Skip to main content

Operation and user identification

 

User identification is the basic requirement for consumption settlement, charging prioritisation, access limitation or release of the charging socket. Using different identification and settlement options and a choice of several data storage and communication options, different user groups can be integrated. This makes our system expandable commercially and practically without limit.

PRO - Operation via touchscreen

 

Our PRO versions are especially suitable for all settlement requirements or the combination of multiple operating methods for any charging station or system control. Operation is performed through intuitive user interactions via the touchscreen monitor. This allows cross-system settlement methods such as StromTicket, Ladenetz, Hubject and so on to be used.

 

LPIN

Identification and release of the charging points by entering a PIN (internal local list) 

LTAN

Identification and one-off release of the charging points by entering a TAN (internal local list) 

ETAN

Identification and release of the charging points through a TAN (back-end of the provider, e.g. StromTicket). A separate arrangement must be set up with the system provider for this. 

RFID

Identification and release of the charging points via the RFID medium, communication with the back-end via a modem (back-end of the provider, e.g. Ladenetz, Hubject). A separate arrangement must be set up with the system provider for this.


RFID-recognition

 

Identification using an RFID transponder (radio frequency identification) is controlled by a reader integrated into the charging station or wall box. It is possible to store a variety of user information on the RFID medium (card, key fob, etc.) prior to use, and this can be transferred to the charging infrastructure during identification as a means of documentation. The RFID transponder can be supplied as standard as a chip card or, as a special design, even as a key fob. This version is suitable both for stand-alone versions (local RFID for small user groups) as well as for a version linked to a back-end (extended RFID for parking space management or vehicle fleets). Comparison with the white lists and black lists stored in the back-end can take place both using special protocols (such as OCPP) and special connections with additional data protection (VPN channel) or networks.


KEY

 

Another simple way of ensuring that only authorised people have access for charging is certainly – especially in the private or semi-public sphere – to use mechanical keys or knob switches. These versions are primarily used in stand-alone situations.


Plug´n charge

 

The simplest form of access is our "Plug'n Charge". It ensures barrier-free access to charging. This solution is suitable both for the private and semi-public sector, where the user is given access and therefore is able to charge exclusively by connecting the charging cable into the infrastructure.


Double charging

 

Our charging stations can be equipped with one TYPE 2 and one protective contact socket on each side. This allows the simultaneous charging of two electric vehicles.


Monitoring and interface for settlement

 

Monitoring can be performed via a LAN connection or radio modem and the use of a web browser, depending on the charging infrastructure facilities.

BASIC monitoring

 

With basic monitoring, the status indicator of the charging points and the behaviour of RFID media, and therefore of user groups, is already included as standard in the basic equipment. It is also possible to export this information as a CSV file via the charging infrastructure's network connection.


Premium monitoring

 

With premium monitoring, charging data (kWh, charging time, user management and chronological charging sequence) can be displayed, read out and processed.

This is a fundamental requirement for all settlement-related issues.

The export of charging data records for processing via a back-end is also supported.