Patent classifications
B60L2270/38
MECHANICAL CONNECTORS FOR CONTACTLESS COMMUNICATION UNITS
Embodiments discussed herein refer to connectors that enable two structures or devices to be coupled together in a manner that enables consistent and reliable operation of contactless communications and power transfer. The connector integrates power and alignment such that when two connectors are coupled together the power connections are also responsible for connector alignment. The connector alignment ensures that contactless communication channels, spanning between the connectors, are aligned to enable consistent and reliable operation of contactless communications.
SECURITY METHOD AND APPARATUS FOR ELECTRIC VEHICLE POWER TRANSFER
A security method and apparatus for an electric vehicle (EV) power transfer system can prevent abuse of privacy information or financial information which is stored in an in-vehicle controller, and block fee charging and authentication. A security method for the EV power transfer system, performed by a charging controller installed in an EV, includes steps of: receiving an authentication request from a communication controller installed in the EV; authenticating second key information included in the authentication request based on first key information which is learned or stored beforehand; and when the authentication succeeds, starting a charging process.
Electric vehicle (EV) charging system
The present invention relates to an electric vehicle (EV) charging system. The electric vehicle (EV) charging system includes an electric vehicle charger, a security monitoring module, a fleet management module, and a charging management platform. The electric vehicle charger is configured to supply power to a connected vehicle and a sensor interface unit (SIU) that enables user authentication through multi-modal biometrics such as voice, facial, fingerprint, RFID/NFC, license plate, and OTP verification, with a prioritised voice-based fallback. The security monitoring module continuously detects cable tampering, power anomalies, and unauthorised access, triggering real-time alerts. Further, a generative AI module analyses authentication, sensor, and network data to identify threats, correlate cyber and physical events, and generate adaptive responses. The fleet management module facilitates multi-level control with role-based authentication for super administrators, managers, and drivers. The charging management platform is provided for session validation, billing, and data recording.
AUTHENTICATION SYSTEM AND VEHICLE
A server performs processing including the steps of obtaining an upper limit number of digital certificates that can be stored when determining that a priority change has been notified, obtaining information about a stored digital certificate, transmitting priority information when determining that a digital certificate having a priority higher than that of an existing distal certificate has been set, transmitting certificate data, and transmitting the priority information when determining that the digital certificate having a priority higher than that of the existing distal certificate has not been set.