CN103136457A - BMS upper computer program protection method - Google Patents
BMS upper computer program protection method Download PDFInfo
- Publication number
- CN103136457A CN103136457A CN2012105610315A CN201210561031A CN103136457A CN 103136457 A CN103136457 A CN 103136457A CN 2012105610315 A CN2012105610315 A CN 2012105610315A CN 201210561031 A CN201210561031 A CN 201210561031A CN 103136457 A CN103136457 A CN 103136457A
- Authority
- CN
- China
- Prior art keywords
- computer program
- bms
- upper computer
- host computer
- xml
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
Provided is a BMS upper computer program protection method. The extensive makeup language (XML) is adopted by the upper computer program. An encryption method comprises the steps of secret keys are added to the upper computer program, and the secret keys have interference information which avoids malicious decryption. Due to the fact that secret keys are added, security of BMS is enhanced. Besides, XML which can be extensively marked up is adopted to describe in the upper computer program, automatic switching with dpc files can be achieved, and therefore CANoe can be conveniently used by inside staff. Besides, batch processing and batch interpretation can be carried out on XML files by software, controller area network (CAN) bus are fully used, and high efficient transmission of CAN information is ensured.
Description
Technical field
The present invention relates to a kind of electric automobile BMS host computer improvement technology.
Background technology
Describe at present the BMS function of electric automobile or the usual way of CAN signal and divide at present two large classes:
First kind document description Use Word, Excel are that the document of word, form comes Direct function description, the definition of various CAN signals and function in BMS.Advantage be describe more detailed; Shortcoming is only can as the help document of help or dictionary format, must by manually consulting, can't realize the automatic identification of program.
The .dbc file of Equations of The Second Kind CANoe software is described various CAN signals in BMS with the .dbc file layout.Advantage: the file layout of unified standard, can pass through CANoe software automatic translation.Shortcoming: the form of .dbc file and implication are Open Standard, if use the CAN signal of the non-public character of this document format description mean that in BMS, institute's protocols having may be disclosed, the intellecture property of enterprise are caused great loss.
Summary of the invention
In view of this, the technical problem to be solved in the present invention is a kind of BMS host computer procedure guard method that can effectively protect the BMS host computer procedure can arbitrarily not copy, crack.
In order to solve the problems of the technologies described above, the present invention adopts following scheme to realize:
The guard method of a kind of BMS host computer procedure, this host computer procedure adopts the XML language description, and this encryption method is: add key in host computer procedure, have the interfere information of the malicious decryption of preventing in key.
The present invention has strengthened the security of BMS by adding key.And, host computer procedure of the present invention is because use the XML language of extensibility mark to be described, can realize the automatic conversion with the .dbc file, facilitate the insider to use CANoe, and the XML language file can be carried out batch processing and deciphering by software, take full advantage of the CAN bus, guaranteed the high efficiency of transmission of CAN information.
Embodiment
For the ease of it will be appreciated by those skilled in the art that below in conjunction with embodiment, the present invention is described in further detail:
Arbitrarily copy use for fear of the BMS host computer procedure; avoid battery and management system technical information thereof to reveal; this enforcement namely designs the guard method of a kind of BMS host computer procedure, and the method adopts the XML language as communications protocol, describes function and the CAN signal of BMS with it.Because the XML language is Markup Language, so this file can be carried out batch processing and deciphering by software, and use host computer procedure to be converted to the .dbc file that CANoe software can be identified to the XML language file, facilitate the internal staff to use CANoe and BMS to carry out communication.
This guard method is for adding key in host computer procedure; XML language file content is encrypted, uses the encryption rule of oneself, in file, only some is real key information to key; other parts are distracters, thereby prevent other people Brute Force key.
The same XML language description with meeting this communication protocol standard of host computer procedure, other host computer procedure that arbitrarily copies can not use; And all need key when opening host computer procedure at every turn.This programme adds cryptographic algorithm in host computer procedure, and after transforming through cryptographic algorithm after the key input, ability and BMS set up the confirmation of shaking hands, and carry out communication.Therefore same client has different host computer procedures hardly, increase client's battery information technical know-how.
To sum up; this programme can realize that different clients has a different host computer procedure; between different clients, host computer procedure can not be general; and do not use the host computer procedure of XML language description cannot use yet; adding the use of key; for BMS and battery increase triple protection, protect as far as possible its information not revealed.
Above-described embodiment is only wherein specific implementation of the present invention, and it describes comparatively concrete and detailed, but can not therefore be interpreted as the restriction to the scope of the claims of the present invention.Should be pointed out that for the person of ordinary skill of the art, without departing from the inventive concept of the premise, can also make some distortion and improvement, these apparent replacement forms all belong to protection scope of the present invention.
Claims (1)
1. BMS host computer procedure guard method is characterized in that, this host computer procedure adopts the XML language description, and this encryption method is: add key in host computer procedure, have the interfere information of the malicious decryption of preventing in key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012105610315A CN103136457A (en) | 2012-12-21 | 2012-12-21 | BMS upper computer program protection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012105610315A CN103136457A (en) | 2012-12-21 | 2012-12-21 | BMS upper computer program protection method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103136457A true CN103136457A (en) | 2013-06-05 |
Family
ID=48496274
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012105610315A Pending CN103136457A (en) | 2012-12-21 | 2012-12-21 | BMS upper computer program protection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103136457A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103984580A (en) * | 2014-05-30 | 2014-08-13 | 天津力神电池股份有限公司 | DBP configuration file, monitoring device configuring method and monitoring device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1359073A (en) * | 2002-01-07 | 2002-07-17 | 东南大学 | Digital content secret transmitting and receiving method based on extendible marked language |
CN101192930A (en) * | 2007-12-21 | 2008-06-04 | 浪潮电子信息产业股份有限公司 | A secure communication method based on enhanced XML file format |
CN101282217A (en) * | 2007-04-05 | 2008-10-08 | 华为技术有限公司 | Method, apparatus and system for protecting biological attribute data |
CN101651861A (en) * | 2008-08-15 | 2010-02-17 | 希姆通信息技术(上海)有限公司 | Method and device for encrypting mobile phone programs |
-
2012
- 2012-12-21 CN CN2012105610315A patent/CN103136457A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1359073A (en) * | 2002-01-07 | 2002-07-17 | 东南大学 | Digital content secret transmitting and receiving method based on extendible marked language |
CN101282217A (en) * | 2007-04-05 | 2008-10-08 | 华为技术有限公司 | Method, apparatus and system for protecting biological attribute data |
CN101192930A (en) * | 2007-12-21 | 2008-06-04 | 浪潮电子信息产业股份有限公司 | A secure communication method based on enhanced XML file format |
CN101651861A (en) * | 2008-08-15 | 2010-02-17 | 希姆通信息技术(上海)有限公司 | Method and device for encrypting mobile phone programs |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103984580A (en) * | 2014-05-30 | 2014-08-13 | 天津力神电池股份有限公司 | DBP configuration file, monitoring device configuring method and monitoring device |
CN103984580B (en) * | 2014-05-30 | 2017-10-24 | 天津力神电池股份有限公司 | DBP configuration files and supervising device collocation method, supervising device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104871484B (en) | The system and method for network firewall for the endpoint hardware auxiliary in security context | |
CN103441991A (en) | Mobile terminal security access platform | |
Hull et al. | Staying in control: Cybersecurity and the modern electric grid | |
CN102682506A (en) | Intelligent Bluetooth door access control method and device based on symmetric cryptographic technique | |
CN104219077A (en) | Information management system for middle and small-sized enterprises | |
WO2001043393A3 (en) | Decoupling access control from key management in a network | |
CN202652534U (en) | Mobile terminal safety access platform | |
EP3713147B1 (en) | Railway signal security encryption method and system | |
CN203659017U (en) | USB interface lock | |
CN108737365A (en) | A kind of network data information guard method and device | |
CN103136457A (en) | BMS upper computer program protection method | |
CN205232389U (en) | Frequency encoding and decoding SOC chip is looked to safe sound | |
CN103269301A (en) | Desktop type IPSecVPN cryptographic machine and networking method | |
CN102098282B (en) | Secure encryption method for database | |
CN115150200A (en) | Electric power data sharing system and equipment based on block chain | |
Hadbah et al. | Powerful IEDs, ethernet networks and their effects on IEC 61850-based electric power utilities security | |
CN101616004A (en) | A kind of emergency response processing method of 4A management platform | |
CN212463237U (en) | Gateway for controlling access to Internet of things based on block chain | |
CN111132136B (en) | Mobile application information security system application system | |
CN103532958A (en) | Method for encrypting website resources | |
CN103391187A (en) | Cloud storage safety control method | |
CN106027535A (en) | Campus network security authentication system and method | |
Yuan | Security technology of computer information system based on DES data encryption algorithm | |
CN201707676U (en) | Virtualized enterprise information management system | |
CN217935630U (en) | Network isolation encryption system with KVM function |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20130605 |