CN111142947A - Chip firmware presetting method and device, presetting equipment and server - Google Patents

Chip firmware presetting method and device, presetting equipment and server Download PDF

Info

Publication number
CN111142947A
CN111142947A CN201911331483.2A CN201911331483A CN111142947A CN 111142947 A CN111142947 A CN 111142947A CN 201911331483 A CN201911331483 A CN 201911331483A CN 111142947 A CN111142947 A CN 111142947A
Authority
CN
China
Prior art keywords
chip
firmware
feature
characteristic
presetting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911331483.2A
Other languages
Chinese (zh)
Other versions
CN111142947B (en
Inventor
江浩
陈景郁
冯世杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Xiaopeng Motors Technology Co Ltd
Original Assignee
Guangzhou Xiaopeng Motors Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Xiaopeng Motors Technology Co Ltd filed Critical Guangzhou Xiaopeng Motors Technology Co Ltd
Priority to CN201911331483.2A priority Critical patent/CN111142947B/en
Publication of CN111142947A publication Critical patent/CN111142947A/en
Application granted granted Critical
Publication of CN111142947B publication Critical patent/CN111142947B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1415Saving, restoring, recovering or retrying at system level
    • G06F11/1441Resetting or repowering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • G06F8/63Image based installation; Cloning; Build to order

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Quality & Reliability (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the invention provides a chip firmware presetting method, a chip firmware presetting device, chip firmware presetting equipment and a server. The chip firmware presetting method comprises the following steps: guiding a chip to start to obtain a built-in characteristic identifier of the chip; sending a firmware request containing the feature identifier to a server to generate feature firmware bound with the chip; the embodiment of the invention can effectively acquire the feature firmware bound with the chip from the server according to the feature identifier of the chip in the firmware presetting process, and burn the feature firmware into the correspondingly bound chip, so that the feature firmware can only run in the bound chip, and the safety of the chip firmware is improved.

Description

Chip firmware presetting method and device, presetting equipment and server
Technical Field
The invention relates to the technical field of chip firmware safety, in particular to a chip firmware presetting method, a chip firmware presetting device, chip firmware presetting equipment and a server.
Background
With the popularization of the application of the internet of vehicles, the safety of the internet of vehicles is concerned by practitioners and social public. The firmware is the bottom program which can enable the chip to run, and the firmware safety of the chip becomes an important basis for guaranteeing the safety of the Internet of vehicles because the firmware relates to communication verification and service data processing.
Conventional provisioning equipment is typically batch burned with the same firmware at work. The chip with the burned firmware can be built in the terminal equipment to activate the chip before use, so that the chip can normally run to realize performance or functions. However, in the above process, the risk that the firmware of the chip is leaked or cracked by hackers is high.
Disclosure of Invention
Embodiments of the present invention provide a chip firmware presetting method, apparatus, presetting device, and server, so as to overcome the above technical problems or at least partially solve the above technical problems. The technical scheme is as follows:
in a first aspect, an embodiment of the present invention provides a chip firmware presetting method, which is applied to a presetting device, and the method includes:
guiding a chip to start to obtain a built-in characteristic identifier of the chip;
sending a firmware request containing the feature identifier to a server to generate feature firmware bound with the chip;
and receiving the characteristic firmware sent by the server, and burning the characteristic firmware into the corresponding chip.
In an optional implementation manner, the generating the feature firmware bound to the chip includes:
and coding based on the firmware to be burned and the feature identifier to generate the feature firmware, so that the feature firmware can be analyzed to obtain the feature identifier for activation verification of the chip.
In an optional implementation manner, the encoding based on the firmware to be burned and the feature identifier to generate the feature firmware includes:
generating a characteristic key and/or a characteristic certificate according to the characteristic identifier, and combining the characteristic key and/or the characteristic certificate with the firmware to be burned to generate the characteristic firmware; the feature key and/or the feature certificate are used for communication verification after the chip is activated.
In an alternative implementation, the feature identifier uniquely corresponds to the chip.
In an optional implementation manner, the method further comprises the following pre-steps:
receiving task information sent by a server;
when the task information accords with a preset task range, executing the subsequent steps;
the task information includes at least one of: the serial number of the preset equipment, the IP address of the preset equipment, the chip model, the chip burning quantity, the running time and the version number of the firmware to be burned.
In an optional implementation manner, the method further includes the following subsequent steps:
and when the burning of the characteristic firmware fails, the chip and the burning control module connected with the chip are electrified again, and the chip firmware presetting method is executed again.
In an optional implementation manner, the method further includes the following steps:
detecting whether the hardware connection between the burning control module and the chip is normal and/or detecting whether the operation of the chip firmware presetting method is normal;
and when the abnormality is detected, the chip and the burning control module are electrified again, and the chip firmware presetting method is executed again until the firmware burning is successful.
In a second aspect, an embodiment of the present invention provides a chip firmware presetting method, which is applied to a server, and the method includes:
receiving a firmware request sent by a preset device; the firmware request comprises a characteristic identifier built in a chip guided by the preset equipment;
generating a feature firmware bound with the chip according to the feature identifier;
and issuing the characteristic firmware to the preset equipment, so that the preset equipment burns the characteristic firmware into the corresponding chip.
In an optional implementation manner, the generating, according to the feature identifier, a feature firmware bound to the chip includes:
and coding based on the firmware to be burned and the feature identifier to generate the feature firmware, so that the feature firmware can be analyzed to obtain the feature identifier for activation verification of the chip.
In an optional implementation manner, the encoding based on the firmware to be burned and the feature identifier to generate the feature firmware includes:
generating a characteristic key and/or a characteristic certificate according to the characteristic identifier, and combining the characteristic key and/or the characteristic certificate with the firmware to be burned to generate the characteristic firmware; the feature key and/or the feature certificate are used for communication verification after the chip is activated.
In an alternative implementation, the feature identifier uniquely corresponds to the chip.
In an optional implementation manner, the method further comprises the following pre-steps:
acquiring task information; the task information includes at least one of: the method comprises the steps of presetting a serial number of equipment, an IP address of the equipment, the running time of the equipment, a chip model, the chip burning quantity and the version number of firmware to be burned;
and when the task information conforms to a preset task range, issuing the task information to the preset equipment and executing the subsequent steps.
In an optional implementation manner, the method further includes the following subsequent steps:
recording chip information and/or characteristic data of a chip burned with the characteristic firmware for activation verification and/or communication verification of the chip in terminal equipment; the chip information represents that the activation state of the chip is an inactivated state; the feature data includes at least one of the feature identification, feature key, and feature certificate.
In an optional implementation manner, the terminal device includes a vehicle-mounted terminal; the chip is adapted to a vehicle corresponding to the vehicle-mounted terminal.
In a third aspect, an embodiment of the present invention provides a chip firmware presetting device, which is applied to a presetting device, and the device includes:
the guiding module is used for guiding a chip to start and acquiring a characteristic identifier built in the chip;
the request module is used for sending a firmware request containing the characteristic identifier to a server so as to generate characteristic firmware bound with the chip through the server;
and the burning module is used for receiving the characteristic firmware sent by the server and burning the characteristic firmware into the corresponding chip.
In a fourth aspect, an embodiment of the present invention provides a chip firmware presetting device, which is applied to a server, and the device includes:
the receiving module is used for receiving a firmware request sent by the preset equipment; the firmware request comprises a characteristic identifier built in a chip guided by the preset equipment;
the generating module is used for generating the feature firmware bound with the chip according to the feature identifier;
and the issuing module issues the characteristic firmware to the preset equipment, so that the preset equipment burns the firmware into the corresponding chip.
In a fifth aspect, an embodiment of the present invention provides a provisioning apparatus, including
The burning base plate is provided with at least one burning seat; the burning seat and the chip are in a hardware connection relationship;
a control unit comprising a processor and a memory for storing program code which is loaded and executed by the processor to implement the operations performed by the method shown in any implementation of the first aspect of an embodiment of the invention.
In a sixth aspect, an embodiment of the present invention provides a server, where the server includes a processor and a memory, where the memory is used to store program codes, and the program codes are loaded by the processor and executed to implement the operations performed by the method shown in any implementation manner of the second aspect of the embodiment of the present invention.
In a seventh aspect, an embodiment of the present invention provides a storage medium, where the storage medium stores program codes, and the program codes are used to execute the method shown in any implementation manner of the first aspect and the second aspect of the embodiment of the present invention.
According to the chip firmware presetting method, device and equipment provided by the embodiment of the invention, a guide chip is adopted for starting to obtain the built-in characteristic identification of the chip; sending a firmware request containing the feature identifier to a server to generate feature firmware bound with the chip; the method for receiving the feature firmware sent by the server and burning the feature firmware into the corresponding chip can acquire the feature firmware bound with the chip according to the feature identifier of the chip and burn the feature firmware into the corresponding bound chip, so that the feature firmware can only run in the bound chip, and the safety of the chip firmware is improved.
Drawings
Fig. 1 is a schematic flowchart of a method for presetting chip firmware according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of another chip firmware initialization method according to an embodiment of the present invention;
fig. 3 is a schematic flowchart of a chip firmware presetting device according to an embodiment of the present invention;
FIG. 4 is a flow chart of another chip firmware initialization apparatus according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a provisioning apparatus according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a server according to an embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to the same or similar elements or elements having the same or similar functions throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the embodiments of the present invention, and are not to be construed as limiting the invention.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It is further understood that the use of relational terms such as first and second, and the like, are used solely to distinguish one from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the term "current" is intended to mean a particular flow or step node, to distinguish it from other flows or steps; the terms "preceding" and "following" are used to indicate the order of flow or step nodes, and are not intended to refer to a particular flow or step node. Furthermore, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other identical elements in a process, method, article, or terminal that comprises the element.
It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. As used herein, the term "and/or" includes all or any element and all combinations of one or more of the associated listed items.
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more comprehensible, embodiments of the present invention are described in detail below with reference to the accompanying drawings and the detailed description.
In the embodiment of the present invention, the firmware (firmware) may include a bottom layer program, such as a driver, a secure encryption program, a communication program, or an operating system program, which is written into the chip memory to at least implement basic functions of the chip; the characteristic mark represents the characteristic information of the chip, and may include a serial code, a serial number, a model number, and the like of the chip. In order to improve the security, a person skilled in the art may also select a unique identifier corresponding to the chip as the feature identifier in practice, and the unique identifier cannot be tampered. For example, because information such as a chip manufacturer, a production date, a production line, and an X/Y (lateral/longitudinal) coordinate on a wafer can be obtained through the DIE ID, the DIE ID as a unique ID number of each chip can be selected as a feature identifier of the chip; we may refer to the firmware generated from the chip feature identification as feature firmware. Optionally, the preset device may be connected to the chip hardware to guide the chip to start and read/write data, may perform bidirectional communication with the server, and receives the feature firmware sent from the server and burns the feature firmware into the corresponding chip. The server may be a central server, a cluster server or a distributed server, or may be a cloud server that implements cloud computing and/or cloud storage, and the like.
It should be understood by those skilled in the art that the above firmware, feature identifier, preset device and server are only examples, and suitable changes based on these examples can also be applied to the present invention, and the embodiments of the present invention do not limit the kinds of feature identifiers and preset devices.
The embodiment of the invention provides a chip firmware presetting method, which is applied to presetting equipment, and please refer to fig. 1, wherein the method comprises the following steps:
step S101: guiding a chip to start to obtain a built-in characteristic identifier of the chip;
step S102: sending a firmware request containing the feature identifier to a server to generate feature firmware bound with the chip;
step S103: and receiving the characteristic firmware sent by the server, and burning the characteristic firmware into the corresponding chip.
The chip firmware presetting method provided by the embodiment of the invention can acquire the characteristic firmware bound with the chip from the server according to the characteristic identifier of the chip and burn the characteristic firmware into the correspondingly bound chip in the firmware presetting process, so that the characteristic firmware can only be activated or operated in the bound chip, and the safety of the chip firmware is improved.
In step S101 of the embodiment of the present invention, a chip may be booted to obtain a feature identifier embedded in the chip.
In the embodiment of the present invention, the preset device may supply power to the chip, guide the chip to start, and read the feature identifier in the chip through hardware connection, such as a burning seat for placing the chip, and the feature identifier may uniquely correspond to the chip, as described above. Taking an STM32 chip as an example, the burning seat may be included in a burning control module (ST-Link), and the preset device may obtain the feature identifier of the chip through a Get _ ChipID function.
Further, in step S102 of the embodiment of the present invention, a firmware request including the feature identifier may be sent to a server, so as to generate a feature firmware bound to the chip.
In the embodiment of the invention, after the preset equipment acquires the feature identifier, the preset equipment can send a firmware request to the server based on the feature identifier, so that the server generates the feature firmware bound with the chip according to the feature identifier after receiving the firmware request, and sends the feature firmware to the preset equipment.
In a feasible implementation manner, firmware to be burned for realizing a basic function of a chip is stored in a server, and the server may perform encoding based on the firmware to be burned and the feature identifier to generate the feature firmware, so that the feature firmware can be analyzed out of the feature identifier for activation verification of the chip. Thus, only when the feature firmware is built into the corresponding chip, the corresponding chip can be verified upon activation. For example, the feature identifier may be encoded in a predetermined format to a predetermined position in the firmware to be burned to generate the feature firmware. Of course, the feature identifier may be preprocessed by shifting, encrypting, and the like before encoding, so as to improve the difficulty of cracking. In a specific implementation, the server may further generate a feature key and/or a feature certificate according to the feature identifier, and combine the feature key and/or the feature certificate with the firmware to be burned to generate the feature firmware; the feature key and/or the feature certificate are used for communication verification after the chip is activated. The key and the certificate are the basis in communication verification, the corresponding feature key and/or the feature certificate can be generated according to the feature identifier and combined with the firmware to be burned for communication verification after the chip is activated, so that strong binding of the feature firmware and the corresponding chip is realized, the chip can be successfully activated only when the bound feature firmware is built in, and the chip can be normally used after being activated, and the safety of the chip is improved.
Further, in step S103 of the embodiment of the present invention, the feature firmware sent by the server may be received, and the feature firmware is burned into the corresponding chip.
In the embodiment of the invention, after receiving the feature firmware generated by the server according to the method, the presetting device burns the feature firmware onto the corresponding chip bound by the feature firmware to complete the presetting of the chip firmware, so that the feature firmware can be activated and operated in the corresponding chip. The chip firmware presetting method provided by the invention can burn the corresponding characteristic firmware for each chip, improves the safety of the chip firmware, and can prevent the safety information from being leaked because the presetting equipment can not directly contact the characteristic key and the characteristic certificate. Moreover, the chips can be installed on terminal equipment such as a vehicle-mounted terminal, and the chips can be adapted to vehicles corresponding to the vehicle-mounted terminal, so that different feature firmware on each vehicle is realized.
In order to improve the normalization and the safety of chip firmware presetting, in practical application, the whole chip firmware presetting process can be monitored by a server so as to ensure that characteristic firmware is burned under preset equipment corresponding to a preset IP address at strictly specified running time; the burning quantity of the chips, the chip models and the version numbers of the firmware to be burned can be strictly controlled, and the whole operation process is controlled by the server. In a possible implementation manner, the method for presetting the chip firmware provided by the embodiment of the present invention further includes the following pre-step: receiving task information sent by a server; when the task information accords with a preset task range, executing the subsequent steps; the task information includes at least one of: the serial number of the preset equipment, the IP address of the preset equipment, the chip model, the chip burning quantity, the running time and the version number of the firmware to be burned. For example, the preset device may communicate with the server through the unique code of the preset device before chip firmware is preset, to verify whether the task information meets a predetermined task range, where the predetermined task range may be determined according to the performance of the preset device or the burning requirement. And after the server passes the verification, the server issues the task production information to the preset equipment. Optionally, at this time, the preset device may enter a standby mode, and display information of the production task on a screen for an operator to confirm. After the task information is confirmed, the preset operation of the chip firmware can be started, the chip is placed in the burning seat, and the chip firmware preset process is started. The corresponding different characteristic firmware is respectively burned in different chips in batch, and the mass production efficiency and safety of the chip firmware presetting are improved.
In the chip firmware presetting process, sometimes a firmware burning failure or data transmission abnormality occurs, at this time, the presetting device may mark an operation failure, and in an optional implementation manner of the embodiment of the present invention, a reset operation may also be performed, including the following subsequent steps: and when the burning of the characteristic firmware fails, the chip and the burning control module connected with the chip are electrified again, and the chip firmware presetting method is executed again. For example, when the feature firmware burning fails, the following steps can be automatically executed or executed after a reset button is triggered: and independently powering on and restarting the burning control module, resetting the software of the burning control module, and simultaneously powering on and restarting the chip in which the burning seat is placed, so that the burning failure caused by the running-off of the burning software in the burning control module or the burning failure caused by the hardware failure is prevented. So that it may attempt to resume normal operation by resetting the reboot.
In order to timely troubleshoot problems that may occur during the chip firmware presetting process, in another optional implementation manner of the embodiment of the present invention, the presetting device may further perform a self-checking operation, including the following steps: detecting whether the hardware connection between the burning control module and the chip is normal and/or detecting whether the operation of the chip firmware presetting method is normal; and when the abnormality is detected, the chip and the burning control module are electrified again, and the chip firmware presetting method is executed again until the firmware burning is successful. For example, after the self-test button is triggered, whether the burning control module normally operates and whether the connection between the burning control module and the chip hardware in the burning seat is normal can be detected. If the self-check is successful, the burning control module software operates normally, the connection between the burning control module and the burning seat chip is not problematic, and the burning seat source of the burning module can be restarted and the burning module software can be restarted by triggering the reset button.
The chip firmware presetting method provided by the embodiment of the invention can acquire the characteristic firmware bound with the chip from the server according to the characteristic identifier of the chip and burn the characteristic firmware into the correspondingly bound chip in the firmware presetting process, so that the characteristic firmware can only run in the bound chip, and the safety of the chip firmware is improved.
Corresponding to a chip firmware presetting method in an optional implementation manner of the foregoing embodiment of the present invention, an embodiment of the present invention further provides another chip firmware presetting method, where the method is applied to a server, and please refer to fig. 2, where the method includes:
step S201: receiving a firmware request sent by a preset device; the firmware request comprises a characteristic identifier built in a chip guided by the preset equipment;
step S202: generating a feature firmware bound with the chip according to the feature identifier;
step S203: and issuing the characteristic firmware to the preset equipment, so that the preset equipment burns the characteristic firmware into the corresponding chip.
The chip firmware presetting method provided by the embodiment of the invention can generate the characteristic firmware bound with the chip according to the characteristic identifier of the chip in the firmware presetting process, and issue the characteristic firmware to the presetting device to be burned in the correspondingly bound chip, so that the characteristic firmware can only run in the bound chip, and the safety of the chip firmware is improved.
In step S201 of the embodiment of the present invention, a firmware request sent by a preset device may be received; the firmware request comprises a characteristic identifier built in a chip guided by the preset equipment.
In the embodiment of the present invention, as described above, the preset device connected to the server may be connected to the server through hardware, such as a burning seat for placing a chip, to guide the chip to start, read the feature identifier in the chip, and send a firmware request to the server based on the feature identifier. And after receiving a firmware request sent by the preset equipment, the server generates a feature firmware bound with the chip according to the feature identifier and sends the feature firmware to the preset equipment. Optionally, the feature identifier uniquely corresponds to the chip.
Further, in step S202 in the embodiment of the present invention, a feature firmware bound to the chip may be generated according to the feature identifier.
In a feasible implementation manner, firmware to be burned for realizing a basic function of a chip is stored in a server, and the server may perform encoding based on the firmware to be burned and the feature identifier to generate the feature firmware, so that the feature firmware can be analyzed out of the feature identifier for activation verification of the chip. Thus, only when the feature firmware is built into the corresponding chip, the corresponding chip can be verified upon activation. For example, the feature identifier may be encoded in a predetermined format to a predetermined position in the firmware to be burned to generate the feature firmware. Of course, the feature identifier may be preprocessed by shifting, encrypting, and the like before encoding, so as to improve the difficulty of cracking. In a specific implementation, the server may further generate a feature key and/or a feature certificate according to the feature identifier, and combine the feature key and/or the feature certificate with the firmware to be burned to generate the feature firmware; the feature key and/or the feature certificate are used for activation verification and/or communication verification after the chip is activated. The key and the certificate are the basis in communication verification, the corresponding feature key and/or the feature certificate can be generated according to the feature identifier and combined with the firmware to be burned for communication verification after the chip is activated, strong binding of the feature firmware and the corresponding chip can be realized, the chip can be successfully activated only when the bound feature firmware is built in, and the chip can be normally used after being activated, so that the safety of the chip is improved.
Further, in step S203 of the embodiment of the present invention, the feature firmware may be issued to the preset device, so that the preset device burns the feature firmware into the corresponding chip.
In the embodiment of the invention, after the server generates the feature firmware, the feature firmware is issued to the corresponding preset equipment, so that the preset equipment receives the feature firmware, then the feature firmware is burnt onto the corresponding chip bound by the feature firmware, the presetting of the chip firmware is completed, and the feature firmware can be activated and operated in the corresponding chip. By the chip firmware presetting method provided by the invention, the corresponding characteristic firmware can be generated and burned for each chip, and the safety of the chip firmware is improved. Moreover, the chips can be installed on terminal equipment such as a vehicle-mounted terminal, and the chips can be adapted to vehicles corresponding to the vehicle-mounted terminal, so that different feature firmware on each vehicle is realized.
In addition, in order to facilitate the subsequent activation verification, in a possible embodiment of the present invention, the following steps are further included: recording chip information and/or characteristic data of a chip burned with the characteristic firmware for activation verification and/or communication verification of the chip in terminal equipment; the chip information represents that the activation state of the chip is an inactivated state; the feature data includes at least one of the feature identification, feature key, and feature certificate. After the characteristic firmware is generated, the server can record relevant information or data of the chip bound by the characteristic firmware and store the information or data in the database so as to verify the chip in the subsequent activation process. For example, in an optional implementation manner, the server may record chip information representing the chip activation condition, and since the chip has not shipped from the factory at this time, the chip is represented in an inactive state by the current chip information. In the subsequent chip activation process, if the server verifies that the chip information corresponding to the server is in an inactivated state, the activation is legal, and the activation instruction can be issued to the terminal equipment containing the chip after the verification is passed. Furthermore, the server can update the chip information corresponding to the chip after the chip is activated, so that the chip is represented to be in an activated state, and the chip is prevented from being stolen or illegally activated. Since the key and the certificate may be used for verification in communication verification, in another alternative implementation, the server may record feature data of the chip, where the feature data may specifically include at least one of the feature identifier, the feature key, and the feature certificate, so as to perform activation verification and/or communication verification during activation or use of the chip, and only when the feature data or the feature data based on the feature data passes verification, it may be determined that the chip has the correspondingly generated feature firmware built therein, so that the chip passes activation verification and/or communication verification, so as to implement normal operation of the chip in the terminal device. In a specific implementation, the server may query feature data corresponding to the feature firmware bound to the chip based on the chip information, and generate signature information according to the feature data; and issuing an activation instruction containing the signature information to the terminal equipment, so that the terminal equipment verifies the signature information according to the characteristic secret key and/or the characteristic certificate of the chip. Only when the chip is internally provided with the correspondingly generated feature firmware, the corresponding feature key and/or the corresponding feature certificate can be generated according to the feature firmware, so that the chip passes activation verification and/or communication verification through verification of the signature information. The chip firmware is effectively prevented from being stolen, falsely used or replaced, and the safety of the chip firmware is improved.
In order to improve the normalization and the safety of chip firmware presetting, in practical application, the whole chip firmware presetting process can be monitored by a server so as to ensure that characteristic firmware is burned under preset equipment corresponding to a preset IP address at strictly specified running time; the burning quantity of the chips, the chip models and the version numbers of the firmware to be burned can be strictly controlled, and the whole operation process is controlled by the server. In a possible implementation manner, the method for presetting the chip firmware provided by the embodiment of the present invention further includes the following pre-step: acquiring task information; the task information includes at least one of: the method comprises the steps of presetting a serial number of equipment, an IP address of the equipment, the running time of the equipment, a chip model, the chip burning quantity and the version number of firmware to be burned; and when the task information conforms to a preset task range, issuing the task information to the preset equipment and executing the subsequent steps. For example, an operator may enter task information, and the server verifies whether the task information meets a predetermined task range after acquiring the task information, where the predetermined task range may be determined according to the performance of a preset device or a burning requirement. And after the server passes the verification, the server issues the task production information to the preset equipment. Optionally, at this time, the preset device may enter a standby mode, and display information of the production task on a screen for an operator to confirm. After the task information is confirmed, the chip firmware preset flow can be started. The corresponding different characteristic firmware is respectively burned in different chips in batch, and the mass production efficiency and safety of the chip firmware presetting are improved.
The chip firmware presetting method provided by the embodiment of the invention can generate the characteristic firmware bound with the chip according to the characteristic identifier of the chip in the firmware presetting process, and issue the characteristic firmware to the presetting device to be burned in the correspondingly bound chip, so that the characteristic firmware can only run in the bound chip, and the safety of the chip firmware is improved.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the illustrated order of acts, as some steps may occur in other orders or concurrently in accordance with the embodiments of the present invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
It should be understood by those skilled in the art that the above-described service scenarios are merely examples, and that suitable changes based on the examples can be made for other scenarios, and also fall within the spirit or scope of the present invention.
Further, it should be understood that, although the respective steps in the flowcharts of the drawings are sequentially shown as indicated by arrows, the steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
The embodiment of the present invention further provides a chip firmware presetting device 50, please refer to fig. 3, where the chip firmware presetting device 50 is applied to a presetting device, and the chip firmware presetting device 50 may include: a guiding module 501, a requesting module 502 and a burning module 503, wherein:
the booting module 501 is configured to boot a chip to obtain a feature identifier embedded in the chip;
a request module 502, configured to send a firmware request including the feature identifier to a server, so as to generate, by the server, a feature firmware bound to the chip;
the burning module 503 is configured to receive the feature firmware sent by the server, and burn the feature firmware into the corresponding chip.
The chip firmware presetting device 50 provided by the embodiment of the invention can acquire the feature firmware bound with the chip from the server according to the feature identifier of the chip and burn the feature firmware into the correspondingly bound chip in the firmware presetting process, so that the feature firmware can only run in the bound chip, and the safety of the chip firmware is improved.
It is clear to those skilled in the art that the chip firmware presetting device 50 provided in the embodiment of the present invention may be a preset device itself or a part thereof or a program code running therein, and the implementation principle and the resulting technical effect are the same as those of the foregoing method embodiment.
The embodiment of the present invention further provides a chip firmware presetting device 60, referring to fig. 4, where the chip firmware presetting device 60 is applied to a server, and the chip firmware presetting device 60 may include: the system comprises a receiving module 601, a generating module 602 and a sending module 603, wherein:
a receiving module 601, configured to receive a firmware request sent by a provisioning device; the firmware request comprises a characteristic identifier built in a chip guided by the preset equipment;
a generating module 602, configured to generate, according to the feature identifier, a feature firmware bound to the chip;
the issuing module 603 issues the feature firmware to the preset device, so that the preset device burns the firmware into the corresponding chip.
The chip firmware presetting device 60 provided by the embodiment of the invention can generate the feature firmware bound with the chip according to the feature identifier of the chip in the firmware presetting process, and issue the feature firmware to the presetting device to be burned into the correspondingly bound chip, so that the feature firmware can only run in the bound chip, and the safety of the chip firmware is improved.
It is clear to those skilled in the art that the chip firmware presetting device 60 provided in the embodiment of the present invention may be a server, such as a cloud server, or a part thereof or a program code running therein, and the implementation principle and the resulting technical effect are the same as those of the foregoing method embodiment.
An embodiment of the present invention further provides a preset device, please refer to fig. 5, where the preset device includes:
the burning base plate 31 is provided with at least one burning seat 311; the burning seat 311 and the chip are in a hardware connection relationship;
a control unit 30 comprising a processor 301 and a memory 302, said memory 302 being adapted to store program code, which is loaded and executed by said processor 301 to implement the respective content of the preceding method embodiments.
Among other things, the processor 301 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and so on. Which may implement or execute the various illustrative logical blocks, modules, and circuits described in connection with the disclosure of the embodiments of the invention, e.g., execute programming software. The processor 401 may be a DSP (Digital Signal Processing), an ASIC (Application Specific Integrated Circuit), an FPGA (Field-Programmable Gate Array), a PLA (Programmable logic Array), or other Programmable logic device, transistor logic device, hardware component, or any combination thereof. The processor 301 may also include a main processor and a coprocessor, where the main processor is a processor for Processing data in an awake state, and is also called a Central Processing Unit (CPU); a coprocessor is a low power processor for processing data in a standby state. In some embodiments, the processor 801 may be integrated with a GPU (Graphics Processing Unit), which is responsible for rendering and drawing the content required to be displayed on the display screen. In some embodiments, the processor 401 may further include an ECU (Electronic Control Unit), or an AI (Artificial Intelligence) processor for processing computing operations related to machine learning. The processor 301 may also be a combination of computing functions, e.g., comprising one or more microprocessors, a combination of a DSP and a microprocessor, or the like.
The memory 302 may be, but is not limited to, a ROM or other type of static storage device that can store static information and instructions, a RAM or other type of dynamic storage device that can store information and instructions, an EEPROM, a CD-ROM or other optical disk storage, optical disk storage (including compact disk, laser disk, optical disk, digital versatile disk, blu-ray disk, etc.), a magnetic disk storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
In a specific application, the processor 301 and the memory 302 may also be embedded in a burn computer, a burn control board or other control circuits according to actual needs, so as to facilitate an operator to implement corresponding contents in the foregoing method embodiments.
The burning backplane 31 may include a control module and is provided with at least one burning seat 311 for placing a chip, and the burning seat 311 may supply power to the chip and transmit data through a hardware interface. Taking the STM32 chip as an example, the burning control module on the burning backplane may be an ST-Link, and is connected to one or more burning sockets 311 through a circuit of the ST-Link. The corresponding different characteristic firmware can be respectively burned in different chips in batch, and the efficiency and the safety of mass production of chip firmware presetting are improved.
Optionally, the burning base plate 31 may further include a key, an indicator light or a display screen, which may be controlled by the burning control board; the burning computer is connected with the burning control panel through the USB-to-serial port. The keys can comprise one or more of start, stop, power-off, power supply, reset, self-checking and the like, and the indicator light can comprise a preset state indicator light and the like; after the start key is triggered, an operation instruction is reported to the burning computer to start a chip firmware presetting process, and a presetting state indicator lamp is lightened to indicate presetting (blue), presetting success (green) and presetting failure (red). In addition, the basic information of the backplane can be stored in the burn control board, including the serial number of the preset device, the model (type) of the chip supporting burn, the use times and the running time of the burn backplane, and the like. The display screen can be used for confirming task information by operators or displaying information such as self-checking abnormity and the like.
Optionally, the preset device may further include a communication unit for communicating with the server. The processor 301 is connected to a communication unit, such as via a bus. It should be noted that, in practical applications, the receiving and communicating unit may include a transceiver, etc., and is not limited to one, and the structure of the preset device does not constitute a limitation on the embodiment of the present invention. In addition, a bus may include a path that transfers information between the components. The bus can be a PCI bus, an EISA bus or the like, and can also comprise a hardware interface such as a USB or the like. The bus may be divided into an address bus, a data bus, a control bus, etc.
The preset device provided by the embodiment of the invention can acquire the characteristic firmware bound with the chip from the server according to the characteristic identifier of the chip and burn the characteristic firmware into the correspondingly bound chip in the firmware presetting process, so that the characteristic firmware can only run on the bound chip, and the safety of the chip firmware is improved.
Referring to fig. 6, the server 40 further includes a processor 401 and a memory 402, where the memory 402 is used to store a program code, and the program code is loaded and executed by the processor 401 to implement the corresponding content in the foregoing method embodiments.
The present principles of the implementation of the processor 401 and the memory 402 are the same as those of the foregoing embodiments of the processor 301 and the memory 302, and for convenience and brevity of description, no mention is made to portions of the embodiments of the processor 401 and the memory 402, and reference may be made to corresponding contents in the foregoing embodiments of the processor 301 and the memory 302, and details are not repeated here.
Optionally, the server 40 may further include a communication unit for communication with the preset device. The processor 301 is connected to a communication unit, such as via a bus. It should be noted that, in practical applications, the receiving and communicating unit may include a transceiver, etc., and is not limited to one, and the structure of the server does not constitute a limitation to the embodiment of the present invention. In addition, a bus may include a path that transfers information between the components. The bus can be a PCI bus, an EISA bus or the like, and can also comprise a hardware interface such as a USB or the like. The bus may be divided into an address bus, a data bus, a control bus, etc.
The server 40 provided by the embodiment of the invention can generate the feature firmware bound with the chip according to the feature identifier of the chip in the firmware presetting process, and issue the feature firmware to the preset device to be burned into the correspondingly bound chip, so that the feature firmware can only run in the bound chip, and the security of the chip firmware is improved.
Embodiments of the present invention also provide a computer program product, wherein the computer program product causes a computer to execute some or all of the steps of the method as in the previous method embodiments when the computer program product runs on the computer.
Embodiments of the present invention further provide an application publishing platform, where the application publishing platform is configured to publish a computer program product, where when the computer program product runs on a computer, the computer is caused to perform some or all of the steps of the method in the foregoing method embodiments.
The embodiment of the invention also provides a storage medium, wherein the storage medium is stored with a program code, and the program code is used for executing the corresponding content in the method embodiment. By way of example, the storage medium may be a computer-readable storage medium capable of running on a computer.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, apparatus, storage medium, provisioning device, server, or computer program product. Accordingly, embodiments of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The foregoing is only a partial embodiment of the present invention, and it should be noted that the principle and embodiments of the present invention are described herein by using specific examples, and the above description is only for assisting understanding of the method and the core idea of the present invention, and should not be construed as limiting the present invention; also, it is intended that the appended claims be interpreted as including the preferred embodiment and all changes and modifications that fall within the true scope of the embodiments of the invention, i.e., all changes and modifications that would occur to one skilled in the art to which the invention pertains without departing from the spirit of the invention.

Claims (19)

1. A chip firmware presetting method is applied to presetting equipment and is characterized by comprising the following steps:
guiding a chip to start to obtain a built-in characteristic identifier of the chip;
sending a firmware request containing the feature identifier to a server to generate feature firmware bound with the chip;
and receiving the characteristic firmware sent by the server, and burning the characteristic firmware into the corresponding chip.
2. The chip firmware presetting method of claim 1, wherein the generating of the feature firmware bound to the chip comprises:
and coding based on the firmware to be burned and the feature identifier to generate the feature firmware, so that the feature firmware can be analyzed to obtain the feature identifier for activation verification of the chip.
3. The chip firmware presetting method of claim 2, wherein the encoding based on the firmware to be burned and the feature identifier to generate the feature firmware comprises:
generating a characteristic key and/or a characteristic certificate according to the characteristic identifier, and combining the characteristic key and/or the characteristic certificate with the firmware to be burned to generate the characteristic firmware; the feature key and/or the feature certificate are used for communication verification after the chip is activated.
4. The chip firmware presetting method according to claim 2 or 3, characterized in that the feature identifier uniquely corresponds to the chip.
5. The chip firmware presetting method of claim 1, characterized by further comprising the following pre-steps:
receiving task information sent by a server;
when the task information accords with a preset task range, executing the subsequent steps;
the task information includes at least one of: the serial number of the preset equipment, the IP address of the preset equipment, the chip model, the chip burning quantity, the running time and the version number of the firmware to be burned.
6. The chip firmware presetting method of claim 5, characterized by further comprising the following subsequent steps:
and when the burning of the characteristic firmware fails, the chip and the burning control module connected with the chip are electrified again, and the chip firmware presetting method is executed again.
7. The chip firmware presetting method of claim 6, characterized by further comprising the steps of:
detecting whether the hardware connection between the burning control module and the chip is normal and/or detecting whether the operation of the chip firmware presetting method is normal;
and when the abnormality is detected, the chip and the burning control module are electrified again, and the chip firmware presetting method is executed again until the firmware burning is successful.
8. A chip firmware presetting method is applied to a server, and is characterized by comprising the following steps:
receiving a firmware request sent by a preset device; the firmware request comprises a characteristic identifier built in a chip guided by the preset equipment;
generating a feature firmware bound with the chip according to the feature identifier;
and issuing the characteristic firmware to the preset equipment, so that the preset equipment burns the characteristic firmware into the corresponding chip.
9. The chip firmware presetting method of claim 8, wherein the generating of the feature firmware bound to the chip according to the feature identifier comprises:
and coding based on the firmware to be burned and the feature identifier to generate the feature firmware, so that the feature firmware can be analyzed to obtain the feature identifier for activation verification of the chip.
10. The chip firmware presetting method of claim 9, wherein the encoding based on the firmware to be burned and the feature identifier to generate the feature firmware comprises:
generating a characteristic key and/or a characteristic certificate according to the characteristic identifier, and combining the characteristic key and/or the characteristic certificate with the firmware to be burned to generate the characteristic firmware; the feature key and/or the feature certificate are used for communication verification after the chip is activated.
11. The chip firmware presetting method according to claim 9 or 10, characterized in that the feature identifier uniquely corresponds to the chip.
12. The chip firmware presetting method of claim 8, characterized by further comprising the following pre-steps:
acquiring task information; the task information includes at least one of: the method comprises the steps of presetting a serial number of equipment, an IP address of the equipment, the running time of the equipment, a chip model, the chip burning quantity and the version number of firmware to be burned;
and when the task information conforms to a preset task range, issuing the task information to the preset equipment and executing the subsequent steps.
13. The chip firmware presetting method of claim 8, characterized by further comprising the following subsequent steps:
recording chip information and/or characteristic data of a chip burned with the characteristic firmware for activation verification and/or communication verification of the chip in terminal equipment; the chip information represents that the activation state of the chip is an inactivated state; the feature data includes at least one of the feature identification, feature key, and feature certificate.
14. The chip firmware presetting method of claim 13, characterized in that the terminal device comprises a vehicle-mounted terminal; the chip is adapted to a vehicle corresponding to the vehicle-mounted terminal.
15. A chip firmware presetting device is applied to presetting equipment and is characterized by comprising:
the guiding module is used for guiding a chip to start and acquiring a characteristic identifier built in the chip;
the request module is used for sending a firmware request containing the characteristic identifier to a server so as to generate characteristic firmware bound with the chip through the server;
and the burning module is used for receiving the characteristic firmware sent by the server and burning the characteristic firmware into the corresponding chip.
16. A chip firmware presetting device is applied to a server, and is characterized by comprising:
the receiving module is used for receiving a firmware request sent by the preset equipment; the firmware request comprises a characteristic identifier built in a chip guided by the preset equipment;
the generating module is used for generating the feature firmware bound with the chip according to the feature identifier;
and the issuing module issues the characteristic firmware to the preset equipment, so that the preset equipment burns the firmware into the corresponding chip.
17. A pre-set apparatus is characterized by comprising
The burning base plate is provided with at least one burning seat; the burning seat and the chip are in a hardware connection relationship;
a control unit comprising a processor and a memory for storing program code, the program code being loaded and executed by the processor to carry out the operations carried out in the method according to any one of claims 1 to 7.
18. A server, characterized in that the server comprises a processor and a memory for storing program code, which is loaded and executed by the processor to implement the operations performed in the method according to any of claims 8 to 14.
19. A storage medium, characterized in that a program code is stored in the storage medium for performing the method of any of claims 1 to 14.
CN201911331483.2A 2019-12-21 2019-12-21 Chip firmware presetting method and device, presetting equipment and server Active CN111142947B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911331483.2A CN111142947B (en) 2019-12-21 2019-12-21 Chip firmware presetting method and device, presetting equipment and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911331483.2A CN111142947B (en) 2019-12-21 2019-12-21 Chip firmware presetting method and device, presetting equipment and server

Publications (2)

Publication Number Publication Date
CN111142947A true CN111142947A (en) 2020-05-12
CN111142947B CN111142947B (en) 2023-09-12

Family

ID=70519258

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911331483.2A Active CN111142947B (en) 2019-12-21 2019-12-21 Chip firmware presetting method and device, presetting equipment and server

Country Status (1)

Country Link
CN (1) CN111142947B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112418788A (en) * 2020-11-17 2021-02-26 广州易而达科技股份有限公司 Module production processing system and method
CN113127013A (en) * 2021-03-18 2021-07-16 杭州涂鸦信息技术有限公司 Chip burning management method and system and computer readable storage medium
CN113254034A (en) * 2021-06-07 2021-08-13 深圳市蔚来芯科技有限公司 Vehicle-mounted terminal system upgrading burning encryption method and encryption process thereof
CN115469910A (en) * 2022-11-15 2022-12-13 浙江日风电气股份有限公司 Photovoltaic inverter firmware updating method, device, system and storage medium
WO2023123898A1 (en) * 2021-12-30 2023-07-06 深圳市广和通无线通信软件有限公司 Firmware burning method and device, burning apparatus, and firmware burning system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108170447A (en) * 2017-12-08 2018-06-15 摩比天线技术(深圳)有限公司 The on-line automatic method for burn-recording of chip and system
CN108762791A (en) * 2018-06-07 2018-11-06 深圳市元征科技股份有限公司 Firmware upgrade method and device
CN109902452A (en) * 2018-11-01 2019-06-18 北京旷视科技有限公司 FPGA authority checking method, apparatus and processing equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108170447A (en) * 2017-12-08 2018-06-15 摩比天线技术(深圳)有限公司 The on-line automatic method for burn-recording of chip and system
CN108762791A (en) * 2018-06-07 2018-11-06 深圳市元征科技股份有限公司 Firmware upgrade method and device
CN109902452A (en) * 2018-11-01 2019-06-18 北京旷视科技有限公司 FPGA authority checking method, apparatus and processing equipment

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112418788A (en) * 2020-11-17 2021-02-26 广州易而达科技股份有限公司 Module production processing system and method
WO2022105170A1 (en) * 2020-11-17 2022-05-27 广州易而达科技股份有限公司 Production treatment system and method for module
CN113127013A (en) * 2021-03-18 2021-07-16 杭州涂鸦信息技术有限公司 Chip burning management method and system and computer readable storage medium
CN113254034A (en) * 2021-06-07 2021-08-13 深圳市蔚来芯科技有限公司 Vehicle-mounted terminal system upgrading burning encryption method and encryption process thereof
WO2023123898A1 (en) * 2021-12-30 2023-07-06 深圳市广和通无线通信软件有限公司 Firmware burning method and device, burning apparatus, and firmware burning system
CN115469910A (en) * 2022-11-15 2022-12-13 浙江日风电气股份有限公司 Photovoltaic inverter firmware updating method, device, system and storage medium

Also Published As

Publication number Publication date
CN111142947B (en) 2023-09-12

Similar Documents

Publication Publication Date Title
CN111142947B (en) Chip firmware presetting method and device, presetting equipment and server
US10397212B2 (en) Information device, data processing system, data processing method, and non-transitory storage medium for executing content upon authentication
CN102630320B (en) Information processing device and method for preventing unauthorized application cooperation
CN109313690A (en) Self-contained encryption boot policy verifying
JP6585072B2 (en) Safe reading of data into non-volatile memory or secure elements
CN111538517B (en) Method and system for upgrading server firmware, electronic equipment and storage medium
JP2018007049A (en) Information sharing system, computer, and information sharing method
CN105531710A (en) Method of authorizing an operation to be performed on a targeted computing device
EP2958017A1 (en) Computerized systems and methods for installing upgraded software on electronic devices
CN106919859B (en) Basic input output system protection method and device
CN114945021A (en) Unmanned vehicle remote debugging method, device and system and storage medium
CN101009888B (en) Secure booting method for a mobile terminal, computer readable recording medium and mobile terminal
US20220391192A1 (en) Ota master, center, system, method, non-transitory storage medium, and vehicle
CN113946854B (en) File access control method and device and computer readable storage medium
CN115437915A (en) Vehicle-based version testing method and device and electronic equipment
CN111079124B (en) Security chip activation method and device, terminal equipment and server
CN115729568A (en) Program burning protection method and device, burner and board card
JP7156499B2 (en) Programmable logic controller activation method, device and system
CN110675894B (en) HDCP key online burning method and device and electronic equipment
US20220300958A1 (en) Control method, device, and recording medium
US20220413831A1 (en) Center, ota master, method, non-transitory storage medium, and vehicle
CN104933367A (en) Information processing method and electronic device
CN112585038B (en) Control device for activating a function, motor vehicle having a control device, and method for operating a control device
CN102096777A (en) Secure programming of vehicle modules
CN115525933B (en) Data tamper-proof method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant