CN111142947B - Chip firmware presetting method and device, presetting equipment and server - Google Patents

Chip firmware presetting method and device, presetting equipment and server Download PDF

Info

Publication number
CN111142947B
CN111142947B CN201911331483.2A CN201911331483A CN111142947B CN 111142947 B CN111142947 B CN 111142947B CN 201911331483 A CN201911331483 A CN 201911331483A CN 111142947 B CN111142947 B CN 111142947B
Authority
CN
China
Prior art keywords
chip
firmware
feature
characteristic
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911331483.2A
Other languages
Chinese (zh)
Other versions
CN111142947A (en
Inventor
江浩
陈景郁
冯世杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Xiaopeng Motors Technology Co Ltd
Original Assignee
Guangzhou Xiaopeng Motors Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Xiaopeng Motors Technology Co Ltd filed Critical Guangzhou Xiaopeng Motors Technology Co Ltd
Priority to CN201911331483.2A priority Critical patent/CN111142947B/en
Publication of CN111142947A publication Critical patent/CN111142947A/en
Application granted granted Critical
Publication of CN111142947B publication Critical patent/CN111142947B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1415Saving, restoring, recovering or retrying at system level
    • G06F11/1441Resetting or repowering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • G06F8/63Image based installation; Cloning; Build to order

Abstract

The embodiment of the invention provides a chip firmware presetting method, device, presetting equipment and a server. The chip firmware presetting method comprises the following steps: guiding a chip to start, and acquiring a characteristic identifier built in the chip; sending a firmware request containing the feature identifier to a server to generate feature firmware bound with the chip; the method and the device for processing the chip firmware can effectively acquire the feature firmware bound with the chip from the server according to the feature identification of the chip in the firmware presetting process and burn the feature firmware into the corresponding bound chip, so that the feature firmware can only run in the bound chip, and the safety of the chip firmware is improved.

Description

Chip firmware presetting method and device, presetting equipment and server
Technical Field
The present invention relates to the field of chip firmware security technologies, and in particular, to a method and apparatus for presetting chip firmware, a preset device, and a server.
Background
With the popularization of the application of the Internet of vehicles, the safety of the Internet of vehicles is paid attention to by practitioners and the public. The firmware is the lowest-layer program in the chip, which can be operated by the chip, and the firmware safety of the chip becomes an important basis for guaranteeing the safety of the Internet of vehicles because of the communication verification and the business data processing.
Conventional preset devices typically burn the same firmware in batches during operation. The chip on which the firmware is burned may then be built into the terminal device to activate the chip prior to use, thereby enabling the chip to function properly for performance or function. However, in the above process, the risk of leakage of the firmware of the chip or hacking is high.
Disclosure of Invention
The embodiment of the invention provides a chip firmware presetting method, device, presetting equipment and server, which are used for overcoming the technical problems or at least partially solving the technical problems. The technical proposal is as follows:
in a first aspect, an embodiment of the present invention provides a chip firmware presetting method, applied to a preset device, where the method includes:
guiding a chip to start, and acquiring a characteristic identifier built in the chip;
sending a firmware request containing the feature identifier to a server to generate feature firmware bound with the chip;
and receiving the characteristic firmware sent by the server, and burning the characteristic firmware into the corresponding chip.
In an alternative implementation, the generating the feature firmware bound to the chip includes:
and encoding based on the firmware to be burned and the feature identifier, and generating the feature firmware so that the feature firmware can be analyzed to obtain the feature identifier for activation verification of the chip.
In an optional implementation manner, the encoding based on the firmware to be burned and the feature identifier, generating the feature firmware, includes:
generating a characteristic key and/or a characteristic certificate according to the characteristic identifier, and combining the characteristic key and/or the characteristic certificate with the firmware to be burned to generate the characteristic firmware; the feature key and/or feature certificate is used for communication verification after the chip is activated.
In an alternative implementation, the feature identifier uniquely corresponds to the chip.
In an alternative implementation, the method further comprises the following pre-steps:
receiving task information sent by a server;
when the task information accords with a preset task range, executing the subsequent steps;
the task information includes at least one of: the serial number of the preset equipment, the IP address of the preset equipment, the chip type, the number of the chip burnt, the running time and the version number of the firmware to be burnt.
In an alternative implementation, the method further comprises the following subsequent steps:
and when the characteristic firmware fails to burn, the chip and a burning control module connected with the chip are electrified again, and the chip firmware presetting method is executed again.
In an alternative implementation, the method further includes the steps of:
detecting whether the hardware connection between the burning control module and the chip is normal or not, and/or detecting whether the operation of the chip firmware presetting method is normal or not;
and when the abnormality is detected, the chip and the burning control module are powered on again, and the chip firmware presetting method is executed again until the firmware is burned successfully.
In a second aspect, an embodiment of the present invention provides a method for presetting chip firmware, which is applied to a server, where the method includes:
receiving a firmware request sent by preset equipment; the firmware request comprises a characteristic identifier built in a chip guided by the preset equipment;
generating feature firmware bound with the chip according to the feature identifier;
and issuing the characteristic firmware to the preset equipment, so that the preset equipment burns the characteristic firmware into the corresponding chip.
In an alternative implementation manner, the generating the feature firmware bound to the chip according to the feature identifier includes:
and encoding based on the firmware to be burned and the feature identifier, and generating the feature firmware so that the feature firmware can be analyzed to obtain the feature identifier for activation verification of the chip.
In an optional implementation manner, the encoding based on the firmware to be burned and the feature identifier, generating the feature firmware, includes:
generating a characteristic key and/or a characteristic certificate according to the characteristic identifier, and combining the characteristic key and/or the characteristic certificate with the firmware to be burned to generate the characteristic firmware; the feature key and/or feature certificate is used for communication verification after the chip is activated.
In an alternative implementation, the feature identifier uniquely corresponds to the chip.
In an alternative implementation, the method further comprises the following pre-steps:
acquiring task information; the task information includes at least one of: presetting a serial number of the equipment, an IP address of the equipment, running time of the equipment, a chip model number, a chip burning number and a version number of firmware to be burned;
and when the task information accords with a preset task range, issuing the task information to the preset equipment, and executing subsequent steps.
In an alternative implementation, the method further comprises the following subsequent steps:
recording chip information and/or characteristic data of a chip on which the characteristic firmware is burnt, wherein the chip information and/or the characteristic data are used for activating verification and/or communication verification of the chip in terminal equipment; the chip information characterizes that the activation state of the chip is an unactivated state; the feature data includes at least one of the feature identification, a feature key, and a feature certificate.
In an alternative implementation, the terminal device includes a vehicle-mounted terminal; the chip is adapted to a vehicle corresponding to the vehicle-mounted terminal.
In a third aspect, an embodiment of the present invention provides a chip firmware preset apparatus, applied to a preset device, where the apparatus includes:
the guiding module is used for guiding the chip to start and acquiring the characteristic identifier built in the chip;
the request module is used for sending a firmware request containing the feature identifier to a server so as to generate feature firmware bound with the chip through the server;
and the burning module is used for receiving the characteristic firmware sent by the server and burning the characteristic firmware into the corresponding chip.
In a fourth aspect, an embodiment of the present invention provides a chip firmware preset device, applied to a server, where the device includes:
the receiving module is used for receiving a firmware request sent by the preset equipment; the firmware request comprises a characteristic identifier built in a chip guided by the preset equipment;
the generating module is used for generating characteristic firmware bound with the chip according to the characteristic identifier;
and the issuing module issues the characteristic firmware to the preset equipment, so that the preset equipment burns the firmware into the corresponding chip.
In a fifth aspect, an embodiment of the present invention provides a preset device, including
The recording bottom plate is provided with at least one recording seat; the burning seat and the chip are in a hardware connection relationship;
a control unit comprising a processor and a memory for storing program code that is loaded and executed by the processor to carry out the operations performed by the method shown in any implementation of the first aspect of the embodiments of the invention.
In a sixth aspect, embodiments of the present invention provide a server comprising a processor and a memory for storing program code that is loaded and executed by the processor to implement the operations performed by the method shown in any implementation of the second aspect of embodiments of the present invention.
In a seventh aspect, an embodiment of the present invention provides a storage medium, where the storage medium stores program code for performing the method shown in any implementation manner of the first aspect and the second aspect of the embodiment of the present invention.
The chip firmware presetting method, the chip firmware presetting device and the chip firmware presetting equipment provided by the embodiment of the invention are started by adopting a guide chip to acquire the characteristic identification built in the chip; sending a firmware request containing the feature identifier to a server to generate feature firmware bound with the chip; the characteristic firmware bound with the chip can be obtained according to the characteristic identifier of the chip by receiving the characteristic firmware sent by the server and burning the characteristic firmware into the corresponding chip, and the characteristic firmware is burnt into the corresponding bound chip, so that the characteristic firmware can only run in the bound chip, and the safety of the chip firmware is improved.
Drawings
Fig. 1 is a flow chart of a chip firmware presetting method according to an embodiment of the present invention;
FIG. 2 is a flowchart of another method for presetting chip firmware according to an embodiment of the present invention;
fig. 3 is a schematic flow chart of a chip firmware presetting device according to an embodiment of the present invention;
FIG. 4 is a flowchart of another chip firmware presetting device according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a preset device according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a server according to an embodiment of the present invention.
Detailed Description
Embodiments of the present invention are described in detail below, some examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are exemplary only for explaining the embodiments of the present invention and are not to be construed as limiting the invention.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless expressly stated otherwise, as understood by those skilled in the art. It is further understood that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the term "current" is intended to mean a particular process or step node, to distinguish it from other processes or steps; the terms "leading," "trailing" and "following" are used to refer to a sequence of flow or step nodes, and are not intended to refer specifically to a particular flow or step node. Furthermore, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other like elements in a process, method, article or terminal device comprising the element.
It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. The term "and/or" as used herein includes all or any element and all combination of one or more of the associated listed items.
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more comprehensible, the embodiments of the present invention are described in further detail below with reference to the accompanying drawings and detailed description.
In an embodiment of the present invention, firmware (firmware) may include a bottom layer program written into a chip memory to implement at least a basic function of the chip, such as a driver, a security encryption program, a communication program, or an operating system program; the feature identifier characterizes the feature information of the chip and can comprise a sequence code, a serial number, a model number and the like of the chip. In order to improve the security, in practice, a person skilled in the art may also select a unique identity identifier corresponding to the chip as the feature identifier, where the unique identity identifier cannot be tampered with. For example, since the manufacturer of the chip, the date of production, the line of production, the X/Y (transverse/longitudinal) coordinates on the wafer, etc. information can be obtained from the DIE ID, the DIE ID can be selected as the unique identity number of each chip as the characteristic identifier of the chip; the firmware generated from the chip feature identification may be referred to as feature firmware. Optionally, the preset device may be connected to the chip hardware to guide the chip to start and read/write data, and may perform two-way communication with the server, receive the feature firmware sent by the server, and burn the feature firmware into the corresponding chip, where the preset device may further be equipped with an operating system, such as Linux, windows, mac, android, iOS, or a derivative/similar system thereof, as required. The server may be a central server, a cluster server or a distributed server, or may be a cloud server for implementing cloud computing and/or cloud storage.
It will be appreciated by those skilled in the art that the above-described several types of firmware, feature identifiers, preset devices and servers are merely examples, and that appropriate changes based on these examples may also be applied to the present invention, and embodiments of the present invention are not limited to the type of feature identifier and preset device.
The embodiment of the invention provides a chip firmware presetting method which is applied to preset equipment, referring to FIG. 1, and comprises the following steps:
step S101: guiding a chip to start, and acquiring a characteristic identifier built in the chip;
step S102: sending a firmware request containing the feature identifier to a server to generate feature firmware bound with the chip;
step S103: and receiving the characteristic firmware sent by the server, and burning the characteristic firmware into the corresponding chip.
According to the chip firmware presetting method provided by the embodiment of the invention, the characteristic firmware bound with the chip can be obtained from the server according to the characteristic identifier of the chip in the firmware presetting process, and the characteristic firmware is burnt in the corresponding bound chip, so that the characteristic firmware can only be activated or operated in the bound chip, and the safety of the chip firmware is improved.
In step S101 of the embodiment of the present invention, a chip may be guided to start, and a feature identifier built in the chip may be obtained.
In the embodiment of the invention, the preset device can be connected through hardware, such as a burning seat for placing a chip, for supplying power to the chip, guiding the chip to start, and reading the characteristic identifier in the chip, wherein the characteristic identifier can be uniquely corresponding to the chip as described above. Taking an STM32 chip as an example, the burning seat can be contained in a burning control module (ST-Link), and the preset equipment can acquire the characteristic identification of the chip through a get_ChipID function.
Further, in step S102 of the embodiment of the present invention, a firmware request including the feature identifier may be sent to a server to generate feature firmware bound to the chip.
In the embodiment of the invention, after the preset device obtains the feature identifier, a firmware request can be sent to the server based on the feature identifier, so that after the server receives the firmware request, the feature firmware bound with the chip is generated according to the feature identifier, and the feature firmware is sent to the preset device.
In a possible implementation manner, the server stores firmware to be burned for realizing the basic function of the chip, and the server can encode based on the firmware to be burned and the feature identifier to generate the feature firmware, so that the feature firmware can be parsed out of the feature identifier for activation verification of the chip. Thus, only when the feature firmware is built into the corresponding chip, the corresponding chip can be authenticated at the time of activation. For example, the feature identification may be encoded in a predetermined format to a predetermined location in the firmware to be burned to generate the feature firmware. Of course, the feature identifier can also be subjected to pretreatment such as shifting, encryption and the like before encoding so as to improve the cracking difficulty. In a specific implementation, the server may further generate a feature key and/or a feature certificate according to the feature identifier, and combine the feature key and/or the feature certificate with the firmware to be burned to generate the feature firmware; the feature key and/or feature certificate is used for communication verification after the chip is activated. The key and the certificate are the basis in communication verification, the corresponding characteristic key and/or the characteristic certificate can be generated according to the characteristic identifier and combined with the firmware to be burned for communication verification after chip activation, so that strong binding of the characteristic firmware and the corresponding chip is realized, the chip can be successfully activated only when the bound characteristic firmware is built in, and the chip can be normally used after activation, and the safety of the chip is improved.
Further, in step S103 of the embodiment of the present invention, the feature firmware sent by the server may be received, and the feature firmware may be burned into the corresponding chip.
In the embodiment of the invention, after the preset device receives the characteristic firmware generated by the server by the method, the characteristic firmware is burnt on the corresponding chip bound with the characteristic firmware to finish the preset of the chip firmware, so that the characteristic firmware can be activated and operated in the corresponding chip. The chip firmware presetting method provided by the invention can burn the corresponding characteristic firmware of each chip, improves the safety of the chip firmware, and can prevent the preset equipment from directly contacting the characteristic key and the characteristic certificate, thereby preventing the leakage of safety information. In addition, the chips can be installed on terminal equipment, such as a vehicle-mounted terminal, and the chips can be adapted to vehicles corresponding to the vehicle-mounted terminal, so that different characteristic firmware on each vehicle is realized.
In order to improve the standardization and the safety of chip firmware presetting, in practical application, the whole process of chip firmware presetting can be monitored by a server so as to ensure that characteristic firmware is burnt under preset equipment corresponding to a preset IP address in strictly specified running time; the number of the chip burning, the chip model and the version number of the firmware to be burnt can be strictly controlled, so that the whole operation process is ensured to be controlled by the server. In a possible implementation manner, the chip firmware presetting method provided by the embodiment of the invention further includes the following pre-steps: receiving task information sent by a server; when the task information accords with a preset task range, executing the subsequent steps; the task information includes at least one of: the serial number of the preset equipment, the IP address of the preset equipment, the chip type, the number of the chip burnt, the running time and the version number of the firmware to be burnt. For example, the preset device may communicate with the server through the unique code of the preset device before the chip firmware is preset, to verify whether the task information accords with the predetermined task range, where the predetermined task range may be determined according to the performance or the burning requirement of the preset device. And after the verification is passed, the server issues the task production information to the preset equipment. Alternatively, the preset device may enter a standby mode at this time, displaying information of the production task on a screen for confirmation by the operator. After the task information is confirmed, the preset operation of the chip firmware can be started, the chip is placed in the burning seat, and the chip firmware preset flow is started. Different corresponding characteristic firmware is respectively burnt in different chips in batches, and the mass production efficiency and the safety of chip firmware presetting are improved.
In the process of presetting the chip firmware, sometimes, the situation of firmware burning failure or abnormal data transmission occurs, and at this time, the preset device can perform resetting operation in an alternative implementation manner of the embodiment of the invention besides marking operation failure, and the method comprises the following subsequent steps: and when the characteristic firmware fails to burn, the chip and a burning control module connected with the chip are electrified again, and the chip firmware presetting method is executed again. For example, when the feature firmware fails to burn, the feature firmware may be automatically executed or executed after the reset button is triggered: and independently powering up and restarting the burning control module, resetting the software of the burning control module, and simultaneously powering up and restarting the burning seat comprising a chip arranged in the burning control module, thereby preventing burning failure caused by the running of the burning software in the burning control module or the burning failure caused by hardware failure. So that an attempt can be made to restore normal operation by resetting the reboot.
In order to timely check possible problems in the chip firmware presetting process, in another optional implementation manner of the embodiment of the present invention, the preset device may further perform a self-checking operation, including the following steps: detecting whether the hardware connection between the burning control module and the chip is normal or not, and/or detecting whether the operation of the chip firmware presetting method is normal or not; and when the abnormality is detected, the chip and the burning control module are powered on again, and the chip firmware presetting method is executed again until the firmware is burned successfully. For example, after the self-checking button is triggered, whether the burning control module operates normally or not and whether the connection between the burning control module and the chip hardware in the burning seat is normal or not can be detected. And if the self-check is successful, the software of the burning control module runs normally, the connection between the burning control module and the burning seat chip is free from problems, and the burning seat source of the burning module can be restarted and the software of the burning module can be restarted by triggering a reset button.
According to the chip firmware presetting method provided by the embodiment of the invention, the characteristic firmware bound with the chip can be obtained from the server according to the characteristic identifier of the chip in the firmware presetting process, and the characteristic firmware is burnt in the corresponding bound chip, so that the characteristic firmware can only run in the bound chip, and the safety of the chip firmware is improved.
Corresponding to one chip firmware presetting method in the alternative implementation manner of the above embodiment of the present invention, the embodiment of the present invention further provides another chip firmware presetting method, where the method is applied to a server, please refer to fig. 2, and the method includes:
step S201: receiving a firmware request sent by preset equipment; the firmware request comprises a characteristic identifier built in a chip guided by the preset equipment;
step S202: generating feature firmware bound with the chip according to the feature identifier;
step S203: and issuing the characteristic firmware to the preset equipment, so that the preset equipment burns the characteristic firmware into the corresponding chip.
The chip firmware presetting method provided by the embodiment of the invention can generate the characteristic firmware bound with the chip according to the characteristic identifier of the chip in the firmware presetting process, and send the characteristic firmware to the preset device to be burnt in the corresponding bound chip, so that the characteristic firmware can only run in the bound chip, and the safety of the chip firmware is improved.
In step S201 of the embodiment of the present invention, a firmware request sent by a preset device may be received; the firmware request contains a feature identifier built in a chip guided by the preset device.
In the embodiment of the invention, as described above, the preset device connected with the server may be connected through hardware, such as a burning seat for placing a chip, to guide the chip to start, read the feature identifier in the chip, and send a firmware request to the server based on the feature identifier. After receiving the firmware request sent by the preset device, the server generates feature firmware bound with the chip according to the feature identifier and sends the feature firmware to the preset device. Optionally, the feature identifier uniquely corresponds to the chip.
Further, in step S202 of the embodiment of the present invention, feature firmware bound to the chip may be generated according to the feature identifier.
In a possible implementation manner, the server stores firmware to be burned for realizing the basic function of the chip, and the server can encode based on the firmware to be burned and the feature identifier to generate the feature firmware, so that the feature firmware can be parsed out of the feature identifier for activation verification of the chip. Thus, only when the feature firmware is built into the corresponding chip, the corresponding chip can be authenticated at the time of activation. For example, the feature identification may be encoded in a predetermined format to a predetermined location in the firmware to be burned to generate the feature firmware. Of course, the feature identifier can also be subjected to pretreatment such as shifting, encryption and the like before encoding so as to improve the cracking difficulty. In a specific implementation, the server may further generate a feature key and/or a feature certificate according to the feature identifier, and combine the feature key and/or the feature certificate with the firmware to be burned to generate the feature firmware; the feature key and/or the feature certificate are used for activation verification and/or communication verification after the chip is activated. The key and the certificate are the basis in communication verification, the corresponding characteristic key and/or the characteristic certificate can be generated according to the characteristic identifier and combined with the firmware to be burned for communication verification after chip activation, so that strong binding of the characteristic firmware and the corresponding chip can be realized, the chip can be successfully activated only when the bound characteristic firmware is built in, and the chip can be normally used after activation, and the safety of the chip is improved.
Further, in step S203 of the embodiment of the present invention, the feature firmware may be issued to the preset device, so that the preset device burns the feature firmware into the corresponding chip.
In the embodiment of the invention, after the server generates the characteristic firmware, the characteristic firmware is issued to the corresponding preset equipment, so that the preset equipment receives the characteristic firmware and burns the characteristic firmware to the corresponding chip bound with the characteristic firmware to finish the preset of the chip firmware, and the characteristic firmware can be activated and operated in the corresponding chip. The chip firmware presetting method provided by the invention can generate and burn the corresponding characteristic firmware for each chip, and improves the safety of the chip firmware. In addition, the chips can be installed on terminal equipment, such as a vehicle-mounted terminal, and the chips can be adapted to vehicles corresponding to the vehicle-mounted terminal, so that different characteristic firmware on each vehicle is realized.
Furthermore, in order to facilitate subsequent activation verification, in a possible embodiment of the present invention, the method further comprises the following steps: recording chip information and/or characteristic data of a chip on which the characteristic firmware is burnt, wherein the chip information and/or the characteristic data are used for activating verification and/or communication verification of the chip in terminal equipment; the chip information characterizes that the activation state of the chip is an unactivated state; the feature data includes at least one of the feature identification, a feature key, and a feature certificate. After generating the characteristic firmware, the server can record the related information or data of the chip bound by the characteristic firmware and store the related information or data in a database so as to verify in the subsequent activation process of the chip. For example, in an alternative implementation, the server may record chip information indicating the activation of the chip, and since the chip is not shipped at this time, the current chip information indicates that the chip is in an inactive state. In the subsequent chip activation process, if the server verifies that the corresponding chip information represents the non-activation state, the activation is legal, and an activation instruction can be issued to the terminal equipment containing the chip after the verification is passed. Furthermore, the server can update the chip information corresponding to the chip after the chip is activated, so that the chip is characterized as an activated state, and the chip is prevented from being stolen or illegally activated. Because the key and the certificate can be used for verification in communication verification, in another alternative implementation manner, the server can record the characteristic data of the chip, wherein the characteristic data specifically can comprise at least one of the characteristic identifier, the characteristic key and the characteristic certificate so as to perform activation verification and/or communication verification in the activation or use process of the chip, and the chip can be determined to be built with the corresponding generated characteristic firmware only when the characteristic data or the verification based on the characteristic data passes, so that the chip passes the activation verification and/or the communication verification to realize the normal operation of the chip in the terminal equipment. In a specific implementation, the server can query feature data corresponding to the feature firmware bound by the chip based on the chip information, and generate signature information according to the feature data; and issuing an activation instruction containing the signature information to the terminal equipment, so that the terminal equipment verifies the signature information according to the characteristic key and/or the characteristic certificate of the chip. Only when the corresponding generated characteristic firmware is arranged in the chip, a corresponding characteristic key and/or characteristic certificate can be generated according to the characteristic firmware, so that the chip can pass activation verification and/or communication verification through verification of signature information. The chip firmware is effectively prevented from being stolen, counterfeited or replaced, and the safety of the chip firmware is improved.
In order to improve the standardization and the safety of chip firmware presetting, in practical application, the whole process of chip firmware presetting can be monitored by a server so as to ensure that characteristic firmware is burnt under preset equipment corresponding to a preset IP address in strictly specified running time; the number of the chip burning, the chip model and the version number of the firmware to be burnt can be strictly controlled, so that the whole operation process is ensured to be controlled by the server. In a possible implementation manner, the chip firmware presetting method provided by the embodiment of the invention further includes the following pre-steps: acquiring task information; the task information includes at least one of: presetting a serial number of the equipment, an IP address of the equipment, running time of the equipment, a chip model number, a chip burning number and a version number of firmware to be burned; and when the task information accords with a preset task range, issuing the task information to the preset equipment, and executing subsequent steps. For example, an operator may enter task information, and the server verifies whether the task information meets a predetermined task scope after acquiring the task information, where the predetermined task scope may be determined according to the performance of the preset device or the recording requirement. And after the verification is passed, the server issues the task production information to the preset equipment. Alternatively, the preset device may enter a standby mode at this time, displaying information of the production task on a screen for confirmation by the operator. After the task information is confirmed, the chip firmware preset flow can be started. Different corresponding characteristic firmware is respectively burnt in different chips in batches, and the mass production efficiency and the safety of chip firmware presetting are improved.
The chip firmware presetting method provided by the embodiment of the invention can generate the characteristic firmware bound with the chip according to the characteristic identifier of the chip in the firmware presetting process, and send the characteristic firmware to the preset device to be burnt in the corresponding bound chip, so that the characteristic firmware can only run in the bound chip, and the safety of the chip firmware is improved.
It should be noted that, for simplicity of description, the method embodiments are shown as a series of acts, but it should be understood by those skilled in the art that the embodiments are not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the embodiments. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred embodiments, and that the acts are not necessarily required by the embodiments of the invention.
Those skilled in the art will appreciate that the above business scenarios are merely examples, and that appropriate changes based on this example can be made for other scenarios, and can also fall within the spirit or scope of the present invention.
Further, it should be understood that, although the steps in the flowcharts of the drawings are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited in order and may be performed in other orders, unless explicitly stated herein. Moreover, at least some of the steps in the flowcharts of the figures may include a plurality of sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, the order of their execution not necessarily being sequential, but may be performed in turn or alternately with other steps or at least a portion of the other steps or stages.
The embodiment of the present invention further provides a chip firmware presetting device 50, referring to fig. 3, the chip firmware presetting device 50 is applied to a presetting device, and the chip firmware presetting device 50 may include: a booting module 501, a requesting module 502, and a burning module 503, wherein:
the guiding module 501 is used for guiding the chip to start and acquiring the characteristic identifier built in the chip;
a request module 502, configured to send a firmware request including the feature identifier to a server, so as to generate, by the server, feature firmware bound with the chip;
and the burning module 503 is configured to receive the feature firmware sent by the server, and burn the feature firmware into the corresponding chip.
The chip firmware presetting device 50 provided by the embodiment of the invention can acquire the characteristic firmware bound with the chip from the server according to the characteristic identifier of the chip in the firmware presetting process, and burn the characteristic firmware in the corresponding bound chip, so that the characteristic firmware can only run in the bound chip, and the safety of the chip firmware is improved.
It will be clear to those skilled in the art that the chip firmware presetting device 50 provided in the embodiment of the present invention may be a presetting device itself or a part thereof or a program code running therein, and its implementation principle and technical effects are the same as those of the foregoing method embodiment, and for convenience and brevity, the corresponding contents in the foregoing method embodiment may be referred to for brevity and clarity of description.
The embodiment of the present invention further provides a chip firmware presetting device 60, referring to fig. 4, the chip firmware presetting device 60 is applied to a server, and the chip firmware presetting device 60 may include: a receiving module 601, a generating module 602, and a transmitting module 603, wherein:
a receiving module 601, configured to receive a firmware request sent by a preset device; the firmware request comprises a characteristic identifier built in a chip guided by the preset equipment;
a generating module 602, configured to generate feature firmware bound to the chip according to the feature identifier;
and the issuing module 603 issues the feature firmware to the preset device, so that the preset device burns the firmware into the corresponding chip.
The chip firmware presetting device 60 provided by the embodiment of the invention can generate the characteristic firmware bound with the chip according to the characteristic identifier of the chip in the firmware presetting process, and send the characteristic firmware to the preset equipment to be burnt in the corresponding bound chip, so that the characteristic firmware can only run in the bound chip, and the safety of the chip firmware is improved.
It can be clearly understood by those skilled in the art that the chip firmware presetting device 60 provided in the embodiment of the present invention may be a server, such as a cloud server, or a part thereof or a program code running therein, and its implementation principle and technical effects are the same as those of the foregoing method embodiment, and for convenience and brevity, the corresponding content in the foregoing method embodiment may be referred to for brevity and clarity.
The embodiment of the invention also provides a preset device, referring to fig. 5, the preset device includes:
the recording bottom plate 31 is provided with at least one recording seat 311; the burning seat 311 is in a hardware connection relationship with the chip;
the control unit 30 comprises a processor 301 and a memory 302, said memory 302 being adapted to store program code, which is loaded and executed by said processor 301 for realizing the respective content in the aforementioned method embodiments.
Processor 301 may include one or more processing cores, such as a 4-core processor, an 8-core processor, etc., among others. Which may implement or execute the various exemplary logic blocks, modules and circuits described in connection with the disclosure of embodiments of the invention, such as running programming software, etc. The processor 401 may be a DSP (Digital Signal Processing ), ASIC (Application Specific Integrated Circuit, application specific integrated circuit) FPGA (Field-Programmable Gate Array, field programmable gate array), PLA (Programmable Logic Array ) or other programmable logic device, transistor logic device, hardware component, or any combination thereof. The processor 301 may also include a main processor, which is a processor for processing data in an awake state, also called a CPU (Central Processing Unit ), and a coprocessor; a coprocessor is a low-power processor for processing data in a standby state. In some embodiments, the processor 801 may integrate a GPU (Graphics Processing Unit, image processor) for rendering and rendering of content required to be displayed by the display screen. In some embodiments, the processor 401 may also include an ECU (Electronic Control Unit ), or an AI (Artificial Intelligence, artificial intelligence) processor for processing computing operations related to machine learning. Processor 301 may also be a combination that implements computing functionality, e.g., comprising one or more microprocessor combinations, a combination of a DSP and a microprocessor, etc.
Memory 302 may be, but is not limited to, ROM or other type of static storage device that can store static information and instructions, RAM or other type of dynamic storage device that can store information and instructions, EEPROM, CD-ROM or other optical disk storage, optical disk storage (including compact disk, laser disk, optical disk, digital versatile disk, blu-ray disc, etc.), magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
In a specific application, the processor 301 and the memory 302 may be further built in a recording computer, a recording control board or other control circuits according to actual needs, so as to facilitate the operator to implement the corresponding content in the foregoing method embodiments.
The recording base plate 31 may include a control module, and at least one recording seat 311 for placing a chip is provided, and the recording seat 311 can supply power and transmit data to the chip through a hardware interface. Taking an STM32 chip as an example, the writing control module on the writing base plate may be an ST-Link, and is connected to one or more writing bases 311 through a circuit of the ST-Link. Different corresponding characteristic firmware can be respectively burnt in different chips in batches, and the mass production efficiency and the safety of chip firmware presetting are improved.
Optionally, the burning base plate 31 may further include a key, an indicator light, or a display screen, which is controlled by the burning control board; the burning computer is connected with the burning control board through a USB serial port. The key can comprise one or more of starting, stopping, powering off, power supply, resetting, self-checking and the like, and the indicator lamp can comprise a preset state indicator lamp and the like; after the start button is triggered, an operation instruction is reported to the burning computer to start a chip firmware preset flow, and a preset state indicator lamp is also lightened to indicate that the preset is in progress (blue), the preset is successful (green), and the preset is failed (red). In addition, the basic information of the bottom plate can be stored in the burning control board, and the basic information comprises the serial number of preset equipment, the type of a chip supporting burning, the use times of the burning bottom plate, the running time and other information. The display screen can be used for confirming task information by an operator or displaying information such as self-checking abnormality and the like.
Optionally, the preset device may further comprise a communication unit for communicating with the server. The processor 301 is connected to a communication unit, e.g. via a bus. It should be noted that, in practical applications, the receiving communication unit may include a transceiver, etc., and is not limited to one, and the configuration of the preset device does not limit the embodiments of the present invention. In addition, a bus may include a path that communicates information between the components. The bus may be a PCI bus or an EISA bus, and may also include a hardware interface such as a USB. The buses may be divided into address buses, data buses, control buses, etc.
The preset device provided by the embodiment of the invention can acquire the characteristic firmware bound with the chip from the server according to the characteristic identifier of the chip in the firmware preset process, and burn the characteristic firmware into the corresponding bound chip, so that the characteristic firmware can only run on the bound chip, and the safety of the chip firmware is improved.
The embodiment of the present invention further provides a server 40, referring to fig. 6, where the server 40 includes a processor 401 and a memory 402, and the memory 402 is configured to store program codes, and the program codes are loaded and executed by the processor 401 to implement the corresponding content in the foregoing method embodiment.
The implementation principles of the processor 401 and the memory 402 are the same as those of the foregoing embodiments of the processor 301 and the memory 302, and for convenience and brevity of description, reference may be made to corresponding contents in the foregoing embodiments of the processor 301 and the memory 302 where the embodiments of the processor 401 and the memory 402 are not mentioned.
Optionally, the server 40 may further comprise a communication unit for communicating with the preset device. The processor 301 is connected to a communication unit, e.g. via a bus. It should be noted that, in practical applications, the receiving communication unit may include a transceiver, etc., and is not limited to one, and the structure of the server is not limited to the embodiment of the present invention. In addition, a bus may include a path that communicates information between the components. The bus may be a PCI bus or an EISA bus, and may also include a hardware interface such as a USB. The buses may be divided into address buses, data buses, control buses, etc.
The server 40 provided by the embodiment of the invention can generate the characteristic firmware bound with the chip according to the characteristic identifier of the chip in the firmware presetting process, and send the characteristic firmware to the preset device to be burnt in the corresponding bound chip, so that the characteristic firmware can only run in the bound chip, and the safety of the chip firmware is improved.
The embodiments of the present invention also provide a computer program product, wherein the computer program product, when run on a computer, causes the computer to perform some or all of the steps of the method as in the method embodiments described above.
The embodiment of the invention also provides an application publishing platform, wherein the application publishing platform is used for publishing a computer program product, and the computer program product is enabled to execute part or all of the steps of the method as in the previous method embodiments when running on the computer.
The embodiment of the invention also provides a storage medium, and the storage medium stores program codes which are used for executing the corresponding content in the embodiment of the method. The storage medium may be, for example, a computer-readable storage medium capable of running on a computer.
In this specification, each embodiment is described in a progressive manner, and each embodiment is mainly described by differences from other embodiments, and identical and similar parts between the embodiments are all enough to be referred to each other.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, apparatus, storage medium, preset device, server or computer program product. Accordingly, embodiments of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal device to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal device, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The foregoing is only a partial embodiment of the present invention, and it should be noted that the principles and embodiments of the present invention have been described herein with reference to specific examples, which are provided to assist in understanding the method of the present invention and its core ideas, and should not be construed as limiting the invention; meanwhile, the appended claims are intended to be interpreted as including the preferred embodiments and all alterations and modifications falling within the scope of the embodiments of the present invention, i.e., improvements and modifications to those skilled in the art without departing from the principles of the present invention should also be regarded as being within the scope of the invention.

Claims (17)

1. A chip firmware presetting method applied to a presetting device, the method comprising:
guiding a chip to start, and acquiring a characteristic identifier built in the chip;
sending a firmware request containing the feature identifier to a server to generate feature firmware bound with the chip; wherein the generating the feature firmware bound with the chip includes:
encoding based on the firmware to be burned and the feature identifier, and generating the feature firmware so that the feature firmware can be analyzed to obtain the feature identifier for activation verification of the chip; wherein activating the verification of the chip comprises:
The server inquires the characteristic data bound with the characteristic firmware based on chip information, wherein the chip information characterizes the activation state of the chip;
the server generates signature information according to the characteristic data;
the terminal equipment activates and verifies the chip based on the characteristic firmware and the signature information;
and receiving the characteristic firmware sent by the server, and burning the characteristic firmware into the corresponding chip.
2. The chip firmware presetting method according to claim 1, wherein the encoding based on the firmware to be burned and the feature identifier, generating the feature firmware, includes:
generating a characteristic key and/or a characteristic certificate according to the characteristic identifier, and combining the characteristic key and/or the characteristic certificate with the firmware to be burned to generate the characteristic firmware; the feature key and/or feature certificate is used for communication verification after the chip is activated.
3. The chip firmware presetting method according to claim 1 or 2, wherein the characteristic identifier uniquely corresponds to the chip.
4. The chip firmware presetting method according to claim 1, further comprising the steps of:
Receiving task information sent by a server;
when the task information accords with a preset task range, executing the subsequent steps;
the task information includes at least one of: the serial number of the preset equipment, the IP address of the preset equipment, the chip type, the number of the chip burnt, the running time and the version number of the firmware to be burnt.
5. The chip firmware presetting method as claimed in claim 4, further comprising the following steps:
and when the characteristic firmware fails to burn, the chip and a burning control module connected with the chip are electrified again, and the chip firmware presetting method is executed again.
6. The chip firmware presetting method as claimed in claim 5, further comprising the steps of:
detecting whether the hardware connection between the burning control module and the chip is normal or not, and/or detecting whether the operation of the chip firmware presetting method is normal or not;
and when the abnormality is detected, the chip and the burning control module are powered on again, and the chip firmware presetting method is executed again until the firmware is burned successfully.
7. The chip firmware presetting method is applied to a server and is characterized by comprising the following steps:
Receiving a firmware request sent by preset equipment; the firmware request comprises a characteristic identifier built in a chip guided by the preset equipment;
generating feature firmware bound with the chip according to the feature identifier; wherein the generating the feature firmware bound with the chip according to the feature identifier includes:
encoding based on the firmware to be burned and the feature identifier, and generating the feature firmware so that the feature firmware can be analyzed to obtain the feature identifier for activation verification of the chip; wherein activating the verification of the chip comprises:
inquiring feature data bound with the feature firmware based on chip information, wherein the chip information characterizes the activation state of the chip;
generating signature information according to the characteristic data;
the terminal equipment activates and verifies the chip based on the characteristic firmware and the signature information;
and issuing the characteristic firmware to the preset equipment, so that the preset equipment burns the characteristic firmware into the corresponding chip.
8. The chip firmware presetting method according to claim 7, wherein the encoding based on the firmware to be burned and the feature identifier, generating the feature firmware, includes:
Generating a characteristic key and/or a characteristic certificate according to the characteristic identifier, and combining the characteristic key and/or the characteristic certificate with the firmware to be burned to generate the characteristic firmware; the feature key and/or feature certificate is used for communication verification after the chip is activated.
9. The chip firmware presetting method according to claim 7 or 8, wherein the feature identification uniquely corresponds to the chip.
10. The chip firmware presetting method as claimed in claim 7, further comprising the steps of:
acquiring task information; the task information includes at least one of: presetting a serial number of the equipment, an IP address of the equipment, running time of the equipment, a chip model number, a chip burning number and a version number of firmware to be burned;
and when the task information accords with a preset task range, issuing the task information to the preset equipment, and executing subsequent steps.
11. The chip firmware presetting method as claimed in claim 7, further comprising the following subsequent steps:
recording chip information and/or characteristic data of a chip on which the characteristic firmware is burnt, wherein the chip information and/or the characteristic data are used for activating verification and/or communication verification of the chip in terminal equipment; the chip information characterizes that the activation state of the chip is an unactivated state; the feature data includes at least one of the feature identification, a feature key, and a feature certificate.
12. The chip firmware presetting method according to claim 11, wherein the terminal device comprises a vehicle-mounted terminal; the chip is adapted to a vehicle corresponding to the vehicle-mounted terminal.
13. A chip firmware preset apparatus for use in a preset device, said apparatus comprising:
the guiding module is used for guiding the chip to start and acquiring the characteristic identifier built in the chip;
the request module is used for sending a firmware request containing the feature identifier to a server so as to generate feature firmware bound with the chip through the server; wherein the generating the feature firmware bound with the chip includes:
encoding based on the firmware to be burned and the feature identifier, and generating the feature firmware so that the feature firmware can be analyzed to obtain the feature identifier for activation verification of the chip; wherein activating the verification of the chip comprises:
the server inquires the characteristic data bound with the characteristic firmware based on chip information, wherein the chip information characterizes the activation state of the chip;
the server generates signature information according to the characteristic data;
the terminal equipment activates and verifies the chip based on the characteristic firmware and the signature information;
And the burning module is used for receiving the characteristic firmware sent by the server and burning the characteristic firmware into the corresponding chip.
14. A chip firmware preset device applied to a server, the device comprising:
the receiving module is used for receiving a firmware request sent by the preset equipment; the firmware request comprises a characteristic identifier built in a chip guided by the preset equipment;
the generating module is used for generating characteristic firmware bound with the chip according to the characteristic identifier; wherein the generating the feature firmware bound with the chip according to the feature identifier includes:
encoding based on the firmware to be burned and the feature identifier, and generating the feature firmware so that the feature firmware can be analyzed to obtain the feature identifier for activation verification of the chip; wherein activating the verification of the chip comprises:
inquiring feature data bound with the feature firmware based on chip information, wherein the chip information characterizes the activation state of the chip;
generating signature information according to the characteristic data;
the terminal equipment activates and verifies the chip based on the characteristic firmware and the signature information;
And the issuing module issues the characteristic firmware to the preset equipment, so that the preset equipment burns the firmware into the corresponding chip.
15. A preset device, comprising
The recording bottom plate is provided with at least one recording seat; the burning seat and the chip are in a hardware connection relationship;
a control unit comprising a processor and a memory for storing program code that is loaded and executed by the processor to carry out the operations performed in the method of any one of claims 1 to 6.
16. A server comprising a processor and a memory for storing program code that is loaded and executed by the processor to implement the operations performed in the method of any of claims 7 to 12.
17. A storage medium, characterized in that the storage medium has stored therein a program code for executing the method of any one of claims 1 to 12.
CN201911331483.2A 2019-12-21 2019-12-21 Chip firmware presetting method and device, presetting equipment and server Active CN111142947B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911331483.2A CN111142947B (en) 2019-12-21 2019-12-21 Chip firmware presetting method and device, presetting equipment and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911331483.2A CN111142947B (en) 2019-12-21 2019-12-21 Chip firmware presetting method and device, presetting equipment and server

Publications (2)

Publication Number Publication Date
CN111142947A CN111142947A (en) 2020-05-12
CN111142947B true CN111142947B (en) 2023-09-12

Family

ID=70519258

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911331483.2A Active CN111142947B (en) 2019-12-21 2019-12-21 Chip firmware presetting method and device, presetting equipment and server

Country Status (1)

Country Link
CN (1) CN111142947B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112418788A (en) * 2020-11-17 2021-02-26 广州易而达科技股份有限公司 Module production processing system and method
CN113127013A (en) * 2021-03-18 2021-07-16 杭州涂鸦信息技术有限公司 Chip burning management method and system and computer readable storage medium
CN113254034A (en) * 2021-06-07 2021-08-13 深圳市蔚来芯科技有限公司 Vehicle-mounted terminal system upgrading burning encryption method and encryption process thereof
CN114416121A (en) * 2021-12-30 2022-04-29 深圳市广和通无线通信软件有限公司 Firmware burning method and device, burning equipment and firmware burning system
CN115469910B (en) * 2022-11-15 2023-02-03 浙江日风电气股份有限公司 Photovoltaic inverter firmware updating method, device, system and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108170447A (en) * 2017-12-08 2018-06-15 摩比天线技术(深圳)有限公司 The on-line automatic method for burn-recording of chip and system
CN108762791A (en) * 2018-06-07 2018-11-06 深圳市元征科技股份有限公司 Firmware upgrade method and device
CN109902452A (en) * 2018-11-01 2019-06-18 北京旷视科技有限公司 FPGA authority checking method, apparatus and processing equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108170447A (en) * 2017-12-08 2018-06-15 摩比天线技术(深圳)有限公司 The on-line automatic method for burn-recording of chip and system
CN108762791A (en) * 2018-06-07 2018-11-06 深圳市元征科技股份有限公司 Firmware upgrade method and device
CN109902452A (en) * 2018-11-01 2019-06-18 北京旷视科技有限公司 FPGA authority checking method, apparatus and processing equipment

Also Published As

Publication number Publication date
CN111142947A (en) 2020-05-12

Similar Documents

Publication Publication Date Title
CN111142947B (en) Chip firmware presetting method and device, presetting equipment and server
US10397212B2 (en) Information device, data processing system, data processing method, and non-transitory storage medium for executing content upon authentication
CN104247361B (en) For method, equipment and the associated vehicle control system of security message filtering, and the computer-readable memory containing corresponding instruction
US9582262B2 (en) Systems and methods for installing upgraded software on electronic devices
CN106919859B (en) Basic input output system protection method and device
JP2018007049A (en) Information sharing system, computer, and information sharing method
KR102557005B1 (en) Generating checksums on trusted storage devices for accelerated authentication
CN106529301A (en) Method and device for controlling vehicle-mounted machine system, and vehicle-mounted machine system
JP7329702B2 (en) Methods for Safely Using Cryptographic Materials
JP2014527677A (en) System and method for installing patches on a computer system
US9965599B2 (en) Function setting method
CN101009888B (en) Secure booting method for a mobile terminal, computer readable recording medium and mobile terminal
CN113348110A (en) Electronic control device and safety verification method for electronic control device
CN108664012A (en) A kind of detection method of electric booster steering system controller, device and equipment
JP2004042794A (en) Control device and control system
US20220391192A1 (en) Ota master, center, system, method, non-transitory storage medium, and vehicle
US20220391194A1 (en) Ota master, system, method, non-transitory storage medium, and vehicle
CN111079124A (en) Security chip activation method and device, terminal equipment and server
CN114741738A (en) Tracing data processing method and device based on block chain, electronic equipment and medium
JP2015210669A (en) Program rewrite method
JP4534731B2 (en) Electronic control device and identification code generation method thereof
CN112585038A (en) Control device for activating a function, motor vehicle having a control device, and method for operating a control device
CN115525933B (en) Data tamper-proof method and device, electronic equipment and storage medium
US20220413831A1 (en) Center, ota master, method, non-transitory storage medium, and vehicle
US11972248B2 (en) Controlling software update of electronic control units mounted on a vehicle

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant