CN102404312B - Points of trust is used to provide service - Google Patents
Points of trust is used to provide service Download PDFInfo
- Publication number
- CN102404312B CN102404312B CN201110276927.4A CN201110276927A CN102404312B CN 102404312 B CN102404312 B CN 102404312B CN 201110276927 A CN201110276927 A CN 201110276927A CN 102404312 B CN102404312 B CN 102404312B
- Authority
- CN
- China
- Prior art keywords
- trust
- trustpoint
- points
- information
- vehicle
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60L—PROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
- B60L3/00—Electric devices on electrically-propelled vehicles for safety purposes; Monitoring operating variables, e.g. speed, deceleration or energy consumption
- B60L3/12—Recording operating variables ; Monitoring of operating variables
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60L—PROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
- B60L53/00—Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles
- B60L53/60—Monitoring or controlling charging stations
- B60L53/65—Monitoring or controlling charging stations involving identification of vehicles or their battery types
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60L—PROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
- B60L2240/00—Control parameters of input or output; Target parameters
- B60L2240/40—Drive Train control parameters
- B60L2240/54—Drive Train control parameters related to batteries
- B60L2240/545—Temperature
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60L—PROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
- B60L2240/00—Control parameters of input or output; Target parameters
- B60L2240/40—Drive Train control parameters
- B60L2240/54—Drive Train control parameters related to batteries
- B60L2240/547—Voltage
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60L—PROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
- B60L2240/00—Control parameters of input or output; Target parameters
- B60L2240/40—Drive Train control parameters
- B60L2240/54—Drive Train control parameters related to batteries
- B60L2240/549—Current
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60L—PROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
- B60L2240/00—Control parameters of input or output; Target parameters
- B60L2240/70—Interactions with external data bases, e.g. traffic centres
- B60L2240/72—Charging station selection relying on external data
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60L—PROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
- B60L2250/00—Driver interactions
- B60L2250/10—Driver interactions by alarm
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02T—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
- Y02T10/00—Road transport of goods or passengers
- Y02T10/60—Other road transportation technologies with climate change mitigation effect
- Y02T10/70—Energy storage systems for electromobility, e.g. batteries
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02T—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
- Y02T10/00—Road transport of goods or passengers
- Y02T10/60—Other road transportation technologies with climate change mitigation effect
- Y02T10/7072—Electromobility specific charging systems or methods for batteries, ultracapacitors, supercapacitors or double-layer capacitors
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02T—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
- Y02T10/00—Road transport of goods or passengers
- Y02T10/60—Other road transportation technologies with climate change mitigation effect
- Y02T10/72—Electric energy management in electromobility
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02T—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
- Y02T90/00—Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
- Y02T90/10—Technologies relating to charging of electric vehicles
- Y02T90/12—Electric charging stations
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02T—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
- Y02T90/00—Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
- Y02T90/10—Technologies relating to charging of electric vehicles
- Y02T90/16—Information or communication technologies improving the operation of electric vehicles
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02T—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
- Y02T90/00—Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
- Y02T90/10—Technologies relating to charging of electric vehicles
- Y02T90/16—Information or communication technologies improving the operation of electric vehicles
- Y02T90/167—Systems integrating technologies related to power network operation and communication or information technologies for supporting the interoperability of electric or hybrid vehicles, i.e. smartgrids as interface for battery charging of electric vehicles [EV] or hybrid vehicles [HEV]
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S30/00—Systems supporting specific end-user applications in the sector of transportation
- Y04S30/10—Systems supporting the interoperability of electric or hybrid vehicles
- Y04S30/14—Details associated with the interoperability, e.g. vehicle recognition, authentication, identification or billing
Landscapes
- Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Transportation (AREA)
- Mechanical Engineering (AREA)
- Life Sciences & Earth Sciences (AREA)
- Sustainable Development (AREA)
- Sustainable Energy (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Navigation (AREA)
- Traffic Control Systems (AREA)
- Electric Propulsion And Braking For Vehicles (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
公开了使用信任点提供服务。在某些实施例中,处理器可以用于通过执行用户认证、平台认证以及环境认证与信任点系统建立信任。处理器可以响应于建立信任与信任点系统交互信息。在某些实施例中,信任点系统可以合作以提供各种服务,诸如护航、电池充电、交通工具安全和/或排放报告服务。
Provides services using trustpoints. In some embodiments, the processor can be used to establish trust by performing user authentication, platform authentication, and environment authentication with a trustpoint system. The processor may interact information with the trustpoint system in response to establishing trust. In some embodiments, trustpoint systems may cooperate to provide various services, such as escort, battery charging, vehicle safety, and/or emissions reporting services.
Description
相关申请related application
本申请要求2010年3月23日提交的题为“REMOTEMAINTENANCE”的美国临时申请61/316,498号的优先权,其整体并入本文。This application claims priority to US Provisional Application No. 61/316,498, filed March 23, 2010, entitled "REMOTEMAINTENANCE," which is incorporated herein in its entirety.
本申请是2010年9月10日提交的代理机构案号073338.0734的题为“System and Methods for Remote Maintenance In An ElectronicNetwork With Multiple Clients”的序列号12/879,226的美国专利申请的部分继续申请,其整体并入本文。This application is a continuation-in-part of U.S. Patent Application Serial No. 12/879,226, filed September 10, 2010, at Attorney Docket No. 073338.0734, and entitled "System and Methods for Remote Maintenance In An Electronic Network With Multiple Clients," the entirety of which Incorporated into this article.
技术领域 technical field
本发明一般地涉及信息交换,更具体而言,涉及使用信任点提供服务。The present invention relates generally to information exchange, and more particularly to providing services using trustpoints.
背景技术 Background technique
向客户端提供的服务可能需要经由通信网络发送保密信息。例如,客户端可以向服务提供商发送服务的请求,服务提供商继而可以从客户端请求支付信息。保密信息的发送方可能想要在发送信息之前认证接收方。Services provided to clients may require the transmission of confidential information over a communication network. For example, a client may send a request for service to a service provider, and the service provider may in turn request payment information from the client. A sender of confidential information may want to authenticate the recipient before sending the information.
附图说明 Description of drawings
为了更完整地理解本发明以及它的特征和优点,现在结合附图,参照以下描述,在附图中:For a more complete understanding of the present invention, together with its features and advantages, reference is now made to the following description taken in conjunction with the accompanying drawings, in which:
图1例示一个或更多服务系统向一个或更多客户端系统提供服务的网络的实例;Figure 1 illustrates an example of a network in which one or more service systems provide services to one or more client systems;
图2例示客户端系统的实例;Figure 2 illustrates an example of a client system;
图3A-图3C例示用于提供护航(escort)服务的方法的实例;3A-3C illustrate an example of a method for providing escort (escort) services;
图4、5、6、7A-7C和8A-8B例示用于提供电池充电服务的方法的实例;Figures 4, 5, 6, 7A-7C and 8A-8B illustrate examples of methods for providing battery charging services;
图9例示用于提供交通工具安全服务的方法的实例;以及Figure 9 illustrates an example of a method for providing vehicle safety services; and
图10例示用于提供排放报告服务的方法的实例。FIG. 10 illustrates an example of a method for providing emission reporting services.
具体实施方式 detailed description
通过参照图的图1至图10最好地理解本发明的实施例和它的优点,相同的附图标记用于各个图的相同和相应部分。Embodiments of the present invention and its advantages are best understood by referring to FIGS. 1 through 10 of the drawings, like reference numerals being used for like and corresponding parts of the various drawings.
概述overview
根据本发明,可以减少或消除与用于提供服务的先前技术相关联的问题和缺点。According to the present invention, problems and disadvantages associated with previous techniques for providing services can be reduced or eliminated.
在某些实施例中,处理器可以通过执行用户认证、平台认证以及环境认证进行工作以与信任点系统建立信任。处理器可以响应于建立信任与信任点系统发送信息。在某些实施例中,信任点系统可以合作以提供各种服务,诸如护航、电池充电、交通工具安全和/或排放报告服务。In some embodiments, the processor may operate to establish trust with the trustpoint system by performing user authentication, platform authentication, and environment authentication. The processor may send information in response to establishing the trust and trustpoint system. In some embodiments, trustpoint systems may cooperate to provide various services, such as escort, battery charging, vehicle safety, and/or emissions reporting services.
本发明的某些实施例可以提供一个或更多技术优点。一个实施例的技术优点可以是移动设备可以包括可以允许移动设备更有效率地接收服务的信任点系统。一个实施例的另一技术优点可以是信任点系统可以合作以提供各种服务,诸如护航、电池充电、交通工具安全和/或排放报告服务。Certain embodiments of the invention may provide one or more technical advantages. A technical advantage of one embodiment may be that a mobile device may include a trustpoint system that may allow the mobile device to receive services more efficiently. Another technical advantage of one embodiment may be that trustpoint systems may cooperate to provide various services, such as escort, battery charging, vehicle safety, and/or emissions reporting services.
本发明的某些实施例可以不包括以上技术优点中的任何技术优点,包括以上技术优点中的一些、或所有技术优点。一个或更多其它技术优点根据本文中包括的权利要求书、描述以及附图对本领域技术人员而言会是显而易见的。Certain embodiments of the present invention may not include any, some, or all of the above technical advantages. One or more other technical advantages will be apparent to those skilled in the art from the claims, description, and drawings included herein.
图1例示一个或更多服务系统10向一个或更多客户端系统20提供服务的网络2的实例。系统10和20可以包括可以用来在系统10与12之中建立信任的信任点系统12。在某些实施例中,移动设备可以包括可以允许移动设备较有效率地参与提供服务的信任点系统12。在某些实施例中,信任点系统12可以合作以提供各种服务,诸如护航、电池充电、交通工具安全和/或排放报告服务。FIG. 1 illustrates an example of a network 2 in which one or more service systems 10 provide services to one or more client systems 20 . Systems 10 and 20 may include a trustpoint system 12 that may be used to establish trust among systems 10 and 12 . In some embodiments, a mobile device may include a trustpoint system 12 that may allow the mobile device to more efficiently participate in providing services. In some embodiments, trustpoint systems 12 may cooperate to provide various services, such as escort, battery charging, vehicle safety, and/or emissions reporting services.
在例示的实例中,网络2包括经由通信网络18耦合到一个或更多客户端系统20的一个或更多服务系统10。服务系统10可以向一个或更多客户端系统20提供一个或更多服务。服务的实例包括护航、电池充电、交通工具安全和/或排放报告服务。服务的另一实例包括管理软件和/或固件更新和/或状态。In the illustrated example, network 2 includes one or more service systems 10 coupled to one or more client systems 20 via communication network 18 . Service system 10 may provide one or more services to one or more client systems 20 . Examples of services include escort, battery charging, vehicle safety and/or emissions reporting services. Another example of a service includes managing software and/or firmware updates and/or status.
服务系统10的实例包括交通工具服务中心、交通信息中心、充电系统、支付系统,以及可以向客户端系统20提供服务的任何其它系统。交通工具服务中心可以是便于向交通工具提供服务的中心。交通信息中心可以包括具有可以用来规划驾驶路线的实时交通信息的中心。充电系统可以是可以对客户端系统20(例如,交通工具)的电源(例如,电池)充电的系统。支付系统可以是可以授权服务支付的系统。支付系统的实例可以包括银行、信用卡公司、信贷机构、商行,或者可以授权服务支付的其它合适组织。Examples of service systems 10 include vehicle service centers, traffic information centers, charging systems, payment systems, and any other systems that can provide services to client systems 20 . A vehicle service center may be a center that facilitates providing services to vehicles. Traffic information centers may include centers with real-time traffic information that can be used to plan driving routes. The charging system may be a system that can charge a power source (eg, a battery) of a client system 20 (eg, a vehicle). The payment system may be a system that can authorize payment for services. Examples of payment systems may include banks, credit card companies, credit institutions, businesses, or other suitable organizations that may authorize payment for services.
服务系统10可以包括允许服务系统10与其它实体安全通信的特征。例如,服务系统10可以包括与其它实体建立信任的信任点系统12。信任点系统12在下面更详细地描述。作为另一实例,服务系统10可以包括管理用来认证其它实体的安全策略的服务器。策略可以定义需要在客户端系统20被授权访问服务的许可之前符合的一套属性值。Service system 10 may include features that allow service system 10 to communicate securely with other entities. For example, service system 10 may include a trustpoint system 12 that establishes trust with other entities. Trustpoint system 12 is described in more detail below. As another example, service system 10 may include a server that manages security policies used to authenticate other entities. A policy may define a set of attribute values that need to be met before a client system 20 is granted permission to access a service.
客户端系统20可以从服务系统10接收服务。客户端系统20的实例包括可以分别称作计算机客户端系统、移动客户端系统以及交通工具客户端系统的计算机、移动设备以及交通工具。Client system 20 may receive services from service system 10 . Examples of client systems 20 include computers, mobile devices, and vehicles, which may be referred to as computer client systems, mobile client systems, and vehicle client systems, respectively.
计算机可以是诸如服务器、笔记本电脑或者桌上型计算机的任何运算设备。移动设备可以是可以通过无线方式通信的手持设备。移动设备的实例包括电话(诸如蜂窝的、移动的或者智能的)、数字助理(诸如个人的或企业的)以及游戏设备。交通工具可以是设计成运输人和/或货物的设备。交通工具的实例包括陆地运输(诸如汽车、火车、自行车以及摩托车)、船舶(诸如船只和轮船)以及飞行器(诸如飞机)。在某些实施例中,交通工具可以包括允许无线通信的收发器。通信网络18在下面更详细地描述。A computer may be any computing device such as a server, laptop or desktop. A mobile device may be a handheld device that can communicate wirelessly. Examples of mobile devices include phones (such as cellular, mobile, or smart), digital assistants (such as personal or business), and gaming devices. A vehicle may be a device designed to transport people and/or goods. Examples of vehicles include land transportation (such as automobiles, trains, bicycles, and motorcycles), watercraft (such as boats and ships), and aircraft (such as airplanes). In some embodiments, a vehicle may include a transceiver to allow wireless communication. The communication network 18 is described in more detail below.
一个或更多服务系统10和/或一个或更多客户端系统20可以包括信任点系统12(或信任点)。在某些实施例中,信任点系统12可以通过执行用户认证、平台认证和/或环境认证与一个或更多其它信任点系统12建立信任,以便与其它信任点系统12交互信息。认证也可以涉及对于服务执行认证和/或对于服务的使用执行计费。One or more service systems 10 and/or one or more client systems 20 may include a trustpoint system 12 (or trustpoint). In some embodiments, a trustpoint system 12 may establish trust with one or more other trustpoint systems 12 by performing user authentication, platform authentication, and/or context authentication in order to exchange information with other trustpoint systems 12 . Authentication may also involve performing authentication for services and/or performing billing for usage of services.
在某些实施例中,建立信任可以包括从第一信任点系统向第二信任点系统发送信任点信息,以允许第二信任点系统认证第一信任点系统。在实施例中,建立信任可以包括从信任点系统接收信任点信息,以及使用信任点信息认证信任点系统。信任点信息可以包括可以用来认证信任点系统的信息。信任点信息的实例参照图2更详细地描述。信任运算和信任立方(TrustCube)是可以在信任点系统12之中提供可保证报告的方法和系统的实例。In some embodiments, establishing trust may include sending trustpoint information from the first trustpoint system to the second trustpoint system to allow the second trustpoint system to authenticate the first trustpoint system. In an embodiment, establishing trust may include receiving trustpoint information from a trustpoint system, and authenticating the trustpoint system using the trustpoint information. Trustpoint information may include information that may be used to authenticate the trustpoint system. An example of trustpoint information is described in more detail with reference to FIG. 2 . Trust Calculations and TrustCubes are examples of methods and systems that can provide assured reporting within the Trustpoint System 12 .
在某些实施例中,客户端系统20还可以包括一个或更多虚拟机(VM)22、虚拟机管理器(VMM)24、信任平台模块(TPM)26、资源列表28、客户端网络系统30、资源32以及GPS接收器40。In some embodiments, client system 20 may also include one or more virtual machines (VMs) 22, virtual machine managers (VMMs) 24, trusted platform modules (TPMs) 26, resource lists 28, client network systems 30 , resource 32 and GPS receiver 40 .
信任平台模块26可以生成可以用来认证模块26的信任点信息。在某些实施例中,信任平台模块(TPM)26可以利用信任点系统12工作。在某些实施例中,信任平台模块26包括具有可以烧制到处理器中的唯一Rivest、Shamir和Adleman(RSA)密钥的至少一个处理器。可以使用RSA密钥来认证信任平台模块26的客户端系统20。在某些实施例中,信任平台模块26可以使用例如伪随机数生成器生成密码密钥(cryptographic key)。Trusted platform module 26 may generate trustpoint information that may be used to authenticate module 26 . In some embodiments, trusted platform module (TPM) 26 may utilize trustpoint system 12 to function. In some embodiments, trusted platform module 26 includes at least one processor with a unique Rivest, Shamir and Adleman (RSA) key that can be burned into the processor. The client system 20 of the trusted platform module 26 may be authenticated using the RSA key. In some embodiments, trusted platform module 26 may generate cryptographic keys using, for example, a pseudo-random number generator.
在某些实施例中,虚拟机22可以与客户端网络系统30和/或与客户端网络系统30相关联的处理相对应。例如,可以使用虚拟机22来结合传感器。一个或更多虚拟机22可以运行一个或更多操作系统(OS)。在某些实施例中,虚拟机22可以通过虚拟机24共享客户端系统20的处理资源以及使用单一用途的操作系统。In some embodiments, a virtual machine 22 may correspond to a client network system 30 and/or a process associated with a client network system 30 . For example, a virtual machine 22 may be used to incorporate sensors. One or more virtual machines 22 may run one or more operating systems (OS). In some embodiments, virtual machine 22 may share processing resources of client system 20 through virtual machine 24 and use a single-purpose operating system.
虚拟机管理器(VMM)24可以创建、运行、监视和/或终止虚拟机22。虚拟机管理器24可以拦截虚拟机22之间的故障和/或中断和/或控制应用具有的对硬件和/或软件的访问。虚拟机管理器24也可以通过在应用和/或虚拟机22运行的各种线程之间共享时间管理处理器的多任务。虚拟机管理器24可以管理虚拟机22之中的通信。A virtual machine manager (VMM) 24 may create, run, monitor and/or terminate virtual machines 22 . Virtual machine manager 24 may intercept failures and/or interruptions between virtual machines 22 and/or control access to hardware and/or software that applications have. Virtual machine manager 24 may also manage processor multitasking by sharing time among various threads running by applications and/or virtual machines 22 . Virtual machine manager 24 may manage communications among virtual machines 22 .
资源列表28可以包括许可访问的实体的白名单和/或将会拒绝访问的实体的黑名单。Resource list 28 may include a whitelist of entities to which access is permitted and/or a blacklist of entities to which access will be denied.
客户端网络30可以是便于客户端系统20的部件中的合作的客户端系统20内的网络。例如,客户端网络30可以是管理交通工具中处理器的网络(诸如FlexRay网络)。作为另一实例,控制器区域网络(CAN或CAN总线)允许微控制器和设备在没有主计算机的情况下彼此通信。另外的实例包括时间触发协议(TTP)和航空电子全双工交换式以太网(AFDX)网络。Client network 30 may be a network within client system 20 that facilitates cooperation among components of client system 20 . For example, client network 30 may be a network managing processors in a vehicle (such as a FlexRay network). As another example, a controller area network (CAN or CAN bus) allows microcontrollers and devices to communicate with each other without a host computer. Additional examples include Time Triggered Protocol (TTP) and Avionics Full Duplex Switched Ethernet (AFDX) networks.
客户端网络30可以管理资源32,诸如客户端系统20的资源,例如,处理器和/或它们的相关联软件、固件和/或与处理器有关的处理指令。例如,客户端网络30可以包括各自使用软件和/或固件以便工作的中央处理单元(CPU)。客户端网络30可以负责资源32的维护和/或工作,包括管理与客户端系统20中每个资源32相关联的固件和/或软件的更新状态和/或版本。Client network 30 may manage resources 32, such as resources of client system 20, eg, processors and/or their associated software, firmware, and/or processor-related processing instructions. For example, client network 30 may include central processing units (CPUs) each utilizing software and/or firmware to function. Client network 30 may be responsible for maintenance and/or operation of resources 32 , including managing update status and/or versions of firmware and/or software associated with each resource 32 in client system 20 .
全球定位系统(GPS)接收器40与提供地点和时间信息的GPS导航卫星系统对接。A Global Positioning System (GPS) receiver 40 interfaces with the GPS navigation satellite system, which provides location and time information.
图2例示客户端系统20的实例。客户端系统20可以是计算机客户端系统、移动客户端系统或者交通工具客户端系统。在示例的实例中,客户端系统包括接口(IF)120、逻辑122以及一个或更多存储器124。逻辑122可以包括一个或更多处理器130以及诸如信任点模块132和服务模块134的应用。信任点模块132可以包括用户模块140、平台模块144以及环境模块148。服务模块134可以包括护航模块150、电池充电模块152、交通工具安全模块154以及排放报告模块156。FIG. 2 illustrates an example of a client system 20 . The client system 20 may be a computer client system, a mobile client system, or a vehicle client system. In the illustrated instance, the client system includes an interface (IF) 120 , logic 122 , and one or more memories 124 . Logic 122 may include one or more processors 130 and applications such as trustpoint module 132 and service module 134 . Trustpoint module 132 may include user module 140 , platform module 144 , and environment module 148 . The service modules 134 may include an escort module 150 , a battery charging module 152 , a vehicle safety module 154 , and an emissions reporting module 156 .
可以使用信任点模块132来建立与其它信任点系统的信任。信任点模块132可以执行认证以建立信任。如先前所讨论的,认证也可以涉及授权和/或计费。信任点模块132可以执行用户认证、平台认证和/或环境认证。Trustpoint module 132 may be used to establish trust with other trustpoint systems. Trustpoint module 132 may perform authentication to establish trust. As previously discussed, authentication may also involve authorization and/or accounting. Trustpoint module 132 may perform user authentication, platform authentication, and/or context authentication.
信任点模块132可以使用信任点信息来执行认证。信任点信息的实例包括用户、设备以及环境信息,在下面更详细地描述。信任点模块132可以检查以查看信息满足需求以确定信任点是否可接受。例如,信任点可以在它在白名单上或者不在黑名单上的情况下可接受。如果信任点可接受,则信任点可以被允许访问服务和/或可以继续与实体通信。Trustpoint module 132 may use the trustpoint information to perform authentication. Examples of trustpoint information include user, device, and context information, described in more detail below. The trustpoint module 132 may check to see that the information meets requirements to determine whether the trustpoint is acceptable. For example, a trustpoint may be acceptable if it is on a whitelist or not on a blacklist. If the trustpoint is acceptable, the trustpoint may be allowed to access the service and/or may continue to communicate with the entity.
用户认证模块140执行用户认证以认证用户。用户认证模块140可以使用用户信息认证用户。用户信息属于特定用户以及可以由用户录入。用户信息可以包括标识符(诸如用户名和密码)和生物计量信息(诸如生理学或行为信息)。生理学信息与身体的特征有关。实例包括指纹、掌纹、手部特征、面部特征、DNA、虹膜或视网膜扫描以及气味。行为信息与人的行为有关。实例包括键入节奏、步态以及嗓音。The user authentication module 140 performs user authentication to authenticate a user. The user authentication module 140 may authenticate a user using user information. User information belongs to a specific user and can be entered by the user. User information may include identifiers (such as usernames and passwords) and biometric information (such as physiological or behavioral information). Physiological information relates to characteristics of the body. Examples include fingerprints, palm prints, hand features, facial features, DNA, iris or retina scans, and smell. Behavioral information is related to human behavior. Examples include typing rhythm, gait, and voice.
平台模块144执行平台认证以认证平台。平台模块144可以使用由平台提供的设备信息来执行认证。设备信息可以包括标识符(诸如注册标识符(ID))、网络地址(诸如互联网协议(IP)地址)、机器地址(诸如媒体访问控制(MAC)地址)、证书(诸如公钥基础设施(PKI)证书)和/或识别设备的其它标识符。The platform module 144 performs platform authentication to authenticate the platform. The platform module 144 may perform authentication using device information provided by the platform. Device information may include identifiers such as registry identifiers (IDs), network addresses such as Internet Protocol (IP) addresses, machine addresses such as Media Access Control (MAC) addresses, certificates such as public key infrastructure (PKI ) certificate) and/or other identifiers that identify the device.
环境模块148执行平台环境认证以认证平台环境。环境模块148可以使用环境信息来执行认证。环境信息可以包括平台上运行的软件的软件信息(诸如软件版本和/或状态)、硬件信息(诸如硬件版本和硬件结构),以及由平台管理的外设的外设信息(诸如外设标识符)。The environment module 148 performs platform environment authentication to authenticate the platform environment. The environment module 148 may use the environment information to perform authentication. Environmental information may include software information (such as software version and/or status) of software running on the platform, hardware information (such as hardware version and hardware architecture), and peripheral information (such as peripheral identifiers) of peripherals managed by the platform. ).
服务模块134便于向客户端系统20提供服务。在实例中,服务包括护航、电池充电、交通工具安全和/或排放报告服务。然而,可以提供任何合适数量的任何合适服务。The service module 134 facilitates providing services to the client systems 20 . In an example, services include escort, battery charging, vehicle safety, and/or emissions reporting services. However, any suitable service may be provided in any suitable number.
护航模块150执行护航处理,护航处理获得根据任务列表规划的路线,然后指示交通工具沿着路线移动。在某些实施例中,护航处理可以包括通过交通工具的交通工具信任点系统与移动信任点系统建立信任。从移动信任点系统接收包括任务的任务列表。与服务信任点系统建立信任,并从服务信任点系统获得任务的路线。指示交通工具沿着路线移动。护航处理的实例参照图3更详细地描述。The convoy module 150 performs convoy processing, which obtains the route planned according to the task list, and then instructs the vehicle to move along the route. In some embodiments, the convoy process may include establishing trust with the mobile trustpoint system through the vehicle's vehicle trustpoint system. A task list including tasks is received from the mobile trustpoint system. Establish trust with the service trustpoint system and get the route of the task from the service trustpoint system. Directs the vehicle to move along the route. An example of escort processing is described in more detail with reference to FIG. 3 .
电池充电模块152执行允许电池充电系统对交通工具的电池充电的电池充电处理。在某些实施例中,电池充电处理可以包括通过交通工具的交通工具信任点系统认证充电信任点系统。发送交通工具信任点信息以允许充电信任点系统认证交通工具信任点系统。将交通工具电池的电池信息发送给充电信任点系统。将与交通工具对应的支付信息发送给充电信任点系统以允许充电信任点系统对电池充电。电池充电处理的实例参照图4至图8更详细地描述。The battery charging module 152 performs battery charging processes that allow the battery charging system to charge the vehicle's battery. In some embodiments, the battery charging process may include authenticating the charging trustpoint system with the vehicle's vehicle trustpoint system. The vehicle trustpoint information is sent to allow the charging trustpoint system to authenticate the vehicle trustpoint system. Send the battery information of the vehicle battery to the charging trust point system. Payment information corresponding to the vehicle is sent to the charging trustpoint system to allow the charging trustpoint system to charge the battery. An example of battery charging processing is described in more detail with reference to FIGS. 4-8 .
交通工具安全模块154执行将响应于安全触发事件做出的记录发送给一个或更多信任点系统的交通工具安全处理。在交通工具安全处理的某些实施例中,交通工具环境中的交通工具的交通工具信任点系统可以感测安全触发事件。响应于安全触发事件记录交通工具环境以产生记录。将记录发送给信任点系统以允许信任点系统将记录发送给移动信任点系统。信任点系统也可以将记录存储在数据库中。交通工具安全处理的实例参照图9更详细地描述。The vehicle security module 154 performs vehicle security processing that sends records made in response to security triggering events to one or more trustpoint systems. In certain embodiments of vehicle security processing, a vehicle point of trust system of a vehicle in the vehicle environment may sense a security triggering event. The vehicle environment is recorded in response to the safety trigger event to generate a record. Send record to trustpoint system to allow the trustpoint system to send the record to the mobile trustpoint system. Trustpoint systems can also store records in a database. An example of vehicle security processing is described in more detail with reference to FIG. 9 .
排放报告模块156执行收集用来计算交通工具的排放的交通工具驾驶数据的排放报告处理。在某些实施例中,排放报告处理可以包括通过交通工具的交通工具信任点系统收集驾驶数据。将驾驶数据发送给中心信任点系统以允许中心信任点系统计算交通工具的一个或更多排放值。排放报告处理的实例参照图10更详细地描述。The emissions reporting module 156 performs an emissions reporting process that collects vehicle driving data used to calculate the emissions of the vehicle. In some embodiments, the emissions reporting process may include collecting driving data through a vehicle's vehicle trustpoint system. The driving data is sent to the central point of trust system to allow the central point of trust system to calculate one or more emission values for the vehicle. An example of emissions reporting processing is described in more detail with reference to FIG. 10 .
图3至图10例示服务方法的实例。在实例中,客户端系统20可以包括移动设备、交通工具或者其它客户端系统。服务系统10可以包括交通工具服务中心、交通信息中心、充电系统或者其它服务系统。在实例中,每个系统10和20可以具有信任点系统(或信任点)。可以通过系统10和20的其它组件和/或信任点执行该方法。3 to 10 illustrate examples of service methods. In examples, client systems 20 may include mobile devices, vehicles, or other client systems. The service system 10 may include a vehicle service center, a traffic information center, a charging system or other service systems. In an example, each system 10 and 20 may have a trustpoint system (or trustpoints). The method may be performed by other components of systems 10 and 20 and/or trustpoints.
图3例示用于提供护航服务的方法的实例。在实例中,客户端系统20包括移动设备和交通工具,且服务系统10包括交通工具服务中心和交通信息中心。可以通过信任点(诸如交通工具信任点)执行方法。Figure 3 illustrates an example of a method for providing escort services. In an example, the client system 20 includes a mobile device and a vehicle, and the service system 10 includes a vehicle service center and a traffic information center. The methods may be performed through a trustpoint, such as a vehicle trustpoint.
在步骤210从用户接收任务列表。任务可以包括要执行的动作(诸如进行杂货采购)、地点(可以表达成地址)、商行、或者地点的类型(诸如杂货店)。在某些实施例中,用户可以将任务列表录入到移动设备中。这可以允许用户在用户方便时(诸如在未进行驾驶时)输入任务列表。移动设备在步骤212与用户一起移动到交通工具中。交通工具可以检测到某人进入了交通工具中,并可以请求用户提供用户标识。At step 210 a task list is received from a user. A task may include an action to be performed (such as making a grocery shopping), a location (which can be expressed as an address), a business, or a type of location (such as a grocery store). In some embodiments, a user may enter a task list into a mobile device. This may allow the user to enter the task list at the user's convenience, such as when not driving. The mobile device moves into the vehicle with the user at step 212 . The vehicle may detect that a person has entered the vehicle and may request the user to provide a user identification.
可以执行步骤214至222以在移动信任点与交通工具信任点之间建立信任。在步骤214请求信息。在某些实施例中,请求可以要求包括从用户获得的用户信息以及由移动设备提供的移动信任点信息的信任点信息。移动信任点在步骤216生成信任点信息。Steps 214 to 222 may be performed to establish trust between the mobile trustpoint and the vehicle trustpoint. Information is requested at step 214 . In some embodiments, the request may require trustpoint information including user information obtained from the user and mobile trustpoint information provided by the mobile device. The mobile trustpoint generates trustpoint information at step 216 .
在步骤218接收信息。交通工具信任点在步骤220检查移动信任点是否可接受。可以通过执行用户、平台和/或环境认证检查信任点。如果移动信任点不可接受,则方法返回到步骤214以再次请求信息。如果移动信任点可接受,则方法进行到步骤222,其中,交通工具根据用户信息和移动信任点信息检查用户和移动设备是否可接受。如果用户和移动设备不可接受,则方法返回步骤214以再次请求信息。如果用户和移动设备可接受,则方法进行到步骤224。Information is received at step 218 . The vehicle trustpoint checks at step 220 whether the mobile trustpoint is acceptable. Trustpoints can be checked by performing user, platform and/or environment authentication. If the mobile trustpoint is not acceptable, the method returns to step 214 to request the information again. If the mobile trustpoint is acceptable, the method proceeds to step 222, where the vehicle checks whether the user and the mobile device are acceptable based on the user information and the mobile trustpoint information. If the user and mobile device are not acceptable, the method returns to step 214 to request the information again. If acceptable to the user and mobile device, the method proceeds to step 224 .
交通工具信任点在步骤224请求任务列表。在步骤226从移动信任点接收任务列表。交通工具信任点在步骤228从中心信任点请求路线。The vehicle trustpoint requests a task list at step 224 . At step 226 a task list is received from the mobile trustpoint. The vehicle trustpoint requests a route at step 228 from the central trustpoint.
可以执行步骤230至238以在中心信任点与交通工具信任点之间建立信任。中心信任点在步骤230请求信息以认证交通工具信任点。交通工具信任点在步骤232生成信任点信息。信任点信息可以包括由交通工具提供的设备信息、用户信息和/或移动信任点信息。Steps 230 to 238 may be performed to establish trust between the central trustpoint and the vehicle trustpoint. The central trustpoint requests information at step 230 to authenticate the vehicle trustpoint. The vehicle trustpoint generates trustpoint information at step 232 . Trustpoint information may include device information, user information, and/or mobile trustpoint information provided by the vehicle.
在步骤234将信任点信息发送给中心信任点,以允许中心信任点认证交通工具信任点。中心信任点在步骤236检查交通工具信任点是否可接受。可以在信任点信息可接受的情况下将信任点视为可接受。可以将来自可接受信任点的信息视为值得信任;可以将来自不可接受信任点的信息视为不值得信任。如果交通工具信任点不可接受,则方法返回中心信任点再次请求信息的步骤230。如果交通工具信任点可接受,则方法进行到步骤238。The trustpoint information is sent to the central trustpoint at step 234 to allow the central trustpoint to authenticate the vehicle trustpoint. The central trustpoint checks at step 236 whether the vehicle trustpoint is acceptable. A trustpoint may be considered acceptable if the trustpoint information is acceptable. Information from acceptable trust points can be considered trustworthy; information from unacceptable trust points can be considered untrustworthy. If the vehicle trustpoint is not acceptable, the method returns to step 230 where the central trustpoint requests the information again. If the vehicle trustpoint is acceptable, the method proceeds to step 238 .
中心信任点在步骤238检查用户和交通工具是否可接受。可以根据策略将实体视为可接受。策略可以指定为了可接受从实体需要什么类型的信息。例如,策略可以指定需要什么类型的用户信息、设备信息和/或环境信息。如果它们不是,则方法返回步骤230,中心信任点再次请求信息。如果它们可接受,则方法进行到步骤240。The central trust point checks at step 238 whether the user and vehicle are acceptable. Entities can be considered acceptable based on policy. Policies may specify what types of information are required in order to be acceptable from an entity. For example, a policy may specify what types of user information, device information, and/or context information are required. If they are not, the method returns to step 230 and the central trust point again requests the information. If they are acceptable, the method proceeds to step 240 .
可以执行步骤240至244以获得任务的路线。中心信任点在步骤240发送路线的请求。交通信息中心在步骤242发送路线。可以按照实时交通报告规划路线。例如,可以规划路线以避免交通拥塞。中心信任点在步骤244把路线转发给交通工具信任点。Steps 240 to 244 may be performed to obtain the route of the task. The central trust point sends a request for a route at step 240 . The traffic information center sends the route at step 242 . Routes can be planned according to real-time traffic reports. For example, routes can be planned to avoid traffic jams. The central trustpoint forwards the route to the vehicle trustpoint at step 244 .
交通工具信任点在步骤246向移动信任点发送支付信息的请求。移动信任点在步骤248和250认证交通工具信任点。移动信任点在步骤252发送信息。The vehicle trustpoint sends a request for payment information at step 246 to the mobile trustpoint. The mobile trustpoint authenticates the vehicle trustpoint at steps 248 and 250 . The mobile trustpoint sends the information at step 252 .
在步骤254开始护航。可以通过任何合适方式执行护航。例如,交通工具的一个或更多部件可以指示交通工具沿着路线移动或者可以指示用户沿着路线移动交通工具。At step 254 the escort is initiated. Escorting may be performed by any suitable means. For example, one or more components of the vehicle may instruct the vehicle to move along a route or may instruct a user to move the vehicle along a route.
执行步骤256至264以检查中心信任点。交通工具在步骤256向中心信任点发送用户账户的请求。中心信任点在步骤258生成和发送信任点信息。在步骤260接收信任点信息。交通工具在步骤262和264检查交通工具服务中心。Steps 256 to 264 are performed to check the central trust point. The vehicle sends a request for a user account to the central trust point at step 256 . The central trustpoint generates and sends trustpoint information at step 258 . At step 260 trustpoint information is received. The vehicle checks with the vehicle service center at steps 262 and 264 .
在步骤266发送支付信息。交通工具服务中心在步骤268更新用户账户,并在步骤270将结果发送到交通工具信任点。交通工具信任点在步骤272将结果转发给移动信任点。In step 266 payment information is sent. The vehicle service center updates the user account at step 268 and sends the result to the vehicle trustpoint at step 270 . The vehicle trustpoint forwards the results to the mobile trustpoint at step 272 .
图4至图8例示用于提供电池充电服务的方法的实例。图4例示用于提供电池充电服务的方法的实例概况。在实例中,客户端系统20包括移动设备和交通工具,服务系统10包括充电系统和支付系统。可以通过信任点(诸如交通工具的交通工具信任点)执行方法。4-8 illustrate examples of methods for providing battery charging services. 4 illustrates an example overview of a method for providing battery charging services. In an example, the client system 20 includes mobile devices and vehicles, and the service system 10 includes a charging system and a payment system. The method may be performed by a trustpoint, such as a vehicle trustpoint of a vehicle.
在某些实施例中,从移动设备发送而非在交通工具中存储用以授权服务支付的信息。这可以防止未被授权的人取得交通工具和获得服务。在某些情形中,对经由移动信任点获得服务的用户收费少于不使用移动信任点的用户。在这些情形中,使用移动信任点的用户会引起较少的问题并且风险较小。相应地,服务提供商可以对于信任点用户支付较少的保险,并因而会能够以较低成本提供服务。另外,可以在成本较少的情况下鼓励用户采用信任点的使用。In some embodiments, the information used to authorize payment for services is transmitted from the mobile device rather than stored in the vehicle. This prevents unauthorized persons from gaining access to the vehicle and services. In some cases, users who obtain services via the mobile trustpoint are charged less than users who do not use the mobile trustpoint. In these scenarios, users using mobile trustpoints cause fewer problems and are less risky. Accordingly, service providers may pay less for trustpoint users for insurance, and thus may be able to provide services at a lower cost. Additionally, users can be encouraged to adopt the use of trustpoints at less cost.
在某些实施例中,可以在步骤308执行认证以在交通工具信任点与充电信任点之间建立信任。在某些实施例中,认证可以包括在交通工具信任点接收充电信任点信息,并且使用充电信任点信息认证充电信任点。认证还可以包括发送交通工具信任点信息以允许充电信任点认证交通工具信任点。In some embodiments, authentication may be performed at step 308 to establish trust between the vehicle trustpoint and the charging trustpoint. In some embodiments, authenticating may include receiving charging trustpoint information at the vehicle trustpoint, and authenticating the charging trustpoint using the charging trustpoint information. Authentication may also include sending the vehicle trustpoint information to allow the charging trustpoint to authenticate the vehicle trustpoint.
可以使用任何合适的信任点信息。充电信任点信息可以包括充电系统标识符(诸如服务商名称和/或机器标识符)和系统状态(诸如工作中或准备好充电)。交通工具信任点信息可以包括例如设备信息和/或用户信息。交通工具设备信息可以包括交通工具描述(诸如制造和/或模型)和/或交通工具标识号。Any suitable trustpoint information may be used. Charging trustpoint information may include a charging system identifier (such as servicer name and/or machine identifier) and system status (such as working or ready to charge). Vehicle trustpoint information may include, for example, device information and/or user information. Vehicle equipment information may include a vehicle description (such as make and/or model) and/or a vehicle identification number.
交通工具信任点在步骤310请求充电。充电信任点在步骤312请求电池信息。电池信息可以包括描述电池的参数,例如,电池的电压、制造、模型、电流电荷(诸如x%容量)、容量、空缺、温度或者其它特征。在步骤314将电池信息发送给充电信任点。The vehicle trustpoint requests charging at step 310 . The charging trustpoint requests battery information at step 312 . Battery information may include parameters describing the battery, eg, voltage, make, model, current charge (such as x% capacity), capacity, vacancy, temperature, or other characteristics of the battery. At step 314 the battery information is sent to the charging trustpoint.
充电信任点在步骤316授权交通工具信任点。充电信任点在步骤318向交通工具信任点通知充电系统准备好充电。交通工具信任点在步骤320授权交通工具。The charging trustpoint authorizes the vehicle trustpoint at step 316 . The charging trustpoint notifies the vehicle trustpoint at step 318 that the charging system is ready to charge. The vehicle trustpoint authorizes the vehicle at step 320 .
在特定实施例中,可以在步骤321执行认证,以在交通工具信任点与移动信任点之间建立信任。在特定实施例中,认证可以包括在交通工具信任点接收移动信任点信息以及使用移动信任点信息认证移动信任点。认证还可以包括发送交通工具信任点信息,以允许移动信任点认证交通工具信任点。In particular embodiments, authentication may be performed at step 321 to establish trust between the vehicle trustpoint and the mobile trustpoint. In particular embodiments, authenticating may include receiving mobile trustpoint information at the vehicle trustpoint and authenticating the mobile trustpoint using the mobile trustpoint information. Authentication may also include sending vehicle trustpoint information to allow the mobile trustpoint to authenticate the vehicle trustpoint.
交通工具信任点在步骤322从移动信任点请求用户账户的支付信息。在步骤324从移动信任点接收与账户对应的支付信息。支付信息可以包括允许为服务对账户进行收费的信息。在某些实施例中,移动信任点可以接收允许移动信任点加密支付信息的密钥。The vehicle trustpoint requests payment information for the user account at step 322 from the mobile trustpoint. Payment information corresponding to the account is received at step 324 from the mobile trustpoint. Payment information may include information that allows the account to be charged for the service. In some embodiments, the mobile trustpoint may receive a key that allows the mobile trustpoint to encrypt payment information.
在步骤326将支付信息发送给充电信任点或者发送给支付系统,以允许充电信任点对电池进行充电。充电信任点可以将信息转发给支付系统。支付系统在步骤328授权账户,并在步骤330将账户授权发送给交通工具。交通工具信任点在步骤332授权支付。The payment information is sent to the charging trustpoint or to the payment system at step 326 to allow the charging trustpoint to charge the battery. Charging trustpoints can forward information to payment systems. The payment system authorizes the account at step 328 and sends the account authorization to the vehicle at step 330 . The vehicle trustpoint authorizes payment at step 332 .
交通工具信任点在步骤334执行状态检查。状态检查可以涉及确定授权了交通工具和/或授权了支付。状态检查可以涉及确定交通工具在充电期间无法移动,例如,交通工具在停泊以及设置了刹车。如果状态检查不合格,则向移动信任点发送告警。如果状态检查通过,则交通工具在步骤336发送请求以开始充电。The vehicle trustpoint performs a status check at step 334 . A status check may involve determining that the vehicle is authorized and/or the payment is authorized. A status check may involve determining that the vehicle is unable to move during charging, eg, the vehicle is parked and the brakes are set. If the status check fails, an alert is sent to the mobile trustpoint. If the status check passes, the vehicle sends a request to begin charging at step 336 .
充电系统在步骤338开始对交通工具充电。在步骤340将充电状态发送给移动信任点。充电状态可以表明电池的电荷以及对电池充电剩余的时间。移动设备可以显示充电状态。在某些实施例中,充电系统可以与连接到能量源的智能仪表(诸如电表或太阳能面板采集器)协作。智能仪表可能能够评估诸如充电时间的充电参数。The charging system begins charging the vehicle at step 338 . At step 340 the state of charge is sent to the mobile trust point. The state of charge may indicate the charge of the battery and the time remaining to charge the battery. Mobile devices can display charging status. In some embodiments, the charging system may cooperate with smart meters connected to the energy source, such as electric meters or solar panel harvesters. Smart meters may be able to evaluate charging parameters such as charging time.
图5例示用于交通工具信任点与充电信任点之间相互认证的方法的实例。交通工具在步骤410检测到电池在警戒级别。警戒级别可以是应当对电池充电的级别,例如,在小于10、10至25、或者25至50百分比电荷的范围中的级别。Figure 5 illustrates an example of a method for mutual authentication between a vehicle trustpoint and a charging trustpoint. The vehicle detects at step 410 that the battery is at an alert level. The alert level may be the level at which the battery should be charged, eg, a level in the range of less than 10, 10 to 25, or 25 to 50 percent charge.
交通工具信任点在步骤412从充电信任点请求信息。充电信任点在步骤414生成信任点信息,并在步骤416将信息发送给交通工具信任点。交通工具信任点在步骤418确定充电信任点是否可接受。如果充电信任点不可接受,则方法返回交通工具再次请求信息的步骤412。如果充电信任点可接受,则方法进行到交通工具信任点向充电信任点通知充电信任点可接受的步骤420。The vehicle trustpoint requests information from the charging trustpoint at step 412 . The charging trustpoint generates trustpoint information at step 414 and sends the information to the vehicle trustpoint at step 416 . The vehicle trustpoint determines at step 418 whether the charging trustpoint is acceptable. If the charging trust point is not acceptable, the method returns to step 412 where the vehicle requests the information again. If the charging trustpoint is acceptable, the method proceeds to step 420 where the vehicle trustpoint notifies the charging trustpoint that the charging trustpoint is acceptable.
充电信任点在步骤422从交通工具信任点请求信息。交通工具信任点在步骤424生成信任点信息并且在步骤426发送信息。充电信任点在步骤428确定交通工具信任点是否可接受。如果交通工具信任点不可接受,则方法返回步骤422以再次请求信息。如果交通工具信任点可接受,则方法进行到步骤430以向交通工具信任点通知交通工具信任点可接受。方法可以通过图6、7、或者8继续。The charging trustpoint requests information from the vehicle trustpoint at step 422 . The vehicle trustpoint generates trustpoint information at step 424 and sends the information at step 426 . The charging trustpoint determines whether the vehicle trustpoint is acceptable at step 428 . If the vehicle trustpoint is not acceptable, the method returns to step 422 to request the information again. If the vehicle trust point is acceptable, the method proceeds to step 430 to notify the vehicle trust point that the vehicle trust point is acceptable. The method may continue with FIGS. 6 , 7 , or 8 .
图6例示用于对交通工具的电池进行充电的方法的实例。交通工具信任点在步骤432从充电信任点请求充电。充电信任点在步骤434请求电池信息。交通工具信任点在步骤436发送电池信息。充电信任点在步骤438设置充电类型。充电类型可以包括要向电池提供的通过电池信息描述的电荷的量。在步骤440将充电站连接到交通工具。Figure 6 illustrates an example of a method for charging a battery of a vehicle. The vehicle trustpoint requests charging from the charging trustpoint at step 432 . The charging trustpoint requests battery information at step 434 . The vehicle trustpoint sends battery information at step 436 . The charging trustpoint sets the charging type at step 438 . The charge type may include the amount of charge described by the battery information to be provided to the battery. At step 440 the charging station is connected to the vehicle.
在步骤442充电信任点请求支付信息,且交通工具信任点将请求转发给移动信任点。移动信任点将支付信息发送给在步骤444转发信息的交通工具信任点。充电信任点在步骤446请求支付的授权。支付系统在步骤448向充电信任点通知授权了支付。The charging trustpoint requests payment information at step 442, and the vehicle trustpoint forwards the request to the mobile trustpoint. The mobile trustpoint sends the payment information to the vehicle trustpoint which forwards the information at step 444 . The charging trustpoint requests authorization of payment at step 446 . The payment system notifies the charging trustpoint at step 448 that the payment is authorized.
充电站在步骤450对交通工具的电池充电。交通工具在步骤452显示充电的状态。交通工具在步骤454将充电状态发送给移动设备,并且移动设备在步骤456显示该状态。充电在步骤458结束。充电信任点在步骤460请求支付,且交通工具信任点在步骤462通知授权支付。充电信任点随后在步骤464发送充电信息。The charging station charges the vehicle's battery at step 450 . The vehicle displays the status of charging at step 452 . The vehicle sends the charging status to the mobile device at step 454 and the mobile device displays the status at step 456 . Charging ends at step 458 . The charging trustpoint requests payment at step 460 and the vehicle trustpoint notifies at step 462 that payment is authorized. The charging trustpoint then sends charging information at step 464 .
图7例示用于对交通工具的电池充电的方法的另一实例。步骤510至520可以与图6的步骤432至442基本上相似。FIG. 7 illustrates another example of a method for charging a battery of a vehicle. Steps 510 to 520 may be substantially similar to steps 432 to 442 of FIG. 6 .
在步骤522至540执行相互认证以在移动信任点与交通工具信任点之间建立信任。交通工具信任点在步骤522从移动信任点请求信息。移动信任点在步骤524生成信任点信息,并在步骤526将信息发送给交通工具信任点。交通工具信任点在步骤528检查移动信任点是否可接受。如果移动信任点不可接受,则方法返回步骤522,再次请求信息。如果移动信任点可接受,则方法进行到步骤530,其中,交通工具信任点向移动信任点通知移动信任点可接受。Mutual authentication is performed at steps 522 to 540 to establish trust between the mobile trustpoint and the vehicle trustpoint. The vehicle trustpoint requests information from the mobile trustpoint at step 522 . The mobile trustpoint generates trustpoint information at step 524 and sends the information to the vehicle trustpoint at step 526 . The vehicle trustpoint checks at step 528 whether the mobile trustpoint is acceptable. If the mobile trustpoint is not acceptable, the method returns to step 522 to request the information again. If the mobile trust point is acceptable, the method proceeds to step 530, where the vehicle trust point notifies the mobile trust point that the mobile trust point is acceptable.
移动信任点在步骤532从交通工具信任点请求信息。交通工具信任点在步骤534生成信任点信息,并在步骤536将信息发送给移动信任点。移动信任点在步骤538检查交通工具信任点是否可接受。如果交通工具信任点不可接受,则方法返回步骤532,再次请求信息。如果交通工具信任点可接受,则方法进行到步骤540,移动信任点向交通工具信任点通知交通工具信任点可接受。The mobile trustpoint requests information from the vehicle trustpoint at step 532 . The vehicle trustpoint generates trustpoint information at step 534 and sends the information to the mobile trustpoint at step 536 . The mobile trustpoint checks at step 538 whether the vehicle trustpoint is acceptable. If the vehicle trustpoint is not acceptable, the method returns to step 532 to request the information again. If the vehicle trust point is acceptable, the method proceeds to step 540 where the mobile trust point notifies the vehicle trust point that the vehicle trust point is acceptable.
交通工具信任点信息在步骤542生成一次性密钥,并在步骤554将一次性密钥发送给移动信任点。移动信任点使用一次性密钥在步骤546加密支付信息。加密支付信息可以包括例如加密的信用卡号。移动信任点随后在步骤548将加密的支付信息发送给交通工具信任点。交通工具信任点在步骤550解密支付信息。步骤552至576可以与步骤444至464基本上类似。The vehicle trustpoint information generates a one-time key at step 542 and sends the one-time key to the mobile trustpoint at step 554 . The mobile trustpoint encrypts the payment information at step 546 using the one-time key. Encrypted payment information may include, for example, encrypted credit card numbers. The mobile trustpoint then sends the encrypted payment information to the vehicle trustpoint at step 548 . The vehicle trustpoint decrypts the payment information at step 550 . Steps 552-576 may be substantially similar to steps 444-464.
图8例示用于对交通工具的电池进行充电的方法的另一实例。步骤610至620可以与步骤432至442基本上类似。FIG. 8 illustrates another example of a method for charging a vehicle's battery. Steps 610-620 may be substantially similar to steps 432-442.
步骤622至628描述为移动设备生成密钥的交通工具服务中心。交通工具信任点在步骤622从中心信任点请求一次性密钥。中心信任点在步骤624生成一次性密钥,并在步骤626将一次性密钥发送给交通工具信任点并在步骤628发送给移动信任点。步骤630至660可以与步骤546至576基本上类似。Steps 622 to 628 describe the vehicle service center generating a key for the mobile device. The vehicle trustpoint requests a one-time key at step 622 from the central trustpoint. The central trustpoint generates a one-time key at step 624 and sends the one-time key to the vehicle trustpoint at step 626 and to the mobile trustpoint at step 628 . Steps 630-660 may be substantially similar to steps 546-576.
图9例示用于提供交通工具安全服务的方法的实例。可以在交通工具环境中通过交通工具的交通工具信任点执行该方法。交通工具环境可以包括以下内容中任何内容的至少一部分:交通工具的内部、交通工具的外部和/或交通工具周围的区域。Figure 9 illustrates an example of a method for providing vehicle safety services. The method may be performed in a vehicle environment by a vehicle trust point of the vehicle. The vehicle environment may include at least a portion of any of: the interior of the vehicle, the exterior of the vehicle, and/or the area surrounding the vehicle.
在步骤710检测安全触发事件。安全触发事件可以是视觉现象(诸如闪光)、听觉现象(诸如碰撞声)、或者移动(诸如抖动或振动)。At step 710 a security trigger event is detected. A security trigger event may be a visual phenomenon (such as a flashing light), an auditory phenomenon (such as a crashing sound), or a movement (such as a shake or vibration).
在步骤712记录交通工具环境以产生记录。可以通过被配置成检测视觉和/或听觉信号的任何合适设备(诸如摄像设备或记录器)记录交通工具环境。在步骤714将记录发送给中心信任点。The vehicle environment is recorded at step 712 to generate a record. The vehicle environment may be recorded by any suitable device configured to detect visual and/or audible signals, such as a camera or recorder. At step 714 the record is sent to the central trust point.
中心信任点在步骤716将记录存储在数据库中。可以使用存储的记录作为关于安全触发事件的审讯中的证据。中心信任点在步骤718将记录发送给移动信任点。移动设备的用户可以随后播放记录。The central trust point stores the record in a database at step 716 . Stored records can be used as evidence in interrogations regarding security trigger events. The central trustpoint sends the record to the mobile trustpoint at step 718 . The user of the mobile device can then play the recording.
图10例示用于提供排放报告服务的方法的实例。可以通过交通工具的交通工具信任点执行方法。FIG. 10 illustrates an example of a method for providing emission reporting services. The method may be performed by a vehicle trustpoint of the vehicle.
在步骤730收集驾驶数据。驾驶数据可以包括可以计算排放的任何合适数据。例如,数据可以包括从排气检测的温度、噪声以及排放。驾驶数据可以识别只有电池在工作、只有引擎在工作、或者二者均在工作时排放的排放物。在某些实施例中,驾驶数据中可以不包括用户的个人数据。在其它实施例中,可以包括个人数据。Driving data is collected at step 730 . Driving data may include any suitable data from which emissions can be calculated. For example, data may include temperature, noise, and emissions detected from the exhaust. Driving data can identify emissions emitted when only the battery is operating, only the engine is operating, or both. In some embodiments, the driving data may not include the user's personal data. In other embodiments, personal data may be included.
在步骤732,驾驶数据被发送给中心信任点。中心信任点在步骤734计算交通工具的排放值。例如,可以计算二氧化碳排放。At step 732, the driving data is sent to the central trust point. The central point of trust calculates the vehicle's emissions value at step 734 . For example, carbon dioxide emissions can be calculated.
可以在不脱离本发明范围的情况下对本文中公开的装置和系统做出修改、添加或者省略。可以把装置和系统的部件整合或分开。此外,可以通过更多的、更少的或者其它部件执行装置和系统的操作。例如,可以通过一个部件执行服务模块134和信任点模块132的操作,或者可以通过多于一个部件执行模块132或134的操作。另外,可以使用包括软件、硬件和/或其它逻辑的任何合适逻辑执行装置和系统的操作。如本文件中所使用的,“每个”是指集合的每个构件或者集合的子集合的每个构件。Modifications, additions or omissions may be made to the devices and systems disclosed herein without departing from the scope of the present invention. Devices and system components may be integrated or separated. In addition, operations of devices and systems may be performed by more, fewer or other components. For example, the operations of service module 134 and trustpoint module 132 may be performed by one component, or the operations of modules 132 or 134 may be performed by more than one component. Additionally, operations of the devices and systems may be performed using any suitable logic, including software, hardware, and/or other logic. As used in this document, "each" refers to each member of a collection or each member of a sub-collection of a collection.
可以在不脱离本发明范围的情况下对本文中公开的方法做出修改、添加或者省略。方法可以包括更多的、更少的或者其它步骤。另外,可以按任何合适顺序执行步骤。Modifications, additions or omissions may be made to the methods disclosed herein without departing from the scope of the present invention. Methods may include more, fewer or other steps. Additionally, the steps may be performed in any suitable order.
在某些实施例中,可以将执行先于(诸如引起)第二步骤的第一步骤的实体视为有助于第二步骤。例如,如果实体执行先于步骤B的步骤A,则实体也有助于步骤B。在某些实施例中,可以把执行先于第二实体可以执行的第二步骤的第一步骤的第一实体视为允许第二实体执行第二步骤。例如,如果第一实体执行先于第二实体可以执行的步骤B的步骤A,则第一实体也允许第二实体执行步骤B。In some embodiments, an entity performing a first step that precedes (such as causes) a second step may be considered to contribute to the second step. For example, if an entity performs step A prior to step B, the entity also contributes to step B. In some embodiments, a first entity performing a first step prior to a second step that a second entity can perform may be considered to allow the second entity to perform the second step. For example, if a first entity performs step A prior to step B that a second entity can perform, the first entity also allows the second entity to perform step B.
本文中公开的装置和系统的部件可以包括接口、逻辑、存储器和/或其它合适元件。接口接收输入,发送输出,处理输入和/或输出,和/或执行其它合适操作。接口可以包括硬件和/或软件。Components of the devices and systems disclosed herein may include interfaces, logic, memory, and/or other suitable elements. An interface receives input, sends output, processes the input and/or output, and/or performs other suitable operations. An interface may include hardware and/or software.
逻辑执行部件的操作,例如,执行用以根据输入生成输出的指令。逻辑可以包括硬件、软件和/或其它逻辑。逻辑可以被编码在一个或更多有形媒体中并可以在通过计算机执行时执行操作。Logic executes the operation of components, eg, executes instructions to generate output from inputs. Logic may include hardware, software, and/or other logic. Logic may be encoded in one or more tangible media and may perform operations when executed by a computer.
某些逻辑(诸如处理器)可以管理部件的操作。处理器可以包括可操作来解释和/或执行其它逻辑的逻辑(诸如设备或装置)。处理器的实例包括以下内容中任何内容中的一个或更多:计算机、微处理器、微控制器、数字信号处理器(DSP)、专用集成电路(ASIC)或者被配置成解释和/或执行程序指令和/或处理数据的任何其它数字或模拟电路。Some logic, such as a processor, may manage the operation of the components. A processor may include logic (such as a device or means) operable to interpret and/or execute other logic. Examples of processors include one or more of any of the following: computers, microprocessors, microcontrollers, digital signal processors (DSPs), application specific integrated circuits (ASICs), or Program instructions and/or any other digital or analog circuitry that processes data.
在特定实施例中,可以通过编码有计算机程序、软件、计算机可执行指令、和/或能够通过计算机执行的指令的一个或更多计算机可读媒体执行实施例的操作。在特定实施例中,可以通过存储、实施和/或编码有计算机程序和/或具有存储的和/或编码的计算机程序的一个或更多计算机可读媒体执行实施例的操作。In certain embodiments, operations of the embodiments may be performed by one or more computer-readable media encoded with computer programs, software, computer-executable instructions, and/or instructions capable of being executed by a computer. In certain embodiments, the operations of the embodiments may be performed by one or more computer-readable media storing, embodying, and/or encoding a computer program and/or having a computer program stored and/or encoded.
诸如电子内容(“内容”)的逻辑(例如,软件(包括更新))可以包括文件、代码(诸如对象或可执行代码)、数据记录和/或客户端可以访问的任何其它以电子方式记录的数据结构。实例可以包括文本文件、电子表格、电子邮件、医疗记录、图像、网页、程序(诸如文字处理和文件管理程序)和/或其它电子数据或程序。Logic such as electronic content ("Content") (e.g., software (including updates)) may include files, code (such as objects or executable code), data records, and/or any other electronically recorded data structure. Examples may include text files, spreadsheets, emails, medical records, images, web pages, programs (such as word processing and document management programs), and/or other electronic data or programs.
存储器存储信息。存储器可以包括一个或更多非临时性的、有形的、计算机可读的和/或计算机可执行的存储媒体。存储器的实例包括计算机存储器(例如,随机访问存储器(RAM)、只读存储器(ROM)或者电可擦除可编程只读存储器(EEPROM)、海量存储媒体(例如,硬盘)、可拆除存储媒体(例如,压缩盘(CD)或数字视频盘(DVD))、数据库和/或网络存储(例如,服务器),和/或即使在不提供电能的情况下也保留数据的其它计算机可读介质或者易失性或非易失性存储器。Memory stores information. Memory may include one or more non-transitory, tangible, computer-readable and/or computer-executable storage media. Examples of memory include computer memory (e.g., random access memory (RAM), read-only memory (ROM), or electrically erasable programmable read-only memory (EEPROM), mass storage media (e.g., hard disks), removable storage media ( For example, compact disks (CDs) or digital video disks (DVDs), databases, and/or network storage (e.g., servers), and/or other computer-readable media that retain data even when power is not volatile or nonvolatile memory.
可以通过根据任何合适通信协议通信的任何合适通信网络耦合装置和系统的组件。通信网络(如,网络18)可以包括以下内容中一个或更多的一部分或全部:公共交换电话网(PSTN),公有或私有数据网络,局域网(LAN),城域网(MAN),广域网(WAN),局域、虚拟专用网(VPN),诸如互联网的区域、或者全球通信或计算机网络,有线或无线网络,企业内部网,其它合适通信链路,或者此前内容中任何内容的任何组合。通信网络可以包括路由器、集线器、交换机、网关、呼叫控制器和/或以任何合适形式或布置的任何其它合适组件。The components of the devices and systems can be coupled by any suitable communications network that communicates according to any suitable communications protocol. The communication network (e.g., network 18) may include some or all of one or more of the following: public switched telephone network (PSTN), public or private data network, local area network (LAN), metropolitan area network (MAN), wide area network ( WAN), local area, virtual private network (VPN), area such as the Internet, or global communication or computer network, wired or wireless network, intranet, other suitable communication link, or any combination of any of the foregoing. A communications network may include routers, hubs, switches, gateways, call controllers, and/or any other suitable components in any suitable form or arrangement.
虽然已在某些实施例的方面描述了本公开,但实施例的改换和变换将会对本领域技术人员而言是明显的。相应地,实施例的以上描述不限制本公开。在不脱离如所附权利要求所限定的本发明范围和精神的情况下可以有其它改变、替换、以及变换。While this disclosure has been described in terms of certain embodiments, alterations and modifications of the embodiments will be apparent to those skilled in the art. Accordingly, the above description of the embodiments does not limit the present disclosure. There may be other changes, substitutions, and transformations without departing from the scope and spirit of the present invention as defined by the appended claims.
Claims (7)
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/879,226 | 2010-09-10 | ||
US12/879,226 US9059978B2 (en) | 2010-03-23 | 2010-09-10 | System and methods for remote maintenance in an electronic network with multiple clients |
US13/053,670 US9286485B2 (en) | 2010-03-23 | 2011-03-22 | Using trust points to provide services |
US13/053,670 | 2011-03-22 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102404312A CN102404312A (en) | 2012-04-04 |
CN102404312B true CN102404312B (en) | 2016-08-10 |
Family
ID=45886099
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110276927.4A Expired - Fee Related CN102404312B (en) | 2010-09-10 | 2011-09-08 | Points of trust is used to provide service |
Country Status (2)
Country | Link |
---|---|
JP (2) | JP5927815B2 (en) |
CN (1) | CN102404312B (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102522318B (en) * | 2011-12-30 | 2013-11-27 | 厦门大学 | Self-split transfer method of GaN-based epitaxial thin film |
US9854438B2 (en) * | 2013-03-06 | 2017-12-26 | Gogoro Inc. | Apparatus, method and article for authentication, security and control of portable charging devices and power storage devices, such as batteries |
JP6210020B2 (en) * | 2014-05-26 | 2017-10-11 | 株式会社オートネットワーク技術研究所 | Power storage device and power supply system |
JP6477281B2 (en) * | 2015-06-17 | 2019-03-06 | 株式会社オートネットワーク技術研究所 | In-vehicle relay device, in-vehicle communication system, and relay program |
DE102018007859A1 (en) * | 2018-10-05 | 2020-04-09 | Daimler Ag | Method for controlling a charging station for charging vehicles, and a charging station and a vehicle therefor |
CN109587151A (en) * | 2018-12-13 | 2019-04-05 | 泰康保险集团股份有限公司 | Access control method, device, equipment and computer readable storage medium |
US11046201B2 (en) * | 2019-03-25 | 2021-06-29 | Micron Technology, Inc. | Electric vehicle charging station system |
CN113525152B (en) * | 2020-04-15 | 2023-07-18 | 华为技术有限公司 | Method and device for charging authentication |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8677505B2 (en) * | 2000-11-13 | 2014-03-18 | Digital Doors, Inc. | Security system with extraction, reconstruction and secure recovery and storage of data |
US20040181327A1 (en) * | 2003-03-11 | 2004-09-16 | Tsosie Everett K. | Vehicle security through an automatic control system |
US8229458B2 (en) * | 2007-04-08 | 2012-07-24 | Enhanced Geographic Llc | Systems and methods to determine the name of a location visited by a user of a wireless device |
WO2009001447A1 (en) * | 2007-06-27 | 2008-12-31 | Fujitsu Limited | Authentication method, authentication system, authentication device, and computer program |
JP5019382B2 (en) * | 2007-10-30 | 2012-09-05 | マーキュリー・システムズ株式会社 | Mobile body status verification information control system |
US8065517B2 (en) * | 2007-11-01 | 2011-11-22 | Infineon Technologies Ag | Method and system for transferring information to a device |
JP4946826B2 (en) * | 2007-11-26 | 2012-06-06 | 富士通株式会社 | Emission apportioning device and emission apportioning program |
JP2009217395A (en) * | 2008-03-07 | 2009-09-24 | Nec Corp | Virtual server software update system, virtual server software update method, server and program for server |
WO2009122530A1 (en) * | 2008-03-31 | 2009-10-08 | 富士通株式会社 | Authentication method, authentication device, program, and recording medium |
JP5163238B2 (en) * | 2008-04-02 | 2013-03-13 | トヨタ自動車株式会社 | Charging service system and charging service station |
JP2010061237A (en) * | 2008-09-01 | 2010-03-18 | Fujitsu Ten Ltd | In-vehicle settlement system, in-vehicle settlement device, and in-vehicle settlement communication interface card |
JP4650567B2 (en) * | 2008-12-24 | 2011-03-16 | 三菱自動車工業株式会社 | Electric vehicle charging display |
JP5353291B2 (en) * | 2009-02-19 | 2013-11-27 | ソニー株式会社 | Guide route delivery apparatus, guide route delivery method, and guide route delivery program |
US7906937B2 (en) * | 2009-06-02 | 2011-03-15 | Coulomb Technologies, Inc. | Overcurrent and ground fault protection in a networked charging station for electric vehicles |
-
2011
- 2011-09-08 CN CN201110276927.4A patent/CN102404312B/en not_active Expired - Fee Related
- 2011-09-09 JP JP2011196651A patent/JP5927815B2/en not_active Expired - Fee Related
-
2015
- 2015-10-23 JP JP2015209382A patent/JP6131994B2/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
CN102404312A (en) | 2012-04-04 |
JP2016040727A (en) | 2016-03-24 |
JP5927815B2 (en) | 2016-06-01 |
JP6131994B2 (en) | 2017-05-24 |
JP2012059270A (en) | 2012-03-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9286485B2 (en) | Using trust points to provide services | |
CN102404312B (en) | Points of trust is used to provide service | |
EP3997606B1 (en) | Cryptoasset custodial system with custom logic | |
CN111033502B (en) | Authentication using biometric data and irreversible functions via blockchain | |
US20180218454A1 (en) | Managing participation in a monitored system using blockchain technology | |
US20240073037A1 (en) | Internal certificate authority for electronic control unit | |
CN116170803B (en) | System and method for securely managing vehicle information | |
US8374911B2 (en) | Vehicle usage-based tolling privacy protection architecture | |
US20220173894A1 (en) | Out-of-band key splitting and key derivation | |
CN109361718A (en) | Authentication method, device and medium | |
WO2015019104A2 (en) | Access and control authorisation system | |
EP4089978A1 (en) | Authentication method and apparatus for vehicle-mounted device | |
CN110148239A (en) | A kind of authorization method and system of Intelligent key | |
CN109890009A (en) | A kind of vehicle communication system | |
CN112187459B (en) | Credible authentication method and system among modules in intelligent network networking | |
Liang et al. | Reputation value-based converged dual-channel digital forensics for blockchain-enabled smart vehicles | |
CN114039771A (en) | Data processing method, device and system, electronic equipment and storage medium | |
CN118694802A (en) | Vehicle remote control method and remote control system | |
Groza et al. | CarINA-Car sharing with IdeNtity based Access control re-enforced by TPM | |
US20240326597A1 (en) | Battery management system communication | |
Riabi et al. | Blockchain based OAuth for IoT | |
Agarwal et al. | Forecasting-based authentication schemes for network resource management in vehicular communication network | |
Aman et al. | Ai based algorithm-hardware separation for IoV security | |
US20250131082A1 (en) | Diagnosis method and apparatus | |
CN110213245B (en) | Application system short-distance energy-saving communication method and system based on asymmetric key pool and proxy signature |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160810 |
|
CF01 | Termination of patent right due to non-payment of annual fee |