BYD logo

BYD

Last updated February 1, 2026
720
Innovation Areas
34,443
Inventors
189
Collaborations

Encrypted charging authentication protocols: BYDRecent Research Landscape

Unauthorized power consumption and data breaches at charging stations create financial leakage and security risks. These innovations mitigate these threats through cryptographic handshake and consumption processing methods.

What technical problems is BYD addressing in Encrypted charging authentication protocols?

Unauthorized energy access risks

(83)evidences

Insecure authentication during vehicle-to-vehicle and grid charging leads to energy theft and data breaches. Establishing robust identity verification prevents fraudulent power drainage and protects user privacy.

Inefficient power transfer alignment

(35)evidences

Manual alignment and fixed positioning constraints limit energy transfer efficiency. Automated and dynamic coupling overcomes physical positioning errors and human intervention requirements.

Unauthorized charging network access

(24)evidences

Vulnerabilities in vehicle-to-station communication allow for fraudulent consumption and identity spoofing. Securing these transactions prevents financial leakage and ensures service integrity.