CN107391143A - A kind of T Box remote upgrade methods - Google Patents

A kind of T Box remote upgrade methods Download PDF

Info

Publication number
CN107391143A
CN107391143A CN201710624039.4A CN201710624039A CN107391143A CN 107391143 A CN107391143 A CN 107391143A CN 201710624039 A CN201710624039 A CN 201710624039A CN 107391143 A CN107391143 A CN 107391143A
Authority
CN
China
Prior art keywords
box
image file
key
file
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710624039.4A
Other languages
Chinese (zh)
Other versions
CN107391143B (en
Inventor
王钦普
王力
刘清波
李涛
范志先
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongtong Bus Holding Co Ltd
Original Assignee
Zhongtong Bus Holding Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongtong Bus Holding Co Ltd filed Critical Zhongtong Bus Holding Co Ltd
Priority to CN201710624039.4A priority Critical patent/CN107391143B/en
Publication of CN107391143A publication Critical patent/CN107391143A/en
Application granted granted Critical
Publication of CN107391143B publication Critical patent/CN107391143B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1461Backup scheduling policy
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Quality & Reliability (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses a kind of T Box remote upgrade methods, this method comprises the following steps:(1) VIN (vehicle identification code) is inputted in the server and obtain the image file of encryption, and described image file is copied in the assigned catalogue of SD card;(2) described SD card is installed in vehicle control system, the T Box of built-in key algorithm verify to the integrality of described image file, and verification is qualified, and it is decrypted;(3) compared with the key for storing the key obtained after decryption image file when dispatching from the factory, allow to upgrade if consistent, otherwise not upgrade.Not only contribute to improve upgrading efficiency using this method, while do not need special updating apparatus, user can voluntarily upgrade, hence it is evident that improve Consumer's Experience.

Description

A kind of T-Box remote upgrade methods
Technical field
It is to be related to a kind of T-Box remote upgrades specifically the present invention relates to a kind of method to vehicle-mounted T-BOX upgradings Method.
Background technology
Compared to other electronic control units on vehicle, T-Box (new-energy automobile monitor supervision platform) is after vehicle release The frequency of program renewal is higher, thus it is simple and efficient it is carried out upgrade it is particularly significant.
At present, most of vehicle producers are all that T-BOX is entered by OBD mouths using special upgrade equipment using UDS agreements Row upgrading, such a mode need professional to be upgraded.Because car networking is in continuous development renewal, T-BOX conducts The ECU of core among vehicle net, TBOX program also need to be upgraded therewith, if desired for large batch of renewal after vehicle is sold T-BOX program, due to needing professional equipment and professional to upgrade, all cars, which have upgraded, just needs the long period, meeting Directly affect user experience.Upgrading of this patent to T-BOX only needs a SD card, and without professional person's operation, (car owner can be certainly Row upgrading), greatly improve upgrading efficiency.
In addition, also some producers T-BOX supports remote upgrade, such a mode needs back-office support, while operating personnel must Platform must be familiar with.Such a upgrading mode need to expend T-BOX data traffics, need network good during upgrading.When upgrade file is excessive When T-BOX does not support that 4G communicates, the file download time is longer to be likely to upgrading failure.Such a upgrading mode is limited by network Situation, while be also required to expend data traffic.The upgrading mode of this patent need to only allow user to prepare a SD card, from official website voluntarily It is i.e. scalable after download upgrade file, without expending data traffic also unrestricted network condition upgrading efficiency high.
The content of the invention
The present invention is in order to solve the above problems, it is proposed that a kind of T-Box remote upgrade methods, it is not only favourable using this method Upgrade efficiency in improving, while do not need special updating apparatus, user can voluntarily upgrade, hence it is evident that improve Consumer's Experience.
To achieve these goals, the present invention adopts the following technical scheme that:
A kind of T-Box remote upgrade methods, based on vehicle control system, SD card and server, it is characterised in that:Including with Lower step:
(1) image file that VIN (vehicle identification code) obtains encryption is inputted in the server, and by described image file It is copied in the assigned catalogue of SD card;
(2) described SD card is installed in vehicle control system, the T-Box of built-in key algorithm is to described mirror image The integrality of file is verified, and verification is qualified, and it is decrypted;
(3) compared with the key for storing the key obtained after decryption image file when dispatching from the factory, allow if consistent Upgrading, otherwise not upgrade.
Further, in the step (1), the specific side of cryptographic image file is obtained by inputting VIN in the server Method is:Vehicle producer is after vehicle is offline, the correspondence of VIN number, T-BOX numberings, T-BOX are dispatched from the factory program version, T-BOX keys Relation has all been entered into database, and image file can be uploaded to backstage when needing upgrading, can be utilized after user inputs VIN Corresponding key by aes algorithm cryptographic image file, for user download by the file generated.
Further, in step (1), described assigned catalogue is:/ sys/ catalogues.
Further, in step (2), described key algorithm generates unique key according to the VIN of input.
Further, in the step (2), according to VIN, T-BOX terminal number, vehicle offline date and vendor code One 32 byte data of composition are as key, because VIN the and T-BOX terminal numbers of every chassis are all different, so being not present There is the T-BOX of same key.
Further, in the step (2), the specific method that T-Box carries out completeness check to the image file is: Use the mode that MD5 values are signed as follows come the integrality for guarantee image file, specific method:
1) image file after signature is made:
The 16 byte hash values obtained after Vehicle Identify Number VIN and whole image file content are signed by MD5 are put Signature image file behind the end of whole image file, generation signature.
2) verification of signature image file:
T-BOX is got the Vehicle Identify Number of oneself and whole file (removing last 16 byte of file) after signature image file MD5 signatures are carried out, last 16 byte of sign 16 obtained byte hash values and file are compared, if the same mirror image File is complete, and image file damages if different.
Further, in the step (3), the T-Box is upgraded under bootloader patterns.
T-BOX starts that image file is decrypted after insertion SD card, and the temporary file image.bin for decrypting generation is put Under/sys/ catalogues, T-BOX copies image file image.bin to SPI flash and set upgrade flag position while deleted Former image.bin files, and restart T-BOX, after T-BOX detects that upgrade flag is set in SPI Flash after starting, verification The integrality of image.bin files, verification reads key from specified address after passing through and T-BOX locals key compares, such as identical Then by the flash of mirror-image copies to MCU, after bootloader jumps to APP, the image.bin texts in SPI flash are deleted Part, while remove upgrade flag position.
Compared with prior art, beneficial effects of the present invention are:
(1) special updating apparatus need not be utilized using upgrade method of the present invention, upgrading effect can be significantly improved Rate;
(2) user voluntarily can upgrade to the T-Box of vehicle, not limited by other objective condition, be advantageous to be lifted Consumer's Experience.
Brief description of the drawings
The Figure of description for forming the part of the application is used for providing further understanding of the present application, and the application's shows Meaning property embodiment and its illustrate be used for explain the application, do not form the improper restriction to the application.
Fig. 1 is the flow chart of the present invention;
Fig. 2 is the course diagram that T-Box of the present invention is upgraded under bootloader patterns.
Embodiment:
The invention will be further described with embodiment below in conjunction with the accompanying drawings.
It is noted that described further below is all exemplary, it is intended to provides further instruction to the application.It is unless another Indicate, all technologies used herein and scientific terminology are with usual with the application person of an ordinary skill in the technical field The identical meanings of understanding.
It should be noted that term used herein above is merely to describe embodiment, and be not intended to restricted root According to the illustrative embodiments of the application.As used herein, unless the context clearly indicates otherwise, otherwise singulative It is also intended to include plural form, additionally, it should be understood that, when in this manual using term "comprising" and/or " bag Include " when, it indicates existing characteristics, step, operation, device, component and/or combinations thereof.
Following embodiments are in a kind of typical embodiment of the application, as shown in figure 1, a kind of T-Box remote upgrades Method, based on vehicle control system, SD card and server, it is characterised in that:Comprise the following steps:
(1) image file that VIN (vehicle identification code) obtains encryption is inputted in the server, and by described image file It is copied in the assigned catalogue of SD card;
(2) described SD card is installed in vehicle control system, the T-Box of built-in key algorithm is to described mirror image The integrality of file is verified, and verification is qualified, and it is decrypted;
(3) compared with the key for storing the key obtained after decryption image file when dispatching from the factory, allow if consistent Upgrading, otherwise not upgrade.
Further, in the step (1), the specific side of cryptographic image file is obtained by inputting VIN in the server Method is:Vehicle producer is after vehicle is offline, the correspondence of VIN number, T-BOX numberings, T-BOX are dispatched from the factory program version, T-BOX keys Relation has all been entered into database, and image file can be uploaded to backstage when needing upgrading, can be utilized after user inputs VIN Corresponding key by aes algorithm cryptographic image file, for user download by the file generated.
In step (1), described assigned catalogue is:/ sys/ catalogues.
In step (2), described key algorithm generates unique key according to the VIN of input.
In the step (2), according to the one of VIN, T-BOX terminal number, vehicle offline date and vendor code composition Individual 32 byte data is as key, because VIN the and T-BOX terminal numbers of every chassis are all different, so identical close in the absence of having The T-BOX of key.
In the step (2), the specific method that T-Box carries out completeness check to the image file is:Using MD5 values The mode of signature is come to ensure the integrality of image file, and specific method is as follows:
1) image file after signature is made:
The 16 byte hash values obtained after Vehicle Identify Number VIN and whole image file content are signed by MD5 are put Signature image file behind the end of whole image file, generation signature.
2) verification of signature image file:
T-BOX is got the Vehicle Identify Number of oneself and whole file (removing last 16 byte of file) after signature image file MD5 signatures are carried out, last 16 byte of sign 16 obtained byte hash values and file are compared, if the same mirror image File is complete, and image file damages if different.
In the step (3), the T-Box is upgraded under bootloader patterns, specifically:
Such as Fig. 2, T-BOX starts that image file is decrypted after inserting SD card, decrypts the temporary file of generation Image.bin is placed on/sys/ catalogues under, T-BOX copies image file image.bin to SPI flash and set upgrading mark Former image.bin files are deleted in note position simultaneously, and restart T-BOX, and T-BOX detects upgrade flag in SPI Flash after starting After being set, the integrality of image.bin files is verified, verification reads key from specified address after passing through and T-BOX is locally close Key compares, and by the flash of mirror-image copies to MCU if identical, after bootloader jumps to APP, deletes in SPI flash Image.bin files, while remove upgrade flag position.
The preferred embodiment of the application is the foregoing is only, is not limited to the application, for the skill of this area For art personnel, the application can have various modifications and variations.It is all within spirit herein and principle, made any repair Change, equivalent substitution, improvement etc., should be included within the protection domain of the application.
Although above-mentioned the embodiment of the present invention is described with reference to accompanying drawing, model not is protected to the present invention The limitation enclosed, one of ordinary skill in the art should be understood that on the basis of technical scheme those skilled in the art are not Need to pay various modifications or deformation that creative work can make still within protection scope of the present invention.

Claims (10)

  1. A kind of 1. T-Box remote upgrade methods, based on vehicle control system, SD card and server, it is characterised in that:Including following Step:
    (1) image file that VIN (vehicle identification code) obtains encryption is inputted in the server, and described image file is copied Into the assigned catalogue of SD card;
    (2) described SD card is installed in vehicle control system, the T-Box of built-in key algorithm is to described image file Integrality verified, verification it is qualified, it is decrypted;
    (3) compared with the key for storing the key obtained after decryption image file when dispatching from the factory, allow to upgrade if consistent, Otherwise not upgrade.
  2. A kind of 2. T-BOX remote upgrade methods according to claim 1, it is characterised in that:In the step (1), pass through The specific method of input VIN acquisitions cryptographic image file is in the server:Vehicle producer is after vehicle is offline, by VIN number, T- BOX is numbered, T-BOX dispatches from the factory, and program version, the corresponding relation of T-BOX keys have all been entered into database, the meeting when needing upgrading Image file is uploaded into backstage, corresponding key can be utilized after user inputs VIN by aes algorithm cryptographic image file, The file generated is downloaded for user.
  3. A kind of 3. T-BOX remote upgrade methods according to claim 1, it is characterised in that:In step (1), described finger Determining catalogue is:/ sys/ catalogues.
  4. A kind of 4. T-BOX remote upgrade methods according to claim 1, it is characterised in that:In step (2), described is close Key algorithm generates unique key according to the VIN of input.
  5. A kind of 5. T-BOX remote upgrade methods according to claim 1, it is characterised in that:It is described in the step (2) 32 byte datas that key algorithm forms according to VIN, T-BOX terminal number, vehicle offline date and vendor code are given birth to Into key, because VIN the and T-BOX terminal numbers of every chassis are all different, so in the absence of the T-BOX for having same key.
  6. A kind of 6. T-BOX remote upgrade methods according to claim 1, it is characterised in that:By the way of MD5 values signature Ensure image file integrality.
  7. A kind of 7. T-BOX remote upgrade methods according to claim 6, it is characterised in that:By the way of MD5 values signature Come to ensure that the specific method of the integrality of image file is as follows:
    1) image file after signature is made:
    The 16 byte hash values obtained after Vehicle Identify Number VIN and whole image file content are signed by MD5 are placed on whole The end of individual image file, generate the signature image file after signature.
    2) verification of signature image file:
    T-BOX carries out MD5 signatures after getting signature image file to the Vehicle Identify Number of oneself and whole file, will sign what is obtained 16 byte hash values and last 16 byte of file are compared, and if the same image file is complete, the mirror image if different File corruption.
  8. A kind of 8. T-BOX remote upgrade methods according to claim 1, it is characterised in that:It is described in the step (3) T-Box is upgraded under bootloader patterns.
  9. A kind of 9. T-BOX remote upgrade methods according to claim 8, it is characterised in that:The T-Box exists The specific method upgraded under bootloader patterns is:T-BOX starts that image file is decrypted after insertion SD card, solves It is dense into temporary file image.bin be placed on/sys/ catalogues under, T-BOX copies image file image.bin to SPI Simultaneously former image.bin files are deleted in set upgrade flag position to flash simultaneously, and restart T-BOX, and T-BOX detects SPI after starting After upgrade flag is set in Flash, the integrality of image.bin files is verified, verification is read close from specified address after passing through Key and T-BOX locals key compare, by the flash of mirror-image copies to MCU if identical.
  10. A kind of 10. T-BOX remote upgrade methods according to claim 9, it is characterised in that:The T-Box exists After being upgraded under bootloader patterns, the bootloader jumps to APP, deletes the image.bin in SPI flash File, while remove upgrade flag position.
CN201710624039.4A 2017-07-27 2017-07-27 T-Box remote upgrading method Active CN107391143B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710624039.4A CN107391143B (en) 2017-07-27 2017-07-27 T-Box remote upgrading method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710624039.4A CN107391143B (en) 2017-07-27 2017-07-27 T-Box remote upgrading method

Publications (2)

Publication Number Publication Date
CN107391143A true CN107391143A (en) 2017-11-24
CN107391143B CN107391143B (en) 2020-05-19

Family

ID=60341792

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710624039.4A Active CN107391143B (en) 2017-07-27 2017-07-27 T-Box remote upgrading method

Country Status (1)

Country Link
CN (1) CN107391143B (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108279919A (en) * 2018-01-22 2018-07-13 成都雅骏新能源汽车科技股份有限公司 A kind of New-energy electric vehicle remotely updating program method
CN108462567A (en) * 2017-12-28 2018-08-28 宁德时代新能源科技股份有限公司 Vehicle-mounted program file downloading method and device
CN109101263A (en) * 2018-08-23 2018-12-28 深圳熙斯特新能源技术有限公司 A kind of method of electrical automobile driver remote software upgrading
CN109240731A (en) * 2018-08-29 2019-01-18 武汉光庭信息技术股份有限公司 A kind of security upgrading method and system of TBox
CN110427202A (en) * 2019-07-31 2019-11-08 上海摩迈汽车科技有限公司 A kind of system and method for car networking TBOX end FOTA
CN111158712A (en) * 2018-11-07 2020-05-15 中兴通讯股份有限公司 Vehicle-mounted Tbox upgrading method, device, equipment and storage medium
CN111221556A (en) * 2020-01-09 2020-06-02 联陆智能交通科技(上海)有限公司 Method and system for remotely upgrading RSU mirror image
CN111241536A (en) * 2020-01-10 2020-06-05 杭州涂鸦信息技术有限公司 Method and system for loading production test image and preventing illegal swiping
CN112231709A (en) * 2020-10-15 2021-01-15 中国电子科技集团公司第三十八研究所 System safety design method with remote upgrading function
CN112486554A (en) * 2020-12-01 2021-03-12 中国科学院合肥物质科学研究院 Vehicle-mounted networking terminal software upgrading method
CN114398066A (en) * 2022-01-07 2022-04-26 中通客车股份有限公司 Software upgrading method, system and application of domain controller
CN114443175A (en) * 2022-04-11 2022-05-06 天津讯联科技有限公司 Startup configuration method for missile-borne FPGA online upgrade
CN115174040A (en) * 2022-02-22 2022-10-11 重庆长安汽车股份有限公司 Method, system, vehicle and medium for injecting and updating secret key of in-vehicle controller

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070061069A1 (en) * 2005-09-09 2007-03-15 General Motors Corporation Method and system for tracking vehicle services
CN102681857A (en) * 2011-03-07 2012-09-19 北京博创理想科技有限公司 Method and device for realizing restoration and update of vehicle-mounted software system
CN103377057A (en) * 2012-04-20 2013-10-30 上海通用汽车有限公司 System and method for refreshing software of user vehicle electronic control module
CN103546576A (en) * 2013-10-31 2014-01-29 中安消技术有限公司 Remote automatic updating method and system of embedded equipment
CN105573787A (en) * 2015-12-15 2016-05-11 上海博泰悦臻网络技术服务有限公司 Software upgrade method and device based on vehicular T-Box
CN205899529U (en) * 2016-06-30 2017-01-18 武汉英泰斯特电子技术有限公司 Long -range renewal device of vehicle ECU
CN106648626A (en) * 2016-11-29 2017-05-10 郑州信大捷安信息技术股份有限公司 Secure remote upgrade system and upgrade method for vehicles

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070061069A1 (en) * 2005-09-09 2007-03-15 General Motors Corporation Method and system for tracking vehicle services
CN102681857A (en) * 2011-03-07 2012-09-19 北京博创理想科技有限公司 Method and device for realizing restoration and update of vehicle-mounted software system
CN103377057A (en) * 2012-04-20 2013-10-30 上海通用汽车有限公司 System and method for refreshing software of user vehicle electronic control module
CN103546576A (en) * 2013-10-31 2014-01-29 中安消技术有限公司 Remote automatic updating method and system of embedded equipment
CN105573787A (en) * 2015-12-15 2016-05-11 上海博泰悦臻网络技术服务有限公司 Software upgrade method and device based on vehicular T-Box
CN205899529U (en) * 2016-06-30 2017-01-18 武汉英泰斯特电子技术有限公司 Long -range renewal device of vehicle ECU
CN106648626A (en) * 2016-11-29 2017-05-10 郑州信大捷安信息技术股份有限公司 Secure remote upgrade system and upgrade method for vehicles

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
今年的土豆: "UCONNECT软件更新操作要点", 《HTTPS://CLUB.AUTOHOME.COM.CN/BBS/THREADOWNER/09F6F2248EBA1DD3/54796458-1.HTML》 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108462567A (en) * 2017-12-28 2018-08-28 宁德时代新能源科技股份有限公司 Vehicle-mounted program file downloading method and device
CN108279919A (en) * 2018-01-22 2018-07-13 成都雅骏新能源汽车科技股份有限公司 A kind of New-energy electric vehicle remotely updating program method
CN109101263A (en) * 2018-08-23 2018-12-28 深圳熙斯特新能源技术有限公司 A kind of method of electrical automobile driver remote software upgrading
CN109240731A (en) * 2018-08-29 2019-01-18 武汉光庭信息技术股份有限公司 A kind of security upgrading method and system of TBox
CN111158712A (en) * 2018-11-07 2020-05-15 中兴通讯股份有限公司 Vehicle-mounted Tbox upgrading method, device, equipment and storage medium
CN110427202A (en) * 2019-07-31 2019-11-08 上海摩迈汽车科技有限公司 A kind of system and method for car networking TBOX end FOTA
CN111221556A (en) * 2020-01-09 2020-06-02 联陆智能交通科技(上海)有限公司 Method and system for remotely upgrading RSU mirror image
CN111221556B (en) * 2020-01-09 2023-08-29 联陆智能交通科技(上海)有限公司 Remote upgrade RSU mirror image method and system
CN111241536A (en) * 2020-01-10 2020-06-05 杭州涂鸦信息技术有限公司 Method and system for loading production test image and preventing illegal swiping
CN112231709A (en) * 2020-10-15 2021-01-15 中国电子科技集团公司第三十八研究所 System safety design method with remote upgrading function
CN112486554A (en) * 2020-12-01 2021-03-12 中国科学院合肥物质科学研究院 Vehicle-mounted networking terminal software upgrading method
CN112486554B (en) * 2020-12-01 2022-11-08 中国科学院合肥物质科学研究院 Vehicle-mounted networking terminal software upgrading method
CN114398066A (en) * 2022-01-07 2022-04-26 中通客车股份有限公司 Software upgrading method, system and application of domain controller
CN115174040A (en) * 2022-02-22 2022-10-11 重庆长安汽车股份有限公司 Method, system, vehicle and medium for injecting and updating secret key of in-vehicle controller
CN114443175A (en) * 2022-04-11 2022-05-06 天津讯联科技有限公司 Startup configuration method for missile-borne FPGA online upgrade

Also Published As

Publication number Publication date
CN107391143B (en) 2020-05-19

Similar Documents

Publication Publication Date Title
CN107391143A (en) A kind of T Box remote upgrade methods
US8978160B2 (en) Method for selective software rollback
US9705678B1 (en) Fast CAN message authentication for vehicular systems
CN104052818B (en) The version upgrading method and device of a kind of mobile terminal
CN109787774B (en) Upgrade downloading method and device based on digital signature verification, server and terminal
US8881308B2 (en) Method to enable development mode of a secure electronic control unit
US8966248B2 (en) Secure software file transfer systems and methods for vehicle control modules
CN100472550C (en) Method for generating licence and method and apparatus for providing contents using the same
US20140075517A1 (en) Authorization scheme to enable special privilege mode in a secure electronic control unit
US8930710B2 (en) Using a manifest to record presence of valid software and calibration
CN107992753B (en) Method for updating software of a control device of a vehicle
DE102012109617A1 (en) A method for replacing a public key of a bootloader
CN105706099A (en) Software update device, and software update program
DE102013105042A1 (en) Safe flash programming of a secondary processor
CN106790247A (en) A kind of method and apparatus of android system upgrading
WO2009157133A1 (en) Information processing device, information processing method, and computer program and integrated circuit for the realization thereof
DE102012109619A1 (en) A method of providing a digital signature for securing a flash programming function
CN111160879B (en) Hardware wallet and security improving method and device thereof
CN107147519B (en) Method, device and system for upgrading equipment
CN105068824B (en) A kind of method and system dividing terminal development pattern and product pattern
CN113010191A (en) Integrated vehicle ECU flashing method and system
CN109240731A (en) A kind of security upgrading method and system of TBox
CN103562930A (en) Prevention of playback attacks using OTP memory
CN107979599A (en) Data Encrypting Transmission System
CN107239299A (en) Plug-in unit upgrade method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 252000 No.261 Huanghe Road, economic development zone, Liaocheng City, Shandong Province

Patentee after: Zhongtong bus Limited by Share Ltd.

Address before: 252000 No.261 Huanghe Road, economic development zone, Liaocheng City, Shandong Province

Patentee before: ZHONGTONG BUS HOLDING Co.,Ltd.

CP01 Change in the name or title of a patent holder