METHOD AND ARRANGEMENT FOR PROTECTING A CHARGING STATION AGAINST IMPROPER USE
20220134898 · 2022-05-05
Inventors
Cpc classification
Y02T90/16
GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
Y02T10/72
GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
B60L53/62
PERFORMING OPERATIONS; TRANSPORTING
Y02T90/14
GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
G07F9/026
PHYSICS
B60L53/65
PERFORMING OPERATIONS; TRANSPORTING
Y02T10/70
GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
B60L53/665
PERFORMING OPERATIONS; TRANSPORTING
Y02T90/12
GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
Y02T90/167
GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
Y04S30/14
GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
Y02T10/7072
GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
International classification
B60L53/30
PERFORMING OPERATIONS; TRANSPORTING
B60L53/62
PERFORMING OPERATIONS; TRANSPORTING
Abstract
To protect a charging station LS against improper use, a second identification feature ID2 is also checked in addition to a first identification feature ID 1. The charging process is only authorized or continued if the check of the second identification feature ID2 was also successful. The authentication or authorization is thus implemented in a low-threshold manner by means of an additional authentication, in which a weak identification is supplemented by one or more further automatic identifications, which can also be checked continuously. This means that an authorized and genuine user does not incur any additional expense, while at the same time any damage caused by behavior in breach of contract by authorized users can be greatly reduced. Related system and methods for protecting against unauthorized use are also disclosed.
Claims
1. A method for protecting a charging station against improper use, in which a first device checks a first identification feature and authorizes a charging procedure if the inspection was successful, wherein the first device or a second device checks a second identification feature before and/or during the charging procedure, and the charging procedure is continued only if the inspection of the second identification feature was successful.
2. The method as claimed in claim 1, in which the second identification feature is inspected again fully automatically at predefined time intervals after the charging procedure has begun, and in which the charging procedure is terminated as soon as the inspection of the second identification feature fails.
3. The method as claimed in claim 1, in which the first identification feature is an RFID card that is checked by a backend, and in which the second identification feature is likewise checked by the backend.
4. The method as claimed in claim 1, in which the second identification feature is a location of a mobile terminal.
5. The method as claimed in claim 4, in which the mobile terminal determines its location by way of GPS, mobile radio or WLAN and outputs its location to the charging station, or in which the charging station is equipped with an authentication unit that checks the presence of the mobile terminal in a wireless local area network.
6. The method as claimed in claim 1, in which the second identification feature is the presence of one or more RFID cards.
7. The method as claimed in claim 1, in which the second identification feature is a location of a vehicle.
8. The method as claimed in claim 1, in which the second identification feature is a state of charge and/or a voltage of a battery of a vehicle and/or a charging current.
9. The method as claimed in claim 8, in which, in the course of the inspection of the second identification feature, it is checked whether the second identification feature corresponds to comparison information provided by a charging control unit in the charging station.
10. The method as claimed in claim 7, in which an additional device is installed in the vehicle and outputs the second identification feature.
11. The method as claimed in claim 10, in which the vehicle supports a vehicle supply by way of a corresponding communication protocol, and in which the charging station conveys communication between the additional device and the backend.
12. A computer-readable data carrier, comprising a non-transitory computer readable storage medium storing a computer program that executes the method as claimed in claim 1 when the computer program is run in a processor.
13. (canceled)
14. An arrangement for protecting a charging station against improper use, comprising: a first device configured to check a first identification feature and authorize a charging procedure in the event of successful inspection, wherein the first device is configured to check a second identification feature before and/or during the charging procedure, or a second device is configured to check the second identification feature before and/or during the charging procedure, and the charging procedure continues only in the event of successful inspection of the second identification feature.
Description
BRIEF DESCRIPTION
[0034] Some of the embodiments will be described in detail, with reference to the following figures, wherein like designations denote like members, wherein:
[0035]
[0036]
DETAILED DESCRIPTION
[0037]
[0038] As second device, the arrangement comprises a backend BE, for example a server, that is programmed to check a second identification feature ID2 before and/or during the charging procedure, and to continue the charging procedure only in the event of successful inspection of the second identification feature ID2.
[0039] In order to protect the charging station, in addition to the first identification feature ID1, at least one further identification feature is thus evaluated, here the second identification feature ID2. The second identification feature ID2 may in this case also comprise multiple different features, or a third or fourth identification feature may also additionally be inspected in addition to the second identification feature ID2. In an embodiment, the second identification feature ID2 is inspected automatically and repeatedly by the backend BE.
[0040] In a first scenario, a user of the charging station LS is identified by submitting an RFID card as first identification feature ID1. The authorization of the RFID card may selectively be inspected locally by the authentication unit AE or centrally in the backend BE. The backend BE then additionally inspects a further feature, here the second identification feature ID2. If the RFID card belongs to the user, the location of a smartphone or of a smartwatch of the user may for example be inspected as second identification feature ID2 through a query directly at the device. It is furthermore also possible (using a corresponding receiver in the charging station LS) to inspect the presence of such devices via their identifier in radio networks (for example MAC address in WLAN, Bluetooth). It is also conceivable to acquire further RFID cards as second identification feature ID2 in the event that the user holds an entire wallet in front of a reader of the authentication unit AE.
[0041] In a second scenario, the RFID card is assigned, as first identification feature ID1, to the vehicle KFZ that has been leased to the user, for example by a car-sharing or rental car provider. In this scenario, the location of the one or more associated vehicles may also be checked as second identification feature ID2. To this end, an additional device ZG may possibly be installed in the vehicle KFZ such that the method is able to be performed even without the involvement of the vehicle manufacturer. The vehicle-side additional device ZG may in particular also transmit further information, such as for example a state of charge (SoC) of a battery or a battery voltage, this then being able to be compared in the backend BE with values transmitted by the charging control unit LE.
[0042] In one variant, the second identification feature ID2 is inspected repeatedly again in order to protect against improper use by an authorized party following an initial check of the identification features. In this case, at the beginning of the charging procedure, further features are available, such as for instance the charging current, these being able to be checked as part of the second identification feature ID2 or in addition thereto.
[0043] In a further variant, communication takes place between the backend BE and the additional device ZG in the vehicle KFZ in accordance with ISO 15118. This may be conveyed via the charging station LS in the form of a multi-value service. This type of data transmission is beneficial in this case in particular for private users, since the costs for procuring and operating the additional device are thus reduced and are not incurred inherently.
[0044]
[0045] These inspections for the most part run fully automatically and repeatedly in the background, while the charging procedure has already begun. This results in a relatively unhindered and low-threshold user experience for the user. In the event of fraud, the charging procedure is terminated as soon as the inspection fails.
[0046] Although the present invention has been disclosed in the form of preferred embodiments and variations thereon, it will be understood that numerous additional modifications and variations could be made thereto without departing from the scope of the invention.
[0047] For the sake of clarity, it is to be understood that the use of “a” or “an” throughout this application does not exclude a plurality, and “comprising” does not exclude other steps or elements.