OCPP 2.0.1 embedded software for EV chargers and gateways
Delivered by dedicated teams for German/EU OEMs and integrators: interoperability-focused commissioning, backend/CSMS integration, TLS + certificate lifecycle, diagnostics/log artifacts, and requirements-to-test traceability. OCPP 2.1 is roadmap (planning & migration). OCTT-aligned where applicable.
- Interoperability
- Commissioning support
- Traceability
- Logs & artifacts
- TLS + cert lifecycle
◈ Technical Summary
We support OCPP 2.0.1 implementation and backend integration, plus embedded development for chargers and gateways. Testing is designed to be OCTT-aligned where applicable, with reproducible diagnostics on target hardware.
- Implementation + Integration Profile alignment, message flows, reconnect/error handling, commissioning support.
- Embedded stack delivery HAL integration, protocol layer, application logic, source code + documentation.
- Test readiness Automated tests, integration tests, and structured validation on target setups.
- Diagnostics Structured logs and traceability support to speed up debugging and verification.
◈ What FlexCharge.OCPP is
Embedded OCPP software stack for EV charging stations, designed for interoperability, testability, and long-term maintainability.
How This Accelerates Your Project
For pilots, we can provide a controlled evaluation scope for technical validation: architecture review, integration fit, and constraints verification. Delivery remains source code + documentation + integration support.
FlexCharge.OCPP packages reusable components and integration patterns refined across multiple charging projects so your team focuses on differentiation instead of rebuilding protocol fundamentals.
Delivery models
◈ Testing & Conformance Pathway
We engineer for testability and certification from day one: reproducible evidence, traceable requirements, and structured validation on target hardware.
Charging Station Software Stack
High-level view of the main modules and how they connect: protocol core, transport, security, hardware interfaces, diagnostics, and lifecycle/update integration.
◈ Architecture Overview
The stack is split into modules with narrow interfaces. Protocol logic is separated from transport, security, and hardware control. Diagnostics and lifecycle behavior use shared APIs so modules can be instrumented and updated without tight coupling.
◈ Module relationships
dispatch in/out
profiles, device model
policy checks
export/adapters
update integration
metering/peripherals
• OCPP Core
- Boundary: routing, state machines, profile logic, device model updates.
- Interfaces: consumes decoded messages + connection state; emits outbound messages + internal events.
- Extension: handler registration, feature flags, hooks for vendor-specific mapping.
• Communication layer
- Boundary: sessions (connect/reconnect), framing, codecs, dispatch.
- Interfaces: send/receive APIs, connection callbacks, codec registry.
- Extension: transport selection, backoff policy, metrics/tracing hooks.
• Security & certificates
- Boundary: TLS config, provisioning/rotation, policy checks.
- Interfaces: TLS integration with transport; status checks for core logic.
- Extension: trust stores, rotation hooks, secure element/keystore providers.
• Hardware abstraction
- Boundary: metering, relays, connector lock, RFID, IO.
- Interfaces: capability-based APIs upward; adapters hide vendor differences.
- Extension: platform implementations, peripheral plugins, feature gating.
• Diagnostics & logging
- Boundary: logs, metrics, traces, export workflows.
- Interfaces: shared API across modules; export adapters for upload/local.
- Extension: sinks, correlation IDs, sampling, per-module log levels.
• Update & lifecycle hooks
- Boundary: startup/shutdown sequencing, lifecycle transitions, update hooks.
- Interfaces: lifecycle callbacks; controlled restart/shutdown APIs.
- Extension: update strategy, pre/post hooks, payload retrieval adapters.
◈ Want this architecture implemented on your hardware?
Schedule a technical review to confirm scope and constraints. We validate platform/OS, required OCPP profiles, backend behavior, security/cert lifecycle, and test approach.
Send these three inputs: backend/CSMS name, target hardware/OS, required OCPP profiles.
Schedule a technical review →◈ Standards and interoperability focus
The stack is engineered around predictable backend behavior, test readiness, and evidence-driven validation for EU delivery expectations.
-
OCPP 2.0.1 aligned implementation Profiles, message flows, and error paths implemented with explicit conformance targets.
-
Backend-agnostic design Clean transport and integration boundaries to support multiple CSMS backends.
-
Interoperability-driven development Validation focuses on real-world flows: reconnect behavior, timeouts, retries, and edge cases.
-
Formal test readiness OCTT-style process discipline where applicable: reproducible tests and traceable artifacts.
-
Traceability Clear links between requirements, implementation decisions, and verification evidence.
-
German/EU delivery expectations Documentation and validation structured for audits, handover, and long-term maintainability.
◈ What you get when working with our team
◈ Software deliverables
Technical outcomes you can ship and maintain.
- Production-ready OCPP implementation tailored to your controller platform and constraints.
- Interface documentation and integration guides for your firmware, backend, and tooling.
- Test strategy + validation plan aligned with your CSMS/backend behaviors and target flows.
◈ Engineering support
How delivery works inside your engineering workflow.
- Dedicated engineers integrated into your repo, CI, and release process.
- Requirements + traceability to keep scope, tests, and evidence consistent.
- Maintenance + protocol evolution support (bug fixing, profile additions, upgrades).
◈ Who FlexCharge.OCPP is for
◈ For
- Charger OEMs
- Industrial EVSE manufacturers
- System integrators building charger firmware
◈ Not for
- End consumers
- Fleet operators looking for SaaS backends
- White-label consumer apps
◈ How engagement works
Typical delivery flow from first validation to rollout. Scope and artifacts are kept traceable so integration and testing remain predictable.
- Evaluation phase (technical discussion, architecture review, integration constraints).
- Pilot or integration phase (repo/CI setup, message flows, target-hardware validation).
- Production rollout (stabilization, release support, handover documentation).
- Optional long-term support (maintenance, protocol evolution, new profiles/backends).
◈ FAQ
Is this a SaaS platform?
No. This is embedded software for charging stations and gateways. You deploy it on your hardware; the CSMS/backend can be yours or a third-party system.
Do you provide complete charger firmware development?
Yes, depending on scope. We can deliver the software stack from the hardware abstraction layer (HAL) through the OCPP protocol layer to application logic. The split between our code and your existing components is defined per platform and project scope.
Can we run it on our own hardware?
Yes. Hardware-specific functionality is implemented behind a hardware abstraction layer (HAL), so protocol and application logic can be ported to your target platform. We adapt the HAL to your specific hardware.
Which OCPP versions are supported?
Core focus is OCPP 2.0.1. OCPP 2.1 support is planned/on the roadmap and is aligned with customer requirements and standards adoption. Supported profiles and optional features are defined per project scope.
Can it integrate with existing backends?
Yes. Integration with an existing CSMS/backend is supported as long as the OCPP version and required profiles are aligned. We validate message flows and error/reconnect behavior during integration testing.
How is QA handled?
QA combines automated tests with integration tests on target hardware using an OCTT-aligned process. Where OCTT test suites are available for the target OCPP version, we use them to validate conformance. This typically includes unit tests for protocol/core logic, integration tests for transport/TLS and message flows, and structured logs to support reproducible debugging.
Can you augment our existing engineering team?
Yes. We can provide embedded and OCPP engineers who work within your repositories, coding standards, CI, and release process. Typical support includes feature delivery, bug fixing, protocol compliance work, and hardware porting.
What's your experience with German/EU charger manufacturers?
We align with delivery expectations common in German/EU contexts: backend interoperability, clear test readiness and traceability, explicit security handling (TLS and certificate lifecycle), and integration support during commissioning and field troubleshooting.
What about standards compliance and certification?
We engineer with testability and certification in mind. Our process includes traceability from requirements to tests, structured validation, and documentation support for certification pathways, including an OCTT-aligned approach where applicable.
Where can I see technical details and architecture?
See the architecture diagram on this page and our Technical Expertise page for tooling and methodology.
◈ Need this architecture implemented on your hardware?
Schedule a technical review to confirm scope and constraints before implementation. We review the target platform, required OCPP profiles, backend behavior, security/cert handling, and test approach.
- Target hardware/OS, HAL scope, peripherals (metering, lock, RFID, IO)
- OCPP version/profiles and required optional features
- CSMS/backend integration: message flows, reconnect/error handling
- TLS + certificate lifecycle requirements
- QA plan: automated tests, integration tests, OCTT alignment where applicable
For exact compatibility confirmation, send your backend name, target hardware/OS, and required OCPP profiles via Contact.
Schedule a technical review →