CN107391143A - A kind of T Box remote upgrade methods - Google Patents
A kind of T Box remote upgrade methods Download PDFInfo
- Publication number
- CN107391143A CN107391143A CN201710624039.4A CN201710624039A CN107391143A CN 107391143 A CN107391143 A CN 107391143A CN 201710624039 A CN201710624039 A CN 201710624039A CN 107391143 A CN107391143 A CN 107391143A
- Authority
- CN
- China
- Prior art keywords
- box
- image file
- key
- file
- image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1461—Backup scheduling policy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/71—Version control; Configuration management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Quality & Reliability (AREA)
- Stored Programmes (AREA)
Abstract
The invention discloses a kind of T Box remote upgrade methods, this method comprises the following steps:(1) VIN (vehicle identification code) is inputted in the server and obtain the image file of encryption, and described image file is copied in the assigned catalogue of SD card;(2) described SD card is installed in vehicle control system, the T Box of built-in key algorithm verify to the integrality of described image file, and verification is qualified, and it is decrypted;(3) compared with the key for storing the key obtained after decryption image file when dispatching from the factory, allow to upgrade if consistent, otherwise not upgrade.Not only contribute to improve upgrading efficiency using this method, while do not need special updating apparatus, user can voluntarily upgrade, hence it is evident that improve Consumer's Experience.
Description
Technical field
It is to be related to a kind of T-Box remote upgrades specifically the present invention relates to a kind of method to vehicle-mounted T-BOX upgradings
Method.
Background technology
Compared to other electronic control units on vehicle, T-Box (new-energy automobile monitor supervision platform) is after vehicle release
The frequency of program renewal is higher, thus it is simple and efficient it is carried out upgrade it is particularly significant.
At present, most of vehicle producers are all that T-BOX is entered by OBD mouths using special upgrade equipment using UDS agreements
Row upgrading, such a mode need professional to be upgraded.Because car networking is in continuous development renewal, T-BOX conducts
The ECU of core among vehicle net, TBOX program also need to be upgraded therewith, if desired for large batch of renewal after vehicle is sold
T-BOX program, due to needing professional equipment and professional to upgrade, all cars, which have upgraded, just needs the long period, meeting
Directly affect user experience.Upgrading of this patent to T-BOX only needs a SD card, and without professional person's operation, (car owner can be certainly
Row upgrading), greatly improve upgrading efficiency.
In addition, also some producers T-BOX supports remote upgrade, such a mode needs back-office support, while operating personnel must
Platform must be familiar with.Such a upgrading mode need to expend T-BOX data traffics, need network good during upgrading.When upgrade file is excessive
When T-BOX does not support that 4G communicates, the file download time is longer to be likely to upgrading failure.Such a upgrading mode is limited by network
Situation, while be also required to expend data traffic.The upgrading mode of this patent need to only allow user to prepare a SD card, from official website voluntarily
It is i.e. scalable after download upgrade file, without expending data traffic also unrestricted network condition upgrading efficiency high.
The content of the invention
The present invention is in order to solve the above problems, it is proposed that a kind of T-Box remote upgrade methods, it is not only favourable using this method
Upgrade efficiency in improving, while do not need special updating apparatus, user can voluntarily upgrade, hence it is evident that improve Consumer's Experience.
To achieve these goals, the present invention adopts the following technical scheme that:
A kind of T-Box remote upgrade methods, based on vehicle control system, SD card and server, it is characterised in that:Including with
Lower step:
(1) image file that VIN (vehicle identification code) obtains encryption is inputted in the server, and by described image file
It is copied in the assigned catalogue of SD card;
(2) described SD card is installed in vehicle control system, the T-Box of built-in key algorithm is to described mirror image
The integrality of file is verified, and verification is qualified, and it is decrypted;
(3) compared with the key for storing the key obtained after decryption image file when dispatching from the factory, allow if consistent
Upgrading, otherwise not upgrade.
Further, in the step (1), the specific side of cryptographic image file is obtained by inputting VIN in the server
Method is:Vehicle producer is after vehicle is offline, the correspondence of VIN number, T-BOX numberings, T-BOX are dispatched from the factory program version, T-BOX keys
Relation has all been entered into database, and image file can be uploaded to backstage when needing upgrading, can be utilized after user inputs VIN
Corresponding key by aes algorithm cryptographic image file, for user download by the file generated.
Further, in step (1), described assigned catalogue is:/ sys/ catalogues.
Further, in step (2), described key algorithm generates unique key according to the VIN of input.
Further, in the step (2), according to VIN, T-BOX terminal number, vehicle offline date and vendor code
One 32 byte data of composition are as key, because VIN the and T-BOX terminal numbers of every chassis are all different, so being not present
There is the T-BOX of same key.
Further, in the step (2), the specific method that T-Box carries out completeness check to the image file is:
Use the mode that MD5 values are signed as follows come the integrality for guarantee image file, specific method:
1) image file after signature is made:
The 16 byte hash values obtained after Vehicle Identify Number VIN and whole image file content are signed by MD5 are put
Signature image file behind the end of whole image file, generation signature.
2) verification of signature image file:
T-BOX is got the Vehicle Identify Number of oneself and whole file (removing last 16 byte of file) after signature image file
MD5 signatures are carried out, last 16 byte of sign 16 obtained byte hash values and file are compared, if the same mirror image
File is complete, and image file damages if different.
Further, in the step (3), the T-Box is upgraded under bootloader patterns.
T-BOX starts that image file is decrypted after insertion SD card, and the temporary file image.bin for decrypting generation is put
Under/sys/ catalogues, T-BOX copies image file image.bin to SPI flash and set upgrade flag position while deleted
Former image.bin files, and restart T-BOX, after T-BOX detects that upgrade flag is set in SPI Flash after starting, verification
The integrality of image.bin files, verification reads key from specified address after passing through and T-BOX locals key compares, such as identical
Then by the flash of mirror-image copies to MCU, after bootloader jumps to APP, the image.bin texts in SPI flash are deleted
Part, while remove upgrade flag position.
Compared with prior art, beneficial effects of the present invention are:
(1) special updating apparatus need not be utilized using upgrade method of the present invention, upgrading effect can be significantly improved
Rate;
(2) user voluntarily can upgrade to the T-Box of vehicle, not limited by other objective condition, be advantageous to be lifted
Consumer's Experience.
Brief description of the drawings
The Figure of description for forming the part of the application is used for providing further understanding of the present application, and the application's shows
Meaning property embodiment and its illustrate be used for explain the application, do not form the improper restriction to the application.
Fig. 1 is the flow chart of the present invention;
Fig. 2 is the course diagram that T-Box of the present invention is upgraded under bootloader patterns.
Embodiment:
The invention will be further described with embodiment below in conjunction with the accompanying drawings.
It is noted that described further below is all exemplary, it is intended to provides further instruction to the application.It is unless another
Indicate, all technologies used herein and scientific terminology are with usual with the application person of an ordinary skill in the technical field
The identical meanings of understanding.
It should be noted that term used herein above is merely to describe embodiment, and be not intended to restricted root
According to the illustrative embodiments of the application.As used herein, unless the context clearly indicates otherwise, otherwise singulative
It is also intended to include plural form, additionally, it should be understood that, when in this manual using term "comprising" and/or " bag
Include " when, it indicates existing characteristics, step, operation, device, component and/or combinations thereof.
Following embodiments are in a kind of typical embodiment of the application, as shown in figure 1, a kind of T-Box remote upgrades
Method, based on vehicle control system, SD card and server, it is characterised in that:Comprise the following steps:
(1) image file that VIN (vehicle identification code) obtains encryption is inputted in the server, and by described image file
It is copied in the assigned catalogue of SD card;
(2) described SD card is installed in vehicle control system, the T-Box of built-in key algorithm is to described mirror image
The integrality of file is verified, and verification is qualified, and it is decrypted;
(3) compared with the key for storing the key obtained after decryption image file when dispatching from the factory, allow if consistent
Upgrading, otherwise not upgrade.
Further, in the step (1), the specific side of cryptographic image file is obtained by inputting VIN in the server
Method is:Vehicle producer is after vehicle is offline, the correspondence of VIN number, T-BOX numberings, T-BOX are dispatched from the factory program version, T-BOX keys
Relation has all been entered into database, and image file can be uploaded to backstage when needing upgrading, can be utilized after user inputs VIN
Corresponding key by aes algorithm cryptographic image file, for user download by the file generated.
In step (1), described assigned catalogue is:/ sys/ catalogues.
In step (2), described key algorithm generates unique key according to the VIN of input.
In the step (2), according to the one of VIN, T-BOX terminal number, vehicle offline date and vendor code composition
Individual 32 byte data is as key, because VIN the and T-BOX terminal numbers of every chassis are all different, so identical close in the absence of having
The T-BOX of key.
In the step (2), the specific method that T-Box carries out completeness check to the image file is:Using MD5 values
The mode of signature is come to ensure the integrality of image file, and specific method is as follows:
1) image file after signature is made:
The 16 byte hash values obtained after Vehicle Identify Number VIN and whole image file content are signed by MD5 are put
Signature image file behind the end of whole image file, generation signature.
2) verification of signature image file:
T-BOX is got the Vehicle Identify Number of oneself and whole file (removing last 16 byte of file) after signature image file
MD5 signatures are carried out, last 16 byte of sign 16 obtained byte hash values and file are compared, if the same mirror image
File is complete, and image file damages if different.
In the step (3), the T-Box is upgraded under bootloader patterns, specifically:
Such as Fig. 2, T-BOX starts that image file is decrypted after inserting SD card, decrypts the temporary file of generation
Image.bin is placed on/sys/ catalogues under, T-BOX copies image file image.bin to SPI flash and set upgrading mark
Former image.bin files are deleted in note position simultaneously, and restart T-BOX, and T-BOX detects upgrade flag in SPI Flash after starting
After being set, the integrality of image.bin files is verified, verification reads key from specified address after passing through and T-BOX is locally close
Key compares, and by the flash of mirror-image copies to MCU if identical, after bootloader jumps to APP, deletes in SPI flash
Image.bin files, while remove upgrade flag position.
The preferred embodiment of the application is the foregoing is only, is not limited to the application, for the skill of this area
For art personnel, the application can have various modifications and variations.It is all within spirit herein and principle, made any repair
Change, equivalent substitution, improvement etc., should be included within the protection domain of the application.
Although above-mentioned the embodiment of the present invention is described with reference to accompanying drawing, model not is protected to the present invention
The limitation enclosed, one of ordinary skill in the art should be understood that on the basis of technical scheme those skilled in the art are not
Need to pay various modifications or deformation that creative work can make still within protection scope of the present invention.
Claims (10)
- A kind of 1. T-Box remote upgrade methods, based on vehicle control system, SD card and server, it is characterised in that:Including following Step:(1) image file that VIN (vehicle identification code) obtains encryption is inputted in the server, and described image file is copied Into the assigned catalogue of SD card;(2) described SD card is installed in vehicle control system, the T-Box of built-in key algorithm is to described image file Integrality verified, verification it is qualified, it is decrypted;(3) compared with the key for storing the key obtained after decryption image file when dispatching from the factory, allow to upgrade if consistent, Otherwise not upgrade.
- A kind of 2. T-BOX remote upgrade methods according to claim 1, it is characterised in that:In the step (1), pass through The specific method of input VIN acquisitions cryptographic image file is in the server:Vehicle producer is after vehicle is offline, by VIN number, T- BOX is numbered, T-BOX dispatches from the factory, and program version, the corresponding relation of T-BOX keys have all been entered into database, the meeting when needing upgrading Image file is uploaded into backstage, corresponding key can be utilized after user inputs VIN by aes algorithm cryptographic image file, The file generated is downloaded for user.
- A kind of 3. T-BOX remote upgrade methods according to claim 1, it is characterised in that:In step (1), described finger Determining catalogue is:/ sys/ catalogues.
- A kind of 4. T-BOX remote upgrade methods according to claim 1, it is characterised in that:In step (2), described is close Key algorithm generates unique key according to the VIN of input.
- A kind of 5. T-BOX remote upgrade methods according to claim 1, it is characterised in that:It is described in the step (2) 32 byte datas that key algorithm forms according to VIN, T-BOX terminal number, vehicle offline date and vendor code are given birth to Into key, because VIN the and T-BOX terminal numbers of every chassis are all different, so in the absence of the T-BOX for having same key.
- A kind of 6. T-BOX remote upgrade methods according to claim 1, it is characterised in that:By the way of MD5 values signature Ensure image file integrality.
- A kind of 7. T-BOX remote upgrade methods according to claim 6, it is characterised in that:By the way of MD5 values signature Come to ensure that the specific method of the integrality of image file is as follows:1) image file after signature is made:The 16 byte hash values obtained after Vehicle Identify Number VIN and whole image file content are signed by MD5 are placed on whole The end of individual image file, generate the signature image file after signature.2) verification of signature image file:T-BOX carries out MD5 signatures after getting signature image file to the Vehicle Identify Number of oneself and whole file, will sign what is obtained 16 byte hash values and last 16 byte of file are compared, and if the same image file is complete, the mirror image if different File corruption.
- A kind of 8. T-BOX remote upgrade methods according to claim 1, it is characterised in that:It is described in the step (3) T-Box is upgraded under bootloader patterns.
- A kind of 9. T-BOX remote upgrade methods according to claim 8, it is characterised in that:The T-Box exists The specific method upgraded under bootloader patterns is:T-BOX starts that image file is decrypted after insertion SD card, solves It is dense into temporary file image.bin be placed on/sys/ catalogues under, T-BOX copies image file image.bin to SPI Simultaneously former image.bin files are deleted in set upgrade flag position to flash simultaneously, and restart T-BOX, and T-BOX detects SPI after starting After upgrade flag is set in Flash, the integrality of image.bin files is verified, verification is read close from specified address after passing through Key and T-BOX locals key compare, by the flash of mirror-image copies to MCU if identical.
- A kind of 10. T-BOX remote upgrade methods according to claim 9, it is characterised in that:The T-Box exists After being upgraded under bootloader patterns, the bootloader jumps to APP, deletes the image.bin in SPI flash File, while remove upgrade flag position.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710624039.4A CN107391143B (en) | 2017-07-27 | 2017-07-27 | T-Box remote upgrading method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710624039.4A CN107391143B (en) | 2017-07-27 | 2017-07-27 | T-Box remote upgrading method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107391143A true CN107391143A (en) | 2017-11-24 |
CN107391143B CN107391143B (en) | 2020-05-19 |
Family
ID=60341792
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710624039.4A Active CN107391143B (en) | 2017-07-27 | 2017-07-27 | T-Box remote upgrading method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107391143B (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108279919A (en) * | 2018-01-22 | 2018-07-13 | 成都雅骏新能源汽车科技股份有限公司 | A kind of New-energy electric vehicle remotely updating program method |
CN108462567A (en) * | 2017-12-28 | 2018-08-28 | 宁德时代新能源科技股份有限公司 | Vehicle-mounted program file downloading method and device |
CN109101263A (en) * | 2018-08-23 | 2018-12-28 | 深圳熙斯特新能源技术有限公司 | A kind of method of electrical automobile driver remote software upgrading |
CN109240731A (en) * | 2018-08-29 | 2019-01-18 | 武汉光庭信息技术股份有限公司 | A kind of security upgrading method and system of TBox |
CN110427202A (en) * | 2019-07-31 | 2019-11-08 | 上海摩迈汽车科技有限公司 | A kind of system and method for car networking TBOX end FOTA |
CN111158712A (en) * | 2018-11-07 | 2020-05-15 | 中兴通讯股份有限公司 | Vehicle-mounted Tbox upgrading method, device, equipment and storage medium |
CN111221556A (en) * | 2020-01-09 | 2020-06-02 | 联陆智能交通科技(上海)有限公司 | Method and system for remotely upgrading RSU mirror image |
CN111241536A (en) * | 2020-01-10 | 2020-06-05 | 杭州涂鸦信息技术有限公司 | Method and system for loading production test image and preventing illegal swiping |
CN112231709A (en) * | 2020-10-15 | 2021-01-15 | 中国电子科技集团公司第三十八研究所 | System safety design method with remote upgrading function |
CN112486554A (en) * | 2020-12-01 | 2021-03-12 | 中国科学院合肥物质科学研究院 | Vehicle-mounted networking terminal software upgrading method |
CN114398066A (en) * | 2022-01-07 | 2022-04-26 | 中通客车股份有限公司 | Software upgrading method, system and application of domain controller |
CN114443175A (en) * | 2022-04-11 | 2022-05-06 | 天津讯联科技有限公司 | Startup configuration method for missile-borne FPGA online upgrade |
CN115174040A (en) * | 2022-02-22 | 2022-10-11 | 重庆长安汽车股份有限公司 | Method, system, vehicle and medium for injecting and updating secret key of in-vehicle controller |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070061069A1 (en) * | 2005-09-09 | 2007-03-15 | General Motors Corporation | Method and system for tracking vehicle services |
CN102681857A (en) * | 2011-03-07 | 2012-09-19 | 北京博创理想科技有限公司 | Method and device for realizing restoration and update of vehicle-mounted software system |
CN103377057A (en) * | 2012-04-20 | 2013-10-30 | 上海通用汽车有限公司 | System and method for refreshing software of user vehicle electronic control module |
CN103546576A (en) * | 2013-10-31 | 2014-01-29 | 中安消技术有限公司 | Remote automatic updating method and system of embedded equipment |
CN105573787A (en) * | 2015-12-15 | 2016-05-11 | 上海博泰悦臻网络技术服务有限公司 | Software upgrade method and device based on vehicular T-Box |
CN205899529U (en) * | 2016-06-30 | 2017-01-18 | 武汉英泰斯特电子技术有限公司 | Long -range renewal device of vehicle ECU |
CN106648626A (en) * | 2016-11-29 | 2017-05-10 | 郑州信大捷安信息技术股份有限公司 | Secure remote upgrade system and upgrade method for vehicles |
-
2017
- 2017-07-27 CN CN201710624039.4A patent/CN107391143B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070061069A1 (en) * | 2005-09-09 | 2007-03-15 | General Motors Corporation | Method and system for tracking vehicle services |
CN102681857A (en) * | 2011-03-07 | 2012-09-19 | 北京博创理想科技有限公司 | Method and device for realizing restoration and update of vehicle-mounted software system |
CN103377057A (en) * | 2012-04-20 | 2013-10-30 | 上海通用汽车有限公司 | System and method for refreshing software of user vehicle electronic control module |
CN103546576A (en) * | 2013-10-31 | 2014-01-29 | 中安消技术有限公司 | Remote automatic updating method and system of embedded equipment |
CN105573787A (en) * | 2015-12-15 | 2016-05-11 | 上海博泰悦臻网络技术服务有限公司 | Software upgrade method and device based on vehicular T-Box |
CN205899529U (en) * | 2016-06-30 | 2017-01-18 | 武汉英泰斯特电子技术有限公司 | Long -range renewal device of vehicle ECU |
CN106648626A (en) * | 2016-11-29 | 2017-05-10 | 郑州信大捷安信息技术股份有限公司 | Secure remote upgrade system and upgrade method for vehicles |
Non-Patent Citations (1)
Title |
---|
今年的土豆: "UCONNECT软件更新操作要点", 《HTTPS://CLUB.AUTOHOME.COM.CN/BBS/THREADOWNER/09F6F2248EBA1DD3/54796458-1.HTML》 * |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108462567A (en) * | 2017-12-28 | 2018-08-28 | 宁德时代新能源科技股份有限公司 | Vehicle-mounted program file downloading method and device |
CN108279919A (en) * | 2018-01-22 | 2018-07-13 | 成都雅骏新能源汽车科技股份有限公司 | A kind of New-energy electric vehicle remotely updating program method |
CN109101263A (en) * | 2018-08-23 | 2018-12-28 | 深圳熙斯特新能源技术有限公司 | A kind of method of electrical automobile driver remote software upgrading |
CN109240731A (en) * | 2018-08-29 | 2019-01-18 | 武汉光庭信息技术股份有限公司 | A kind of security upgrading method and system of TBox |
CN111158712A (en) * | 2018-11-07 | 2020-05-15 | 中兴通讯股份有限公司 | Vehicle-mounted Tbox upgrading method, device, equipment and storage medium |
CN110427202A (en) * | 2019-07-31 | 2019-11-08 | 上海摩迈汽车科技有限公司 | A kind of system and method for car networking TBOX end FOTA |
CN111221556A (en) * | 2020-01-09 | 2020-06-02 | 联陆智能交通科技(上海)有限公司 | Method and system for remotely upgrading RSU mirror image |
CN111221556B (en) * | 2020-01-09 | 2023-08-29 | 联陆智能交通科技(上海)有限公司 | Remote upgrade RSU mirror image method and system |
CN111241536A (en) * | 2020-01-10 | 2020-06-05 | 杭州涂鸦信息技术有限公司 | Method and system for loading production test image and preventing illegal swiping |
CN112231709A (en) * | 2020-10-15 | 2021-01-15 | 中国电子科技集团公司第三十八研究所 | System safety design method with remote upgrading function |
CN112486554A (en) * | 2020-12-01 | 2021-03-12 | 中国科学院合肥物质科学研究院 | Vehicle-mounted networking terminal software upgrading method |
CN112486554B (en) * | 2020-12-01 | 2022-11-08 | 中国科学院合肥物质科学研究院 | Vehicle-mounted networking terminal software upgrading method |
CN114398066A (en) * | 2022-01-07 | 2022-04-26 | 中通客车股份有限公司 | Software upgrading method, system and application of domain controller |
CN115174040A (en) * | 2022-02-22 | 2022-10-11 | 重庆长安汽车股份有限公司 | Method, system, vehicle and medium for injecting and updating secret key of in-vehicle controller |
CN114443175A (en) * | 2022-04-11 | 2022-05-06 | 天津讯联科技有限公司 | Startup configuration method for missile-borne FPGA online upgrade |
Also Published As
Publication number | Publication date |
---|---|
CN107391143B (en) | 2020-05-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107391143A (en) | A kind of T Box remote upgrade methods | |
US8978160B2 (en) | Method for selective software rollback | |
US9705678B1 (en) | Fast CAN message authentication for vehicular systems | |
CN104052818B (en) | The version upgrading method and device of a kind of mobile terminal | |
CN109787774B (en) | Upgrade downloading method and device based on digital signature verification, server and terminal | |
US8881308B2 (en) | Method to enable development mode of a secure electronic control unit | |
US8966248B2 (en) | Secure software file transfer systems and methods for vehicle control modules | |
CN100472550C (en) | Method for generating licence and method and apparatus for providing contents using the same | |
US20140075517A1 (en) | Authorization scheme to enable special privilege mode in a secure electronic control unit | |
US8930710B2 (en) | Using a manifest to record presence of valid software and calibration | |
CN107992753B (en) | Method for updating software of a control device of a vehicle | |
DE102012109617A1 (en) | A method for replacing a public key of a bootloader | |
CN105706099A (en) | Software update device, and software update program | |
DE102013105042A1 (en) | Safe flash programming of a secondary processor | |
CN106790247A (en) | A kind of method and apparatus of android system upgrading | |
WO2009157133A1 (en) | Information processing device, information processing method, and computer program and integrated circuit for the realization thereof | |
DE102012109619A1 (en) | A method of providing a digital signature for securing a flash programming function | |
CN111160879B (en) | Hardware wallet and security improving method and device thereof | |
CN107147519B (en) | Method, device and system for upgrading equipment | |
CN105068824B (en) | A kind of method and system dividing terminal development pattern and product pattern | |
CN113010191A (en) | Integrated vehicle ECU flashing method and system | |
CN109240731A (en) | A kind of security upgrading method and system of TBox | |
CN103562930A (en) | Prevention of playback attacks using OTP memory | |
CN107979599A (en) | Data Encrypting Transmission System | |
CN107239299A (en) | Plug-in unit upgrade method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder |
Address after: 252000 No.261 Huanghe Road, economic development zone, Liaocheng City, Shandong Province Patentee after: Zhongtong bus Limited by Share Ltd. Address before: 252000 No.261 Huanghe Road, economic development zone, Liaocheng City, Shandong Province Patentee before: ZHONGTONG BUS HOLDING Co.,Ltd. |
|
CP01 | Change in the name or title of a patent holder |