Search

US-12626008-B2 - Privacy-related electric vehicle charging

US12626008B2US 12626008 B2US12626008 B2US 12626008B2US-12626008-B2

Abstract

An example operation includes one or more of: determining, by a charging station, that a vehicle requests approval to receive a charge; accessing, by the charging station, personal information related to the vehicle and related to an occupant of the vehicle; analyzing, by the charging station, the personal information related to the vehicle and related to the occupant of the vehicle; determining, by the charging station, to grant the approval, based on the analyzing; and, responsive to the approval being granted, deleting, by the charging station, the accessed personal information related to the vehicle and related to the occupant of the vehicle, after the vehicle has received the charge.

Inventors

  • Norman Lu
  • Maximilian Parness

Assignees

  • Toyota Motor North America, Inc.

Dates

Publication Date
20260512
Application Date
20230918

Claims (20)

  1. 1 . A method, comprising: determining, by a charging station, that a vehicle requests approval to perform a charging operation; accessing, by the charging station, information stored on the vehicle which includes a charging profile unique to the vehicle; storing the information accessed from the vehicle at the charging station; determining, by the charging station, an identity of the vehicle based on the information stored on the vehicle and to approve the charging operation based on the identity of the vehicle; charging the vehicle at different charging currents based on the charging profile; determining the charging operation is completed; and deleting, by the charging station, the information accessed from the vehicle based on the charging operation being completed.
  2. 2 . The method of claim 1 , comprising: prior to the accessing, concealing, by the vehicle, at least a portion of the information.
  3. 3 . The method of claim 1 , wherein the charging comprises transmitting a charge, by the charging station to the vehicle, wherein the transmitting is commenced at a first amount of current, and the transmitting progresses to a second amount of current greater than the first amount of current based on the charging profile.
  4. 4 . The method of claim 1 , wherein the charging comprises: processing, by the charging station, an electronic payment for charging the vehicle; and responsive to the processing, transmitting a charge, by the charging station, to the vehicle.
  5. 5 . The method of claim 1 , wherein the information comprises payment account information and personal identification information, and the determining comprises granting approval of the charging operation in response to the payment account information being associated with the personal identification information.
  6. 6 . The method of claim 1 , wherein the information comprises a vehicle identification number for the vehicle, the method further comprises encrypting, by the charging station, the vehicle identification number.
  7. 7 . The method of claim 1 , further comprising exchanging certificates between the charging station and the vehicle, wherein the determining comprises determining to approve the charging operation based on the certificates.
  8. 8 . A system, comprising: a processor; and a hardware memory, wherein the processor and the hardware memory are communicably coupled, wherein the processor is configured to: determine, by a charge station, that a vehicle requests approval to perform a charging operation; access, by the charge station, information stored on the vehicle which includes a charging profile that is unique to the vehicle; store the information accessed from the vehicle at the charging station; determine, by the charge station, an identity of the vehicle based on the information stored on the vehicle and to approve the charging operation based on the identity of the vehicle; charge the vehicle at different charging currents based on the charging profile; determine the charging operation is completed; and delete, from the charge station, information accessed from the vehicle based on the charging operation being completed.
  9. 9 . The system of claim 8 , wherein the processor is configured to conceal at least a portion of the information.
  10. 10 . The system of claim 8 , wherein the processor is configured to transmit a charge to the vehicle, wherein the processor controls charge to be transmitted at a first amount of current and subsequently progress to a second amount of current greater than the first amount of current.
  11. 11 . The system of claim 8 , wherein the processor is configured to process an electronic payment for charging the vehicle, and in response, transmit a charge to the vehicle.
  12. 12 . The system of claim 8 , wherein the information comprises payment account information and personal identification information, and the processor is configured to determine comprises granting approval of the charging operation in response to the payment account information being associated with the personal identification information.
  13. 13 . The system of claim 8 , wherein the information comprises a vehicle identification number for the vehicle, and the processor is configured to encrypt the vehicle identification number.
  14. 14 . The system of claim 8 , wherein the processor is configured to exchange certificates between the charge station and the vehicle, and determine to approve the charging operation based on the certificates.
  15. 15 . A non-transitory computer-readable storage medium comprising instructions that, when read by a processor, cause the processor to perform: determining, by a charging station, that a vehicle requests approval perform a charging operation; accessing, by the charging station, information stored on the vehicle which includes a charging profile unique to the vehicle; storing the information accessed from the vehicle at the charging station; determining, by the charging station, an identity of the vehicle based on the information stored on the vehicle and to approve the charging operation based on the identity of the vehicle; charging the vehicle at different charging currents based on the charging profile; determining the charging operation is completed; and deleting, by the charging station, the information accessed from the vehicle based on the charging operation being completed.
  16. 16 . The non-transitory computer-readable storage medium of claim 15 , wherein the processor is further configured to perform: concealing, by the vehicle, at least a portion of the information.
  17. 17 . The non-transitory computer-readable storage medium of claim 15 , wherein the processor is further configured to perform transmitting a charge, by the charging station to the vehicle, wherein the transmitting is commenced at a first amount of current, and the transmitting progresses to a second amount of current greater than the first amount of current based on the charging profile.
  18. 18 . The non-transitory computer-readable storage medium of claim 15 , further comprising instructions for: processing, by the charging station, an electronic payment for charging the vehicle; and responsive to the processing, transmitting a charge, by the charging station, to the vehicle.
  19. 19 . The non-transitory computer-readable storage medium of claim 15 , wherein the information comprises payment account information and personal identification information, and the determining comprises granting approval of the charging operation in response to the payment account information being associated with the personal identification information.
  20. 20 . The non-transitory computer-readable storage medium of claim 15 , wherein the processor is further configured to perform: exchanging certificates between the charging station and the vehicle, wherein the determining comprises determining to approve the charging operation based on the certificates.

Description

BACKGROUND Vehicles or transports, such as cars, motorcycles, trucks, planes, trains, etc., generally provide transportation needs to occupants and/or goods in a variety of ways. Functions related to vehicles may be identified and utilized by various computing devices, such as a smartphone or a computer located on and/or off the vehicle. SUMMARY One example embodiment provides a method that includes one or more of determining, by a charging station, that a vehicle requests approval to receive a charge; accessing, by the charging station, personal information related to the vehicle and related to an occupant of the vehicle; analyzing, by the charging station, the personal information related to the vehicle and related to the occupant of the vehicle; determining, by the charging station, to grant the approval, based on the analyzing; and, responsive to the approval being granted, deleting, by the charging station, the accessed personal information related to the vehicle and related to the occupant of the vehicle, after the vehicle has received the charge. Another example embodiment provides a system that includes a memory communicably coupled to a processor, wherein the processor performs one or more of determines, from a charge station, that a vehicle requests approval to receive a charge; accesses, from the charge station, personal information related to the vehicle and related to an occupant of the vehicle; analyzes the personal information related to the vehicle and related to the occupant of the vehicle; determines to grant the approval, based on the analyzes; and, responsive to the approval, deletes, from the charge station, the accessed personal information related to the vehicle and related to the occupant of the vehicle, after the vehicle has received the charge. A further example embodiment provides a computer readable storage medium comprising instructions, that when read by a processor, cause the processor to perform one or more of determining, by a charging station, that a vehicle requests approval to receive a charge; accessing, by the charging station, personal information related to the vehicle and related to an occupant of the vehicle; analyzing, by the charging station, the personal information related to the vehicle and related to the occupant of the vehicle; determining, by the charging station, to grant the approval, based on the analyzing; and, responsive to the approval being granted, deleting, by the charging station, the accessed personal information related to the vehicle and related to the occupant of the vehicle, after the vehicle has received the charge. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1A illustrates an example of a system diagram, according to example embodiments. FIG. 1B illustrates a further example of a system diagram, according to example embodiments. FIG. 2A illustrates a vehicle network diagram, according to example embodiments. FIG. 2B illustrates another vehicle network diagram, according to example embodiments. FIG. 2C illustrates yet another vehicle network diagram, according to example embodiments. FIG. 2D illustrates a further vehicle network diagram, according to example embodiments. FIG. 2E illustrates a flow diagram, according to example embodiments. FIG. 2F illustrates another flow diagram, according to example embodiments. FIG. 3A illustrates a machine learning network diagram, according to example embodiments. FIG. 3B illustrates another machine learning network diagram, according to example embodiments. FIG. 3C illustrates yet another machine learning network diagram, according to example embodiments. FIG. 3D illustrates a further machine learning network diagram, according to example embodiments. FIG. 3E illustrates a machine learning network diagram, according to example embodiments. FIG. 4A illustrates a diagram depicting electrification of one or more elements, according to example embodiments. FIG. 4B illustrates a diagram depicting interconnections between different elements, according to example embodiments. FIG. 4C illustrates a further diagram depicting interconnections between different elements, according to example embodiments. FIG. 4D illustrates yet a further diagram depicting interconnections between elements, according to example embodiments. FIG. 4E illustrates yet a further diagram depicting an example of vehicles performing secured V2V communications using security certificates, according to example embodiments. FIG. 5A illustrates an example vehicle configuration for managing database transactions associated with a vehicle, according to example embodiments. FIG. 5B illustrates an example blockchain group, according to example embodiments. FIG. 5C illustrates an example interaction between elements and a blockchain, according to example embodiments. FIG. 5D illustrates an example data block interaction, according to example embodiments. FIG. 5E illustrates a blockchain network diagram, according to example embodiments. FIG. 5F illustra