CN108388439A - A kind of update method, system, device and the readable storage medium storing program for executing of vehicle-mounted software - Google Patents

A kind of update method, system, device and the readable storage medium storing program for executing of vehicle-mounted software Download PDF

Info

Publication number
CN108388439A
CN108388439A CN201810259684.5A CN201810259684A CN108388439A CN 108388439 A CN108388439 A CN 108388439A CN 201810259684 A CN201810259684 A CN 201810259684A CN 108388439 A CN108388439 A CN 108388439A
Authority
CN
China
Prior art keywords
vehicle
secret key
mounted software
software
attributive character
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810259684.5A
Other languages
Chinese (zh)
Inventor
李培能
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN ROADROVER TECHNOLOGY Co Ltd
Original Assignee
SHENZHEN ROADROVER TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN ROADROVER TECHNOLOGY Co Ltd filed Critical SHENZHEN ROADROVER TECHNOLOGY Co Ltd
Priority to CN201810259684.5A priority Critical patent/CN108388439A/en
Publication of CN108388439A publication Critical patent/CN108388439A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Stored Programmes (AREA)

Abstract

This application discloses a kind of update methods of vehicle-mounted software, including:Obtain the vehicle-mounted software and input secret key;Verification secret key is generated using the attributive character of the vehicle-mounted software;Judge whether the input secret key and the verification secret key are consistent;If so, deactivation system is closed, to carry out relevant operation to the vehicle-mounted software.In the application, the attributive character of different vehicle-mounted software is different, so corresponding different verification secret key, when to be operated to different vehicle-mounted software, necessarily correspond to different input secret keys, unless having grasped the generating algorithm of verification secret key, otherwise the input secret key consistent with secret key is verified can not be obtained, the case where third party unseals system when being revealed so as to avoid no secret key or static password, software arbitrarily updates, the update safety of onboard system is greatly improved, ensure that the stability of onboard system.Correspondingly, disclosed herein as well is a kind of more new system, device and the readable storage medium storing program for executing of vehicle-mounted software.

Description

A kind of update method, system, device and the readable storage medium storing program for executing of vehicle-mounted software
Technical field
The present invention relates to vehicle-mounted software field, more particularly to a kind of update method of vehicle-mounted software, system, device and readable Storage medium.
Background technology
Currently, due to not networking when onboard system major part, the update of onboard system depends on local upload mostly The new version of software is updated.Some onboard systems do not carry out system lock, and user, which can freely update or install, to be answered With, this update method may cause user installation with it is original using incompatible software, so as to cause onboard system stability It reduces, the problems such as system crash occur.Therefore, some onboard systems proceed by system lock, user can not freely install or Update application, if user wants installation or update application, it is necessary to go to the shops 4S, make the staff in the shops 4S reserved by depot Static password come contact system closing, be then updated again.But since the staff in the shops 4S remains static password, The update or installation that depot is independently applied can also be got around, and static password is easy leakage, it is still it cannot be guaranteed that vehicle-mounted System only installs the application of depot's permission, cannot meet requirement of the depot to system lock.
Invention content
In view of this, the purpose of the present invention is to provide a kind of update method of vehicle-mounted software, system, device and readable depositing Storage media, to improve the safe coefficient of vehicle-mounted software at no point in the update process.Its concrete scheme is as follows:
A kind of update method of vehicle-mounted software, including:
Obtain the vehicle-mounted software and input secret key;
Verification secret key is generated using the attributive character of the vehicle-mounted software;
Judge whether the input secret key and the verification secret key are consistent;
If so, deactivation system is closed, to carry out relevant operation to the vehicle-mounted software.
Preferably, the input secret key is that depot's data platform receives after system operatio application according to the vehicle-mounted software The secret key that attributive character is generated and issued.
Preferably, described to include to the vehicle-mounted relevant operation of software progress:
The vehicle-mounted software is installed, updated or unloaded.
Preferably, the attributive character of the vehicle-mounted software includes the version and/or feature code of the vehicle-mounted software.
Preferably, the vehicle-mounted software includes navigation software and/or FM broadcast softwares and/or on-vehicle Bluetooth software.
Preferably, the process of the attributive character generation verification secret key using the vehicle-mounted software specifically includes:
The aapt.exe tools of attributive character by presetting Python scripts and for obtaining the vehicle-mounted software utilize The attributive character of the vehicle-mounted software generates verification secret key;
The input secret key is:
After depot's data platform receives system operatio application, pass through the default Python scripts and the aapt.exe works Tool, the secret key for generating and issuing according to the attributive character of the vehicle-mounted software.
Preferably, described to obtain vehicle-mounted software and input after secret key, further include:
Whether before the deadline to judge the input secret key;
If so, starting the process for generating verification secret key using the vehicle-mounted software and attributive character.
Correspondingly, the invention also discloses a kind of more new systems of vehicle-mounted software, including:
Acquisition module, for obtaining the vehicle-mounted software and input secret key;
Secret key generation module, for generating verification secret key using the attributive character of the vehicle-mounted software;
Judgment module, for judging whether the input secret key and the verification secret key are consistent;If so, starting operation mould Block;
The action module is closed for deactivation system, to carry out relevant operation to the vehicle-mounted software.
Correspondingly, the invention also discloses a kind of updating devices of vehicle-mounted software, including:
Memory, for storing computer program;
Processor realizes the update side of the vehicle-mounted software as described in any one of above when for executing the computer program The step of method.
Correspondingly, the invention also discloses a kind of readable storage medium storing program for executing, computer is stored on the readable storage medium storing program for executing Program realizes the step of the update method of vehicle-mounted software as described in any one above when the computer program is executed by processor Suddenly.
The invention discloses a kind of update methods of vehicle-mounted software, including:Obtain vehicle-mounted software and input secret key;Using institute The attributive character for stating vehicle-mounted software generates verification secret key;Judge whether the input secret key and the verification secret key are consistent;If It is deactivation system closing, to carry out relevant operation to the vehicle-mounted software.In the present invention, the attribute of different vehicle-mounted software Feature is different, so corresponding different verification secret key necessarily corresponds to different when to be operated to different vehicle-mounted software Secret key is inputted, unless having grasped the generating algorithm of verification secret key, otherwise can not obtain the input secret key consistent with secret key is verified, from And the case where third party's deblocking system, software arbitrarily update when avoiding no secret key or static password leakage, it increases substantially The update safety of onboard system, ensure that the stability of onboard system.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of step flow chart of the update method of vehicle-mounted software in the embodiment of the present invention;
Fig. 2 is a kind of structure distribution figure of the more new system of vehicle-mounted software in the embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
It is shown in Figure 1 the embodiment of the invention discloses a kind of update method of vehicle-mounted software, including:
S1:Obtain vehicle-mounted software and input secret key;
It is understood that vehicle-mounted software here will be used in onboard system, generally comprises navigation software and/or FM is wide Broadcast software and/or on-vehicle Bluetooth software etc..
Wherein, input secret key is generally issued by depot's data platform after receiving system operatio application.The system operatio Shen Please be usually the update request that user or the shops 4S are sent to depot's data platform, depot's data platform is according to the system operatio application Input secret key is issued to requesting party.In addition, if the system operatio application is unsatisfactory for more new demand namely depot's data platform is sentenced Fixed vehicle-mounted software is illegal, incompatible or not by testing results, and depot's data platform can be refused to issue input secret key.
S2:Verification secret key is generated using the attributive character of the vehicle-mounted software;
It is understood that the attributive character due to different application is different, different verification secret keys is generated.
S3:Judge whether the input secret key and the verification secret key are consistent;
It is understood that input secret key is to need the password inputted outside system, verification secret key is raw inside onboard system At identifying code, if the two is consistent, it was demonstrated that input secret key and verification secret key are by same algorithm to same vehicle-mounted soft What the attributive character of part obtained after being calculated.Or it is depot's data platform due to grasping the main body of this algorithm outside system, It is a certain data server of depot's license, leakage possibility is low, therefore can ensure that input the from the horse's mouth of secret key can Letter.
Wherein, the attributive character of the vehicle-mounted software for generating input secret key and verification secret key is usually the version of vehicle-mounted software Sheet and/or feature code, can also be the one section of random code or other attributive character identified in vehicle-mounted software.It needs to distinguish It is that feature code refers to the code that unique corresponding vehicle-mounted software can be identified according to the code;And authentication code is one Section random code, with feature code compared with may content information it is less, not necessarily uniquely correspond to the vehicle-mounted software, but difference vehicle The identical probability of random code for carrying software is very low, even if the cognizance code likelihood of two vehicle-mounted softwares is higher, is given birth to using algorithm At verification secret key be also different, can still ensure verify secret key safety be far above static password.
S4:If so, deactivation system is closed, to carry out relevant operation to the vehicle-mounted software.
If not, refusal carries out any operation to the vehicle-mounted software.
Wherein, described to include to the vehicle-mounted relevant operation of software progress:
The vehicle-mounted software is installed, updated or unloaded.
The embodiment of the invention discloses a kind of update methods of vehicle-mounted software, including:Obtain vehicle-mounted software and input secret key; Verification secret key is generated using the attributive character of the vehicle-mounted software;Judge the input secret key and the verification secret key whether one It causes;If so, deactivation system is closed, to carry out relevant operation to the vehicle-mounted software.In the present invention, different vehicle-mounted software Attributive character it is different, so corresponding different verification secret key is necessarily corresponded to when to be operated to different vehicle-mounted software Otherwise different input secret keys can not obtain the input consistent with secret key is verified unless having grasped the generating algorithm of verification secret key The case where secret key, third party unseals system when being revealed so as to avoid no secret key or static password, software arbitrarily updates, substantially Degree improves the update safety of onboard system, ensure that the stability of onboard system.
The embodiment of the invention discloses a kind of update methods of specific vehicle-mounted software, relative to a upper embodiment, this implementation Example has made further instruction and optimization to technical solution.Specifically:
The process that the attributive character using the vehicle-mounted software generates verification secret key includes:
The aapt.exe tools of attributive character by presetting Python scripts and for obtaining the vehicle-mounted software utilize The attributive character of the vehicle-mounted software generates verification secret key;
The input secret key is after depot's data platform receives system operatio application, by the default Python scripts and The aapt.exe tools, the secret key for generating and issuing according to the attributive character of the vehicle-mounted software.
A kind of specific method for generating input secret key and verifying secret key is provided in the present embodiment, can also be used certainly Other methods and algorithm input secret key and verification secret key to generate.
Further, after the process for obtaining vehicle-mounted software and input secret key, further include:
Whether before the deadline to judge the input secret key;
If so, starting the process for generating verification secret key using the vehicle-mounted software and attributive character.
If not, directly operation of the refusal to the vehicle-mounted software.
It is understood that the term of validity allows for the timeliness of vehicle-mounted software and is arranged.Such as it is secret generating input This method is had to carry out in 24 hours after key, once exceed the term of validity, it is necessary to again to new defeated of depot's data platform application Entering secret key can continue to execute.
It is understood that " judge described input secret key whether before the deadline " as long as action closed in deactivation system It executes before, be not intended to limit the step and other steps executes priority.
Correspondingly, the embodiment of the invention also discloses a kind of more new system of vehicle-mounted software, it is shown in Figure 2, including:
Acquisition module 1, for obtaining vehicle-mounted software and input secret key;
Secret key generation module 2, for generating verification secret key using the attributive character of the vehicle-mounted software;
Judgment module 3, for judging whether the input secret key and the verification secret key are consistent;If so, starting operation Module 4;
The action module 4 is closed for deactivation system, to carry out relevant operation to the vehicle-mounted software.
Vehicle-mounted software in the advantageous effect and foregoing embodiments of the more new system of vehicle-mounted software in the embodiment of the present invention Update method is identical.
Correspondingly, the embodiment of the invention also discloses a kind of updating devices of vehicle-mounted software, including:
Memory, for storing computer program;
Processor, realizing the vehicle-mounted software as described in embodiment any one of above when for executing the computer program The step of update method.
Wherein, the specific datail description in relation to the computer program can refer to related vehicle-mounted software in foregoing embodiments Update method related content, details are not described herein again.
Advantageous effect in the embodiment of the present invention is identical as the update method of vehicle-mounted software in foregoing embodiments.
Correspondingly, the embodiment of the invention also discloses a kind of readable storage medium storing program for executing, it is stored on the readable storage medium storing program for executing Computer program realizes that vehicle-mounted software is more as described in any one embodiment above when the computer program is executed by processor The step of new method.
Wherein, the specific datail description in relation to the readable storage medium storing program for executing can refer to related vehicle-mounted soft in foregoing embodiments The related content of the update method of part, details are not described herein again.
Advantageous effect in the embodiment of the present invention is identical as the update method of vehicle-mounted software in foregoing embodiments.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that the process, method, article or equipment including a series of elements includes not only that A little elements, but also include other elements that are not explicitly listed, or further include for this process, method, article or The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged Except there is also other identical elements in the process, method, article or apparatus that includes the element.
Above to a kind of update method, system, device and the readable storage medium storing program for executing of vehicle-mounted software provided by the present invention into It has gone and has been discussed in detail, principle and implementation of the present invention are described for specific case used herein, the above implementation The explanation of example is merely used to help understand the method and its core concept of the present invention;Meanwhile for the general technology people of this field Member, according to the thought of the present invention, there will be changes in the specific implementation manner and application range, in conclusion this explanation Book content should not be construed as limiting the invention.

Claims (10)

1. a kind of update method of vehicle-mounted software, which is characterized in that including:
Obtain the vehicle-mounted software and input secret key;
Verification secret key is generated using the attributive character of the vehicle-mounted software;
Judge whether the input secret key and the verification secret key are consistent;
If so, deactivation system is closed, to carry out relevant operation to the vehicle-mounted software.
2. update method according to claim 1, which is characterized in that
The input secret key is to be given birth to according to the attributive character of the vehicle-mounted software after depot's data platform receives system operatio application At and the secret key that issues.
3. update method according to claim 1, which is characterized in that described to carry out relevant operation packet to the vehicle-mounted software It includes:
The vehicle-mounted software is installed, updated or unloaded.
4. update method according to claim 3, which is characterized in that
The attributive character of the vehicle-mounted software includes the version and/or feature code of the vehicle-mounted software.
5. update method according to claim 4, which is characterized in that
The vehicle-mounted software includes navigation software and/or FM broadcast softwares and/or on-vehicle Bluetooth software.
6. according to any one of claim 1 to 5 update method, which is characterized in that
The process that the attributive character using the vehicle-mounted software generates verification secret key specifically includes:
By presetting the aapt.exe tools of Python scripts and attributive character for obtaining the vehicle-mounted software, using described The attributive character of vehicle-mounted software generates verification secret key;
The input secret key is:
After depot's data platform receives system operatio application, by the default Python scripts and the aapt.exe tools, The secret key for generating and issuing according to the attributive character of the vehicle-mounted software.
7. update method according to claim 6, which is characterized in that it is described to obtain vehicle-mounted software and input after secret key, also Including:
Whether before the deadline to judge the input secret key;
If so, starting the process for generating verification secret key using the vehicle-mounted software and attributive character.
8. a kind of more new system of vehicle-mounted software, which is characterized in that including:
Acquisition module, for obtaining the vehicle-mounted software and input secret key;
Secret key generation module, for generating verification secret key using the attributive character of the vehicle-mounted software;
Judgment module, for judging whether the input secret key and the verification secret key are consistent;If so, starting operation module;
The action module is closed for deactivation system, to carry out relevant operation to the vehicle-mounted software.
9. a kind of updating device of vehicle-mounted software, which is characterized in that including:
Memory, for storing computer program;
Processor realizes the update of the vehicle-mounted software as described in any one of claim 1 to 7 when for executing the computer program The step of method.
10. a kind of readable storage medium storing program for executing, which is characterized in that be stored with computer program, the meter on the readable storage medium storing program for executing It is realized when calculation machine program is executed by processor as described in any one of claim 1 to 7 the step of the update method of vehicle-mounted software.
CN201810259684.5A 2018-03-27 2018-03-27 A kind of update method, system, device and the readable storage medium storing program for executing of vehicle-mounted software Pending CN108388439A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810259684.5A CN108388439A (en) 2018-03-27 2018-03-27 A kind of update method, system, device and the readable storage medium storing program for executing of vehicle-mounted software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810259684.5A CN108388439A (en) 2018-03-27 2018-03-27 A kind of update method, system, device and the readable storage medium storing program for executing of vehicle-mounted software

Publications (1)

Publication Number Publication Date
CN108388439A true CN108388439A (en) 2018-08-10

Family

ID=63072685

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810259684.5A Pending CN108388439A (en) 2018-03-27 2018-03-27 A kind of update method, system, device and the readable storage medium storing program for executing of vehicle-mounted software

Country Status (1)

Country Link
CN (1) CN108388439A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109041263A (en) * 2018-08-29 2018-12-18 武汉光庭信息技术股份有限公司 A kind of TBox Bluetooth connecting method and device
CN111414606A (en) * 2020-03-18 2020-07-14 一汽-大众汽车有限公司 Robot interface management method and device
CN112925534A (en) * 2021-02-25 2021-06-08 广东电网有限责任公司电力调度控制中心 Embedded application unloading method and device for cryptographic chip
CN112925535A (en) * 2021-02-25 2021-06-08 广东电网有限责任公司电力调度控制中心 Method and device for installing embedded application of password chip
WO2022068322A1 (en) * 2020-09-29 2022-04-07 International Business Machines Corporation Software access through heterogeneous encryption
US12001523B2 (en) 2020-09-29 2024-06-04 International Business Machines Corporation Software access through heterogeneous encryption

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1949235A (en) * 2006-04-24 2007-04-18 南京熊猫电子股份有限公司 Tax controlling equipment software edition intelligent upgrade encryption identification method
CN103685471A (en) * 2013-11-21 2014-03-26 珠海金山网络游戏科技有限公司 Method and system for updating software client sides in monopoly mode
KR20140109949A (en) * 2012-01-11 2014-09-16 마이크로소프트 코포레이션 Contextual solicitation in a starter application
CN104780445A (en) * 2015-03-18 2015-07-15 福建新大陆通信科技股份有限公司 Method and system for preventing set top box software from malicious upgrade

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1949235A (en) * 2006-04-24 2007-04-18 南京熊猫电子股份有限公司 Tax controlling equipment software edition intelligent upgrade encryption identification method
KR20140109949A (en) * 2012-01-11 2014-09-16 마이크로소프트 코포레이션 Contextual solicitation in a starter application
CN103685471A (en) * 2013-11-21 2014-03-26 珠海金山网络游戏科技有限公司 Method and system for updating software client sides in monopoly mode
CN104780445A (en) * 2015-03-18 2015-07-15 福建新大陆通信科技股份有限公司 Method and system for preventing set top box software from malicious upgrade

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
VICLEE108: "通过Python脚本读取apk信息", 《CSDN博客 HTTPS://BLOG.CSDN.NET/GOODLIXUEYONG/ARTICLE/DETAILS/52004668》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109041263A (en) * 2018-08-29 2018-12-18 武汉光庭信息技术股份有限公司 A kind of TBox Bluetooth connecting method and device
CN109041263B (en) * 2018-08-29 2020-12-08 武汉光庭信息技术股份有限公司 TBox Bluetooth connection method and device
CN111414606A (en) * 2020-03-18 2020-07-14 一汽-大众汽车有限公司 Robot interface management method and device
WO2022068322A1 (en) * 2020-09-29 2022-04-07 International Business Machines Corporation Software access through heterogeneous encryption
GB2614677A (en) * 2020-09-29 2023-07-12 Ibm Software access through heterogeneous encryption
US12001523B2 (en) 2020-09-29 2024-06-04 International Business Machines Corporation Software access through heterogeneous encryption
CN112925534A (en) * 2021-02-25 2021-06-08 广东电网有限责任公司电力调度控制中心 Embedded application unloading method and device for cryptographic chip
CN112925535A (en) * 2021-02-25 2021-06-08 广东电网有限责任公司电力调度控制中心 Method and device for installing embedded application of password chip

Similar Documents

Publication Publication Date Title
CN108388439A (en) A kind of update method, system, device and the readable storage medium storing program for executing of vehicle-mounted software
US11669338B2 (en) Device locator disable authentication
US8978160B2 (en) Method for selective software rollback
CN101202762B (en) Methods and system for storing and retrieving identity mapping information
US11218478B1 (en) Security platform
CN103679005B (en) The method for enabling the development mode of secure electronic control unit
CN103677892A (en) Authorization scheme to enable special privilege mode in secure electronic control unit
US20140032916A1 (en) Secured flash programming of secondary processor
US20190215163A1 (en) Electronic custody tracking
RU2011153984A (en) TRUSTED AUTHORITY ADMINISTRATOR (TIM)
JP2008022526A (en) Attribute certificate verification method, attribute authority apparatus, service providing apparatus, and attribute certificate verification system
CN103888252A (en) UID, PID, and APPID-based control application access permission method
EP3031036A2 (en) Access and control authorisation system
CN110371081A (en) Vehicle tamper resistant method, device and vehicle
CN113240833A (en) Vehicle-mounted function control method, system, electronic device and storage medium
CN106240521B (en) Method and apparatus for remote vehicle keypad enablement and disablement
CN111953634B (en) Access control method and device for terminal equipment, computer equipment and storage medium
CN111783060A (en) Electronic certificate distribution control method and device, electronic equipment and storage medium
EP2490395A1 (en) Method and system for access control for near field communication
US10484373B2 (en) Systems and methods for biometric authentication of certificate signing request processing
US20190114414A1 (en) Vehicle computer update authentication
CN116842502A (en) Decentralizing identity verification method, system and readable storage medium
CN102081717A (en) Method for protecting authorized software by using metadata
US11321072B2 (en) Vehicle computer update authentication
US10755504B1 (en) Method for controlling vehicle based on location information and vehicle-control supporting server using the same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180810

RJ01 Rejection of invention patent application after publication