminal number, a terminal transaction counter, and a random number.
The payment terminal encrypts the second transaction verification data by using the AES secret key, signs the second transaction verification data encrypted by using the AES secret key by using the wallet secret key, and sends the signed second transaction verification data to the charging pile.
Step 550, receiving the deduction instruction sent by the charging pile, and deducting the charging amount from the balance of the wallet based on the deduction instruction.
Specifically, the payment terminal deducts the corresponding charging amount from the wallet based on the deduction instruction, and generates and records charging transaction information including, but not limited to, at least one of transaction time, actual payment charging amount, PSAM terminal number, charging gun number, wallet card number, and terminal transaction counter.
Further, the payment terminal unlocks the wallet based on the deduction instruction.
In some embodiments, the payment terminal also sends charging transaction credential data to the charging stake.
The payment terminal encrypts the charging transaction information by using the AES secret key, signs the charging transaction information encrypted by using the AES secret key by using the wallet secret key, and sends the signed charging transaction information to the charging pile.
Through the technical scheme in this embodiment, combine NFC technique effectively avoided originally through the charge mode of entity card, caused raw materials cost and the environmental pollution problem that the preparation entity card brought, increased the alternative charge mode of new energy automobile, have wide application space and good market prospect. In addition, when the payment terminal performs the first near field communication and the second near field communication with the charging pile, the payment terminal respectively sends the first transaction verification data and the second transaction verification data to the charging pile for judging the correctness of the identity of the payment terminal by the charging pile, thereby solving the problems that the charging pile and the payment terminal are in a single or double off-line state, cannot communicate with a cloud platform, cannot perform identity authentication and order settlement with the payment terminal and cannot provide normal charging service due to the influence of factors such as network stability.
Fig. 6 is a schematic flow chart of receiving charging pile data and estimated charging amount information sent by a charging pile according to an embodiment of the present application. The embodiment shown in fig. 6 is extended from the embodiment shown in fig. 5, and differences between the embodiment shown in fig. 6 and the embodiment shown in fig. 5 are described in detail, so that details of the differences will not be repeated.
As shown in fig. 6, the step of receiving charging pile data and estimated charging amount information sent by the charging pile includes the following steps.
Step 521, the signed second encrypted data packet sent by the charging pile and the PSAM public key certificate are received.
Specifically, the second encrypted data packet is signed with the PSAM private key. The second encrypted data packet comprises second encrypted PSAM terminal number data, second encrypted terminal transaction count data, second encrypted random number data, second encrypted charging gun number data and second encrypted estimated charging amount information.
Step 522, obtaining the PSAM public key based on the CA public key and the PSAM public key certificate.
Step 523, verifying the signed second encrypted data packet based on the PSAM public key to obtain a second encrypted data packet.
And step 524, decrypting the second encrypted data packet based on the wallet private key to obtain the first encrypted data packet.
And step 525, decrypting the first encrypted data packet based on the AES secret key to obtain PSAM terminal number data, terminal transaction count data, random number data, charging gun number data and estimated charging amount information.
By the technical scheme in the embodiment, the data transmitted between the charging pile and the payment terminal can be prevented from being tampered, and the safety and the accuracy of data receiving and the smooth proceeding of charging service are ensured.
Fig. 7 is a schematic flow chart of deducting a charging amount from a wallet balance according to an embodiment of the present application. The embodiment shown in fig. 7 is extended from the embodiment shown in fig. 6, and differences between the embodiment shown in fig. 7 and the embodiment shown in fig. 6 are described in detail, so that the description is omitted.
As shown in fig. 6, the step of receiving the deduction instruction sent by the charging post and deducting the charging amount from the balance of the wallet based on the deduction instruction includes the following steps.
In step 561, the deduction instruction is checked and signed based on the public key of the PSAM.
Specifically, the deduction instruction includes a deduction amount and at least one of a wallet card number and a PSAM terminal number.
In step 562, the deduction instruction encrypted by the AES key is decrypted based on the AES key.
Step 563, deducting the charged amount from the wallet balance based on the decrypted deduction instruction.
Specifically, based on the decrypted deduction instruction, the charging amount is deducted from the wallet balance, and the wallet is unlocked.
Through the technical scheme in the embodiment, the data in the deduction instruction can be effectively prevented from being tampered, and the accuracy of the deduction amount is ensured.
In some embodiments, the data transmission process when the payment terminal and the charging pile perform the first short-range wireless communication is shown in fig. 8, and the data transmission process when the payment terminal and the charging pile perform the second short-range wireless communication is shown in fig. 9. The description of fig. 8 and 9 is referred to the above embodiment.
Fig. 10 is a schematic structural diagram of a charging pile according to an embodiment of the present disclosure. As shown in fig. 10, the charging stake 100 includes one or more processors 1001 and memory 1002. The processor 1001 may be a Central Processing Unit (CPU) or other form of processing unit having data processing and/or instruction execution capabilities and may control other components in the charging stake 100 to perform desired functions.
Memory 1002 may include one or more computer program products that may include various forms of computer-readable storage media, such as volatile memory and/or non-volatile memory. The volatile memory may include, for example, random Access Memory (RAM) and/or cache memory (cache), and the like. The non-volatile memory may include, for example, read Only Memory (ROM), hard disk, flash memory, and the like. One or more computer program instructions may be stored on the computer readable storage medium that can be executed by the processor 1001 to implement the charging stake side offline payment method and/or other desired functions of the various embodiments of the present application described above. Various content such as including PSAM terminal number data, terminal transaction count data, random number data, and charging gun number data, wallet data including wallet card number, wallet balance, wallet status, wallet public key certificate, and wallet transaction data may also be stored in the computer readable storage medium.
In one example, the charging pile 100 may further include: an input device 1003 and an output device 1004, which are interconnected by a bus system and/or other forms of connection mechanisms (not shown).
The input device 1003 may include, for example, a keyboard, a mouse, and the like.
The output device 1004 may output various information to the outside, including charging pile data including PSAM terminal number data, terminal transaction count data, random number data, charging gun number data, and the like. The output 1004 may include, for example, a display, speakers, a printer, and a communication network and remote output devices connected thereto, etc.
Of course, only some of the components related to the present application in the charging pile 100 are shown in fig. 10 for simplicity, and components such as buses, input/output interfaces, and the like are omitted. In addition, the charging stake 100 can include any other suitable components, depending on the particular application.
In addition to the methods and apparatus described above, embodiments of the present application may also be a computer program product comprising computer program instructions which, when executed by a processor, cause the processor to perform the steps in the offline payment method of the charging pile side according to the various embodiments of the present application described above in the present specification.
The computer program product may write program code for performing the operations of embodiments of the present application in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server.
Fig. 11 is a schematic structural diagram of a payment terminal according to an embodiment of the present application. As shown in fig. 11, the payment terminal 110 includes one or more processors 1101 and a memory 1102. The processor 1101 may be a Central Processing Unit (CPU) or other form of processing unit having data processing capabilities and/or instruction execution capabilities, and may control other components in the payment terminal 110 to perform desired functions.
Memory 1102 may include one or more computer program products that may include various forms of computer-readable storage media, such as volatile memory and/or non-volatile memory. The volatile memory may include, for example, random Access Memory (RAM) and/or cache memory (cache), and the like. The non-volatile memory may include, for example, read Only Memory (ROM), hard disk, flash memory, and the like. One or more computer program instructions may be stored on the computer readable storage medium that may be executed by the processor 1101 to implement the offline payment method and/or other desired functions of the payment terminal side of the various embodiments of the present application described above. Various content such as including PSAM terminal number data, terminal transaction count data, random number data, and charging gun number data, wallet data including wallet card number, wallet balance, wallet status, wallet public key certificate, and wallet transaction data may also be stored in the computer readable storage medium.
In one example, the payment terminal 110 may further include: an input device 1103 and an output device 1104, which are interconnected by a bus system and/or other form of connection mechanism (not shown).
The input device 1103 may include, for example, a keyboard, a mouse, and the like.
The output device 1104 may output various information to the outside, including wallet card number, wallet balance, wallet status, wallet public key certificate, wallet transaction data, and the like. The output device 1104 may include, for example, a display, speakers, a printer, and a communication network and remote output devices connected thereto, etc.
Of course, only some of the components of the payment terminal 110 relevant to the present application are shown in fig. 11 for simplicity, components such as buses, input/output interfaces, and the like being omitted. In addition, payment terminal 110 may include any other suitable components depending on the particular application.
In addition to the methods and apparatus described above, embodiments of the present application may also be a computer program product comprising computer program instructions which, when executed by a processor, cause the processor to perform the steps in the payment terminal side offline payment method according to the various embodiments of the present application described above in the present specification.
The computer program product may write program code for performing the operations of embodiments of the present application in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server.
The basic principles of the present application have been described above in connection with specific embodiments, however, it should be noted that the advantages, benefits, effects, etc. mentioned in the present application are merely examples and not limiting, and these advantages, benefits, effects, etc. are not to be considered as necessarily possessed by the various embodiments of the present application. Furthermore, the specific details disclosed herein are for purposes of illustration and understanding only, and are not intended to be limiting, as the application is not intended to be limited to the details disclosed herein as such.
The block diagrams of the devices, apparatuses, devices, systems referred to in this application are only illustrative examples and are not intended to require or imply that the connections, arrangements, configurations must be made in the manner shown in the block diagrams. As will be appreciated by one of skill in the art, the devices, apparatuses, devices, systems may be connected, arranged, configured in any manner. Words such as "including," "comprising," "having," and the like are words of openness and mean "including but not limited to," and are used interchangeably therewith. The terms "or" and "as used herein refer to and are used interchangeably with the term" and/or "unless the context clearly indicates otherwise. The term "such as" as used herein refers to, and is used interchangeably with, the phrase "such as, but not limited to.
The previous description of the disclosed aspects is provided to enable any person skilled in the art to make or use the present application. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects without departing from the scope of the application. Thus, the present application is not intended to be limited to the aspects shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The foregoing description has been presented for purposes of illustration and description. Furthermore, this description is not intended to limit the embodiments of the application to the form disclosed herein. Although a number of example aspects and embodiments have been discussed above, a person of ordinary skill in the art will recognize certain variations, modifications, alterations, additions, and subcombinations thereof.

Claims (10)

1. An offline payment method, characterized by being applied to a charging stake, the method comprising:
receiving wallet data of the payment terminal in response to a charging start request instruction;
if the payment terminal meets the charging condition based on the wallet data, sending estimated charging amount information and charging pile data corresponding to the charging pile to the payment terminal;
receiving first transaction verification data sent by the payment terminal, and starting charging operation;
responding to a charging stop request instruction, stopping charging operation, and receiving second transaction verification data sent by the payment terminal;
and if the second transaction verification data is consistent with the first transaction verification data, sending a deduction instruction to the payment terminal.
2. The offline payment method according to claim 1, wherein the charge initiation request instruction is generated based on a first time short-range wireless communication between the charging peg and the payment terminal; and/or the charging stop request instruction is generated based on a second time of short-range wireless communication between the charging pile and the payment terminal.
3. The offline payment method according to claim 1 or 2, wherein the charging stake is deployed with a security module, the charging stake data includes PSAM terminal number data, terminal transaction count data, random number data, and charging gun number data, the wallet data includes wallet card number, wallet balance, wallet status, wallet public key certificate, and wallet transaction data,
the sending the estimated charging amount information and charging pile data corresponding to the charging pile to the payment terminal comprises the following steps:
obtaining a wallet public key based on the CA public key and the wallet public key certificate by utilizing the security module;
acquiring the PSAM terminal number data, the terminal transaction count data, the random number data, the charging gun number data and the estimated charging amount information by utilizing the safety module;
encrypting the PSAM terminal number data, the terminal transaction count data, the random number data, the charging gun number data and the estimated charging amount information by using an AES key by using the security module to obtain a first encrypted data packet;
encrypting the first encrypted data packet by using the wallet public key by using the security module to obtain a second encrypted data packet;
Signing the second encrypted data packet by using a PSAM private key by utilizing the security module to obtain a signed second encrypted data packet;
and transmitting the signed second encrypted data packet and the PSAM public key certificate to the payment terminal by utilizing the security module.
4. The offline payment method according to claim 1 or 2, characterized in that before the determining that the payment terminal satisfies the charging condition based on the wallet data, the transmitting of the estimated charging amount information and the charging post data corresponding to the charging post to the payment terminal further comprises:
judging whether the payment terminal meets the charging condition or not based on the wallet data;
and if the payment terminal is determined not to meet the charging condition based on the wallet data, sending charging prohibition information to the payment terminal.
5. The offline payment method according to claim 1 or 2, wherein the first transaction verification data comprises first wallet verification data and first charging stake verification data, the second transaction verification data comprises second wallet verification data and second charging stake verification data, and the sending a deduction instruction to the payment terminal if the second transaction verification data is consistent with the first transaction verification data comprises:
If the first wallet verification data is consistent with the second wallet verification data, and the first charging pile verification data is consistent with the second charging pile verification data, generating the deduction instruction, encrypting the deduction instruction by using an AES secret key, signing the deduction instruction encrypted by the AES secret key by using a PSAM private key, and sending the signed deduction instruction to the payment terminal.
6. An offline payment method, characterized in that it is applied to a payment terminal, said method comprising:
transmitting wallet data to a charging stake in response to a charging start request instruction;
receiving charging pile data and estimated charging amount information sent by the charging pile;
based on the estimated charge amount information, freezing a wallet balance, and transmitting first transaction verification data to the charging stake;
transmitting second transaction verification data to the charging pile in response to a charging stop request instruction;
and receiving a deduction instruction sent by the charging pile, and deducting the charging amount from the balance of the wallet based on the deduction instruction.
7. The offline payment method of claim 6, wherein the charging stake data includes PSAM terminal number data, terminal transaction count data, random number data, and charging gun number data, the wallet data includes wallet card number, wallet balance, wallet status, wallet public key certificate, and wallet transaction data,
The receiving the charging pile data and the estimated charging amount information sent by the charging pile comprises the following steps:
receiving a signed second encrypted data packet and a PSAM public key certificate sent by the charging pile;
based on the CA public key and the PSAM public key certificate, a PSAM public key is obtained;
verifying the signed second encrypted data packet based on the PSAM public key to obtain a second encrypted data packet;
decrypting the second encrypted data packet based on a wallet private key to obtain a first encrypted data packet;
and decrypting the first encrypted data packet based on an AES secret key to obtain the PSAM terminal number data, the terminal transaction count data, the random number data, the charging gun number data and the estimated charging amount information.
8. The offline payment method according to claim 7, wherein the receiving the deduction instruction sent by the charging post deducts a charging amount from the wallet balance based on the deduction instruction, comprising:
verifying a signature of the deduction instruction based on the PSAM public key;
decrypting the deduction instruction encrypted by the AES key based on the AES key;
and deducting the charging amount from the wallet balance based on the decrypted deduction instruction.
9. A charging pile, comprising:
a processor;
a memory for storing the processor-executable instructions;
the processor being configured to perform the method of any of the preceding claims 1 to 5.
10. A payment terminal, comprising:
a processor;
a memory for storing the processor-executable instructions;
the processor being configured to perform the method of any of the preceding claims 6 to 8.
CN202111632699.XA 2021-12-28 2021-12-28 Offline payment method, charging pile and payment terminal Pending CN116363801A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111632699.XA CN116363801A (en) 2021-12-28 2021-12-28 Offline payment method, charging pile and payment terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111632699.XA CN116363801A (en) 2021-12-28 2021-12-28 Offline payment method, charging pile and payment terminal

Publications (1)

Publication Number Publication Date
CN116363801A true CN116363801A (en) 2023-06-30

Family

ID=86915022

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111632699.XA Pending CN116363801A (en) 2021-12-28 2021-12-28 Offline payment method, charging pile and payment terminal

Country Status (1)

Country Link
CN (1) CN116363801A (en)

Similar Documents

Publication Publication Date Title
US11276051B2 (en) Systems and methods for convenient and secure mobile transactions
JP7442552B2 (en) Dynamic off-chain digital currency transaction processing
CN110933125B (en) Blockchain entity, infink entity, authentication device, and method for performing collaboration
CN109165934B (en) Safe mobile payment method and system based on identification password
KR101544722B1 (en) Method for performing non-repudiation, payment managing server and user device therefor
EP3699019A1 (en) Electric car charging method and system using certificate-based management
CN103597520B (en) The ticketing service method and system of identity-based
EP3540671B1 (en) Systems and methods for software based encryption
CN102510333B (en) Authorization method and system
CN106327184A (en) Intelligent mobile terminal payment system and intelligent mobile terminal payment method based on safe hardware isolation
CN111200496B (en) Digital key implementation method based on vehicle
CN106096947B (en) The half off-line anonymous method of payment based on NFC
CN105900375A (en) Efficient methods for protecting identity in authenticated transmissions
CN108141444B (en) Improved authentication method and authentication device
CN103312691A (en) Method and system for authenticating and accessing cloud platform
US20150294309A1 (en) Method, Device and Service Provision Unit for Authenticating a Customer for a Service to be Provided by the Service Provision Unit
WO2015055120A1 (en) Device for secure information exchange
WO2021208549A1 (en) Method and device for charging authentication
CN110838919A (en) Communication method, storage method, operation method and device
MXPA04010160A (en) Challenge-based authentication without requiring knowledge of secret authentication data.
CN113766450B (en) Vehicle virtual key sharing method, mobile terminal, server and vehicle
CN112073967B (en) Method and device for downloading identity certificate of mobile phone shield equipment and electronic equipment
CN111200807B (en) Bluetooth-based information interaction method and device
US20220353058A1 (en) Conditional offline interaction system and method
CN116363801A (en) Offline payment method, charging pile and payment terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination