CN106850311A - For the data safe transmission system and method for firmware upgrade - Google Patents

For the data safe transmission system and method for firmware upgrade Download PDF

Info

Publication number
CN106850311A
CN106850311A CN201710123213.7A CN201710123213A CN106850311A CN 106850311 A CN106850311 A CN 106850311A CN 201710123213 A CN201710123213 A CN 201710123213A CN 106850311 A CN106850311 A CN 106850311A
Authority
CN
China
Prior art keywords
firmware
unit
information
public key
dispatching
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710123213.7A
Other languages
Chinese (zh)
Other versions
CN106850311B (en
Inventor
陈崇峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NIO Co Ltd
Original Assignee
NIO Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NIO Co Ltd filed Critical NIO Co Ltd
Priority to CN201710123213.7A priority Critical patent/CN106850311B/en
Publication of CN106850311A publication Critical patent/CN106850311A/en
Application granted granted Critical
Publication of CN106850311B publication Critical patent/CN106850311B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • H04L41/082Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Stored Programmes (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of data safe transmission system and method for firmware upgrade, and the system includes:Authentication center, firmware Dispatching Unit, firmware receiving unit;Authentication center is configured to the identity code of each unit, public key, generates the authentication public key information of corresponding unit, and is sent to corresponding unit;Firmware Dispatching Unit is configured to selected firmware upgrade information as transmission data file, the authentication public key information generation data file encryption based on firmware receiving unit, and is sent to corresponding firmware receiving unit;Firmware receiving unit, is configured to receive the data file encryption of firmware Dispatching Unit transmission and decrypt, and obtains firmware upgrade information.So as to fully ensure that the safe transmission of data in firmware upgrade process.

Description

For the data safe transmission system and method for firmware upgrade
Technical field
It is the present invention relates to firmware upgrade technical field and more particularly it relates to a kind of for firmware upgrade Data safe transmission system and method.
Background technology
Nowadays many ECU (Electronic Control Unit, Electronic Control list are all typically contained in automobile Unit).When these ECU break down or function needs to improve, it is necessary to these ECU are carried out with firmware upgrade, and now can be with Completing remote firmware updating, i.e. vehicle using FOTA (Firmware Over The Air, aerial firmware upgrade) need not reach 4S Shop is upgraded, and remote firmware updating can be very easily carried out by FOTA.Although however, aerial firmware upgrade can be very It is readily achieved the firmware upgrade of ECU, but the opening being wirelessly transferred used due to it, also it is easily caused firmware upgrade not Security.Security it is therefore desirable to improve data transfer in aerial firmware upgrade.
The content of the invention
In order to solve above mentioned problem of the prior art, i.e., in order to improve the safety of data transfer in aerial firmware upgrade Property.The present invention proposes a kind of data safe transmission system for firmware upgrade, and the system includes:Authentication center, firmware point Bill unit, firmware receiving unit.
Authentication center, is configured to identity code, the public key of each unit, generates the authentication public key letter of corresponding unit Breath, and it is sent to corresponding unit;Firmware Dispatching Unit, is configured to selected firmware upgrade information as transmission data text Part, the authentication public key information generation data file encryption based on firmware receiving unit, and send to corresponding firmware receiving unit; Firmware receiving unit, is configured to receive the data file encryption of firmware Dispatching Unit transmission and decrypt, and obtains firmware upgrade information.
Preferably, the system also includes firmware feeding unit, and the unit is configured to new firmware upgrade information as biography Data file is sent, the authentication public key information generation data file encryption based on firmware Dispatching Unit, and send single to firmware distribution Unit;Firmware Dispatching Unit, is additionally configured to receive the data file encryption of firmware feeding unit transmission and decrypt, and obtains firmware upgrade Information.
Preferably, system also includes firmware memory cell, and the unit is configured to store the firmware that firmware Dispatching Unit sends Upgrade information, and send the firmware upgrade information that firmware Dispatching Unit is transferred;The firmware upgrade information of firmware memory cell adds Close, decryption collocation method is consistent with firmware Dispatching Unit.
Preferably, firmware receiving unit includes workshop receiving unit, 4S shops receiving unit and vehicle-mounted receiving unit; Workshop receiving unit, is configured to carry out firmware upgrade to the vehicle in workshop;4S shops receiving unit, is configured to coming Shop vehicle carries out firmware upgrade;Vehicle-mounted receiving unit, the vehicle for being configured to load it carries out firmware upgrade.
Preferably, firmware Dispatching Unit is additionally configured to the authentication public key acquisition of information corresponding unit based on other each units Public key, and session key and message authentication code between firmware Dispatching Unit and other each units are generated, by receiving unit Corresponding unit is sent to after public key encryption;The encrypted transmission of the firmware upgrade information in system between each unit includes:
Sender is based on its own session key between recipient and encrypts transmission to firmware upgrade information, while being based on Its own message authentication code between sender obtains the authentication code information of firmware upgrade information, and the authentication code information is led to Sent after crossing the public key encryption of recipient;Recipient is decrypted acquisition correspondence based on the private key pair encryption data file of its own Authentication code information, and authentication code information is authenticated, certification is close based on its own session between sender after passing through Key is decrypted acquisition firmware upgrade information to data file encryption.
Correspondingly, to solve above mentioned problem of the prior art, the invention allows for a kind of number for firmware upgrade According to safe transmission method, the method is based on the above-mentioned data safe transmission system for firmware upgrade, and the method includes:
Identity code, the public key of other each units are based on by authentication center, the authentication public key letter of corresponding unit is generated Breath, and it is sent to corresponding unit;By firmware Dispatching Unit using selected firmware upgrade information as transmission data file, Authentication public key information generation data file encryption based on firmware receiving unit, and send to corresponding firmware receiving unit;It is logical Cross firmware receiving unit to receive the data file encryption of firmware Dispatching Unit transmission and decrypt, obtain firmware upgrade information.
Preferably, the method also includes:It is by firmware feeding unit that new firmware upgrade information is literary as transmission data Part, the public key verifications information generation data file encryption based on firmware Dispatching Unit, and send to firmware Dispatching Unit;By solid Part Dispatching Unit receives the data file encryption of firmware feeding unit transmission and decrypts, and obtains firmware upgrade information.
Preferably, the method also includes:The firmware upgrade letter that firmware Dispatching Unit sends is stored by firmware memory cell Breath, and send the firmware upgrade information that firmware Dispatching Unit is transferred;The firmware upgrade information encryption of firmware memory cell, decryption Collocation method is consistent with firmware Dispatching Unit.
Preferably, the method also includes:The authentication public key acquisition of information of other each units is based on by firmware Dispatching Unit The public key of other each units, and session key and message authentication code between firmware Dispatching Unit and other each units are generated, lead to Corresponding unit is sent to after the public key encryption for crossing receiving unit;The encrypted transmission of the firmware upgrade information between each unit includes:
Sender is based on its own session key between recipient and encrypts transmission to firmware upgrade information, while being based on Its own message authentication code between sender obtains the authentication code information of firmware upgrade information, and the authentication code information is led to Sent after crossing the public key encryption of recipient;Recipient is decrypted acquisition correspondence based on the private key pair encryption data file of its own Authentication code information, and authentication code information is authenticated, certification is close based on its own session between sender after passing through Key is decrypted acquisition firmware upgrade information to data file encryption.
Preferably, firmware upgrade information is sent to firmware Dispatching Unit by firmware feeding unit in the following manner:
X1=E [PRVFM,C(KMVFM,F)||IDV||IDECU||IDU||TS1]
E[KSVFM,F||E(PUFDM,X1)]
Wherein, E represents encryption, PRVFMIt is firmware feeding unit private key, KMVFMIt is that firmware feeding unit and firmware distribution are single Message authentication code between unit, F represents firmware upgrade information, C (KMVFM, F) represent message authentication code treatment is carried out to firmware, IDVIt is firmware supplier ID, IDECUIt is the ID, ID of impacted element during upgradingUIt is the ID of element to be upgraded, TS1It is timestamp, KSVFMIt is the session key between firmware feeding unit and firmware Dispatching Unit, PUFDMIt is firmware Dispatching Unit public key.
Preferably, firmware upgrade information is sent to firmware memory cell by firmware Dispatching Unit in the following manner:
X2=E [PRFDM,C(KMFS,F)||Info||IDU||TS2];
E[KSFS,F||E(PUFS,X2)]
Wherein, PRFDMIt is firmware Dispatching Unit private key, KMFSIt is the information between firmware Dispatching Unit and firmware memory cell Authentication code, Info represents additional information, and the accessory information includes upgraded version, the ID of element to be upgraded, supplier ID, supply Business's name and upgrading type, TS2It is timestamp, KSFSIt is the session key between firmware Dispatching Unit and firmware memory cell, PUFSIt is firmware memory cell public key.
Preferably, firmware upgrade information is sent to firmware receiving unit by firmware Dispatching Unit in the following manner:
X3=E [PRFDM,C(KMM,F)||IDECU||IDU||TS3]
E[KSVFM,F||E(PUM,X3)]
Wherein, KMMIt is the message authentication code between firmware Dispatching Unit and firmware receiving unit, TS3It is timestamp, PUMFor Firmware receiving unit public key.
Preferably, firmware upgrade information is sent to firmware Dispatching Unit by firmware memory cell in the following manner:
X4=E [PRFS,C(KMFS,F)||IDECU||IDU||TS4]
E[KSFS,F||E(PUFDM,X4)]
Wherein, PRFSIt is firmware memory cell private key, KMFSIt is the information between firmware Dispatching Unit and firmware memory cell Authentication code, TS6It is timestamp, KSFSIt is the session key between firmware Dispatching Unit and firmware memory cell, PUFDMIt is firmware point Bill unit public key.
Preferably, the method also includes:When finding that firmware is leaky or needs to be repaired by firmware Dispatching Unit, will The reparation AKU of firmware is sent to firmware feeding unit.
Preferably, the reparation AKU of firmware is sent to firmware by firmware Dispatching Unit by way of formula (1) or formula (2) Feeding unit:
X5=E [PUVFM,B||E(PRFDM,H(B)||IDV||IDECU||TS5] (1)
X6=E [PUVFM,I||E(PRFDM,H(I)||IDV||IDECU||TS6] (2)
Wherein, PUVFMIt is firmware feeding unit public key, PRFDMIt is firmware Dispatching Unit private key, IDVIt is supplier ID, IDECU It is the ID, T of element that is leaky or needing reparationS5And TS6It is timestamp, B represents the details of leak, and I represents what is repaired Details, H (B) represents the hashed value of B, and H (I) represents the hashed value of I.
Preferably, the method also includes:Firmware receiving unit sends the information that upgrades successfully and complete after the completion of firmware upgrade Into upgrading vehicle VIN yards of list to firmware Dispatching Unit.
Preferably, firmware receiving unit will upgrade successfully information and be sent to firmware Dispatching Unit in the following manner:
X7=E [PRM||IDECU||IDU||VIN||TS7]
E(PUFDM,X7)
Wherein, E represents encryption, PRMIt is firmware receiving unit private key, IDECUIt is the ID, ID of impacted element during upgradingUIt is The ID of the element of upgrading, VIN are VIN yards of the vehicle for completing firmware upgrade, TS7It is timestamp, PUFDMFor firmware Dispatching Unit is public Key.
Preferably, the VIN lists for completing the vehicle of firmware upgrade are sent to firmware by firmware receiving unit in the following manner Dispatching Unit:
X8=E [PRM,C(KMM,L)||UID||TS8]
E[KSM,L||E(PUFDM,X8)]
Wherein, E represents encryption, and L is the VIN lists of the vehicle for completing firmware upgrade, PRMIt is firmware receiving unit private key, KMMIt is the message authentication code between firmware receiving unit and firmware Dispatching Unit, C (KMM, L) represent message authentication code is carried out to L Treatment, UIDIt is the ID, KS of element of upgradingMIt is the session key between firmware Dispatching Unit and firmware receiving unit, TS8It is the time Stamp, PUFDMIt is firmware Dispatching Unit public key.
Preferably, the authentication public key information of each unit is as follows:
E[PRCA,(PUX||IDX||T1||T2)];
Wherein PRCAIt is authentication center's private key, PUXIt is the public key of corresponding unit, IDXIt is the identity code of corresponding unit, T1 It is timestamp, T2It is authentication public key validity information.
Data safe transmission system and method for firmware upgrade proposed by the present invention, other are based on by authentication center The identity code of each unit, public key, generate the authentication public key information of corresponding unit, and are sent to corresponding unit;By solid Part Dispatching Unit believes selected firmware upgrade information as transmission data file, the authentication public key based on firmware receiving unit Breath generation data file encryption, and send to corresponding firmware receiving unit;Firmware is received by firmware receiving unit and distributes list The data file encryption of unit's transmission is simultaneously decrypted, and obtains firmware upgrade information.So as to fully ensure that data in firmware upgrade process Safe transmission.
Scheme 1, a kind of data safe transmission system for firmware upgrade, it is characterised in that the system include authentication center, Firmware Dispatching Unit, firmware receiving unit;
The authentication center, is configured to identity code, the public key of each unit, generates the authentication public key letter of corresponding unit Breath, and it is sent to corresponding unit;
The firmware Dispatching Unit, is configured to, using selected firmware upgrade information as transmission data file, be connect based on firmware The authentication public key information generation data file encryption of unit is received, and is sent to corresponding firmware receiving unit;
The firmware receiving unit, is configured to receive the data file encryption of firmware Dispatching Unit transmission and decrypt, and obtains firmware Upgrade information.
Scheme 2, the Transmission system according to scheme 1, it is characterised in that the system also includes firmware feeding unit, the unit It is configured to new firmware upgrade information as transmission data file, the authentication public key information generation based on firmware Dispatching Unit adds Ciphertext data file, and send to firmware Dispatching Unit;
The firmware Dispatching Unit, is additionally configured to receive the data file encryption of firmware feeding unit transmission and decrypt, and obtains solid Part upgrade information.
Scheme 3, the Transmission system according to scheme 2, it is characterised in that the system also includes firmware memory cell, the list Unit is configured to store the firmware upgrade information that firmware Dispatching Unit sends, and sends the firmware upgrade that firmware Dispatching Unit is transferred Information;The firmware upgrade information encryption of firmware memory cell, decryption collocation method are consistent with firmware Dispatching Unit.
Scheme 4, the Transmission system according to scheme 3, it is characterised in that the firmware receiving unit is received including workshop Unit, 4S shops receiving unit and vehicle-mounted receiving unit;
The workshop receiving unit, is configured to carry out firmware upgrade to the vehicle in workshop;
4S shops receiving unit, is configured to carry out firmware upgrade to carrying out shop vehicle;
The vehicle-mounted receiving unit, the vehicle for being configured to load it carries out firmware upgrade.
Scheme 5, the Transmission system according to any one of scheme 1~4, it is characterised in that the firmware Dispatching Unit is also matched somebody with somebody The public key of the authentication public key acquisition of information corresponding unit based on other each units is set to, and it is each with other to generate firmware Dispatching Unit Session key and message authentication code between unit, by being sent to corresponding unit after the public key encryption of receiving unit;
The encrypted transmission of the firmware upgrade information in the system between each unit includes:
Sender is based on its own session key between recipient and encrypts transmission to firmware upgrade information, while based on it certainly Message authentication code between body and sender obtains the authentication code information of firmware upgrade information, and by the authentication code information by connecing Sent after the public key encryption of debit;
Recipient is decrypted the corresponding authentication code information of acquisition based on the private key pair encryption data file of its own, and to certification Code information is authenticated, and certification is solved based on its own session key between sender after passing through to data file encryption Close acquisition firmware upgrade information.
Scheme 6, a kind of data safe transmission method for firmware upgrade, it is characterised in that based on any one institute of scheme 1~5 The data safe transmission system for firmware upgrade stated, methods described includes:
Identity code, the public key of other each units are based on by authentication center, the authentication public key information of corresponding unit is generated, and It is sent to corresponding unit;
By firmware Dispatching Unit using selected firmware upgrade information as transmission data file, based on firmware receiving unit Authentication public key information generates data file encryption, and sends to corresponding firmware receiving unit;
The data file encryption of firmware Dispatching Unit transmission is received by firmware receiving unit and is decrypted, obtain firmware upgrade letter Breath.
Scheme 7, the transmission method according to scheme 6, it is characterised in that methods described also includes:
By firmware feeding unit using new firmware upgrade information as transmission data file, the public key based on firmware Dispatching Unit Checking information generates data file encryption, and sends to firmware Dispatching Unit;
The data file encryption of firmware feeding unit transmission is received by firmware Dispatching Unit and is decrypted, obtain firmware upgrade letter Breath.
Scheme 8, the transmission method according to scheme 7, it is characterised in that methods described also includes:
The firmware upgrade information that firmware Dispatching Unit sends is stored by firmware memory cell, and sends firmware Dispatching Unit and adjusted The firmware upgrade information for taking;The firmware upgrade information encryption of firmware memory cell, decryption collocation method and firmware Dispatching Unit one Cause.
Scheme 9, the transmission method according to any one of scheme 6~8, it is characterised in that methods described also includes:
The public key of other each units of the authentication public key acquisition of information of other each units is based on by firmware Dispatching Unit, and is generated solid Session key and message authentication code between part Dispatching Unit and other each units, by being sent after the public key encryption of receiving unit To corresponding unit;
The encrypted transmission of the firmware upgrade information between each unit includes:
Sender is based on its own session key between recipient and encrypts transmission to firmware upgrade information, while based on it certainly Message authentication code between body and sender obtains the authentication code information of firmware upgrade information, and by the authentication code information by connecing Sent after the public key encryption of debit;
Recipient is decrypted the corresponding authentication code information of acquisition based on the private key pair encryption data file of its own, and to certification Code information is authenticated, and certification is solved based on its own session key between sender after passing through to data file encryption Close acquisition firmware upgrade information.
Scheme 10, the transmission method according to scheme 9, it is characterised in that firmware feeding unit is in the following manner by firmware liter Level information is sent to firmware Dispatching Unit:
X1=E [PRVFM,C(KMVFM,F)||IDV||IDECU||IDU||TS1]
E[KSVFM,F||E(PUFDM,X1)]
Wherein, E represents encryption, PRVFMIt is firmware feeding unit private key, KMVFMFor firmware feeding unit and firmware Dispatching Unit it Between message authentication code, F represents firmware upgrade information, C (KMVFM, F) represent message authentication code treatment, ID are carried out to firmwareVFor Firmware supplier ID, IDECUIt is the ID, ID of impacted element during upgradingUIt is the ID of element to be upgraded, TS1It is timestamp, KSVFMFor Session key between firmware feeding unit and firmware Dispatching Unit, PUFDMIt is firmware Dispatching Unit public key.
Scheme 11, the transmission method according to scheme 10, it is characterised in that firmware Dispatching Unit is in the following manner by firmware liter Level information is sent to firmware memory cell:
X2=E [PRFDM,C(KMFS,F)||Info||IDU||TS2];
E[KSFS,F||E(PUFS,X2)]
Wherein, PRFDMIt is firmware Dispatching Unit private key, KMFSFor the information between firmware Dispatching Unit and firmware memory cell is recognized Card code, Info represents additional information, and the accessory information includes upgraded version, the ID of element to be upgraded, supplier ID, supplier Name and upgrading type, TS2It is timestamp, KSFSIt is the session key between firmware Dispatching Unit and firmware memory cell, PUFSIt is firmware memory cell public key.
Scheme 12, the transmission method according to scheme 11, it is characterised in that firmware Dispatching Unit is in the following manner by firmware liter Level information is sent to firmware receiving unit:
X3=E [PRFDM,C(KMM,F)||IDECU||IDU||TS3]
E[KSVFM,F||E(PUM,X3)]
Wherein, KMMIt is the message authentication code between firmware Dispatching Unit and firmware receiving unit, TS3It is timestamp, PUMIt is firmware Receiving unit public key.
Scheme 13, the transmission method according to scheme 12, it is characterised in that firmware memory cell is in the following manner by firmware liter Level information is sent to firmware Dispatching Unit:
X4=E [PRFS,C(KMFS,F)||IDECU||IDU||TS4]
E[KSFS,F||E(PUFDM,X4)]
Wherein, PRFSIt is firmware memory cell private key, KMFSIt is the authentification of message between firmware Dispatching Unit and firmware memory cell Code, TS6It is timestamp, KSFSIt is the session key between firmware Dispatching Unit and firmware memory cell, PUFDMFor firmware distributes list First public key.
Scheme 14, the transmission method according to scheme 9, it is characterised in that methods described also includes:By firmware Dispatching Unit It was found that firmware is leaky or needs are when being repaired, the reparation AKU of firmware is sent to firmware feeding unit.
Scheme 15, the transmission method according to scheme 14, it is characterised in that firmware Dispatching Unit is by formula (1) or formula (2) The reparation AKU of firmware is sent to firmware feeding unit by mode:
X5=E [PUVFM,B||E(PRFDM,H(B)||IDV||IDECU||TS5](1)
X6=E [PUVFM,I||E(PRFDM,H(I)||IDV||IDECU||TS6](2)
Wherein, PUVFMIt is firmware feeding unit public key, PRFDMIt is firmware Dispatching Unit private key, IDVIt is supplier ID, IDECUTo have The ID, T of the element that leak or needs are repairedS5And TS6It is timestamp, B represents the details of leak, and I represents the detailed of reparation Information, H (B) represents the hashed value of B, and H (I) represents the hashed value of I.
Scheme 16, the transmission method according to scheme 9, it is characterised in that methods described also includes:Firmware receiving unit is solid The information that upgrades successfully is sent after the completion of part upgrading and complete VIN yards of list of the vehicle of upgrading to firmware Dispatching Unit.
Scheme 17, the transmission method according to scheme 16, it is characterised in that firmware receiving unit will be escalated into the following manner Work(information is sent to firmware Dispatching Unit:
X7=E [PRM||IDECU||IDU||VIN||TS7]
E(PUFDM,X7)
Wherein, E represents encryption, PRMIt is firmware receiving unit private key, IDECUIt is the ID, ID of impacted element during upgradingUIt is upgrading Element ID, VIN is complete firmware upgrade VIN yards of vehicle, TS7It is timestamp, PUFDMIt is firmware Dispatching Unit public key.
Scheme 18, the transmission method according to scheme 16, it is characterised in that firmware receiving unit will complete solid in the following manner The VIN lists of the vehicle of part upgrading are sent to firmware Dispatching Unit:
X8=E [PRM,C(KMM,L)||UID||TS8]
E[KSM,L||E(PUFDM,X8)]
Wherein, E represents encryption, and L is the VIN lists of the vehicle for completing firmware upgrade, PRMIt is firmware receiving unit private key, KMMFor Message authentication code between firmware receiving unit and firmware Dispatching Unit, C (KMM, L) represent message authentication code treatment is carried out to L, UIDIt is the ID, KS of element of upgradingMIt is the session key between firmware Dispatching Unit and firmware receiving unit, TS8It is timestamp, PUFDMIt is firmware Dispatching Unit public key.
Scheme 19, the transmission method according to scheme 6, it is characterised in that the authentication public key information of each unit is as follows:E [PRCA,(PUX||IDX||T1||T2)];
Wherein PRCAIt is authentication center's private key, PUXIt is the public key of corresponding unit, IDXIt is the identity code of corresponding unit, T1It is Timestamp, T2It is authentication public key validity information.
Brief description of the drawings
Fig. 1 is the structural representation of the data safe transmission system for firmware upgrade in first embodiment of the invention;
Fig. 2 is the schematic flow sheet of the data safe transmission method for firmware upgrade in second embodiment of the invention.
Specific embodiment
The preferred embodiment of the present invention described with reference to the accompanying drawings.It will be apparent to a skilled person that this A little implementation methods are used only for explaining know-why of the invention, it is not intended that limit the scope of the invention.
First embodiment
Fig. 1 is referred to, Fig. 1 shows the Security Data Transmission system for firmware upgrade in the first embodiment of the present invention The structural representation of system, concrete structure includes:
Authentication center 101, is configured to identity code, the public key of each unit, generates the authentication public key of corresponding unit Information, and by being sent to corresponding unit after the public key encryption of corresponding unit.By after the certification of authentication center 101, each list Just safe data transfer can be carried out based on authentication public key information between unit.Specifically, in the present embodiment, each unit will be respective Identity code and public key by being sent to authentication center 101, authentication center 101 after the public key encryption of authentication center 101 Generate following authentication public key information:
E[PRCA,(PUX||IDX||T1||T2)];
Wherein PRCAIt is the private key of authentication center 101, PUXIt is the public key of corresponding unit, IDXIt is the identification of corresponding unit Code, T1It is timestamp, T2It is authentication public key validity information.Authentication public key information is sent by the public key encryption of corresponding unit can To ensure that only specific unit can just obtain corresponding authentication public key information.
Firmware Dispatching Unit 102, is configured to using selected firmware upgrade information as transmission data file, based on firmware The authentication public key information generation data file encryption of receiving unit, and send to corresponding firmware receiving unit.Additionally, firmware point Bill unit 102 is additionally configured to obtain new firmware upgrade information from firmware feeding unit 104.And firmware Dispatching Unit 102 When finding that firmware has leak or needs to be repaired, actively firmware supply can will be sent to after firmware upgrade reparation packet encryption Unit 104, firmware feeding unit 104 is after it can prepare new firmware upgrade information and encrypt after receiving firmware upgrade reparation bag Send to firmware Dispatching Unit 102.Need to be come into contacts with multiple firmware suppliers in reality, only with a firmware in Fig. 1 Feeding unit is making to illustrate.
Additionally, for the encryption in firmware transmitting procedure, firmware Dispatching Unit 102 is additionally configured to based on other each units The public key of authentication public key acquisition of information corresponding unit, and the session generated between firmware Dispatching Unit 102 and other each units is close Key and message authentication code, by being sent to corresponding unit after the public key encryption of receiving unit.
Firmware receiving unit 103, is configured to receive the data file encryption of firmware Dispatching Unit transmission and decrypt, and obtains solid Part upgrade information.And after firmware completes upgrading, firmware receiving unit 103 can send the information of upgrading successfully and complete to upgrade VIN yards of list of vehicle is to firmware Dispatching Unit 102.Specifically, in the present embodiment, firmware receiving unit 103 includes production Workshop receiving unit 1032,4S shops receiving unit 1031 and vehicle-mounted receiving unit 1033;Workshop receiving unit 1032, matches somebody with somebody Be set to carries out firmware upgrade to the vehicle in workshop;4S shops receiving unit 1031, is configured to carry out firmware to carrying out shop vehicle Upgrading;Vehicle-mounted receiving unit 1033, the vehicle for being configured to load it carries out firmware upgrade.
Additionally, the storage in order to complete firmware, also including firmware memory cell 105, the unit is configured to storage to the system Firmware Dispatching Unit 102 send firmware upgrade information, and receive firmware Dispatching Unit 102 transfer instruction after, foundation Instruction is transferred to send to firmware Dispatching Unit 102 firmware.The firmware upgrade information encryption of firmware memory cell 105, decryption are matched somebody with somebody Put method consistent with firmware Dispatching Unit 102.
The encrypted transmission of the firmware upgrade information in said system between each unit includes:Sender is based on its own and connects Session key between debit is encrypted to firmware upgrade information and sent, while the authentification of message based on its own between sender Code obtains the authentication code information of firmware upgrade information, and by the authentication code information by being sent after the public key encryption of recipient;Connect Debit is decrypted the corresponding authentication code information of acquisition based on the private key pair encryption data file of its own, and to authentication code information It is authenticated, certification is decrypted acquisition based on its own session key between sender after passing through to data file encryption Firmware upgrade information.
The data safe transmission system for firmware upgrade in the present embodiment, is configured to respectively by by authentication center The identity code of unit, public key, generate the authentication public key information of corresponding unit, and are sent to corresponding unit;Firmware is distributed Unit is configured to selected firmware upgrade information as transmission data file, the authentication public key letter based on firmware receiving unit Breath generation data file encryption, and send to corresponding firmware receiving unit;Firmware receiving unit is configured to receive firmware distribution The data file encryption of unit transmission is simultaneously decrypted, and obtains firmware upgrade information.So as to fully ensure that number in firmware upgrade process According to safe transmission.
Second embodiment
Fig. 2 is referred to, Fig. 2 shows the Security Data Transmission system for firmware upgrade in the second embodiment of the present invention The schematic flow sheet of system, comprises the following steps that:
S201, identity code, the public key of other each units are based on by authentication center, and the public key for generating corresponding unit is recognized Card information, and it is sent to corresponding unit.
Specifically, in the present embodiment, the process of authentication center's generation each unit authentication public key information is as follows:
Authentication center is by the public key PU of itselfCAEach unit is sent to, each unit is receiving PUCAAfterwards by the public key of itself PUXAnd identity code IDXBy PUCAAuthentication center is sent to after encryption, authentication center passes through the private key PR of itselfCATo letter PU is obtained after breath decryptionXAnd IDXAfter generate following authentication public key information:
E[PRCA,(PUX||IDX||T1||T2)];
Wherein PUXIt is the public key of corresponding unit, IDXIt is the identity code of corresponding unit, T1It is timestamp, T2It is public key The authentication information term of validity.Timestamp can prevent from resetting and relay attack.The public affairs that above-mentioned authentication public key information passes through corresponding unit Corresponding unit is sent to after key encryption, so as to ensure that only specific unit can just obtain correspondence authentication public key information.
After the authentication public key information that each unit obtains itself, firmware Dispatching Unit is by by the authentication public key information of itself The public key for obtaining other each units is swapped with other units, and generates the meeting between firmware Dispatching Unit and other each units Words key and message authentication code, by being sent to corresponding unit after the public key encryption of receiving unit.Session key is mainly used in Firmware is encrypted in firmware transmitting procedure, because firmware is generally big file, therefore by way of this symmetric cryptography, Decryption speed can be accelerated in decryption.And message authentication code is then used to judge transmission sources and data in firmware transmitting procedure Integrality.
Specifically, the data transfer of each unit is based in the following manner in the present embodiment:
Sender is based on its own session key between recipient and encrypts transmission to firmware upgrade information, while being based on Its own message authentication code between sender obtains the authentication code information of firmware upgrade information, and the authentication code information is led to Sent after crossing the public key encryption of recipient;Recipient is decrypted acquisition correspondence based on the private key pair encryption data file of its own Authentication code information, and authentication code information is authenticated, certification is close based on its own session between sender after passing through Key is decrypted acquisition firmware upgrade information to data file encryption.
S202, data file encryption is generated by the authentication public key information that firmware upgrade information is based on firmware receiving unit, and Send to corresponding firmware receiving unit.
Firmware upgrade information is the volume of data for firmware upgrade, and the firmware upgrade information is sent out by firmware feeding unit Firmware Dispatching Unit is delivered to, and is sent to corresponding firmware according to the particular content of the firmware upgrade information by firmware Dispatching Unit Receiving unit.Additionally, in addition to firmware feeding unit actively sends new firmware to firmware Dispatching Unit, firmware Dispatching Unit exists It was found that when firmware has leak or needs upgrading, the upgrading reparation bag of firmware can be sent to firmware feeding unit.
Firmware Dispatching Unit in addition to firmware is sent to corresponding firmware receiving unit, is gone back when new firmware is got Firmware can be sent to firmware memory cell and be stored, and correspondence is transferred admittedly from firmware memory cell when firmware is needed Part.
Specifically, firmware upgrade information is sent to firmware Dispatching Unit by firmware feeding unit in the following manner:
X1=E [PRVFM,C(KMVFM,F)||IDV||IDECU||IDU||TS1]
E[KSVFM,F||E(PUFDM,X1)]
Wherein, PRVFMIt is firmware feeding unit private key, KMVFMIt is the letter between firmware feeding unit and firmware Dispatching Unit Breath authentication code, F represents firmware upgrade information, C (KMVFM, F) represent message authentication code treatment, ID are carried out to firmwareVFor firmware is supplied Answer business ID, IDECUIt is the ID, ID of impacted element during upgradingUIt is the ID of element to be upgraded, TS1It is timestamp, KSVFMFor firmware is supplied Answer the session key between unit and firmware Dispatching Unit, PUFDMIt is firmware Dispatching Unit public key.
Symmetrical and asymmet-ric encryption method has been used in aforesaid way simultaneously.Symmetric encryption method is mainly used in big text Part, here pair as if firmware.Asymmet-ric encryption method is mainly using the transmission and the certification of identity of key.Firmware feeding unit PR is usedVFMMAC is signed.X1PU is usedFDMIt is encrypted, it is ensured that only firmware Dispatching Unit is private using it Key could be untied.
Similarly, firmware upgrade information is sent to firmware memory cell by firmware Dispatching Unit in the following manner:
X2=E [PRFDM,C(KMFS,F)||Info||IDU||TS2];
E[KSFS,F||E(PUFS,X2)]
Wherein, PRFDMIt is firmware Dispatching Unit private key, KMFSIt is the information between firmware Dispatching Unit and firmware memory cell Authentication code, Info represents additional information, and the accessory information includes upgraded version, the ID of element to be upgraded, supplier ID, supply Business's name and upgrading type, TS2It is timestamp, KSFSIt is the session key between firmware Dispatching Unit and firmware memory cell, PUFSIt is firmware memory cell public key.
Firmware upgrade information is sent to firmware receiving unit by firmware Dispatching Unit in the following manner:
X3=E [PRFDM,C(KMM,F)||IDECU||IDU||TS3]
E[KSVFM,F||E(PUM,X3)]
Wherein, KMMIt is the message authentication code between firmware Dispatching Unit and firmware receiving unit, TS3It is timestamp, PUMFor Firmware receiving unit public key.
Firmware upgrade information is sent to firmware Dispatching Unit by firmware memory cell in the following manner:
X4=E [PRFS,C(KMFS,F)||IDECU||IDU||TS4]
E[KSFS,F||E(PUFDM,X4)]
Wherein, PRFSIt is firmware memory cell private key, KMFSIt is the information between firmware Dispatching Unit and firmware memory cell Authentication code, TS6It is timestamp, KSFSIt is the session key between firmware Dispatching Unit and firmware memory cell, PUFDMIt is firmware point Bill unit public key.
Additionally, the reparation AKU of firmware is sent to firmware by firmware Dispatching Unit by way of formula (1) or formula (2) supplying Answer unit:
X5=E [PUVFM,B||E(PRFDM,H(B)||IDV||IDECU||TS5] (1)
X6=E [PUVFM,I||E(PRFDM,H(I)||IDV||IDECU||TS6] (2)
Wherein, PUVFMIt is firmware feeding unit public key, PRFDMIt is firmware Dispatching Unit private key, IDVIt is supplier ID, IDECU It is the ID, T of element that is leaky or needing reparationS5And TS6It is timestamp, B represents the details of leak, and I represents what is repaired Details, H (B) represents the hashed value of B, and H (I) represents the hashed value of I.
Due to message X5And X6And less, therefore only with asymmetric encryption in aforesaid way.Firmware feeding unit is received Hashed value comparing is carried out after to message, if the verification passes, then flow of upgrading starts.
S203, receives the data file encryption of firmware Dispatching Unit transmission and decrypts by firmware receiving unit, obtains solid Part upgrade information.
Firmware receiving unit can enter according to firmware upgrade information after firmware upgrade information is got to corresponding firmware Go and upgrade, and VIN yards of list of the vehicle that the information that upgrades successfully and completion are upgraded is sent after the completion of firmware upgrade and divide to firmware Bill unit.
Specifically, in the present embodiment, firmware receiving unit will upgrade successfully information and be sent to firmware distribution in the following manner Unit:
X7=E [PRM||IDECU||IDU||VIN||TS7]
E(PUFDM,X7)
Wherein, E represents encryption, PRMIt is firmware receiving unit private key, IDECUIt is the ID, ID of impacted element during upgradingUIt is The ID of the element of upgrading, VIN are VIN yards of the vehicle for completing firmware upgrade, TS7It is timestamp, PUFDMFor firmware Dispatching Unit is public Key.
The VIN lists for completing the vehicle of firmware upgrade are sent to firmware Dispatching Unit in the following manner:
X8=E [PRM,C(KMM,L)||UID||TS8]
E[KSM,L||E(PUFDM,X8)]
Wherein, E represents encryption, and L is the VIN lists of the vehicle for completing firmware upgrade, PRMIt is firmware receiving unit private key, KMMIt is the message authentication code between firmware receiving unit and firmware Dispatching Unit, C (KMM, L) represent message authentication code is carried out to L Treatment, UIDIt is the ID, KS of element of upgradingMIt is the session key between firmware Dispatching Unit and firmware receiving unit, TS8It is the time Stamp, PUFDMIt is firmware Dispatching Unit public key.
Additionally, the firmware receiving unit in the present embodiment includes workshop receiving unit, 4S shops receiving unit and car Carry receiving unit.Workshop receiving unit, is configured to carry out firmware upgrade to the vehicle in workshop;4S shops receive single Unit, is configured to carry out firmware upgrade to carrying out shop vehicle;Vehicle-mounted receiving unit, the vehicle for being configured to load it carries out firmware liter Level.
The data safe transmission method for firmware upgrade in the present embodiment, other each units are based on by authentication center Identity code, public key, generate the authentication public key information of corresponding unit, and be sent to corresponding unit;Distributed by firmware Unit generates selected firmware upgrade information as transmission data file, the authentication public key information based on firmware receiving unit Data file encryption, and send to corresponding firmware receiving unit;Firmware Dispatching Unit is received by firmware receiving unit to send Data file encryption and decrypt, obtain firmware upgrade information.So as to fully ensure that the safety of data in firmware upgrade process Transmission.
So far, combined preferred embodiment shown in the drawings describes technical scheme, but, this area Technical staff is it is easily understood that protection scope of the present invention is expressly not limited to these specific embodiments.Without departing from this On the premise of the principle of invention, those skilled in the art can make equivalent change or replacement to correlation technique feature, these Technical scheme after changing or replacing it is fallen within protection scope of the present invention.

Claims (10)

1. a kind of data safe transmission system for firmware upgrade, it is characterised in that the system includes authentication center, firmware Dispatching Unit, firmware receiving unit;
The authentication center, is configured to identity code, the public key of each unit, generates the authentication public key letter of corresponding unit Breath, and it is sent to corresponding unit;
The firmware Dispatching Unit, is configured to, using selected firmware upgrade information as transmission data file, be connect based on firmware The authentication public key information generation data file encryption of unit is received, and is sent to corresponding firmware receiving unit;
The firmware receiving unit, is configured to receive the data file encryption of firmware Dispatching Unit transmission and decrypt, and obtains firmware Upgrade information.
2. Transmission system according to claim 1, it is characterised in that the system also includes firmware feeding unit, the unit It is configured to new firmware upgrade information as transmission data file, the authentication public key information generation based on firmware Dispatching Unit adds Ciphertext data file, and send to firmware Dispatching Unit;
The firmware Dispatching Unit, is additionally configured to receive the data file encryption of firmware feeding unit transmission and decrypt, and obtains solid Part upgrade information.
3. Transmission system according to claim 2, it is characterised in that the system also includes firmware memory cell, the list Unit is configured to store the firmware upgrade information that firmware Dispatching Unit sends, and sends the firmware upgrade that firmware Dispatching Unit is transferred Information;The firmware upgrade information encryption of firmware memory cell, decryption collocation method are consistent with firmware Dispatching Unit.
4. Transmission system according to claim 3, it is characterised in that the firmware receiving unit includes that workshop is received Unit, 4S shops receiving unit and vehicle-mounted receiving unit;
The workshop receiving unit, is configured to carry out firmware upgrade to the vehicle in workshop;
4S shops receiving unit, is configured to carry out firmware upgrade to carrying out shop vehicle;
The vehicle-mounted receiving unit, the vehicle for being configured to load it carries out firmware upgrade.
5. the Transmission system according to any one of Claims 1 to 4, it is characterised in that the firmware Dispatching Unit is also matched somebody with somebody The public key of the authentication public key acquisition of information corresponding unit based on other each units is set to, and it is each with other to generate firmware Dispatching Unit Session key and message authentication code between unit, by being sent to corresponding unit after the public key encryption of receiving unit;
The encrypted transmission of the firmware upgrade information in the system between each unit includes:
Sender is based on its own session key between recipient and encrypts transmission to firmware upgrade information, while based on it certainly Message authentication code between body and sender obtains the authentication code information of firmware upgrade information, and by the authentication code information by connecing Sent after the public key encryption of debit;
Recipient is decrypted the corresponding authentication code information of acquisition based on the private key pair encryption data file of its own, and to certification Code information is authenticated, and certification is solved based on its own session key between sender after passing through to data file encryption Close acquisition firmware upgrade information.
6. a kind of data safe transmission method for firmware upgrade, it is characterised in that based on any one of Claims 1 to 5 institute The data safe transmission system for firmware upgrade stated, methods described includes:
Identity code, the public key of other each units are based on by authentication center, the authentication public key information of corresponding unit is generated, and It is sent to corresponding unit;
By firmware Dispatching Unit using selected firmware upgrade information as transmission data file, based on firmware receiving unit Authentication public key information generates data file encryption, and sends to corresponding firmware receiving unit;
The data file encryption of firmware Dispatching Unit transmission is received by firmware receiving unit and is decrypted, obtain firmware upgrade letter Breath.
7. transmission method according to claim 6, it is characterised in that methods described also includes:
By firmware feeding unit using new firmware upgrade information as transmission data file, the public key based on firmware Dispatching Unit Checking information generates data file encryption, and sends to firmware Dispatching Unit;
The data file encryption of firmware feeding unit transmission is received by firmware Dispatching Unit and is decrypted, obtain firmware upgrade letter Breath.
8. transmission method according to claim 7, it is characterised in that methods described also includes:
The firmware upgrade information that firmware Dispatching Unit sends is stored by firmware memory cell, and sends firmware Dispatching Unit and adjusted The firmware upgrade information for taking;The firmware upgrade information encryption of firmware memory cell, decryption collocation method and firmware Dispatching Unit one Cause.
9. the transmission method according to any one of claim 6~8, it is characterised in that methods described also includes:
The public key of other each units of the authentication public key acquisition of information of other each units is based on by firmware Dispatching Unit, and is generated solid Session key and message authentication code between part Dispatching Unit and other each units, by being sent after the public key encryption of receiving unit To corresponding unit;
The encrypted transmission of the firmware upgrade information between each unit includes:
Sender is based on its own session key between recipient and encrypts transmission to firmware upgrade information, while based on it certainly Message authentication code between body and sender obtains the authentication code information of firmware upgrade information, and by the authentication code information by connecing Sent after the public key encryption of debit;
Recipient is decrypted the corresponding authentication code information of acquisition based on the private key pair encryption data file of its own, and to certification Code information is authenticated, and certification is solved based on its own session key between sender after passing through to data file encryption Close acquisition firmware upgrade information.
10. transmission method according to claim 9, it is characterised in that firmware feeding unit is in the following manner by firmware liter Level information is sent to firmware Dispatching Unit:
X1=E [PRVFM,C(KMVFM,F)||IDV||IDECU||IDU||TS1]
E[KSVFM,F||E(PUFDM,X1)]
Wherein, E represents encryption, PRVFMIt is firmware feeding unit private key, KMVFMFor firmware feeding unit and firmware Dispatching Unit it Between message authentication code, F represents firmware upgrade information, C (KMVFM, F) represent message authentication code treatment, ID are carried out to firmwareVFor Firmware supplier ID, IDECUIt is the ID, ID of impacted element during upgradingUIt is the ID of element to be upgraded, TS1It is timestamp, KSVFMFor Session key between firmware feeding unit and firmware Dispatching Unit, PUFDMIt is firmware Dispatching Unit public key.
CN201710123213.7A 2017-03-03 2017-03-03 Data security transmission system and method for firmware upgrade Active CN106850311B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710123213.7A CN106850311B (en) 2017-03-03 2017-03-03 Data security transmission system and method for firmware upgrade

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710123213.7A CN106850311B (en) 2017-03-03 2017-03-03 Data security transmission system and method for firmware upgrade

Publications (2)

Publication Number Publication Date
CN106850311A true CN106850311A (en) 2017-06-13
CN106850311B CN106850311B (en) 2019-12-13

Family

ID=59137836

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710123213.7A Active CN106850311B (en) 2017-03-03 2017-03-03 Data security transmission system and method for firmware upgrade

Country Status (1)

Country Link
CN (1) CN106850311B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108228230A (en) * 2017-12-28 2018-06-29 努比亚技术有限公司 Upgrade method, terminal and the computer readable storage medium of UFS firmwares
CN108762788A (en) * 2018-05-31 2018-11-06 四川斐讯信息技术有限公司 A kind of embedded device firmware encrypting method and system based on server
CN108874432A (en) * 2018-08-17 2018-11-23 深圳市优驰科技有限公司 Radio firmware upgrade-system
CN109977674A (en) * 2017-12-28 2019-07-05 航天信息股份有限公司 The method for upgrading software and device of embedded device
CN110225063A (en) * 2019-07-02 2019-09-10 广州小鹏汽车科技有限公司 Upgrade method, upgrade-system, server and the car-mounted terminal of automobile mounted system
CN110650478A (en) * 2019-10-12 2020-01-03 捷德(中国)信息科技有限公司 OTA method, system, device, SE module, program server and medium
CN110908695A (en) * 2019-10-18 2020-03-24 中国第一汽车股份有限公司 Vehicle remote upgrading method, device and system
CN113867818A (en) * 2021-09-28 2021-12-31 潍柴动力股份有限公司 Method and device for generating ini file, computer equipment and medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101184301A (en) * 2007-12-14 2008-05-21 中兴通讯股份有限公司 Mobile terminal remote firmware updating method and system
CN101436141A (en) * 2008-11-21 2009-05-20 深圳创维数字技术股份有限公司 Firmware upgrading and encapsulating method and device based on digital signing
CN101470411A (en) * 2007-12-28 2009-07-01 联合汽车电子有限公司 System and method for safely updating ECU data
CN101924607A (en) * 2010-08-27 2010-12-22 华为终端有限公司 Firmware processing method based on firmware air transmission technology, device and system thereof
CN102611720A (en) * 2011-01-21 2012-07-25 基信康信息技术(上海)有限公司 Mobile phone firmware upgrade method
CN104090790A (en) * 2014-06-30 2014-10-08 飞天诚信科技股份有限公司 Two-chip scheme firmware updating method for safety terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101184301A (en) * 2007-12-14 2008-05-21 中兴通讯股份有限公司 Mobile terminal remote firmware updating method and system
CN101470411A (en) * 2007-12-28 2009-07-01 联合汽车电子有限公司 System and method for safely updating ECU data
CN101436141A (en) * 2008-11-21 2009-05-20 深圳创维数字技术股份有限公司 Firmware upgrading and encapsulating method and device based on digital signing
CN101924607A (en) * 2010-08-27 2010-12-22 华为终端有限公司 Firmware processing method based on firmware air transmission technology, device and system thereof
US20130111455A1 (en) * 2010-08-27 2013-05-02 Huawei Device Co., Ltd. Method for processing firmware based on firmware over the air technology, apparatus, and system
CN102611720A (en) * 2011-01-21 2012-07-25 基信康信息技术(上海)有限公司 Mobile phone firmware upgrade method
CN104090790A (en) * 2014-06-30 2014-10-08 飞天诚信科技股份有限公司 Two-chip scheme firmware updating method for safety terminal

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108228230A (en) * 2017-12-28 2018-06-29 努比亚技术有限公司 Upgrade method, terminal and the computer readable storage medium of UFS firmwares
CN109977674A (en) * 2017-12-28 2019-07-05 航天信息股份有限公司 The method for upgrading software and device of embedded device
CN108762788A (en) * 2018-05-31 2018-11-06 四川斐讯信息技术有限公司 A kind of embedded device firmware encrypting method and system based on server
CN108762788B (en) * 2018-05-31 2023-07-28 杭州吉吉知识产权运营有限公司 Method and system for encrypting firmware of embedded equipment based on server
CN108874432B (en) * 2018-08-17 2022-07-12 深圳市优驰科技有限公司 Wireless firmware upgrade system
CN108874432A (en) * 2018-08-17 2018-11-23 深圳市优驰科技有限公司 Radio firmware upgrade-system
CN110225063B (en) * 2019-07-02 2021-09-03 广州小鹏汽车科技有限公司 Upgrading method and system of automobile-mounted system, server and vehicle-mounted terminal
CN110225063A (en) * 2019-07-02 2019-09-10 广州小鹏汽车科技有限公司 Upgrade method, upgrade-system, server and the car-mounted terminal of automobile mounted system
CN110650478A (en) * 2019-10-12 2020-01-03 捷德(中国)信息科技有限公司 OTA method, system, device, SE module, program server and medium
CN110650478B (en) * 2019-10-12 2023-11-28 捷德(江西)技术有限公司 OTA method, system, device, SE module, program server and medium
CN110908695A (en) * 2019-10-18 2020-03-24 中国第一汽车股份有限公司 Vehicle remote upgrading method, device and system
CN113867818A (en) * 2021-09-28 2021-12-31 潍柴动力股份有限公司 Method and device for generating ini file, computer equipment and medium
CN113867818B (en) * 2021-09-28 2024-04-16 潍柴动力股份有限公司 Method, device, computer equipment and medium for generating ini file

Also Published As

Publication number Publication date
CN106850311B (en) 2019-12-13

Similar Documents

Publication Publication Date Title
CN106850311A (en) For the data safe transmission system and method for firmware upgrade
CN101217728B (en) A blank card for wireless card writing, wireless card writing server and wireless card writing method
CN106027260B (en) Automobile ECU integrity verification and encryption communication method based on cipher key pre-distribution
WO2018040643A1 (en) Mobile terminal, server, vehicle and control system thereof
CN106357400B (en) Establish the method and system in channel between TBOX terminal and TSP platform
CN112543927B (en) Equipment upgrading method and related equipment
CN107493273A (en) Identity identifying method, system and computer-readable recording medium
CN107277033B (en) Charging and battery replacing equipment and authentication method and system for object to be charged and battery replaced
CN106648626A (en) Secure remote upgrade system and upgrade method for vehicles
CN107710676B (en) Gateway device and control method thereof
CN109286599A (en) Data security protection method, smart machine, server and readable storage medium storing program for executing
CN108809643A (en) A kind of method, system and the equipment of equipment and high in the clouds arranging key
CN104158819A (en) Safety authentication method of vehicle-mounted information entertainment terminal
CN102413132A (en) Two-way-security-authentication-based data downloading method and system
US8949611B1 (en) Methods, apparatus and computer program products for authenticating and determining integrity of a software part of an air vehicle
CN106331970A (en) Hearing device and method of updating a hearing device
CN101997681A (en) Authentication method and system for multi-node path and relevant node equipment
CN107040379A (en) Method for the controller certification by vehicle
US20210227368A1 (en) Master-Slave System for Communication Over a Bluetooth Low Energy Connection
CN104050431A (en) Self-signing method and self-signing device for RFID chips
CN106506149A (en) Key generation method and system between a kind of TBOX terminals and TSP platforms
CN106953725A (en) For method and system derived from asymmetrical key
CN113411294A (en) Vehicle-mounted secure communication method, system and device based on secure cloud public key protection
CN110912864A (en) Electric equipment, charging equipment and identity authentication method thereof
CN115665138A (en) Automobile OTA (over the air) upgrading system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant