CN106850311A - For the data safe transmission system and method for firmware upgrade - Google Patents
For the data safe transmission system and method for firmware upgrade Download PDFInfo
- Publication number
- CN106850311A CN106850311A CN201710123213.7A CN201710123213A CN106850311A CN 106850311 A CN106850311 A CN 106850311A CN 201710123213 A CN201710123213 A CN 201710123213A CN 106850311 A CN106850311 A CN 106850311A
- Authority
- CN
- China
- Prior art keywords
- firmware
- unit
- information
- public key
- dispatching
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0813—Configuration setting characterised by the conditions triggering a change of settings
- H04L41/082—Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Stored Programmes (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of data safe transmission system and method for firmware upgrade, and the system includes:Authentication center, firmware Dispatching Unit, firmware receiving unit;Authentication center is configured to the identity code of each unit, public key, generates the authentication public key information of corresponding unit, and is sent to corresponding unit;Firmware Dispatching Unit is configured to selected firmware upgrade information as transmission data file, the authentication public key information generation data file encryption based on firmware receiving unit, and is sent to corresponding firmware receiving unit;Firmware receiving unit, is configured to receive the data file encryption of firmware Dispatching Unit transmission and decrypt, and obtains firmware upgrade information.So as to fully ensure that the safe transmission of data in firmware upgrade process.
Description
Technical field
It is the present invention relates to firmware upgrade technical field and more particularly it relates to a kind of for firmware upgrade
Data safe transmission system and method.
Background technology
Nowadays many ECU (Electronic Control Unit, Electronic Control list are all typically contained in automobile
Unit).When these ECU break down or function needs to improve, it is necessary to these ECU are carried out with firmware upgrade, and now can be with
Completing remote firmware updating, i.e. vehicle using FOTA (Firmware Over The Air, aerial firmware upgrade) need not reach 4S
Shop is upgraded, and remote firmware updating can be very easily carried out by FOTA.Although however, aerial firmware upgrade can be very
It is readily achieved the firmware upgrade of ECU, but the opening being wirelessly transferred used due to it, also it is easily caused firmware upgrade not
Security.Security it is therefore desirable to improve data transfer in aerial firmware upgrade.
The content of the invention
In order to solve above mentioned problem of the prior art, i.e., in order to improve the safety of data transfer in aerial firmware upgrade
Property.The present invention proposes a kind of data safe transmission system for firmware upgrade, and the system includes:Authentication center, firmware point
Bill unit, firmware receiving unit.
Authentication center, is configured to identity code, the public key of each unit, generates the authentication public key letter of corresponding unit
Breath, and it is sent to corresponding unit;Firmware Dispatching Unit, is configured to selected firmware upgrade information as transmission data text
Part, the authentication public key information generation data file encryption based on firmware receiving unit, and send to corresponding firmware receiving unit;
Firmware receiving unit, is configured to receive the data file encryption of firmware Dispatching Unit transmission and decrypt, and obtains firmware upgrade information.
Preferably, the system also includes firmware feeding unit, and the unit is configured to new firmware upgrade information as biography
Data file is sent, the authentication public key information generation data file encryption based on firmware Dispatching Unit, and send single to firmware distribution
Unit;Firmware Dispatching Unit, is additionally configured to receive the data file encryption of firmware feeding unit transmission and decrypt, and obtains firmware upgrade
Information.
Preferably, system also includes firmware memory cell, and the unit is configured to store the firmware that firmware Dispatching Unit sends
Upgrade information, and send the firmware upgrade information that firmware Dispatching Unit is transferred;The firmware upgrade information of firmware memory cell adds
Close, decryption collocation method is consistent with firmware Dispatching Unit.
Preferably, firmware receiving unit includes workshop receiving unit, 4S shops receiving unit and vehicle-mounted receiving unit;
Workshop receiving unit, is configured to carry out firmware upgrade to the vehicle in workshop;4S shops receiving unit, is configured to coming
Shop vehicle carries out firmware upgrade;Vehicle-mounted receiving unit, the vehicle for being configured to load it carries out firmware upgrade.
Preferably, firmware Dispatching Unit is additionally configured to the authentication public key acquisition of information corresponding unit based on other each units
Public key, and session key and message authentication code between firmware Dispatching Unit and other each units are generated, by receiving unit
Corresponding unit is sent to after public key encryption;The encrypted transmission of the firmware upgrade information in system between each unit includes:
Sender is based on its own session key between recipient and encrypts transmission to firmware upgrade information, while being based on
Its own message authentication code between sender obtains the authentication code information of firmware upgrade information, and the authentication code information is led to
Sent after crossing the public key encryption of recipient;Recipient is decrypted acquisition correspondence based on the private key pair encryption data file of its own
Authentication code information, and authentication code information is authenticated, certification is close based on its own session between sender after passing through
Key is decrypted acquisition firmware upgrade information to data file encryption.
Correspondingly, to solve above mentioned problem of the prior art, the invention allows for a kind of number for firmware upgrade
According to safe transmission method, the method is based on the above-mentioned data safe transmission system for firmware upgrade, and the method includes:
Identity code, the public key of other each units are based on by authentication center, the authentication public key letter of corresponding unit is generated
Breath, and it is sent to corresponding unit;By firmware Dispatching Unit using selected firmware upgrade information as transmission data file,
Authentication public key information generation data file encryption based on firmware receiving unit, and send to corresponding firmware receiving unit;It is logical
Cross firmware receiving unit to receive the data file encryption of firmware Dispatching Unit transmission and decrypt, obtain firmware upgrade information.
Preferably, the method also includes:It is by firmware feeding unit that new firmware upgrade information is literary as transmission data
Part, the public key verifications information generation data file encryption based on firmware Dispatching Unit, and send to firmware Dispatching Unit;By solid
Part Dispatching Unit receives the data file encryption of firmware feeding unit transmission and decrypts, and obtains firmware upgrade information.
Preferably, the method also includes:The firmware upgrade letter that firmware Dispatching Unit sends is stored by firmware memory cell
Breath, and send the firmware upgrade information that firmware Dispatching Unit is transferred;The firmware upgrade information encryption of firmware memory cell, decryption
Collocation method is consistent with firmware Dispatching Unit.
Preferably, the method also includes:The authentication public key acquisition of information of other each units is based on by firmware Dispatching Unit
The public key of other each units, and session key and message authentication code between firmware Dispatching Unit and other each units are generated, lead to
Corresponding unit is sent to after the public key encryption for crossing receiving unit;The encrypted transmission of the firmware upgrade information between each unit includes:
Sender is based on its own session key between recipient and encrypts transmission to firmware upgrade information, while being based on
Its own message authentication code between sender obtains the authentication code information of firmware upgrade information, and the authentication code information is led to
Sent after crossing the public key encryption of recipient;Recipient is decrypted acquisition correspondence based on the private key pair encryption data file of its own
Authentication code information, and authentication code information is authenticated, certification is close based on its own session between sender after passing through
Key is decrypted acquisition firmware upgrade information to data file encryption.
Preferably, firmware upgrade information is sent to firmware Dispatching Unit by firmware feeding unit in the following manner:
X1=E [PRVFM,C(KMVFM,F)||IDV||IDECU||IDU||TS1]
E[KSVFM,F||E(PUFDM,X1)]
Wherein, E represents encryption, PRVFMIt is firmware feeding unit private key, KMVFMIt is that firmware feeding unit and firmware distribution are single
Message authentication code between unit, F represents firmware upgrade information, C (KMVFM, F) represent message authentication code treatment is carried out to firmware,
IDVIt is firmware supplier ID, IDECUIt is the ID, ID of impacted element during upgradingUIt is the ID of element to be upgraded, TS1It is timestamp,
KSVFMIt is the session key between firmware feeding unit and firmware Dispatching Unit, PUFDMIt is firmware Dispatching Unit public key.
Preferably, firmware upgrade information is sent to firmware memory cell by firmware Dispatching Unit in the following manner:
X2=E [PRFDM,C(KMFS,F)||Info||IDU||TS2];
E[KSFS,F||E(PUFS,X2)]
Wherein, PRFDMIt is firmware Dispatching Unit private key, KMFSIt is the information between firmware Dispatching Unit and firmware memory cell
Authentication code, Info represents additional information, and the accessory information includes upgraded version, the ID of element to be upgraded, supplier ID, supply
Business's name and upgrading type, TS2It is timestamp, KSFSIt is the session key between firmware Dispatching Unit and firmware memory cell,
PUFSIt is firmware memory cell public key.
Preferably, firmware upgrade information is sent to firmware receiving unit by firmware Dispatching Unit in the following manner:
X3=E [PRFDM,C(KMM,F)||IDECU||IDU||TS3]
E[KSVFM,F||E(PUM,X3)]
Wherein, KMMIt is the message authentication code between firmware Dispatching Unit and firmware receiving unit, TS3It is timestamp, PUMFor
Firmware receiving unit public key.
Preferably, firmware upgrade information is sent to firmware Dispatching Unit by firmware memory cell in the following manner:
X4=E [PRFS,C(KMFS,F)||IDECU||IDU||TS4]
E[KSFS,F||E(PUFDM,X4)]
Wherein, PRFSIt is firmware memory cell private key, KMFSIt is the information between firmware Dispatching Unit and firmware memory cell
Authentication code, TS6It is timestamp, KSFSIt is the session key between firmware Dispatching Unit and firmware memory cell, PUFDMIt is firmware point
Bill unit public key.
Preferably, the method also includes:When finding that firmware is leaky or needs to be repaired by firmware Dispatching Unit, will
The reparation AKU of firmware is sent to firmware feeding unit.
Preferably, the reparation AKU of firmware is sent to firmware by firmware Dispatching Unit by way of formula (1) or formula (2)
Feeding unit:
X5=E [PUVFM,B||E(PRFDM,H(B)||IDV||IDECU||TS5] (1)
X6=E [PUVFM,I||E(PRFDM,H(I)||IDV||IDECU||TS6] (2)
Wherein, PUVFMIt is firmware feeding unit public key, PRFDMIt is firmware Dispatching Unit private key, IDVIt is supplier ID, IDECU
It is the ID, T of element that is leaky or needing reparationS5And TS6It is timestamp, B represents the details of leak, and I represents what is repaired
Details, H (B) represents the hashed value of B, and H (I) represents the hashed value of I.
Preferably, the method also includes:Firmware receiving unit sends the information that upgrades successfully and complete after the completion of firmware upgrade
Into upgrading vehicle VIN yards of list to firmware Dispatching Unit.
Preferably, firmware receiving unit will upgrade successfully information and be sent to firmware Dispatching Unit in the following manner:
X7=E [PRM||IDECU||IDU||VIN||TS7]
E(PUFDM,X7)
Wherein, E represents encryption, PRMIt is firmware receiving unit private key, IDECUIt is the ID, ID of impacted element during upgradingUIt is
The ID of the element of upgrading, VIN are VIN yards of the vehicle for completing firmware upgrade, TS7It is timestamp, PUFDMFor firmware Dispatching Unit is public
Key.
Preferably, the VIN lists for completing the vehicle of firmware upgrade are sent to firmware by firmware receiving unit in the following manner
Dispatching Unit:
X8=E [PRM,C(KMM,L)||UID||TS8]
E[KSM,L||E(PUFDM,X8)]
Wherein, E represents encryption, and L is the VIN lists of the vehicle for completing firmware upgrade, PRMIt is firmware receiving unit private key,
KMMIt is the message authentication code between firmware receiving unit and firmware Dispatching Unit, C (KMM, L) represent message authentication code is carried out to L
Treatment, UIDIt is the ID, KS of element of upgradingMIt is the session key between firmware Dispatching Unit and firmware receiving unit, TS8It is the time
Stamp, PUFDMIt is firmware Dispatching Unit public key.
Preferably, the authentication public key information of each unit is as follows:
E[PRCA,(PUX||IDX||T1||T2)];
Wherein PRCAIt is authentication center's private key, PUXIt is the public key of corresponding unit, IDXIt is the identity code of corresponding unit, T1
It is timestamp, T2It is authentication public key validity information.
Data safe transmission system and method for firmware upgrade proposed by the present invention, other are based on by authentication center
The identity code of each unit, public key, generate the authentication public key information of corresponding unit, and are sent to corresponding unit;By solid
Part Dispatching Unit believes selected firmware upgrade information as transmission data file, the authentication public key based on firmware receiving unit
Breath generation data file encryption, and send to corresponding firmware receiving unit;Firmware is received by firmware receiving unit and distributes list
The data file encryption of unit's transmission is simultaneously decrypted, and obtains firmware upgrade information.So as to fully ensure that data in firmware upgrade process
Safe transmission.
Scheme 1, a kind of data safe transmission system for firmware upgrade, it is characterised in that the system include authentication center,
Firmware Dispatching Unit, firmware receiving unit;
The authentication center, is configured to identity code, the public key of each unit, generates the authentication public key letter of corresponding unit
Breath, and it is sent to corresponding unit;
The firmware Dispatching Unit, is configured to, using selected firmware upgrade information as transmission data file, be connect based on firmware
The authentication public key information generation data file encryption of unit is received, and is sent to corresponding firmware receiving unit;
The firmware receiving unit, is configured to receive the data file encryption of firmware Dispatching Unit transmission and decrypt, and obtains firmware
Upgrade information.
Scheme 2, the Transmission system according to scheme 1, it is characterised in that the system also includes firmware feeding unit, the unit
It is configured to new firmware upgrade information as transmission data file, the authentication public key information generation based on firmware Dispatching Unit adds
Ciphertext data file, and send to firmware Dispatching Unit;
The firmware Dispatching Unit, is additionally configured to receive the data file encryption of firmware feeding unit transmission and decrypt, and obtains solid
Part upgrade information.
Scheme 3, the Transmission system according to scheme 2, it is characterised in that the system also includes firmware memory cell, the list
Unit is configured to store the firmware upgrade information that firmware Dispatching Unit sends, and sends the firmware upgrade that firmware Dispatching Unit is transferred
Information;The firmware upgrade information encryption of firmware memory cell, decryption collocation method are consistent with firmware Dispatching Unit.
Scheme 4, the Transmission system according to scheme 3, it is characterised in that the firmware receiving unit is received including workshop
Unit, 4S shops receiving unit and vehicle-mounted receiving unit;
The workshop receiving unit, is configured to carry out firmware upgrade to the vehicle in workshop;
4S shops receiving unit, is configured to carry out firmware upgrade to carrying out shop vehicle;
The vehicle-mounted receiving unit, the vehicle for being configured to load it carries out firmware upgrade.
Scheme 5, the Transmission system according to any one of scheme 1~4, it is characterised in that the firmware Dispatching Unit is also matched somebody with somebody
The public key of the authentication public key acquisition of information corresponding unit based on other each units is set to, and it is each with other to generate firmware Dispatching Unit
Session key and message authentication code between unit, by being sent to corresponding unit after the public key encryption of receiving unit;
The encrypted transmission of the firmware upgrade information in the system between each unit includes:
Sender is based on its own session key between recipient and encrypts transmission to firmware upgrade information, while based on it certainly
Message authentication code between body and sender obtains the authentication code information of firmware upgrade information, and by the authentication code information by connecing
Sent after the public key encryption of debit;
Recipient is decrypted the corresponding authentication code information of acquisition based on the private key pair encryption data file of its own, and to certification
Code information is authenticated, and certification is solved based on its own session key between sender after passing through to data file encryption
Close acquisition firmware upgrade information.
Scheme 6, a kind of data safe transmission method for firmware upgrade, it is characterised in that based on any one institute of scheme 1~5
The data safe transmission system for firmware upgrade stated, methods described includes:
Identity code, the public key of other each units are based on by authentication center, the authentication public key information of corresponding unit is generated, and
It is sent to corresponding unit;
By firmware Dispatching Unit using selected firmware upgrade information as transmission data file, based on firmware receiving unit
Authentication public key information generates data file encryption, and sends to corresponding firmware receiving unit;
The data file encryption of firmware Dispatching Unit transmission is received by firmware receiving unit and is decrypted, obtain firmware upgrade letter
Breath.
Scheme 7, the transmission method according to scheme 6, it is characterised in that methods described also includes:
By firmware feeding unit using new firmware upgrade information as transmission data file, the public key based on firmware Dispatching Unit
Checking information generates data file encryption, and sends to firmware Dispatching Unit;
The data file encryption of firmware feeding unit transmission is received by firmware Dispatching Unit and is decrypted, obtain firmware upgrade letter
Breath.
Scheme 8, the transmission method according to scheme 7, it is characterised in that methods described also includes:
The firmware upgrade information that firmware Dispatching Unit sends is stored by firmware memory cell, and sends firmware Dispatching Unit and adjusted
The firmware upgrade information for taking;The firmware upgrade information encryption of firmware memory cell, decryption collocation method and firmware Dispatching Unit one
Cause.
Scheme 9, the transmission method according to any one of scheme 6~8, it is characterised in that methods described also includes:
The public key of other each units of the authentication public key acquisition of information of other each units is based on by firmware Dispatching Unit, and is generated solid
Session key and message authentication code between part Dispatching Unit and other each units, by being sent after the public key encryption of receiving unit
To corresponding unit;
The encrypted transmission of the firmware upgrade information between each unit includes:
Sender is based on its own session key between recipient and encrypts transmission to firmware upgrade information, while based on it certainly
Message authentication code between body and sender obtains the authentication code information of firmware upgrade information, and by the authentication code information by connecing
Sent after the public key encryption of debit;
Recipient is decrypted the corresponding authentication code information of acquisition based on the private key pair encryption data file of its own, and to certification
Code information is authenticated, and certification is solved based on its own session key between sender after passing through to data file encryption
Close acquisition firmware upgrade information.
Scheme 10, the transmission method according to scheme 9, it is characterised in that firmware feeding unit is in the following manner by firmware liter
Level information is sent to firmware Dispatching Unit:
X1=E [PRVFM,C(KMVFM,F)||IDV||IDECU||IDU||TS1]
E[KSVFM,F||E(PUFDM,X1)]
Wherein, E represents encryption, PRVFMIt is firmware feeding unit private key, KMVFMFor firmware feeding unit and firmware Dispatching Unit it
Between message authentication code, F represents firmware upgrade information, C (KMVFM, F) represent message authentication code treatment, ID are carried out to firmwareVFor
Firmware supplier ID, IDECUIt is the ID, ID of impacted element during upgradingUIt is the ID of element to be upgraded, TS1It is timestamp, KSVFMFor
Session key between firmware feeding unit and firmware Dispatching Unit, PUFDMIt is firmware Dispatching Unit public key.
Scheme 11, the transmission method according to scheme 10, it is characterised in that firmware Dispatching Unit is in the following manner by firmware liter
Level information is sent to firmware memory cell:
X2=E [PRFDM,C(KMFS,F)||Info||IDU||TS2];
E[KSFS,F||E(PUFS,X2)]
Wherein, PRFDMIt is firmware Dispatching Unit private key, KMFSFor the information between firmware Dispatching Unit and firmware memory cell is recognized
Card code, Info represents additional information, and the accessory information includes upgraded version, the ID of element to be upgraded, supplier ID, supplier
Name and upgrading type, TS2It is timestamp, KSFSIt is the session key between firmware Dispatching Unit and firmware memory cell,
PUFSIt is firmware memory cell public key.
Scheme 12, the transmission method according to scheme 11, it is characterised in that firmware Dispatching Unit is in the following manner by firmware liter
Level information is sent to firmware receiving unit:
X3=E [PRFDM,C(KMM,F)||IDECU||IDU||TS3]
E[KSVFM,F||E(PUM,X3)]
Wherein, KMMIt is the message authentication code between firmware Dispatching Unit and firmware receiving unit, TS3It is timestamp, PUMIt is firmware
Receiving unit public key.
Scheme 13, the transmission method according to scheme 12, it is characterised in that firmware memory cell is in the following manner by firmware liter
Level information is sent to firmware Dispatching Unit:
X4=E [PRFS,C(KMFS,F)||IDECU||IDU||TS4]
E[KSFS,F||E(PUFDM,X4)]
Wherein, PRFSIt is firmware memory cell private key, KMFSIt is the authentification of message between firmware Dispatching Unit and firmware memory cell
Code, TS6It is timestamp, KSFSIt is the session key between firmware Dispatching Unit and firmware memory cell, PUFDMFor firmware distributes list
First public key.
Scheme 14, the transmission method according to scheme 9, it is characterised in that methods described also includes:By firmware Dispatching Unit
It was found that firmware is leaky or needs are when being repaired, the reparation AKU of firmware is sent to firmware feeding unit.
Scheme 15, the transmission method according to scheme 14, it is characterised in that firmware Dispatching Unit is by formula (1) or formula (2)
The reparation AKU of firmware is sent to firmware feeding unit by mode:
X5=E [PUVFM,B||E(PRFDM,H(B)||IDV||IDECU||TS5](1)
X6=E [PUVFM,I||E(PRFDM,H(I)||IDV||IDECU||TS6](2)
Wherein, PUVFMIt is firmware feeding unit public key, PRFDMIt is firmware Dispatching Unit private key, IDVIt is supplier ID, IDECUTo have
The ID, T of the element that leak or needs are repairedS5And TS6It is timestamp, B represents the details of leak, and I represents the detailed of reparation
Information, H (B) represents the hashed value of B, and H (I) represents the hashed value of I.
Scheme 16, the transmission method according to scheme 9, it is characterised in that methods described also includes:Firmware receiving unit is solid
The information that upgrades successfully is sent after the completion of part upgrading and complete VIN yards of list of the vehicle of upgrading to firmware Dispatching Unit.
Scheme 17, the transmission method according to scheme 16, it is characterised in that firmware receiving unit will be escalated into the following manner
Work(information is sent to firmware Dispatching Unit:
X7=E [PRM||IDECU||IDU||VIN||TS7]
E(PUFDM,X7)
Wherein, E represents encryption, PRMIt is firmware receiving unit private key, IDECUIt is the ID, ID of impacted element during upgradingUIt is upgrading
Element ID, VIN is complete firmware upgrade VIN yards of vehicle, TS7It is timestamp, PUFDMIt is firmware Dispatching Unit public key.
Scheme 18, the transmission method according to scheme 16, it is characterised in that firmware receiving unit will complete solid in the following manner
The VIN lists of the vehicle of part upgrading are sent to firmware Dispatching Unit:
X8=E [PRM,C(KMM,L)||UID||TS8]
E[KSM,L||E(PUFDM,X8)]
Wherein, E represents encryption, and L is the VIN lists of the vehicle for completing firmware upgrade, PRMIt is firmware receiving unit private key, KMMFor
Message authentication code between firmware receiving unit and firmware Dispatching Unit, C (KMM, L) represent message authentication code treatment is carried out to L,
UIDIt is the ID, KS of element of upgradingMIt is the session key between firmware Dispatching Unit and firmware receiving unit, TS8It is timestamp,
PUFDMIt is firmware Dispatching Unit public key.
Scheme 19, the transmission method according to scheme 6, it is characterised in that the authentication public key information of each unit is as follows:E
[PRCA,(PUX||IDX||T1||T2)];
Wherein PRCAIt is authentication center's private key, PUXIt is the public key of corresponding unit, IDXIt is the identity code of corresponding unit, T1It is
Timestamp, T2It is authentication public key validity information.
Brief description of the drawings
Fig. 1 is the structural representation of the data safe transmission system for firmware upgrade in first embodiment of the invention;
Fig. 2 is the schematic flow sheet of the data safe transmission method for firmware upgrade in second embodiment of the invention.
Specific embodiment
The preferred embodiment of the present invention described with reference to the accompanying drawings.It will be apparent to a skilled person that this
A little implementation methods are used only for explaining know-why of the invention, it is not intended that limit the scope of the invention.
First embodiment
Fig. 1 is referred to, Fig. 1 shows the Security Data Transmission system for firmware upgrade in the first embodiment of the present invention
The structural representation of system, concrete structure includes:
Authentication center 101, is configured to identity code, the public key of each unit, generates the authentication public key of corresponding unit
Information, and by being sent to corresponding unit after the public key encryption of corresponding unit.By after the certification of authentication center 101, each list
Just safe data transfer can be carried out based on authentication public key information between unit.Specifically, in the present embodiment, each unit will be respective
Identity code and public key by being sent to authentication center 101, authentication center 101 after the public key encryption of authentication center 101
Generate following authentication public key information:
E[PRCA,(PUX||IDX||T1||T2)];
Wherein PRCAIt is the private key of authentication center 101, PUXIt is the public key of corresponding unit, IDXIt is the identification of corresponding unit
Code, T1It is timestamp, T2It is authentication public key validity information.Authentication public key information is sent by the public key encryption of corresponding unit can
To ensure that only specific unit can just obtain corresponding authentication public key information.
Firmware Dispatching Unit 102, is configured to using selected firmware upgrade information as transmission data file, based on firmware
The authentication public key information generation data file encryption of receiving unit, and send to corresponding firmware receiving unit.Additionally, firmware point
Bill unit 102 is additionally configured to obtain new firmware upgrade information from firmware feeding unit 104.And firmware Dispatching Unit 102
When finding that firmware has leak or needs to be repaired, actively firmware supply can will be sent to after firmware upgrade reparation packet encryption
Unit 104, firmware feeding unit 104 is after it can prepare new firmware upgrade information and encrypt after receiving firmware upgrade reparation bag
Send to firmware Dispatching Unit 102.Need to be come into contacts with multiple firmware suppliers in reality, only with a firmware in Fig. 1
Feeding unit is making to illustrate.
Additionally, for the encryption in firmware transmitting procedure, firmware Dispatching Unit 102 is additionally configured to based on other each units
The public key of authentication public key acquisition of information corresponding unit, and the session generated between firmware Dispatching Unit 102 and other each units is close
Key and message authentication code, by being sent to corresponding unit after the public key encryption of receiving unit.
Firmware receiving unit 103, is configured to receive the data file encryption of firmware Dispatching Unit transmission and decrypt, and obtains solid
Part upgrade information.And after firmware completes upgrading, firmware receiving unit 103 can send the information of upgrading successfully and complete to upgrade
VIN yards of list of vehicle is to firmware Dispatching Unit 102.Specifically, in the present embodiment, firmware receiving unit 103 includes production
Workshop receiving unit 1032,4S shops receiving unit 1031 and vehicle-mounted receiving unit 1033;Workshop receiving unit 1032, matches somebody with somebody
Be set to carries out firmware upgrade to the vehicle in workshop;4S shops receiving unit 1031, is configured to carry out firmware to carrying out shop vehicle
Upgrading;Vehicle-mounted receiving unit 1033, the vehicle for being configured to load it carries out firmware upgrade.
Additionally, the storage in order to complete firmware, also including firmware memory cell 105, the unit is configured to storage to the system
Firmware Dispatching Unit 102 send firmware upgrade information, and receive firmware Dispatching Unit 102 transfer instruction after, foundation
Instruction is transferred to send to firmware Dispatching Unit 102 firmware.The firmware upgrade information encryption of firmware memory cell 105, decryption are matched somebody with somebody
Put method consistent with firmware Dispatching Unit 102.
The encrypted transmission of the firmware upgrade information in said system between each unit includes:Sender is based on its own and connects
Session key between debit is encrypted to firmware upgrade information and sent, while the authentification of message based on its own between sender
Code obtains the authentication code information of firmware upgrade information, and by the authentication code information by being sent after the public key encryption of recipient;Connect
Debit is decrypted the corresponding authentication code information of acquisition based on the private key pair encryption data file of its own, and to authentication code information
It is authenticated, certification is decrypted acquisition based on its own session key between sender after passing through to data file encryption
Firmware upgrade information.
The data safe transmission system for firmware upgrade in the present embodiment, is configured to respectively by by authentication center
The identity code of unit, public key, generate the authentication public key information of corresponding unit, and are sent to corresponding unit;Firmware is distributed
Unit is configured to selected firmware upgrade information as transmission data file, the authentication public key letter based on firmware receiving unit
Breath generation data file encryption, and send to corresponding firmware receiving unit;Firmware receiving unit is configured to receive firmware distribution
The data file encryption of unit transmission is simultaneously decrypted, and obtains firmware upgrade information.So as to fully ensure that number in firmware upgrade process
According to safe transmission.
Second embodiment
Fig. 2 is referred to, Fig. 2 shows the Security Data Transmission system for firmware upgrade in the second embodiment of the present invention
The schematic flow sheet of system, comprises the following steps that:
S201, identity code, the public key of other each units are based on by authentication center, and the public key for generating corresponding unit is recognized
Card information, and it is sent to corresponding unit.
Specifically, in the present embodiment, the process of authentication center's generation each unit authentication public key information is as follows:
Authentication center is by the public key PU of itselfCAEach unit is sent to, each unit is receiving PUCAAfterwards by the public key of itself
PUXAnd identity code IDXBy PUCAAuthentication center is sent to after encryption, authentication center passes through the private key PR of itselfCATo letter
PU is obtained after breath decryptionXAnd IDXAfter generate following authentication public key information:
E[PRCA,(PUX||IDX||T1||T2)];
Wherein PUXIt is the public key of corresponding unit, IDXIt is the identity code of corresponding unit, T1It is timestamp, T2It is public key
The authentication information term of validity.Timestamp can prevent from resetting and relay attack.The public affairs that above-mentioned authentication public key information passes through corresponding unit
Corresponding unit is sent to after key encryption, so as to ensure that only specific unit can just obtain correspondence authentication public key information.
After the authentication public key information that each unit obtains itself, firmware Dispatching Unit is by by the authentication public key information of itself
The public key for obtaining other each units is swapped with other units, and generates the meeting between firmware Dispatching Unit and other each units
Words key and message authentication code, by being sent to corresponding unit after the public key encryption of receiving unit.Session key is mainly used in
Firmware is encrypted in firmware transmitting procedure, because firmware is generally big file, therefore by way of this symmetric cryptography,
Decryption speed can be accelerated in decryption.And message authentication code is then used to judge transmission sources and data in firmware transmitting procedure
Integrality.
Specifically, the data transfer of each unit is based in the following manner in the present embodiment:
Sender is based on its own session key between recipient and encrypts transmission to firmware upgrade information, while being based on
Its own message authentication code between sender obtains the authentication code information of firmware upgrade information, and the authentication code information is led to
Sent after crossing the public key encryption of recipient;Recipient is decrypted acquisition correspondence based on the private key pair encryption data file of its own
Authentication code information, and authentication code information is authenticated, certification is close based on its own session between sender after passing through
Key is decrypted acquisition firmware upgrade information to data file encryption.
S202, data file encryption is generated by the authentication public key information that firmware upgrade information is based on firmware receiving unit, and
Send to corresponding firmware receiving unit.
Firmware upgrade information is the volume of data for firmware upgrade, and the firmware upgrade information is sent out by firmware feeding unit
Firmware Dispatching Unit is delivered to, and is sent to corresponding firmware according to the particular content of the firmware upgrade information by firmware Dispatching Unit
Receiving unit.Additionally, in addition to firmware feeding unit actively sends new firmware to firmware Dispatching Unit, firmware Dispatching Unit exists
It was found that when firmware has leak or needs upgrading, the upgrading reparation bag of firmware can be sent to firmware feeding unit.
Firmware Dispatching Unit in addition to firmware is sent to corresponding firmware receiving unit, is gone back when new firmware is got
Firmware can be sent to firmware memory cell and be stored, and correspondence is transferred admittedly from firmware memory cell when firmware is needed
Part.
Specifically, firmware upgrade information is sent to firmware Dispatching Unit by firmware feeding unit in the following manner:
X1=E [PRVFM,C(KMVFM,F)||IDV||IDECU||IDU||TS1]
E[KSVFM,F||E(PUFDM,X1)]
Wherein, PRVFMIt is firmware feeding unit private key, KMVFMIt is the letter between firmware feeding unit and firmware Dispatching Unit
Breath authentication code, F represents firmware upgrade information, C (KMVFM, F) represent message authentication code treatment, ID are carried out to firmwareVFor firmware is supplied
Answer business ID, IDECUIt is the ID, ID of impacted element during upgradingUIt is the ID of element to be upgraded, TS1It is timestamp, KSVFMFor firmware is supplied
Answer the session key between unit and firmware Dispatching Unit, PUFDMIt is firmware Dispatching Unit public key.
Symmetrical and asymmet-ric encryption method has been used in aforesaid way simultaneously.Symmetric encryption method is mainly used in big text
Part, here pair as if firmware.Asymmet-ric encryption method is mainly using the transmission and the certification of identity of key.Firmware feeding unit
PR is usedVFMMAC is signed.X1PU is usedFDMIt is encrypted, it is ensured that only firmware Dispatching Unit is private using it
Key could be untied.
Similarly, firmware upgrade information is sent to firmware memory cell by firmware Dispatching Unit in the following manner:
X2=E [PRFDM,C(KMFS,F)||Info||IDU||TS2];
E[KSFS,F||E(PUFS,X2)]
Wherein, PRFDMIt is firmware Dispatching Unit private key, KMFSIt is the information between firmware Dispatching Unit and firmware memory cell
Authentication code, Info represents additional information, and the accessory information includes upgraded version, the ID of element to be upgraded, supplier ID, supply
Business's name and upgrading type, TS2It is timestamp, KSFSIt is the session key between firmware Dispatching Unit and firmware memory cell,
PUFSIt is firmware memory cell public key.
Firmware upgrade information is sent to firmware receiving unit by firmware Dispatching Unit in the following manner:
X3=E [PRFDM,C(KMM,F)||IDECU||IDU||TS3]
E[KSVFM,F||E(PUM,X3)]
Wherein, KMMIt is the message authentication code between firmware Dispatching Unit and firmware receiving unit, TS3It is timestamp, PUMFor
Firmware receiving unit public key.
Firmware upgrade information is sent to firmware Dispatching Unit by firmware memory cell in the following manner:
X4=E [PRFS,C(KMFS,F)||IDECU||IDU||TS4]
E[KSFS,F||E(PUFDM,X4)]
Wherein, PRFSIt is firmware memory cell private key, KMFSIt is the information between firmware Dispatching Unit and firmware memory cell
Authentication code, TS6It is timestamp, KSFSIt is the session key between firmware Dispatching Unit and firmware memory cell, PUFDMIt is firmware point
Bill unit public key.
Additionally, the reparation AKU of firmware is sent to firmware by firmware Dispatching Unit by way of formula (1) or formula (2) supplying
Answer unit:
X5=E [PUVFM,B||E(PRFDM,H(B)||IDV||IDECU||TS5] (1)
X6=E [PUVFM,I||E(PRFDM,H(I)||IDV||IDECU||TS6] (2)
Wherein, PUVFMIt is firmware feeding unit public key, PRFDMIt is firmware Dispatching Unit private key, IDVIt is supplier ID, IDECU
It is the ID, T of element that is leaky or needing reparationS5And TS6It is timestamp, B represents the details of leak, and I represents what is repaired
Details, H (B) represents the hashed value of B, and H (I) represents the hashed value of I.
Due to message X5And X6And less, therefore only with asymmetric encryption in aforesaid way.Firmware feeding unit is received
Hashed value comparing is carried out after to message, if the verification passes, then flow of upgrading starts.
S203, receives the data file encryption of firmware Dispatching Unit transmission and decrypts by firmware receiving unit, obtains solid
Part upgrade information.
Firmware receiving unit can enter according to firmware upgrade information after firmware upgrade information is got to corresponding firmware
Go and upgrade, and VIN yards of list of the vehicle that the information that upgrades successfully and completion are upgraded is sent after the completion of firmware upgrade and divide to firmware
Bill unit.
Specifically, in the present embodiment, firmware receiving unit will upgrade successfully information and be sent to firmware distribution in the following manner
Unit:
X7=E [PRM||IDECU||IDU||VIN||TS7]
E(PUFDM,X7)
Wherein, E represents encryption, PRMIt is firmware receiving unit private key, IDECUIt is the ID, ID of impacted element during upgradingUIt is
The ID of the element of upgrading, VIN are VIN yards of the vehicle for completing firmware upgrade, TS7It is timestamp, PUFDMFor firmware Dispatching Unit is public
Key.
The VIN lists for completing the vehicle of firmware upgrade are sent to firmware Dispatching Unit in the following manner:
X8=E [PRM,C(KMM,L)||UID||TS8]
E[KSM,L||E(PUFDM,X8)]
Wherein, E represents encryption, and L is the VIN lists of the vehicle for completing firmware upgrade, PRMIt is firmware receiving unit private key,
KMMIt is the message authentication code between firmware receiving unit and firmware Dispatching Unit, C (KMM, L) represent message authentication code is carried out to L
Treatment, UIDIt is the ID, KS of element of upgradingMIt is the session key between firmware Dispatching Unit and firmware receiving unit, TS8It is the time
Stamp, PUFDMIt is firmware Dispatching Unit public key.
Additionally, the firmware receiving unit in the present embodiment includes workshop receiving unit, 4S shops receiving unit and car
Carry receiving unit.Workshop receiving unit, is configured to carry out firmware upgrade to the vehicle in workshop;4S shops receive single
Unit, is configured to carry out firmware upgrade to carrying out shop vehicle;Vehicle-mounted receiving unit, the vehicle for being configured to load it carries out firmware liter
Level.
The data safe transmission method for firmware upgrade in the present embodiment, other each units are based on by authentication center
Identity code, public key, generate the authentication public key information of corresponding unit, and be sent to corresponding unit;Distributed by firmware
Unit generates selected firmware upgrade information as transmission data file, the authentication public key information based on firmware receiving unit
Data file encryption, and send to corresponding firmware receiving unit;Firmware Dispatching Unit is received by firmware receiving unit to send
Data file encryption and decrypt, obtain firmware upgrade information.So as to fully ensure that the safety of data in firmware upgrade process
Transmission.
So far, combined preferred embodiment shown in the drawings describes technical scheme, but, this area
Technical staff is it is easily understood that protection scope of the present invention is expressly not limited to these specific embodiments.Without departing from this
On the premise of the principle of invention, those skilled in the art can make equivalent change or replacement to correlation technique feature, these
Technical scheme after changing or replacing it is fallen within protection scope of the present invention.
Claims (10)
1. a kind of data safe transmission system for firmware upgrade, it is characterised in that the system includes authentication center, firmware
Dispatching Unit, firmware receiving unit;
The authentication center, is configured to identity code, the public key of each unit, generates the authentication public key letter of corresponding unit
Breath, and it is sent to corresponding unit;
The firmware Dispatching Unit, is configured to, using selected firmware upgrade information as transmission data file, be connect based on firmware
The authentication public key information generation data file encryption of unit is received, and is sent to corresponding firmware receiving unit;
The firmware receiving unit, is configured to receive the data file encryption of firmware Dispatching Unit transmission and decrypt, and obtains firmware
Upgrade information.
2. Transmission system according to claim 1, it is characterised in that the system also includes firmware feeding unit, the unit
It is configured to new firmware upgrade information as transmission data file, the authentication public key information generation based on firmware Dispatching Unit adds
Ciphertext data file, and send to firmware Dispatching Unit;
The firmware Dispatching Unit, is additionally configured to receive the data file encryption of firmware feeding unit transmission and decrypt, and obtains solid
Part upgrade information.
3. Transmission system according to claim 2, it is characterised in that the system also includes firmware memory cell, the list
Unit is configured to store the firmware upgrade information that firmware Dispatching Unit sends, and sends the firmware upgrade that firmware Dispatching Unit is transferred
Information;The firmware upgrade information encryption of firmware memory cell, decryption collocation method are consistent with firmware Dispatching Unit.
4. Transmission system according to claim 3, it is characterised in that the firmware receiving unit includes that workshop is received
Unit, 4S shops receiving unit and vehicle-mounted receiving unit;
The workshop receiving unit, is configured to carry out firmware upgrade to the vehicle in workshop;
4S shops receiving unit, is configured to carry out firmware upgrade to carrying out shop vehicle;
The vehicle-mounted receiving unit, the vehicle for being configured to load it carries out firmware upgrade.
5. the Transmission system according to any one of Claims 1 to 4, it is characterised in that the firmware Dispatching Unit is also matched somebody with somebody
The public key of the authentication public key acquisition of information corresponding unit based on other each units is set to, and it is each with other to generate firmware Dispatching Unit
Session key and message authentication code between unit, by being sent to corresponding unit after the public key encryption of receiving unit;
The encrypted transmission of the firmware upgrade information in the system between each unit includes:
Sender is based on its own session key between recipient and encrypts transmission to firmware upgrade information, while based on it certainly
Message authentication code between body and sender obtains the authentication code information of firmware upgrade information, and by the authentication code information by connecing
Sent after the public key encryption of debit;
Recipient is decrypted the corresponding authentication code information of acquisition based on the private key pair encryption data file of its own, and to certification
Code information is authenticated, and certification is solved based on its own session key between sender after passing through to data file encryption
Close acquisition firmware upgrade information.
6. a kind of data safe transmission method for firmware upgrade, it is characterised in that based on any one of Claims 1 to 5 institute
The data safe transmission system for firmware upgrade stated, methods described includes:
Identity code, the public key of other each units are based on by authentication center, the authentication public key information of corresponding unit is generated, and
It is sent to corresponding unit;
By firmware Dispatching Unit using selected firmware upgrade information as transmission data file, based on firmware receiving unit
Authentication public key information generates data file encryption, and sends to corresponding firmware receiving unit;
The data file encryption of firmware Dispatching Unit transmission is received by firmware receiving unit and is decrypted, obtain firmware upgrade letter
Breath.
7. transmission method according to claim 6, it is characterised in that methods described also includes:
By firmware feeding unit using new firmware upgrade information as transmission data file, the public key based on firmware Dispatching Unit
Checking information generates data file encryption, and sends to firmware Dispatching Unit;
The data file encryption of firmware feeding unit transmission is received by firmware Dispatching Unit and is decrypted, obtain firmware upgrade letter
Breath.
8. transmission method according to claim 7, it is characterised in that methods described also includes:
The firmware upgrade information that firmware Dispatching Unit sends is stored by firmware memory cell, and sends firmware Dispatching Unit and adjusted
The firmware upgrade information for taking;The firmware upgrade information encryption of firmware memory cell, decryption collocation method and firmware Dispatching Unit one
Cause.
9. the transmission method according to any one of claim 6~8, it is characterised in that methods described also includes:
The public key of other each units of the authentication public key acquisition of information of other each units is based on by firmware Dispatching Unit, and is generated solid
Session key and message authentication code between part Dispatching Unit and other each units, by being sent after the public key encryption of receiving unit
To corresponding unit;
The encrypted transmission of the firmware upgrade information between each unit includes:
Sender is based on its own session key between recipient and encrypts transmission to firmware upgrade information, while based on it certainly
Message authentication code between body and sender obtains the authentication code information of firmware upgrade information, and by the authentication code information by connecing
Sent after the public key encryption of debit;
Recipient is decrypted the corresponding authentication code information of acquisition based on the private key pair encryption data file of its own, and to certification
Code information is authenticated, and certification is solved based on its own session key between sender after passing through to data file encryption
Close acquisition firmware upgrade information.
10. transmission method according to claim 9, it is characterised in that firmware feeding unit is in the following manner by firmware liter
Level information is sent to firmware Dispatching Unit:
X1=E [PRVFM,C(KMVFM,F)||IDV||IDECU||IDU||TS1]
E[KSVFM,F||E(PUFDM,X1)]
Wherein, E represents encryption, PRVFMIt is firmware feeding unit private key, KMVFMFor firmware feeding unit and firmware Dispatching Unit it
Between message authentication code, F represents firmware upgrade information, C (KMVFM, F) represent message authentication code treatment, ID are carried out to firmwareVFor
Firmware supplier ID, IDECUIt is the ID, ID of impacted element during upgradingUIt is the ID of element to be upgraded, TS1It is timestamp, KSVFMFor
Session key between firmware feeding unit and firmware Dispatching Unit, PUFDMIt is firmware Dispatching Unit public key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710123213.7A CN106850311B (en) | 2017-03-03 | 2017-03-03 | Data security transmission system and method for firmware upgrade |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710123213.7A CN106850311B (en) | 2017-03-03 | 2017-03-03 | Data security transmission system and method for firmware upgrade |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106850311A true CN106850311A (en) | 2017-06-13 |
CN106850311B CN106850311B (en) | 2019-12-13 |
Family
ID=59137836
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710123213.7A Active CN106850311B (en) | 2017-03-03 | 2017-03-03 | Data security transmission system and method for firmware upgrade |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106850311B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108228230A (en) * | 2017-12-28 | 2018-06-29 | 努比亚技术有限公司 | Upgrade method, terminal and the computer readable storage medium of UFS firmwares |
CN108762788A (en) * | 2018-05-31 | 2018-11-06 | 四川斐讯信息技术有限公司 | A kind of embedded device firmware encrypting method and system based on server |
CN108874432A (en) * | 2018-08-17 | 2018-11-23 | 深圳市优驰科技有限公司 | Radio firmware upgrade-system |
CN109977674A (en) * | 2017-12-28 | 2019-07-05 | 航天信息股份有限公司 | The method for upgrading software and device of embedded device |
CN110225063A (en) * | 2019-07-02 | 2019-09-10 | 广州小鹏汽车科技有限公司 | Upgrade method, upgrade-system, server and the car-mounted terminal of automobile mounted system |
CN110650478A (en) * | 2019-10-12 | 2020-01-03 | 捷德(中国)信息科技有限公司 | OTA method, system, device, SE module, program server and medium |
CN110908695A (en) * | 2019-10-18 | 2020-03-24 | 中国第一汽车股份有限公司 | Vehicle remote upgrading method, device and system |
CN113867818A (en) * | 2021-09-28 | 2021-12-31 | 潍柴动力股份有限公司 | Method and device for generating ini file, computer equipment and medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101184301A (en) * | 2007-12-14 | 2008-05-21 | 中兴通讯股份有限公司 | Mobile terminal remote firmware updating method and system |
CN101436141A (en) * | 2008-11-21 | 2009-05-20 | 深圳创维数字技术股份有限公司 | Firmware upgrading and encapsulating method and device based on digital signing |
CN101470411A (en) * | 2007-12-28 | 2009-07-01 | 联合汽车电子有限公司 | System and method for safely updating ECU data |
CN101924607A (en) * | 2010-08-27 | 2010-12-22 | 华为终端有限公司 | Firmware processing method based on firmware air transmission technology, device and system thereof |
CN102611720A (en) * | 2011-01-21 | 2012-07-25 | 基信康信息技术(上海)有限公司 | Mobile phone firmware upgrade method |
CN104090790A (en) * | 2014-06-30 | 2014-10-08 | 飞天诚信科技股份有限公司 | Two-chip scheme firmware updating method for safety terminal |
-
2017
- 2017-03-03 CN CN201710123213.7A patent/CN106850311B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101184301A (en) * | 2007-12-14 | 2008-05-21 | 中兴通讯股份有限公司 | Mobile terminal remote firmware updating method and system |
CN101470411A (en) * | 2007-12-28 | 2009-07-01 | 联合汽车电子有限公司 | System and method for safely updating ECU data |
CN101436141A (en) * | 2008-11-21 | 2009-05-20 | 深圳创维数字技术股份有限公司 | Firmware upgrading and encapsulating method and device based on digital signing |
CN101924607A (en) * | 2010-08-27 | 2010-12-22 | 华为终端有限公司 | Firmware processing method based on firmware air transmission technology, device and system thereof |
US20130111455A1 (en) * | 2010-08-27 | 2013-05-02 | Huawei Device Co., Ltd. | Method for processing firmware based on firmware over the air technology, apparatus, and system |
CN102611720A (en) * | 2011-01-21 | 2012-07-25 | 基信康信息技术(上海)有限公司 | Mobile phone firmware upgrade method |
CN104090790A (en) * | 2014-06-30 | 2014-10-08 | 飞天诚信科技股份有限公司 | Two-chip scheme firmware updating method for safety terminal |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108228230A (en) * | 2017-12-28 | 2018-06-29 | 努比亚技术有限公司 | Upgrade method, terminal and the computer readable storage medium of UFS firmwares |
CN109977674A (en) * | 2017-12-28 | 2019-07-05 | 航天信息股份有限公司 | The method for upgrading software and device of embedded device |
CN108762788A (en) * | 2018-05-31 | 2018-11-06 | 四川斐讯信息技术有限公司 | A kind of embedded device firmware encrypting method and system based on server |
CN108762788B (en) * | 2018-05-31 | 2023-07-28 | 杭州吉吉知识产权运营有限公司 | Method and system for encrypting firmware of embedded equipment based on server |
CN108874432B (en) * | 2018-08-17 | 2022-07-12 | 深圳市优驰科技有限公司 | Wireless firmware upgrade system |
CN108874432A (en) * | 2018-08-17 | 2018-11-23 | 深圳市优驰科技有限公司 | Radio firmware upgrade-system |
CN110225063B (en) * | 2019-07-02 | 2021-09-03 | 广州小鹏汽车科技有限公司 | Upgrading method and system of automobile-mounted system, server and vehicle-mounted terminal |
CN110225063A (en) * | 2019-07-02 | 2019-09-10 | 广州小鹏汽车科技有限公司 | Upgrade method, upgrade-system, server and the car-mounted terminal of automobile mounted system |
CN110650478A (en) * | 2019-10-12 | 2020-01-03 | 捷德(中国)信息科技有限公司 | OTA method, system, device, SE module, program server and medium |
CN110650478B (en) * | 2019-10-12 | 2023-11-28 | 捷德(江西)技术有限公司 | OTA method, system, device, SE module, program server and medium |
CN110908695A (en) * | 2019-10-18 | 2020-03-24 | 中国第一汽车股份有限公司 | Vehicle remote upgrading method, device and system |
CN113867818A (en) * | 2021-09-28 | 2021-12-31 | 潍柴动力股份有限公司 | Method and device for generating ini file, computer equipment and medium |
CN113867818B (en) * | 2021-09-28 | 2024-04-16 | 潍柴动力股份有限公司 | Method, device, computer equipment and medium for generating ini file |
Also Published As
Publication number | Publication date |
---|---|
CN106850311B (en) | 2019-12-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106850311A (en) | For the data safe transmission system and method for firmware upgrade | |
CN101217728B (en) | A blank card for wireless card writing, wireless card writing server and wireless card writing method | |
CN106027260B (en) | Automobile ECU integrity verification and encryption communication method based on cipher key pre-distribution | |
WO2018040643A1 (en) | Mobile terminal, server, vehicle and control system thereof | |
CN106357400B (en) | Establish the method and system in channel between TBOX terminal and TSP platform | |
CN112543927B (en) | Equipment upgrading method and related equipment | |
CN107493273A (en) | Identity identifying method, system and computer-readable recording medium | |
CN107277033B (en) | Charging and battery replacing equipment and authentication method and system for object to be charged and battery replaced | |
CN106648626A (en) | Secure remote upgrade system and upgrade method for vehicles | |
CN107710676B (en) | Gateway device and control method thereof | |
CN109286599A (en) | Data security protection method, smart machine, server and readable storage medium storing program for executing | |
CN108809643A (en) | A kind of method, system and the equipment of equipment and high in the clouds arranging key | |
CN104158819A (en) | Safety authentication method of vehicle-mounted information entertainment terminal | |
CN102413132A (en) | Two-way-security-authentication-based data downloading method and system | |
US8949611B1 (en) | Methods, apparatus and computer program products for authenticating and determining integrity of a software part of an air vehicle | |
CN106331970A (en) | Hearing device and method of updating a hearing device | |
CN101997681A (en) | Authentication method and system for multi-node path and relevant node equipment | |
CN107040379A (en) | Method for the controller certification by vehicle | |
US20210227368A1 (en) | Master-Slave System for Communication Over a Bluetooth Low Energy Connection | |
CN104050431A (en) | Self-signing method and self-signing device for RFID chips | |
CN106506149A (en) | Key generation method and system between a kind of TBOX terminals and TSP platforms | |
CN106953725A (en) | For method and system derived from asymmetrical key | |
CN113411294A (en) | Vehicle-mounted secure communication method, system and device based on secure cloud public key protection | |
CN110912864A (en) | Electric equipment, charging equipment and identity authentication method thereof | |
CN115665138A (en) | Automobile OTA (over the air) upgrading system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |