Charging Authentication Method and Apparatus

    公开(公告)号:US20230030673A1

    公开(公告)日:2023-02-02

    申请号:US17965906

    申请日:2022-10-14

    Abstract: A charging authentication method and apparatus are provided, to improve security of communication between an electric vehicle and a charging spot. When the method is performed by an electric vehicle, a first connection is established between the electric vehicle and a charging spot by using a controller area network CAN bus, a second connection is established between the electric vehicle and a charging management system by using a mobile communication network, and the method includes: The electric vehicle sends a charging request message to the charging spot by using the first connection; and the electric vehicle performs identity authentication and key negotiation with the charging spot by using the second connection and a third connection between the charging spot and the charging management system.

    INTRUSION MONITORING SYSTEM, METHOD AND RELATED PRODUCTS

    公开(公告)号:US20230231864A1

    公开(公告)日:2023-07-20

    申请号:US18186040

    申请日:2023-03-17

    Abstract: The present disclosure provides an intrusion monitoring system, an intrusion monitoring method and related products. The intrusion monitoring system includes: a first monitoring component deployed in a controller area network, a second monitoring component deployed in an Ethernet network, and a first control component; the first monitoring component is configured to obtain first CAN reporting information on data traffic in the system and transmit the first CAN reporting information to the first control component; the second monitoring component is configured to obtain second Ethernet reporting information on the data traffic and transmit the second Ethernet reporting information to the first control component; and the first control component is configured to receive the first CAN reporting information from the first monitoring component and the second Ethernet reporting information from the second monitoring component, and determine whether the data traffic is an attack.

Patent Agency Ranking