-
公开(公告)号:US20230030673A1
公开(公告)日:2023-02-02
申请号:US17965906
申请日:2022-10-14
Applicant: Huawei Technologies Co., Ltd.
Inventor: Rehana Yasmin , Yanjiang Yang , Songlie Zhan , Zhuo Wei
Abstract: A charging authentication method and apparatus are provided, to improve security of communication between an electric vehicle and a charging spot. When the method is performed by an electric vehicle, a first connection is established between the electric vehicle and a charging spot by using a controller area network CAN bus, a second connection is established between the electric vehicle and a charging management system by using a mobile communication network, and the method includes: The electric vehicle sends a charging request message to the charging spot by using the first connection; and the electric vehicle performs identity authentication and key negotiation with the charging spot by using the second connection and a third connection between the charging spot and the charging management system.
-
公开(公告)号:US20230231864A1
公开(公告)日:2023-07-20
申请号:US18186040
申请日:2023-03-17
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Rehana Yasmin , Zhuo Wei , Suk In KANG , Feng Geng
CPC classification number: H04L63/1425 , H04L63/1416 , H04L12/40013 , H04L2012/40215
Abstract: The present disclosure provides an intrusion monitoring system, an intrusion monitoring method and related products. The intrusion monitoring system includes: a first monitoring component deployed in a controller area network, a second monitoring component deployed in an Ethernet network, and a first control component; the first monitoring component is configured to obtain first CAN reporting information on data traffic in the system and transmit the first CAN reporting information to the first control component; the second monitoring component is configured to obtain second Ethernet reporting information on the data traffic and transmit the second Ethernet reporting information to the first control component; and the first control component is configured to receive the first CAN reporting information from the first monitoring component and the second Ethernet reporting information from the second monitoring component, and determine whether the data traffic is an attack.
-