CN107273749B - Vehicle ECU file safe flashing method and system - Google Patents

Vehicle ECU file safe flashing method and system Download PDF

Info

Publication number
CN107273749B
CN107273749B CN201710398954.6A CN201710398954A CN107273749B CN 107273749 B CN107273749 B CN 107273749B CN 201710398954 A CN201710398954 A CN 201710398954A CN 107273749 B CN107273749 B CN 107273749B
Authority
CN
China
Prior art keywords
remote
file
monitoring terminal
vehicle
remote monitoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710398954.6A
Other languages
Chinese (zh)
Other versions
CN107273749A (en
Inventor
陈涛
李涛
刘笃佼
江建刚
胡汉周
刘忠文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan English Stettlen Electron Technology Co Ltd
Original Assignee
Wuhan English Stettlen Electron Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan English Stettlen Electron Technology Co Ltd filed Critical Wuhan English Stettlen Electron Technology Co Ltd
Priority to CN201710398954.6A priority Critical patent/CN107273749B/en
Publication of CN107273749A publication Critical patent/CN107273749A/en
Application granted granted Critical
Publication of CN107273749B publication Critical patent/CN107273749B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/572Secure firmware programming, e.g. of basic input output system [BIOS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Coloring (AREA)

Abstract

The invention discloses a safe brushing method for an ECU (electronic control unit) file of a vehicle, which is characterized in that a remote platform server is utilized to search the vehicle to be brushed and send a brushing package file and a secret key file to a remote monitoring terminal, the brushing package file and the secret key file stored in the remote monitoring terminal are verified in real time before and during brushing, and a brushing control instruction is sent out through a remote control terminal. The invention also provides a vehicle ECU file flashing system based on the method, which comprises a remote monitoring terminal connected with the ECU of the vehicle to be flashed, wherein the remote monitoring terminal is connected with a remote platform server through a remote access server group, and the remote access server group is connected with a remote control terminal. The invention realizes safe and reliable ECU file flashing of vehicles in batches in a remote environment, avoids vehicles from being flashed in one position, and saves a great deal of manpower and financial resources for after-sale maintenance of automobile factories and suppliers.

Description

Vehicle ECU file safe flashing method and system
Technical Field
The invention relates to a method and a system for safely flashing an ECU (electronic control unit) file of a vehicle, belonging to the technical field of automobiles.
Background
In the field of engines and automobiles, Electronic Control technology is increasingly important, and an ECU (Electronic Control Unit) is a core element of Electronic Control. When data failure occurs in the ECU, the ECU is refreshed in a simple and effective maintenance mode.
Due to the limitation of authority, currently, legal ECU (electronic control unit) flashing is only performed by manufacturers, and is performed on site by special equipment by workers, but the on-site flashing is inconvenient and only suitable for the condition that vehicles are intensively stored in the same place, and the local batch updating mode is not suitable for the condition that the vehicles are distributed to a vehicle owner for autonomous flashing.
If remote flash is adopted, the potential safety hazard that the content of the flash file is tampered by a malicious user exists, in this case, the identity of the flash ECU needs to be authenticated, but a general car manufacturer cannot provide the source code form of the Seedkey algorithm file.
Disclosure of Invention
In order to solve the defects of the prior art, the invention provides a method and a system for safely flashing vehicle ECU files, which can realize safe and reliable ECU file flashing of vehicles in batches in a remote environment, avoid the vehicles from being flashed in one place in a centralized manner and save a large amount of manpower and financial resources for after-sale maintenance of a car factory and a supplier.
The technical scheme adopted by the invention for solving the technical problem is as follows: the method for safely flashing the ECU file of the vehicle comprises the following steps:
(1) the remote platform server searches for the vehicle to be flashed and communicates with a remote monitoring terminal installed on the vehicle to be flashed through a remote access server group; the remote monitoring terminal is connected with an ECU (electronic control unit) of the vehicle to be flashed through the UDS and a flash control protocol;
(2) the remote platform server sends the flash package file and the secret key file to the remote monitoring terminal through the remote access server group;
(3) the remote platform server conducts real-time verification on the brushing package file and the secret key file stored in the remote monitoring terminal through the remote access server group, meanwhile, the state of the vehicle to be brushed is monitored in real time through the remote monitoring terminal, and if the brushing package file and the secret key file are confirmed to be in accordance with the original file information stored in the remote platform server through verification and the vehicle to be brushed is in a non-driving state, the remote monitoring terminal sends brushing ready state information to the remote platform server and the remote control terminal through the remote access server group;
(4) the remote control terminal sends a flash control instruction to the remote monitoring terminal through the remote access server group, and the remote control terminal uses the flash package file to flash the vehicle to be flashed;
(5) the remote platform server conducts real-time verification on the brushing package file and the secret key file stored in the remote monitoring terminal through the remote access server group in the brushing process, meanwhile, the state of the vehicle to be brushed is monitored in real time through the remote monitoring terminal, if the brushing package file and the secret key file are not consistent with the original file information stored in the remote platform server through verification, or the vehicle to be brushed is in a running state, the remote platform server sends a brushing termination control instruction to the remote monitoring terminal through the remote access server group to control the remote monitoring terminal to terminate brushing, sends brushing termination state information to the remote platform server and the remote control terminal through the remote access server group, and returns to the step (1) to restart the brushing task.
The flash package file is a BIN file provided by a manufacturer and written with a Seedkey algorithm.
The remote platform server performs real-time verification on the flash package file and the secret key file stored in the remote monitoring terminal through a remote access server group, and the method specifically comprises the following processes: the remote monitoring terminal loads the BIN file to the memory of the remote monitoring terminal, and in the flashing process, the algorithm is used for encrypting the Seed value sent by the flashed ECU and then sending the Seed value back to the flashed ECU, so that the remote monitoring terminal passes the identity authentication of the ECU.
The remote control terminal adopts mobile intelligent equipment.
In the swiping process, if the SD card of the remote monitoring terminal is pulled out and then inserted, the remote monitoring terminal stops swiping, the remote platform server conducts real-time verification on a swiping package file and a secret key file stored in the remote monitoring terminal through a remote access server group, meanwhile, the state of the vehicle to be swiped is monitored in real time through the remote monitoring terminal, and if the swiping package file and the secret key file are confirmed to be in consistency with original file information stored in the remote platform server through verification and the vehicle to be swiped is in a non-running state, the remote monitoring terminal sends swiping ready state information to the remote platform server and the remote control terminal through the remote access server group; and then the remote control terminal sends a flash control instruction to the remote monitoring terminal through the remote access server group, so that the remote control terminal can continuously flash the vehicle to be flashed by using the flash packet file.
The invention also provides a vehicle ECU file flashing system based on the method, which comprises a remote monitoring terminal connected with the ECU of the vehicle to be flashed, wherein the remote monitoring terminal is connected with a remote platform server through a remote access server group, and the remote access server group is connected with a remote control terminal.
The invention has the beneficial effects based on the technical scheme that:
(1) according to the vehicle ECU file safe flashing method, the remote platform server is used for sending the flashing package file and the secret key file to the remote monitoring terminal connected with the vehicle ECU to be flashed, compared with the case that the flashing package file and the secret key file are directly loaded on the remote monitoring terminal and handed to a user for flashing, the dynamic encryption of the flashing package file and the secret key file can be realized, and the safety performance is higher;
(2) according to the vehicle ECU file safe flashing method, the remote platform server is used for carrying out real-time verification on the flashing packet file and the secret key file which are sent to the remote monitoring terminal before and during flashing, so that inconsistency caused by changes of data transmitted and received in the air is avoided, the phenomenon of malicious file tampering in the flashing process is avoided, and the encryption safety performance of the file can be improved;
(3) according to the vehicle ECU file safe flashing method, the state of the vehicle to be flashed is monitored in real time through the remote monitoring terminal before flashing and during flashing, flashing in the vehicle driving process or other non-safe states is avoided, and the life safety of a driver is protected;
(4) according to the vehicle ECU file safe flashing method, the remote control terminal is used for finally issuing the flashing command, the flashing authority can be transferred to a user instead of a remote platform server, manpower waste caused by centralized flashing is avoided, and the flashing efficiency can be improved;
(5) the safe vehicle ECU file flashing method can achieve batch flashing, multiple flashing tasks can be performed simultaneously only by designating a flashing vehicle at the beginning, and compared with a traditional method that a terminal is directly connected with a vehicle ECU flashing mode, the flashing is more efficient and flexible;
(6) according to the vehicle ECU file safe flashing method, the remote control terminal adopts the mobile intelligent equipment, a user can directly control flashing by directly downloading the corresponding program, and the method is convenient, rapid and easy to operate;
(7) the vehicle ECU file flashing system provides a hardware platform for realizing the ECU file safety flashing method, wherein the remote platform server and the remote access server group have different performance emphasis points, compared with a remote server which is integrated, the split server is convenient for deployment and management, and the layers and the frameworks of codes used for realizing the ECU file safety flashing are clearer.
Drawings
Fig. 1 is a system block diagram of a vehicle ECU file flashing system.
Detailed Description
The invention is further illustrated by the following figures and examples.
The invention provides a safe flashing method for a vehicle ECU file, which comprises the following steps:
(1) the remote platform server searches for the vehicle to be flashed and communicates with a remote monitoring terminal installed on the vehicle to be flashed through a remote access server group; the remote monitoring terminal is connected with an ECU (electronic control unit) of the vehicle to be flashed through the UDS and a flash control protocol;
(2) the remote platform server sends the flash package file and the secret key file to the remote monitoring terminal through the remote access server group;
(3) the remote platform server conducts real-time verification on the brushing package file and the secret key file stored in the remote monitoring terminal through the remote access server group, meanwhile, the state of the vehicle to be brushed is monitored in real time through the remote monitoring terminal, and if the brushing package file and the secret key file are confirmed to be in accordance with the original file information stored in the remote platform server through verification and the vehicle to be brushed is in a non-driving state, the remote monitoring terminal sends brushing ready state information to the remote platform server and the remote control terminal through the remote access server group;
(4) the remote control terminal sends a flash control instruction to the remote monitoring terminal through the remote access server group, and the remote control terminal uses the flash package file to flash the vehicle to be flashed;
(5) the remote platform server conducts real-time verification on the brushing package file and the secret key file stored in the remote monitoring terminal through the remote access server group in the brushing process, meanwhile, the state of the vehicle to be brushed is monitored in real time through the remote monitoring terminal, if the brushing package file and the secret key file are not consistent with the original file information stored in the remote platform server through verification, or the vehicle to be brushed is in a running state, the remote platform server sends a brushing termination control instruction to the remote monitoring terminal through the remote access server group to control the remote monitoring terminal to terminate brushing, sends brushing termination state information to the remote platform server and the remote control terminal through the remote access server group, and returns to the step (1) to restart the brushing task.
The flash package file is a BIN file provided by a manufacturer and written with a Seedkey algorithm.
The remote platform server performs real-time verification on the flash package file and the secret key file stored in the remote monitoring terminal through a remote access server group, and the method specifically comprises the following processes: the remote monitoring terminal loads the BIN file to the memory of the remote monitoring terminal, and in the flashing process, the algorithm is used for encrypting the Seed value sent by the flashed ECU and then sending the Seed value back to the flashed ECU, so that the remote monitoring terminal passes the identity authentication of the ECU.
The remote control terminal adopts mobile intelligent equipment.
In the swiping process, if the SD card of the remote monitoring terminal is pulled out and then inserted, the remote monitoring terminal stops swiping, the remote platform server conducts real-time verification on a swiping package file and a secret key file stored in the remote monitoring terminal through a remote access server group, meanwhile, the state of the vehicle to be swiped is monitored in real time through the remote monitoring terminal, and if the swiping package file and the secret key file are confirmed to be in consistency with original file information stored in the remote platform server through verification and the vehicle to be swiped is in a non-running state, the remote monitoring terminal sends swiping ready state information to the remote platform server and the remote control terminal through the remote access server group; and then the remote control terminal sends a flash control instruction to the remote monitoring terminal through the remote access server group, so that the remote control terminal can continuously flash the vehicle to be flashed by using the flash packet file.
The invention also provides a vehicle ECU file flashing system based on the method, and the system comprises a remote monitoring terminal connected with the ECU of the vehicle to be flashed, wherein the remote monitoring terminal is connected with a remote platform server through a remote access server group, and the remote access server group is connected with a remote control terminal, referring to FIG. 1.
The method and the system for safely flashing the ECU files of the vehicles realize safe and reliable ECU file flashing of the vehicles in batches in a remote environment, simultaneously avoid the vehicles from being flashed in one position, and save a large amount of manpower and financial resources for after-sale maintenance of a car factory and a supplier.

Claims (4)

1. A vehicle ECU file safe flashing method is characterized by comprising the following steps:
(1) the remote platform server searches for the vehicle to be flashed and communicates with a remote monitoring terminal installed on the vehicle to be flashed through a remote access server group; the remote monitoring terminal is connected with an ECU (electronic control unit) of the vehicle to be flashed through the UDS and a flash control protocol;
(2) the remote platform server sends the flash package file and the secret key file to the remote monitoring terminal through the remote access server group;
(3) the remote platform server conducts real-time verification on the brushing package file and the secret key file stored in the remote monitoring terminal through the remote access server group, meanwhile, the state of the vehicle to be brushed is monitored in real time through the remote monitoring terminal, if the brushing package file and the secret key file are confirmed to be in accordance with the comparison of the brushing package file and the secret key file stored in the remote platform server through verification, and the vehicle to be brushed is in a non-running state, the remote monitoring terminal sends brushing ready state information to the remote platform server and the remote control terminal through the remote access server group;
(4) the remote control terminal sends a flash control instruction to the remote monitoring terminal through the remote access server group, and the remote control terminal uses the flash package file to flash the vehicle to be flashed;
(5) in the flashing process, the remote platform server conducts real-time verification on a flashing package file and a secret key file stored in the remote monitoring terminal through the remote access server group, meanwhile, the state of a vehicle to be flashed is monitored in real time through the remote monitoring terminal, if the verification confirms that the comparison between the flashing package file and the secret key file and the original file information stored in the remote platform server is inconsistent, or the vehicle to be flashed is in a running state, the remote platform server sends a flashing termination control instruction to the remote monitoring terminal through the remote access server group to control the remote monitoring terminal to terminate the flashing, sends the flashing termination state information to the remote platform server and the remote control terminal through the remote access server group, and returns to the step (1) to restart the flashing task;
the flash package file is a BIN file provided by a manufacturer and written with a Seedkey algorithm.
2. The vehicle ECU file secure flash method according to claim 1, characterized in that: the remote platform server performs real-time verification on the flash package file and the secret key file stored in the remote monitoring terminal through a remote access server group, and the method specifically comprises the following processes: the remote monitoring terminal loads the BIN file to the memory of the remote monitoring terminal, and in the flashing process, the algorithm is used for encrypting the Seed value sent by the flashed ECU and then sending the Seed value back to the flashed ECU, so that the remote monitoring terminal passes the identity authentication of the ECU.
3. The vehicle ECU file secure flash method according to claim 1, characterized in that: the remote control terminal adopts mobile intelligent equipment.
4. The vehicle ECU file secure flash method according to claim 1, characterized in that: in the swiping process, if the SD card of the remote monitoring terminal is pulled out and then inserted, the remote monitoring terminal stops swiping, the remote platform server conducts real-time verification on a swiping package file and a secret key file stored in the remote monitoring terminal through a remote access server group, meanwhile, the state of the vehicle to be swiped is monitored in real time through the remote monitoring terminal, and if the swiping package file and the secret key file are confirmed to be in consistency with original file information stored in the remote platform server through verification and the vehicle to be swiped is in a non-running state, the remote monitoring terminal sends swiping ready state information to the remote platform server and the remote control terminal through the remote access server group; and then the remote control terminal sends a flash control instruction to the remote monitoring terminal through the remote access server group, so that the remote control terminal can continuously flash the vehicle to be flashed by using the flash packet file.
CN201710398954.6A 2017-05-31 2017-05-31 Vehicle ECU file safe flashing method and system Active CN107273749B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710398954.6A CN107273749B (en) 2017-05-31 2017-05-31 Vehicle ECU file safe flashing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710398954.6A CN107273749B (en) 2017-05-31 2017-05-31 Vehicle ECU file safe flashing method and system

Publications (2)

Publication Number Publication Date
CN107273749A CN107273749A (en) 2017-10-20
CN107273749B true CN107273749B (en) 2019-12-27

Family

ID=60065757

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710398954.6A Active CN107273749B (en) 2017-05-31 2017-05-31 Vehicle ECU file safe flashing method and system

Country Status (1)

Country Link
CN (1) CN107273749B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108462567A (en) * 2017-12-28 2018-08-28 宁德时代新能源科技股份有限公司 Vehicle-mounted program file downloading method and device
CN112311882A (en) * 2020-10-30 2021-02-02 上海中通吉网络技术有限公司 Method and system for remotely and group-controlling logistics equipment
CN112883382B (en) * 2021-03-03 2023-05-23 一汽解放汽车有限公司 Vehicle writing method, internet of vehicles box, vehicle and storage medium
CN113485734A (en) * 2021-07-20 2021-10-08 安徽江淮汽车集团股份有限公司 Automatic vehicle configuration flashing method
CN113741936B (en) * 2021-08-31 2024-04-19 重庆长安汽车股份有限公司 Parallel refreshing method and device based on UDS protocol, vehicle and computer readable storage medium
CN113867818B (en) * 2021-09-28 2024-04-16 潍柴动力股份有限公司 Method, device, computer equipment and medium for generating ini file
CN114172741A (en) * 2021-12-22 2022-03-11 卓品智能科技无锡有限公司 Method, system and storage medium for preventing vehicle-mounted controller from being stolen

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103019759A (en) * 2011-09-22 2013-04-03 现代自动车株式会社 Vehicle upgrade system and method thereof
CN103713527A (en) * 2012-09-29 2014-04-09 博世汽车部件(苏州)有限公司 Refreshing method, writing apparatus and writing system for automobile electronic controller
CN103885437A (en) * 2014-03-12 2014-06-25 潍柴动力股份有限公司 Data security protection method and device and electronic control unit
US9233655B2 (en) * 2012-11-07 2016-01-12 Cloudcar, Inc. Cloud-based vehicle information and control system
CN106682519A (en) * 2017-01-04 2017-05-17 重庆长安汽车股份有限公司 Method and system for remotely flashing vehicle controller program

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103019759A (en) * 2011-09-22 2013-04-03 现代自动车株式会社 Vehicle upgrade system and method thereof
CN103713527A (en) * 2012-09-29 2014-04-09 博世汽车部件(苏州)有限公司 Refreshing method, writing apparatus and writing system for automobile electronic controller
US9233655B2 (en) * 2012-11-07 2016-01-12 Cloudcar, Inc. Cloud-based vehicle information and control system
CN103885437A (en) * 2014-03-12 2014-06-25 潍柴动力股份有限公司 Data security protection method and device and electronic control unit
CN106682519A (en) * 2017-01-04 2017-05-17 重庆长安汽车股份有限公司 Method and system for remotely flashing vehicle controller program

Also Published As

Publication number Publication date
CN107273749A (en) 2017-10-20

Similar Documents

Publication Publication Date Title
CN107273749B (en) Vehicle ECU file safe flashing method and system
CN110111472B (en) Vehicle key control method and device
CN111061499B (en) ECU updating method and system based on file system
US9648023B2 (en) Vehicle module update, protection and diagnostics
WO2017101310A1 (en) Remote control method, device and system for vehicle
WO2019212403A1 (en) Method for upgrading vehicle-mounted device, and related device
CN111279310A (en) Vehicle-mounted equipment upgrading method and related equipment
CN111782234A (en) Vehicle-mounted software flashing method, control device, central processing unit and automobile
CN102624525B (en) Electronic identity recognition method for engineering machinery and device
CN110501995A (en) A kind of vehicle diagnosing system and method
US20080278282A1 (en) Motor Vehicle Control Device Data Transfer System And Process
CN113645590B (en) Method, device, equipment and medium for remotely controlling vehicle based on encryption algorithm
CN112087419B (en) Vehicle-mounted terminal data transmission safety protection method and device
CN111949288A (en) Intelligent element remote upgrading method and system based on vehicle-mounted Ethernet
CN110371081A (en) Vehicle tamper resistant method, device and vehicle
CN109587164A (en) A kind of information encrypting transmission method, device, equipment and storage medium
CN108123805A (en) Communication security authentication method between vehicle-mounted ECU
CN115242634A (en) Software upgrading method, device and storage medium
KR102036024B1 (en) Method and system for vehicle security
CN113805916A (en) Upgrading method, system, readable storage medium and vehicle
CN112148312A (en) Firmware upgrading management method, device, equipment and medium for electronic controller
CN109955934A (en) Electric vehicle identity authorization system and method
CN105334840B (en) Vehicle network child node collocation method
KR101879820B1 (en) Security system and method for car
Bogdan et al. Design and implementation of a bootloader in the context of intelligent vehicle systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A method and system of vehicle ECU file safe writing

Effective date of registration: 20210630

Granted publication date: 20191227

Pledgee: Guanggu Branch of Wuhan Rural Commercial Bank Co.,Ltd.

Pledgor: WUHAN INTEST ELECTRONIC TECHNOLOGY Co.,Ltd.

Registration number: Y2021420000064

PE01 Entry into force of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20220620

Granted publication date: 20191227

Pledgee: Guanggu Branch of Wuhan Rural Commercial Bank Co.,Ltd.

Pledgor: WUHAN INTEST ELECTRONIC TECHNOLOGY CO.,LTD.

Registration number: Y2021420000064

PC01 Cancellation of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A safe writing method and system for vehicle ECU files

Effective date of registration: 20220623

Granted publication date: 20191227

Pledgee: Guanggu Branch of Wuhan Rural Commercial Bank Co.,Ltd.

Pledgor: WUHAN INTEST ELECTRONIC TECHNOLOGY CO.,LTD.

Registration number: Y2022420000181

PE01 Entry into force of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20230609

Granted publication date: 20191227

Pledgee: Guanggu Branch of Wuhan Rural Commercial Bank Co.,Ltd.

Pledgor: WUHAN INTEST ELECTRONIC TECHNOLOGY CO.,LTD.

Registration number: Y2022420000181

PC01 Cancellation of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A Method and System for Secure Writing of Vehicle ECU Files

Effective date of registration: 20230714

Granted publication date: 20191227

Pledgee: Guanggu Branch of Wuhan Rural Commercial Bank Co.,Ltd.

Pledgor: WUHAN INTEST ELECTRONIC TECHNOLOGY CO.,LTD.

Registration number: Y2023420000302

PE01 Entry into force of the registration of the contract for pledge of patent right