CN103136457A - BMS upper computer program protection method - Google Patents

BMS upper computer program protection method Download PDF

Info

Publication number
CN103136457A
CN103136457A CN2012105610315A CN201210561031A CN103136457A CN 103136457 A CN103136457 A CN 103136457A CN 2012105610315 A CN2012105610315 A CN 2012105610315A CN 201210561031 A CN201210561031 A CN 201210561031A CN 103136457 A CN103136457 A CN 103136457A
Authority
CN
China
Prior art keywords
computer program
bms
upper computer
host computer
xml
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012105610315A
Other languages
Chinese (zh)
Inventor
刘飞
文锋
阮旭松
邓军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huizhou Epower Electronics Co Ltd
Original Assignee
Huizhou Epower Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huizhou Epower Electronics Co Ltd filed Critical Huizhou Epower Electronics Co Ltd
Priority to CN2012105610315A priority Critical patent/CN103136457A/en
Publication of CN103136457A publication Critical patent/CN103136457A/en
Pending legal-status Critical Current

Links

Abstract

Provided is a BMS upper computer program protection method. The extensive makeup language (XML) is adopted by the upper computer program. An encryption method comprises the steps of secret keys are added to the upper computer program, and the secret keys have interference information which avoids malicious decryption. Due to the fact that secret keys are added, security of BMS is enhanced. Besides, XML which can be extensively marked up is adopted to describe in the upper computer program, automatic switching with dpc files can be achieved, and therefore CANoe can be conveniently used by inside staff. Besides, batch processing and batch interpretation can be carried out on XML files by software, controller area network (CAN) bus are fully used, and high efficient transmission of CAN information is ensured.

Description

The guard method of a kind of BMS host computer procedure
Technical field
The present invention relates to a kind of electric automobile BMS host computer improvement technology.
Background technology
Describe at present the BMS function of electric automobile or the usual way of CAN signal and divide at present two large classes:
First kind document description Use Word, Excel are that the document of word, form comes Direct function description, the definition of various CAN signals and function in BMS.Advantage be describe more detailed; Shortcoming is only can as the help document of help or dictionary format, must by manually consulting, can't realize the automatic identification of program.
The .dbc file of Equations of The Second Kind CANoe software is described various CAN signals in BMS with the .dbc file layout.Advantage: the file layout of unified standard, can pass through CANoe software automatic translation.Shortcoming: the form of .dbc file and implication are Open Standard, if use the CAN signal of the non-public character of this document format description mean that in BMS, institute's protocols having may be disclosed, the intellecture property of enterprise are caused great loss.
Summary of the invention
In view of this, the technical problem to be solved in the present invention is a kind of BMS host computer procedure guard method that can effectively protect the BMS host computer procedure can arbitrarily not copy, crack.
In order to solve the problems of the technologies described above, the present invention adopts following scheme to realize:
The guard method of a kind of BMS host computer procedure, this host computer procedure adopts the XML language description, and this encryption method is: add key in host computer procedure, have the interfere information of the malicious decryption of preventing in key.
The present invention has strengthened the security of BMS by adding key.And, host computer procedure of the present invention is because use the XML language of extensibility mark to be described, can realize the automatic conversion with the .dbc file, facilitate the insider to use CANoe, and the XML language file can be carried out batch processing and deciphering by software, take full advantage of the CAN bus, guaranteed the high efficiency of transmission of CAN information.
Embodiment
For the ease of it will be appreciated by those skilled in the art that below in conjunction with embodiment, the present invention is described in further detail:
Arbitrarily copy use for fear of the BMS host computer procedure; avoid battery and management system technical information thereof to reveal; this enforcement namely designs the guard method of a kind of BMS host computer procedure, and the method adopts the XML language as communications protocol, describes function and the CAN signal of BMS with it.Because the XML language is Markup Language, so this file can be carried out batch processing and deciphering by software, and use host computer procedure to be converted to the .dbc file that CANoe software can be identified to the XML language file, facilitate the internal staff to use CANoe and BMS to carry out communication.
This guard method is for adding key in host computer procedure; XML language file content is encrypted, uses the encryption rule of oneself, in file, only some is real key information to key; other parts are distracters, thereby prevent other people Brute Force key.
The same XML language description with meeting this communication protocol standard of host computer procedure, other host computer procedure that arbitrarily copies can not use; And all need key when opening host computer procedure at every turn.This programme adds cryptographic algorithm in host computer procedure, and after transforming through cryptographic algorithm after the key input, ability and BMS set up the confirmation of shaking hands, and carry out communication.Therefore same client has different host computer procedures hardly, increase client's battery information technical know-how.
To sum up; this programme can realize that different clients has a different host computer procedure; between different clients, host computer procedure can not be general; and do not use the host computer procedure of XML language description cannot use yet; adding the use of key; for BMS and battery increase triple protection, protect as far as possible its information not revealed.
Above-described embodiment is only wherein specific implementation of the present invention, and it describes comparatively concrete and detailed, but can not therefore be interpreted as the restriction to the scope of the claims of the present invention.Should be pointed out that for the person of ordinary skill of the art, without departing from the inventive concept of the premise, can also make some distortion and improvement, these apparent replacement forms all belong to protection scope of the present invention.

Claims (1)

1. BMS host computer procedure guard method is characterized in that, this host computer procedure adopts the XML language description, and this encryption method is: add key in host computer procedure, have the interfere information of the malicious decryption of preventing in key.
CN2012105610315A 2012-12-21 2012-12-21 BMS upper computer program protection method Pending CN103136457A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012105610315A CN103136457A (en) 2012-12-21 2012-12-21 BMS upper computer program protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012105610315A CN103136457A (en) 2012-12-21 2012-12-21 BMS upper computer program protection method

Publications (1)

Publication Number Publication Date
CN103136457A true CN103136457A (en) 2013-06-05

Family

ID=48496274

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012105610315A Pending CN103136457A (en) 2012-12-21 2012-12-21 BMS upper computer program protection method

Country Status (1)

Country Link
CN (1) CN103136457A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103984580A (en) * 2014-05-30 2014-08-13 天津力神电池股份有限公司 DBP configuration file, monitoring device configuring method and monitoring device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1359073A (en) * 2002-01-07 2002-07-17 东南大学 Digital content secret transmitting and receiving method based on extendible marked language
CN101192930A (en) * 2007-12-21 2008-06-04 浪潮电子信息产业股份有限公司 A secure communication method based on enhanced XML file format
CN101282217A (en) * 2007-04-05 2008-10-08 华为技术有限公司 Method, apparatus and system for protecting biological attribute data
CN101651861A (en) * 2008-08-15 2010-02-17 希姆通信息技术(上海)有限公司 Method and device for encrypting mobile phone programs

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1359073A (en) * 2002-01-07 2002-07-17 东南大学 Digital content secret transmitting and receiving method based on extendible marked language
CN101282217A (en) * 2007-04-05 2008-10-08 华为技术有限公司 Method, apparatus and system for protecting biological attribute data
CN101192930A (en) * 2007-12-21 2008-06-04 浪潮电子信息产业股份有限公司 A secure communication method based on enhanced XML file format
CN101651861A (en) * 2008-08-15 2010-02-17 希姆通信息技术(上海)有限公司 Method and device for encrypting mobile phone programs

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103984580A (en) * 2014-05-30 2014-08-13 天津力神电池股份有限公司 DBP configuration file, monitoring device configuring method and monitoring device
CN103984580B (en) * 2014-05-30 2017-10-24 天津力神电池股份有限公司 DBP configuration files and supervising device collocation method, supervising device

Similar Documents

Publication Publication Date Title
CN104871484B (en) The system and method for network firewall for the endpoint hardware auxiliary in security context
CN103441991A (en) Mobile terminal security access platform
Hull et al. Staying in control: Cybersecurity and the modern electric grid
CN102682506A (en) Intelligent Bluetooth door access control method and device based on symmetric cryptographic technique
CN104219077A (en) Information management system for middle and small-sized enterprises
WO2001043393A3 (en) Decoupling access control from key management in a network
CN202652534U (en) Mobile terminal safety access platform
EP3713147B1 (en) Railway signal security encryption method and system
CN203659017U (en) USB interface lock
CN108737365A (en) A kind of network data information guard method and device
CN103136457A (en) BMS upper computer program protection method
CN205232389U (en) Frequency encoding and decoding SOC chip is looked to safe sound
CN103269301A (en) Desktop type IPSecVPN cryptographic machine and networking method
CN102098282B (en) Secure encryption method for database
CN115150200A (en) Electric power data sharing system and equipment based on block chain
Hadbah et al. Powerful IEDs, ethernet networks and their effects on IEC 61850-based electric power utilities security
CN101616004A (en) A kind of emergency response processing method of 4A management platform
CN212463237U (en) Gateway for controlling access to Internet of things based on block chain
CN111132136B (en) Mobile application information security system application system
CN103532958A (en) Method for encrypting website resources
CN103391187A (en) Cloud storage safety control method
CN106027535A (en) Campus network security authentication system and method
Yuan Security technology of computer information system based on DES data encryption algorithm
CN201707676U (en) Virtualized enterprise information management system
CN217935630U (en) Network isolation encryption system with KVM function

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20130605