CN103530567A - Data safety copying method of on-line programmer - Google Patents

Data safety copying method of on-line programmer Download PDF

Info

Publication number
CN103530567A
CN103530567A CN201210232678.3A CN201210232678A CN103530567A CN 103530567 A CN103530567 A CN 103530567A CN 201210232678 A CN201210232678 A CN 201210232678A CN 103530567 A CN103530567 A CN 103530567A
Authority
CN
China
Prior art keywords
programming device
data
file
online programming
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210232678.3A
Other languages
Chinese (zh)
Inventor
侯庆东
杨清祥
赵俊峰
代富友
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan Thinker Automatic Equipment Co Ltd
Original Assignee
Henan Thinker Automatic Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan Thinker Automatic Equipment Co Ltd filed Critical Henan Thinker Automatic Equipment Co Ltd
Priority to CN201210232678.3A priority Critical patent/CN103530567A/en
Publication of CN103530567A publication Critical patent/CN103530567A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)
  • Storage Device Security (AREA)

Abstract

A data safety copying method of an on-line programmer comprises the steps that first, when a PC is used for writing data files into the on-line programmer, an identity recognition verification file is generated for the written data files in the on-line programmer, creating time, modifying time and original file names of the data files are recorded in the identity recognition verification file; second, when the on-line programmer carries out data updating on equipment to be updated, the equipment to be updated first reads the data files in the on-line programmer and obtains creating time and modifying time of the data files, creating time and modifying time of the data files and creating time and modifying time of the identity recognition verification file of the data files are compared for verification, and after time is legal by verification, the on-line programmer carries out data updating on the equipment to be updated.

Description

The data security copy method of online programming device
Technical field
The present invention relates to the data security update method of a kind of online programming device and equipment to be updated.
Background technology
Train operation monitoring device (LKJ) is the important component part of Train operation control system, is for preventing that train overrun a signal, operation hypervelocity accident and donkey engine driver (containing motor train unit driver) from improving the important traffic safety equipment of maneuvering capability.LKJ vehicle-mounted data is that LKJ controls the basis of function realization and the foundation of operating analysis.The accuracy of LKJ vehicle-mounted data is prerequisite and the guarantee of monitoring safe train operation.Therefore, the reliability of LKJ vehicle-mounted data renewal process, security are had to very high requirement.
When utilizing online programming device to carry out Data Update to monitoring record plug-in unit, because online programming device can be to a plurality of monitoring record plate copied files.Like this, if monitoring record plate is not legitimate device, there is like this risk of mistake copy.
The patent No. is the patent of invention of CN200580030465.0, its objective is for preventing from repeating copy security and the legitimacy of the i.e. number of times of restriction copy, rather than assurance copy.Its measure of taking is: by judgement destination media device id, copy time and random number, judge.
Summary of the invention
The object of this invention is to provide a kind of mistake copy, data security copy method of the online programming device guaranteeing data security of preventing.
For achieving the above object, the present invention is by the following technical solutions:
A kind of data security copy method of online programming device, it comprises: step 1, while utilizing PC to online programming device data writing file, in online programming device, be the identification authenticating documents of Generating Data File writing, in described identification authenticating documents, record the raw filename of creation-time, modification time and the data file of data file; Step 2, online programming device is treated and is updated the equipment while carrying out Data Update, first equipment to be updated read the data file in online programmable device and obtain creation-time and the modification time of data file, and by the checking of comparing of the creation-time in the creation-time of data file and modification time and its identification authenticating documents and modification time, after empirical tests is legal, online programming device carries out Data Update to equipment to be updated.
Utilize PC to before online programming device data writing file, first the legitimacy of verification online programming device.
In described step 1, the identification authenticating documents of the content data file writing and generation is all encrypted and checking treatment; Correspondingly, in step 2, after checking is legal, online programming device is first decrypted and checking treatment content data file and identification authenticating documents, finally carries out Data Update again.
Described checking treatment comprises that CRC check is processed and retaking of a year or grade is processed, after described retaking of a year or grade is processed and referred to that online programming device data writing file successfully, by the verification of comparing of the file on the data file writing and computing machine.
The document format data that PC writes to online programming device, is the file layout that equipment to be updated can be identified.
Adopt the present invention of technique scheme, in order to prevent artificial mistake copy, by when source file generates, produce a supporting identification authenticating documents with it, record creation-time, the modification time of source file, raw filename of source file etc., and to identification authenticating documents content-encrypt, after only having source file and the check of identification authenticating documents legal, monitoring record plate just upgrades source file.
Accompanying drawing explanation
Fig. 1 is process flow diagram of the present invention.
Fig. 2 is the process flow diagram of online programming management software.
Embodiment
As shown in Figure 1, a kind of data security copy method of online programming device, it comprises the following steps:
Step 1, LKJ online programming management software is housed in PC, this LKJ online programming management software be by LKJ is used section control the compiling of parameter making software write sheet file and the compiling of LKJ basic data making software write sheet file, boot file adds after file identification and check information, be written in LKJ online programming device with configuration file and clear one of (reading) ferroelectric memory command file, and daily record manages to LKJ2000 monitoring record H update of plug-in, its course of work as shown in Figure 2.First, the legitimacy of this management software verification online programming device, differentiates equipment by device identifier, manufacturer and built-in instruction response value, prevents that file from writing miscellaneous equipment, guarantees only to write the LKJ online programming device that our company produces.After checking this online programming device legal, utilize the online programming management software of PC to online programming device data writing file, and the form of data writing file is the file layout that equipment to be updated can be identified.For the present invention, equipment to be updated is LKJ2000 monitoring record H plug-in unit, so, to writing in files such as LKJ vehicle-mounted control file, LKJ vehicle-mounted basic data files, should generate the file that LKJ2000 monitoring record H plug-in unit can be identified by agreement form.
Simultaneously, identification authenticating documents of Generating Data File for writing in online programming device, in described identification authenticating documents, record the important informations such as raw filename of creation-time, modification time and the data file of data file, and identification authenticating documents content is encrypted and checking treatment.By identification authenticating documents, prevent from by artificial copy mode, file directly being copied in LKJ online programming device and being gone, realize the object that file security upgrades.
Step 2, after equipment to be updated is connected with online programming device, equipment to be updated sends and writes instruction to online programming device, this writes the write-protect that online programming device is removed in instruction, then first equipment to be updated read the data file in LKJ online programming device and obtain creation-time and the modification time of data file, and by the checking of comparing of the creation-time in the creation-time of data file and modification time and its identification authenticating documents and modification time, and file content is carried out to CRC check, after empirical tests is legal, online programming device is first decrypted and checking treatment data file and identification authenticating documents, final online programmable device carries out Data Update to equipment to be updated, and on LKJ online programming device, produce and upgrade LOG journal file.LKJ online programming device connects upper PC computer, imports and upgrades LOG daily record in software, can viewing files upgrade result.
It should be noted that, above-mentioned checking treatment comprises that CRC check is processed and retaking of a year or grade is processed, and described retaking of a year or grade processing refers to after online programming device generated data file, by the verification of comparing of the file on data file and computing machine.

Claims (5)

1. a data security copy method for online programming device, is characterized in that:
Step 1, while utilizing PC to online programming device data writing file, in online programming device, be the identification authenticating documents of Generating Data File writing, in described identification authenticating documents, record the raw filename of creation-time, modification time and the data file of data file;
Step 2, online programming device is treated and is updated the equipment while carrying out Data Update, first equipment to be updated read the data file in online programmable device and obtain creation-time and the modification time of data file, and by the checking of comparing of the creation-time in the creation-time of data file and modification time and its identification authenticating documents and modification time, after empirical tests is legal, online programming device carries out Data Update to equipment to be updated.
2. the data security copy method of online programming device according to claim 1, is characterized in that: utilize PC to before online programming device data writing file, first the legitimacy of verification online programming device.
3. the data security copy method of online programming device according to claim 1, is characterized in that: in described step 1, the identification authenticating documents of the content data file writing and generation is all encrypted and checking treatment; Correspondingly, in step 2, after checking is legal, online programming device is first decrypted and checking treatment content data file and identification authenticating documents, finally carries out Data Update again.
4. the data security copy method of online programming device according to claim 3, it is characterized in that: described checking treatment comprises that CRC check is processed and retaking of a year or grade is processed, described retaking of a year or grade is processed and is referred to after the success of online programming device data writing file, by the verification of comparing of the file on the data file writing and computing machine.
5. the data security copy method of online programming device according to claim 1, is characterized in that: the document format data that PC writes to online programming device, is the file layout that equipment to be updated can be identified.
CN201210232678.3A 2012-07-06 2012-07-06 Data safety copying method of on-line programmer Pending CN103530567A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210232678.3A CN103530567A (en) 2012-07-06 2012-07-06 Data safety copying method of on-line programmer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210232678.3A CN103530567A (en) 2012-07-06 2012-07-06 Data safety copying method of on-line programmer

Publications (1)

Publication Number Publication Date
CN103530567A true CN103530567A (en) 2014-01-22

Family

ID=49932569

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210232678.3A Pending CN103530567A (en) 2012-07-06 2012-07-06 Data safety copying method of on-line programmer

Country Status (1)

Country Link
CN (1) CN103530567A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104572461A (en) * 2014-12-30 2015-04-29 北京奇虎科技有限公司 File automatically detecting method and device
CN108228297A (en) * 2017-12-30 2018-06-29 河南思维自动化设备股份有限公司 LKJ uses section control parameter preparation method and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101019188A (en) * 2004-09-10 2007-08-15 皇家飞利浦电子股份有限公司 System and method for a voiding redundant copying of shared content when using virtual titles
CN102404331A (en) * 2011-12-01 2012-04-04 江苏仕德伟网络科技股份有限公司 Method for judging whether website is maliciously tampered

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101019188A (en) * 2004-09-10 2007-08-15 皇家飞利浦电子股份有限公司 System and method for a voiding redundant copying of shared content when using virtual titles
CN102404331A (en) * 2011-12-01 2012-04-04 江苏仕德伟网络科技股份有限公司 Method for judging whether website is maliciously tampered

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
解宗光等: ""通过IAP实现LKJ数据动态载入"", 《铁路技术创新》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104572461A (en) * 2014-12-30 2015-04-29 北京奇虎科技有限公司 File automatically detecting method and device
CN104572461B (en) * 2014-12-30 2018-03-02 北京奇虎科技有限公司 A kind of file automatic testing method and device
CN108228297A (en) * 2017-12-30 2018-06-29 河南思维自动化设备股份有限公司 LKJ uses section control parameter preparation method and storage medium

Similar Documents

Publication Publication Date Title
WO2020124985A1 (en) Secure firmware upgrade method, device, on-board system, and vehicle
CN102156840B (en) Controller and managing device thereof
CN1329787C (en) Method of preventing firmware piracy
CN102340541B (en) System and method for cloud volume production
CN103530141A (en) Vehicle data updating method and vehicle data updating system
CN111142947B (en) Chip firmware presetting method and device, presetting equipment and server
CN104268458B (en) A kind of vehicle program encryption verification method and encryption, checking device
CN102479091B (en) Method and device for running software and moveable storage medium
JP6260005B2 (en) Function setting method
CN105224965A (en) A kind of 3D integration card producing system and method thereof
CN104915240B (en) A kind of method of atm device software upgrading
CN203084710U (en) On-vehicle data updating system
JP2012079209A (en) Log-in method for injection molding machine, and injection molding machine
CN103530567A (en) Data safety copying method of on-line programmer
CN106935272B (en) Method and device for opening eMMC back door debugging
CN102012874B (en) USB (universal serial bus) storage device provided with resource manager
CN112948355A (en) Method, system, device and medium for destroying distributed network data
CN116991671A (en) DCS controller and trusted start audit log recording method and system thereof
JP2001265581A (en) System and method for preventing illegal use of software
US20170063835A1 (en) Control apparatus and control apparatus system
CN104021355A (en) Safety inspection method for simultaneously operating same file through multiple processes
CN111079124B (en) Security chip activation method and device, terminal equipment and server
DE102005020313A1 (en) Apparatus and method for generating data for security media initialization
JPH10198776A (en) Portable information recording medium, and its information writing and reading method
CN114218593A (en) Information security detection method based on office equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140122

RJ01 Rejection of invention patent application after publication