That includes a reliable authentication solution that can be used to easily and securely manage both access to charging stations and billing.
RFID (Radio-Frequency Identification) and mobile technologies such as NFC (Near Field Communication) or BLE (Bluetooth Low Energy) are all well suited for this task.
But in a rapidly changing industry, the requirements for an authentication solution can change quickly too, so to ensure sustainable and future-proof solutions, operators and manufacturers of charging infrastructure need to consider several important points.
The first pivots around the safe and convenient charging of EVs. To ensure this, operators of charging stations - whether public or private - need to know who is allowed to use the charging facility and how the billing is done. In short, they need to ensure the end-to-end traceability of the entire EV charging process.
The requirements for user authentication, access restrictions and billing models differ depending on each application with options ranging from membership programmes to free offers.
For example, fleet EVs can be charged using employee ID cards so that only authorised users have access to charging facilities ensuring that they can be billed against the right account.
Outlets such as cinemas or shopping centres that use charging points as an additional source of revenue - as well as network operators that offer charging options on the road network - could offer their customers convenient access and transparent billing models that work via credit card or smartphone app.
Original equipment manufacturers (OEMs) could adapt their offerings to the needs of operators and users. This is true not only in terms of the charging technology EV charging station use, but also in terms of access control and user authentication options.
Challenges of integration
Regardless of who is accessing EV charge points, operators of charging infrastructure also need to know who is accessing their service, regulate access where necessary, and ensure that data security is always maintained.
To do so, operators depend on an authentication solution that ensures maximum security of sensitive, personal user data. This is especially true for authentication and access control solutions for metered charging stations. Without encryption, there is a risk that account data could be intercepted and misused.
If charging station manufacturers offer their products on a supra-regional, or even transnational basis, they need to consider that the market for charging infrastructure is highly fragmented, for example regarding technical specifications and data protection laws.
That’s why when it comes to integrating authentication and access control solutions, the chosen solution must simplify charging station management.
Users of the charging infrastructure may also use different card or mobile technologies. This is because a variety of transponder technologies are available on the international market, each with its own data formats, communication frequencies and security functions.
However, most readers are only capable of reading a few card technologies. This means OEMs looking to increase their market opportunity may need to stock different readers for different customers. It can also be a challenge for charging network providers that have stations in multiple regions or countries to find a reader that is certified for use in all target markets and which supports all the technologies preferred in each location.
Finally, market requirements and legal regulations are also constantly changing. Smartphone-based solutions are becoming increasingly popular and are replacing the classic card in many areas and application scenarios. However, most readers can only be upgraded and adapted to current customer needs to a limited extent and would, therefore, have to be replaced at great expense in case of doubt.
The solution
A modern authentication solution based on RFID and mobile technologies offers a simple, convenient and secure option for user authentication and access control. At public and private charging stations, users can be identified with either an RFID card or a token. It is also possible to use digital credentials, so-called “mobile credentials”.
These are based on NFC or BLE technologies with which a large proportion of all mobile devices such as smartphones are equipped. The use of such authentication protects charging stations from unauthorised access and ensures that sensitive information such as users' payment data does not fall into the wrong hands.
Users simply need to hold their credentials in the form of a card or smartphone up to the charging station. The integrated reader then enables secure, safe and contactless access to the charge point - without the need for credit cards, passwords or PINs.
Making access control and user authentication sustainable and secure, here's what EV charge point operators need to consider:
Security for infrastructure and data: An access control with an authentication solution increases security. It protects against misuse - both in terms of data and the charging infrastructure. This is because EV charge points can only be used by authorised users with their ID cards. The system also allows their charging behaviour to be monitored.
To increase data security, a reader can be programmed to support encryption technologies including cryptographic methods that require high computing power. Appropriate devices allow manufacturers or operators to add custom encryption methods and other complex functions.
Flexibility and complexity reduction: Multi-frequency readers are well suited to the challenges posed by the highly fragmented market for charging infrastructure and the multitude of common transponder technologies. Universal readers are available on the market that can process more than 60 common transponder technologies worldwide and are certified for use in up to 110 countries. These readers are compatible with virtually every card technology used by users and can process mobile credentials.
This makes them ideal for EV charging applications. With one single, easy-to-integrate device, they provide a solution that simplifies distribution and inventory management. For manufacturers, this means they only need to stock one version of their system for all potential customers reducing complexity.
Future-proof through remote updates and upgrades: To future-proof their investment, EV charge point operators need to invest in a flexible system that can easily be upgraded and optimised. This includes the remote configuration enabling all installed readers to be updated easily and quickly regardless of their location.
Conclusion
EV charging infrastructure is expected to expand in the coming years fuelled by large corporations, government agencies with their own fleets as well as small businesses and rental companies.
Operators and OEMs that rely on secure, scalable authentication solutions have a clear advantage and a chance to make a decisive contribution to a stable charging infrastructure.
How RFID, NFC and BLE work
RFID cards have an embedded chip (or tag) that consists of two main components:
- an integrated unit that can store and process information
- an antenna to transmit or receive a signal.
Each RFID card stores a unique set of data that is used to identify the card and, therefore, the person carrying it. When a card with an embedded RFID tag is in the vicinity of an RFID reader, the reader sends out a radio signal to interrogate the tag. The radio signal activates the tag, which then uses the energy from the radio signal to communicate its unique ID to the reader.
Both BLE and NFC are technologies for contactless data exchange. Their main difference from RFID is that the information carriers (e.g., smartphones) are active radio transmitters and require a power source.
- NFC is based on high-frequency RFID technology (13.56 MHz) and enables contactless data exchange in near-field communication (<10 cm)
- BLE is a short-range radio technology for distances up to ten meters in the 2.4 GHz frequency range.
When smartphones are used for user authentication and access control, they act as card emulators and send a unique user ID to the reader.
Author details: Johannes Weil is VP Industry EMEA at Elatec