CN103049683A - Authorization encryption method of upper computer program of BMS (Battery Management System) - Google Patents

Authorization encryption method of upper computer program of BMS (Battery Management System) Download PDF

Info

Publication number
CN103049683A
CN103049683A CN2012105510340A CN201210551034A CN103049683A CN 103049683 A CN103049683 A CN 103049683A CN 2012105510340 A CN2012105510340 A CN 2012105510340A CN 201210551034 A CN201210551034 A CN 201210551034A CN 103049683 A CN103049683 A CN 103049683A
Authority
CN
China
Prior art keywords
bms
authorization
host computer
computer procedure
computer program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012105510340A
Other languages
Chinese (zh)
Other versions
CN103049683B (en
Inventor
刘飞
文锋
阮旭松
邓军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huizhou Epower Electronics Co Ltd
Original Assignee
Huizhou Epower Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huizhou Epower Electronics Co Ltd filed Critical Huizhou Epower Electronics Co Ltd
Priority to CN201210551034.0A priority Critical patent/CN103049683B/en
Publication of CN103049683A publication Critical patent/CN103049683A/en
Application granted granted Critical
Publication of CN103049683B publication Critical patent/CN103049683B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses an authorization encryption method of an upper computer program of a BMS (Battery Management System). The authorization encryption method comprises the following steps that: a user PC (Personal Computer) is installed with the upper computer program and obtains authorization through an authorization code; the upper computer program reads hardware information of the PC, generates a hardware identification code, puts the hardware identification code in the authorization code and stores a new authorization code in the upper computer program; the PC is connected to the BMS for the first time, the BMS interactively contrasts the authorization code information through the upper computer program and confirms if the PC is legally authorized; and when the BMS is needed to be connected to be written and read, the PC is connected to the BMS to start up the upper computer program, and the BMS checks if the upper computer program is legally authorized. The authorization encryption method of the upper computer program of the BMS can protect the upper computer program technology and use right thereof efficiently, prevent an authorization code file from being decrypted maliciously and reduce a risk of software imitation.

Description

A kind of BMS host computer procedure mandate time slot scrambling
Technical field
The present invention relates to the improvement of BMS safety technique.
Background technology
Battery management system and the host computer thereof of at present electric automobile use all do not have secrecy provision, as long as anyone can copy host computer among the own PC to, can both carry out communication with battery management system, can read the parameters such as voltage, capacity, temperature and temperature rise of respective battery, this will cause the leakage of battery management system technology, the leakage of battery technology index, causes damage for battery management system producer and battery producer.
The authorization technique of often using in the software at present has: hardware lock technology and authorization code technology.
Hardware lock technology: be commonly used in anti-software and copied standby upper, mostly pass through at present the hardware such as drive information of MAC Address of Network Card, CPU sequence number or the hard disk of locking user PC, be not authorized to software and just can not use, real software is not freely copied the purpose of use.The shortcoming of this class technology is: may not have network interface card on some user PC, can replace with virtual mac address even if having also; The CPU sequence number just only has dividing of classification, and has not had concrete difference after 4 models of running quickly, and just can't lock according to the CPU sequence number after 4; The drive of hard disk then can be revised by dos command or other software, so these are not safest hardware lock modes, they all might be cracked.
The authorization code technology: authorization code often will be confirmed by network user's information, thereby is confirmed whether it is authorized user.If but in off-line state then can't realize the identification of authorization code, so usually only the function on open basis come limited subscriber to use and protect software copyright.
Summary of the invention
In view of this, the technical problem to be solved in the present invention is a kind of BMS host computer procedure mandate time slot scrambling that can prevent effectively that host computer procedure from being used by the malice copy.
In order to solve the problems of the technologies described above, the present invention adopts following scheme to realize:
A kind of BMS host computer procedure mandate time slot scrambling, the method comprises the steps:
(1). user's PC is installed host computer procedure, and obtains the authorization by authorization code;
(2). host computer procedure reads the PC hardware information, and generates the hardware identification coding, and this hardware identification coding is put in the authorization code, then leaves in new authorization code together in the host computer procedure;
(3) the .PC machine is connected for the first time with BMS, BMS compares authorization code information alternately by host computer procedure, confirm whether this PC is legal authorization, if the hardware identification coding for storing in legal authorization then the BMS storage host computer procedure then prompts for and can not obtain the authorization if not legal authorization;
(4). need to be connected with BMS when BMS read and write, PC is connected with BMS, start host computer procedure, BMS checks whether host computer procedure is legal authorization, if for the hardware identification coding that legal authorization then verify is stored among the BMS whether consistent with the PC hardware information that is connecting, if unanimously then PC can carry out normal read-write operation to BMS, if host computer procedure inconsistent then that be judged as on this PC is the illegal copies program, PC can't operate BMS.
Wherein, the identification code that has the identification authorization mechanism in the described authorization code.
The present invention has following advantage:
1. can effectively protect host computer procedure technology and right to use thereof, the copyright of protection host computer procedure is convenient to realize that host computer uses charging mechanism.Host computer need just can use through authorizing, and unauthorized user can't be installed host computer, and can not use from the host computer procedure that other computer copies, thereby protect the host computer procedure literary property.By the supervisor authority code, can realize that host computer uses charging mechanism.
2. the present invention is safe.Authorization code file is all through storage after encrypting, and encryption rule is that user oneself defines, and non-insider can't know, thereby prevents that authorization code file from maliciously being cracked.
3. authentication policy of the present invention is tighter, and it is stronger that software prevents illegally cracking usability, needs host computer procedure and BMS to realize alternately each other authentication, can reduce the risk that software is imitated.
Embodiment
For the ease of it will be appreciated by those skilled in the art that below in conjunction with embodiment the present invention is described in further detail:
A kind of BMS host computer procedure mandate time slot scrambling, the method comprises the steps:
(1). user's PC is installed host computer procedure, and obtains the authorization by authorization code;
(2). host computer procedure reads the PC hardware information, and generates the hardware identification coding, and this hardware identification coding is put in the authorization code, then leaves in new authorization code together in the host computer procedure;
(3) the .PC machine is connected for the first time with BMS, BMS compares authorization code information alternately by host computer procedure, confirm whether this PC is legal authorization, if the hardware identification coding for storing in legal authorization then the BMS storage host computer procedure then prompts for and can not obtain the authorization if not legal authorization;
(4). need to be connected with BMS when BMS read and write, PC is connected with BMS, start host computer procedure, BMS checks whether host computer procedure is legal authorization, if for the hardware identification coding that legal authorization then verify is stored among the BMS whether consistent with the PC hardware information that is connecting, if unanimously then PC can carry out normal read-write operation to BMS, if host computer procedure inconsistent then that be judged as on this PC is the illegal copies program, PC can't operate BMS.
Wherein, the identification code that has the identification authorization mechanism in the described authorization code.
In the present embodiment, the PC user during machine program of position, must go out authorized access code from host computer procedure provider simultaneously, otherwise program can not be used in the use.Authorization code is comprised of " client's identification division+hardware identification part+target authorization portions+function controlling part divides " four parts, and its each several part effect is as follows:
Client's identification division: limit different host computer procedures and PC and can only set up communication with corresponding client's BMS, can only read corresponding client's battery information, be i.e. client identity identification restriction.
The hardware identification part: program is before first the use, and the hardware identification part in the authorization code is without any coding; During first the use, program can read the hardware information of PC and encode, and prevents that the random copy of host computer procedure between different PCs from using, and namely PC uses restriction.
The target authorization portions: whether the software version number of checking host computer procedure and BMS matches, and does not match then and can not use.
Function controlling part divides: be each functional module in the management host computer procedure, if the PC user has this right, then function controlling part divides the functional module of the correspondence in open this host computer procedure; If the user is this right not, then function controlling part divides the functional module of hiding correspondence in the host computer procedure.
Above-described embodiment only is wherein specific implementation of the present invention, and it describes comparatively concrete and detailed, but can not therefore be interpreted as the restriction to claim of the present invention.Should be pointed out that for the person of ordinary skill of the art, without departing from the inventive concept of the premise, can also make some distortion and improvement, these apparent replacement forms all belong to protection scope of the present invention.

Claims (2)

1. a BMS host computer procedure mandate time slot scrambling is characterized in that the method comprises the steps:
(1). user's PC is installed host computer procedure, and obtains the authorization by authorization code;
(2). host computer procedure reads the PC hardware information, and generates the hardware identification coding, and this hardware identification coding is put in the authorization code, then leaves in new authorization code together in the host computer procedure;
(3) the .PC machine is connected for the first time with BMS, BMS compares authorization code information alternately by host computer procedure, confirm whether this PC is legal authorization, if the hardware identification coding for storing in legal authorization then the BMS storage host computer procedure then prompts for and can not obtain the authorization if not legal authorization;
(4). need to be connected with BMS when BMS read and write, PC is connected with BMS, start host computer procedure, BMS checks whether host computer procedure is legal authorization, if for the hardware identification coding that legal authorization then verify is stored among the BMS whether consistent with the PC hardware information that is connecting, if unanimously then PC can carry out normal read-write operation to BMS, if host computer procedure inconsistent then that be judged as on this PC is the illegal copies program, PC can't operate BMS.
2. BMS host computer procedure mandate time slot scrambling according to claim 1 is characterized in that, has the identification code of identification authorization mechanism in the described authorization code.
CN201210551034.0A 2012-12-18 2012-12-18 A kind of BMS host computer procedure mandate time slot scrambling Active CN103049683B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210551034.0A CN103049683B (en) 2012-12-18 2012-12-18 A kind of BMS host computer procedure mandate time slot scrambling

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210551034.0A CN103049683B (en) 2012-12-18 2012-12-18 A kind of BMS host computer procedure mandate time slot scrambling

Publications (2)

Publication Number Publication Date
CN103049683A true CN103049683A (en) 2013-04-17
CN103049683B CN103049683B (en) 2016-04-06

Family

ID=48062317

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210551034.0A Active CN103049683B (en) 2012-12-18 2012-12-18 A kind of BMS host computer procedure mandate time slot scrambling

Country Status (1)

Country Link
CN (1) CN103049683B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106355110A (en) * 2016-08-29 2017-01-25 惠州市蓝微新源技术有限公司 BMS hardware encryption system and encryption method thereof
CN117077184A (en) * 2023-10-17 2023-11-17 西安热工研究院有限公司 Method, system, equipment and medium for authorizing and keeping secret of upper computer software of DCS (distributed control system)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1305151A (en) * 1999-12-08 2001-07-25 开利公司 Software safety mechanism
CN1740940A (en) * 2005-09-09 2006-03-01 北京兆日科技有限责任公司 Method for realizing computer software intruder preventing edition based on confidence computation module chip
CN1744099A (en) * 2004-09-01 2006-03-08 微软公司 Licensing the use of software on a particular CPU
JP2007179357A (en) * 2005-12-28 2007-07-12 Hitachi Software Eng Co Ltd Method for installing computer program
CN101201883A (en) * 2007-09-18 2008-06-18 北京赛柏科技有限责任公司 Software protection method based on virtual machine
CN101441692A (en) * 2008-11-21 2009-05-27 北京市研祥兴业国际智能科技有限公司 Method for binding computer hardware and software
US7734550B1 (en) * 2003-10-07 2010-06-08 Microsoft Corporation Method and system for identifying the controlling license for installed software
WO2011101972A1 (en) * 2010-02-18 2011-08-25 株式会社東芝 Program

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1305151A (en) * 1999-12-08 2001-07-25 开利公司 Software safety mechanism
US7734550B1 (en) * 2003-10-07 2010-06-08 Microsoft Corporation Method and system for identifying the controlling license for installed software
CN1744099A (en) * 2004-09-01 2006-03-08 微软公司 Licensing the use of software on a particular CPU
CN1740940A (en) * 2005-09-09 2006-03-01 北京兆日科技有限责任公司 Method for realizing computer software intruder preventing edition based on confidence computation module chip
JP2007179357A (en) * 2005-12-28 2007-07-12 Hitachi Software Eng Co Ltd Method for installing computer program
CN101201883A (en) * 2007-09-18 2008-06-18 北京赛柏科技有限责任公司 Software protection method based on virtual machine
CN101441692A (en) * 2008-11-21 2009-05-27 北京市研祥兴业国际智能科技有限公司 Method for binding computer hardware and software
WO2011101972A1 (en) * 2010-02-18 2011-08-25 株式会社東芝 Program

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106355110A (en) * 2016-08-29 2017-01-25 惠州市蓝微新源技术有限公司 BMS hardware encryption system and encryption method thereof
CN117077184A (en) * 2023-10-17 2023-11-17 西安热工研究院有限公司 Method, system, equipment and medium for authorizing and keeping secret of upper computer software of DCS (distributed control system)
CN117077184B (en) * 2023-10-17 2024-01-30 西安热工研究院有限公司 Method, system, equipment and medium for authorizing and keeping secret of upper computer software of DCS (distributed control system)

Also Published As

Publication number Publication date
CN103049683B (en) 2016-04-06

Similar Documents

Publication Publication Date Title
CN103065102B (en) Data encryption mobile storage management method based on virtual disk
CN102948114B (en) Single for accessing enciphered data uses authentication method and system
CN100449561C (en) Divulging secrets prevention system of USB storage device date based on certificate and transparent encryption technology
CN104318176B (en) Data management method and device for terminal and terminal
CN102884535A (en) Protected device management
CN102279814B (en) Encryption anti-copy system and anti-copy method thereof
CN101635018A (en) Method of safety ferriage of USB flash disk data
CN109344598A (en) The binding of equipment room and authority control method, device, equipment and storage medium
CN109800605A (en) A kind of fail-safe computer
CN101739361A (en) Access control method, access control device and terminal device
CN107590395A (en) Suitable for multi-layer data encryption method, device, equipment and the system of cloud environment
CN102902635B (en) Safety U disk system for enterprises
CN103268435A (en) Intranet license generation method and system, and intranet license protection method and system
CN102073597B (en) A kind of operating system dish full disk encryption method based on authenticating user identification
CN105260627B (en) A kind of anti-copy method of embedded device program
CN111539042B (en) Safe operation method based on trusted storage of core data files
CN103049683B (en) A kind of BMS host computer procedure mandate time slot scrambling
CN107273725A (en) A kind of data back up method and system for classified information
CN111523127B (en) Authority authentication method and system for password equipment
CN104598837B (en) A kind of environment implementation method solving file security editor demand
CN1091902C (en) Access control of general computer, its software copyright protector and method
CN113221139A (en) Electronic information encryption method
CN102542698A (en) Safety protective method of electric power mobile payment terminal
CN106817359A (en) A kind of safety access control method of intelligent electric meter data
CN110443070A (en) More host shared memory systems and data completeness protection method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant