CN111327689A - Method for realizing remote upgrading of vehicle ECU (electronic control Unit) based on UDS (Universal data System) communication protocol - Google Patents

Method for realizing remote upgrading of vehicle ECU (electronic control Unit) based on UDS (Universal data System) communication protocol Download PDF

Info

Publication number
CN111327689A
CN111327689A CN202010074474.6A CN202010074474A CN111327689A CN 111327689 A CN111327689 A CN 111327689A CN 202010074474 A CN202010074474 A CN 202010074474A CN 111327689 A CN111327689 A CN 111327689A
Authority
CN
China
Prior art keywords
ecu
vehicle
upgrading
upgrade
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010074474.6A
Other languages
Chinese (zh)
Inventor
金高辉
周宏伟
侯杨杨
李晓伟
张家如
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dayun Automobile Co Ltd
Original Assignee
Dayun Automobile Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dayun Automobile Co Ltd filed Critical Dayun Automobile Co Ltd
Priority to CN202010074474.6A priority Critical patent/CN111327689A/en
Publication of CN111327689A publication Critical patent/CN111327689A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60WCONJOINT CONTROL OF VEHICLE SUB-UNITS OF DIFFERENT TYPE OR DIFFERENT FUNCTION; CONTROL SYSTEMS SPECIALLY ADAPTED FOR HYBRID VEHICLES; ROAD VEHICLE DRIVE CONTROL SYSTEMS FOR PURPOSES NOT RELATED TO THE CONTROL OF A PARTICULAR SUB-UNIT
    • B60W50/00Details of control systems for road vehicle drive control not related to the control of a particular sub-unit, e.g. process diagnostic or vehicle driver interfaces
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/04Programme control other than numerical control, i.e. in sequence controllers or logic controllers
    • G05B19/042Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60WCONJOINT CONTROL OF VEHICLE SUB-UNITS OF DIFFERENT TYPE OR DIFFERENT FUNCTION; CONTROL SYSTEMS SPECIALLY ADAPTED FOR HYBRID VEHICLES; ROAD VEHICLE DRIVE CONTROL SYSTEMS FOR PURPOSES NOT RELATED TO THE CONTROL OF A PARTICULAR SUB-UNIT
    • B60W50/00Details of control systems for road vehicle drive control not related to the control of a particular sub-unit, e.g. process diagnostic or vehicle driver interfaces
    • B60W2050/0062Adapting control system settings
    • B60W2050/0075Automatic parameter input, automatic initialising or calibrating means
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60WCONJOINT CONTROL OF VEHICLE SUB-UNITS OF DIFFERENT TYPE OR DIFFERENT FUNCTION; CONTROL SYSTEMS SPECIALLY ADAPTED FOR HYBRID VEHICLES; ROAD VEHICLE DRIVE CONTROL SYSTEMS FOR PURPOSES NOT RELATED TO THE CONTROL OF A PARTICULAR SUB-UNIT
    • B60W50/00Details of control systems for road vehicle drive control not related to the control of a particular sub-unit, e.g. process diagnostic or vehicle driver interfaces
    • B60W2050/0062Adapting control system settings
    • B60W2050/0075Automatic parameter input, automatic initialising or calibrating means
    • B60W2050/0083Setting, resetting, calibration
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60WCONJOINT CONTROL OF VEHICLE SUB-UNITS OF DIFFERENT TYPE OR DIFFERENT FUNCTION; CONTROL SYSTEMS SPECIALLY ADAPTED FOR HYBRID VEHICLES; ROAD VEHICLE DRIVE CONTROL SYSTEMS FOR PURPOSES NOT RELATED TO THE CONTROL OF A PARTICULAR SUB-UNIT
    • B60W2556/00Input parameters relating to data
    • B60W2556/45External transmission of data to or from the vehicle
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • H04L2012/40208Bus networks characterized by the use of a particular bus standard
    • H04L2012/40215Controller Area Network CAN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • H04L2012/40267Bus for use in transportation systems
    • H04L2012/40273Bus for use in transportation systems the transportation system being a vehicle

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Mechanical Engineering (AREA)
  • Transportation (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Medical Informatics (AREA)
  • General Health & Medical Sciences (AREA)
  • Stored Programmes (AREA)

Abstract

The invention relates to a device and a method for remotely upgrading vehicle ECUs, and provides a method for remotely upgrading the vehicle ECUs based on a UDS communication protocol, aiming at the current situation that different vehicle factories need to independently develop respective vehicle ECU remote upgrading systems. According to the invention, a vehicle UDS diagnostic protocol and a remote monitoring platform scheme are worked out based on CAN communication data of a vehicle, data upgrading of a vehicle ECU is realized remotely through a hardware vehicle-mounted terminal 4G module, the ECU does not need to be upgraded manually on line, the upgrading time of the vehicle ECU CAN be set at the background, and the ECU is automatically upgraded through remote networking after the set time is reached. An ECU delivery recovery mechanism is specified in the UDS protocol, so that the conditions of ECU crash damage, data loss and the like caused by networking failure in the upgrading process are avoided. According to the invention, the cloud platform, the vehicle-mounted hardware and the data management algorithm are established, and the encryption security access is carried out by combining the UDS diagnostic protocol, so that the ECU is safer and more convenient to upgrade.

Description

Method for realizing remote upgrading of vehicle ECU (electronic control Unit) based on UDS (Universal data System) communication protocol
Technical Field
The invention relates to a vehicle ECU remote upgrading device and a method, in particular to a method for realizing vehicle ECU remote upgrading based on a UDS communication protocol.
Background
Automobiles are more and more popular in life, and after mass production, many problems often occur to more and more automobiles, automobile factories need to upgrade sold automobile ECUs (Electronic Control units, also called as "driving computers", "vehicle-mounted computers", and the like), generally, automobile owners need to drive the automobiles to a specified 4S store or return to the factory, and the ECUs are upgraded manually by special workers. At present, in a traditional upgrading program method, a worker ECU is used for detaching a board or welding a circuit chip, and a lower computer is used for manually downloading the line for flashing, so that a large part of work occupied by time, manpower and financial resources is caused, the working efficiency is low, and errors are easy to make.
Vehicle remote control and data monitoring have many applications in the field of intelligent science and technology. Vehicle ECU remote upgrade has been applied to existing vehicles; however, different vehicle factories need to independently develop respective vehicle ECU remote upgrading systems.
Disclosure of Invention
The invention provides a method for realizing remote upgrading of vehicle ECU (electronic control unit) based on a UDS (universal data system) communication protocol, aiming at the current situation that different vehicle factories need to independently develop respective vehicle ECU remote upgrading systems.
The invention is realized by adopting the following technical scheme: the method for realizing the remote upgrade of the vehicle ECU based on the UDS communication protocol comprises an equipment cloud server, a vehicle-mounted TBOX (Telematics BOX), a TSP (Telematics Service Provider) management system and a vehicle-mounted ECU.
The UDS diagnosis upgrading process comprises the following steps:
UDS (unified diagnostic services) is directed to all ECUs of a vehicle. It is only an application layer protocol (ISO 14229-1), so it CAN be implemented on both CAN lines and even Ethernet. And the UDS provides a basic framework of diagnostic services, and a host factory and a part supplier can select to implement part of the diagnostic services or customize the diagnostic services into a plurality of privatized diagnostic services according to actual conditions.
The vehicle-mounted ECU of the whole vehicle is connected with the vehicle-mounted TBOX through a CAN bus; the CAN bus is divided into a power CAN bus PTCAN, a vehicle body CAN bus BCAN and an information CAN bus InfoCAN (shown in figure 1); the PTCAN is connected with: the system comprises a vehicle control unit VCU, a battery management system BMS, a direct current conversion CDU, a front motor controller MCUF, a rear motor controller MCUR, an electric power steering system EPS and an anti-lock brake system ABS; the BCAN is connected with: the system comprises a vehicle control unit VCU, an air bag ACU, an air conditioner AC, a compressor ACCM, an anti-pinch PWU and a vehicle body module BCM; connected to the InfoCAN are: the system comprises a vehicle control unit VCU, a combination instrument IC and a pedestrian early warning AVAS.
Vehicle-mounted ECU bootloader diagnostic upgrade protocol (as shown in fig. 2): ECU Bootloader starts the time sequence, in Bootloader mode, uses three diagnosis conversation modes: a default session mode, an extended session mode and a programming session mode; if the ECU receives "10 h02 h" under the correct conditions, the ECU asserts the external reprogramming request flag and executes an ECU restart.
1. The first step is to pre-program the file upgrading process:
an ECU upgrading preprogramming step, wherein after the TBOX receives a TSP platform instruction, the TBOX downloads a flash file from the TSP, and then carries out edition recognition on the ECU for preprogramming, and the specific flow is as follows (as shown in figure 3):
1) reading hardware version number of ECU: 22hF1h93 h;
2) reading version number of boot software: 22hF1h95 h;
3) diagnostic session control 10h 03 h: preprogramming requires that a non-default session mode be initiated in order to disable normal communication between ECUs and control the DTC (diagnostic trouble Code) settings. This is done by using a diagnostic session control (10h) service with the session type being an extended session mode. The request is sent to all ECUs through functional addressing by using a single-frame request message;
4) routine control, checking preprogrammed conditions: 31h 01h FFh 02h, through which the ECU programming conditions are checked to ensure system safety, the preprogrammed check conditions being determined by the ECU, which should refuse programming if there are any unsafe factors;
5) function request, disable DTC storage: 85h02h, prohibiting the DTC from storing fault information, and preventing the influence on the reprogramming communication network;
6) function request, disable non-diagnostic communication: 85h03h, the receiving and sending of the non-diagnosis message are forbidden, and the influence on the reprogramming communication network is prevented.
2. The second step is the upgrading process of the main programming file:
the ECU upgrades the main programming step, which is followed by the pre-programming step. The main programming sequence is the application of a single ECU programming event, so all requests for service use physical addressing, the specific flow is as follows (as shown in fig. 4):
1) diagnostic session control 10h 02 h: after receiving that an addressing mode is physical addressing and a subfunction is a diagnosis session control 10h service of a programming session, the ECU starts a Bootloader and allocates all resources required by programming; the ECU needs to send a positive response first and then executes the action of jumping to a programming mode;
2) secure access 27h 03h/04 h: the programming event must be through a secure access 27h service that is mandatory in emission-related and security systems, which other systems do not require to use. Before downloading, the safe access process is mandatory, and only a legal diagnostic instrument can download the ECU;
3) writing fingerprint information: 2EhF1h84h, writing the serial number of year, month, day and equipment;
4) downloading the FlashDriver, controlling the routine, and checking the integrity of the FlashDriver: 31h 01h F1h A0h, which is used to check the integrity of the logic block;
5) routine control, erasing program memory: 31h 01h FFh00h, in order to allow application software and data downloading, the memory of the ECU is erased; this step is performed by the routine control service 31h to erase the memory; if the memory erasing routine is called to be executed, the flag bit of the application software is set to be invalid;
6) drive download 34h, 36h, 37h, 31 h: when the memory drive is not stored in the nonvolatile storage unit of the ECU, the downloading of the memory drive is executed; the downloading is performed according to the following sequence: requesting downloading, transmitting data and requesting transmission to quit; after all bytes have been downloaded, a "check program integrity" routine 31h 01h F1h A0h is used to check that all bytes were transferred correctly;
7) after the integrity check, judging whether other data blocks need to be downloaded, if so, jumping to 31h FFh00h), and if not, continuing to go downwards;
8) routine control, checking for programmed dependencies: 31h 01h FFh 01h, TBOX will start a routine to trigger the ECU to check for reprogramming dependencies once all application software or data blocks/modules are downloaded; the ECU vendor defines the inspection content, but must ensure compatibility and consistency of all logic blocks;
9) resetting the ECU: the 11h 01h diagnostic instrument uses physical addressing to send an ECU reset 11h service request message with a reset type of hard reset to the CAN network; the ECU finishes the reprogramming process through the ECU reset service request and returns to the normal operation mode; the memory drive code must be completely cleared from the RAM cache to avoid accidentally activating code that may perform unintended memory erasures or program operations;
3. the third step is a flash process:
program download (as shown in fig. 5): each successive block (also called segment, which may be a complete piece of application software or data or a portion of application software or data) of application software or data is downloaded into the ECU nonvolatile memory, and the data transmission is completed according to the following service sequence:
requesting to download 34 h;
transmitting data 36 h;
request transmission exit 37 h;
when the length of a single application software or data block exceeds the cache size of a network layer, the single application software or data block needs a plurality of data transmission 36h request messages to complete transmission;
secondly, remote upgrade management:
2.1 remote upgrade management
According to the scheme, the ECU software and hardware versions of the vehicle can be managed in the whole life cycle of the vehicle, the upgrading task is automatically issued differentially by issuing the upgrading package, and the vehicle is appointed to be upgraded at the preset time. In the downloading and upgrading process, the platform has a corresponding remote downloading and upgrading strategy and a version rollback function. After the download is finished and the upgrade is finished, the platform can count the success rate of the batch upgrade and the failure reason. The remote upgrade flow is shown in fig. 6.
2.2 background upgrade flow description:
1. the operator provides the upgrade version and the software package to the Tsp, and the Tsp verifies the validity of the upgrade package and then issues the version update to an OTA (Over-the-Air Technology) database through the platform.
2. And after the platform releases the upgrading task and reaches the specified time, the Tsp verifies the difference between the version and the current version again, determines the upgrading range and makes a complete packet/difference packet.
3. When the update message is confirmed to be issued, the Tsp OTA server informs the vehicle T-Box that the new software version exists. And returning the version information by the T-box.
And 4, the Tsp determines the content of the differential version and then transmits the content back to the T-box, and the T-box communicates with the Tsp to obtain the version number.
5. And when the downloading condition is met, the T-box carries out the downloading process. The midway interruption judges whether the time exceeds 2 hours or not to decide the breakpoint continuous transmission or the re-downloading.
6. After the upgrade package is completely downloaded through the downloading process, the integrity of the CRC (Cyclic Redundancy Check) electronic signature is checked.
7. And judging whether the T-box has higher-priority events or not so as to perform upgrading action.
8. And after the upgrade is finished, transmitting the upgrade result and the current version information back to the Tsp for preservation and coverage.
2.3 software data packet encryption:
encryption the upgrade software package is encrypted using AES-128. The vendor generates an AES-128 key, which is kept secret and can only be used once. A new AES-128 key will be generated the next time. The delivered software package should contain the encrypted upgrade software package, the electronic certificate, and the encrypted AES-128 key. The encrypted AES-128 key is protected by the RSA encryption method using a private key, the public key of which is contained in the electronic certificate.
Thirdly, the equipment cloud server is implemented:
the cloud platform architecture of the device cloud server comprises a value-added application layer, an application management layer, a big data service layer, a basic service layer, a data access layer and a device access layer; the cloud platform architecture is subdivided in a modularization mode, and the modularization design can ensure the opening of basic functions and the expansion of later functions and business volumes, so that the disorder of functions and logic is avoided.
In specific implementation, the equipment cloud server is a cloud server based on Hua;
meanwhile, the cloud server of the device is required to have load balancing service so as to realize cloud service of flow distribution, and an effective and transparent method is provided for expanding the bandwidth of the network device and the server. The load balancing service increases the throughput, strengthens the network data processing capacity, and improves the flexibility and the usability of the network and the capacity of an application system to deal with high load. The load balancing service can be generally used as a network entrance of the application system, and distributes the user request to the cloud server cluster, so that the elastic expansion of the application system is realized.
According to the invention, a vehicle UDS diagnostic protocol and a remote monitoring platform scheme are worked out based on CAN communication data of a vehicle, data upgrading of a vehicle ECU is realized remotely through a hardware vehicle-mounted terminal 4G module, the ECU does not need to be upgraded manually on line, the upgrading time of the vehicle ECU CAN be set at the background, and the ECU is automatically upgraded through remote networking after the set time is reached. An ECU delivery recovery mechanism is specified in the UDS protocol, so that the conditions of ECU crash damage, data loss and the like caused by networking failure in the upgrading process are avoided. According to the invention, the cloud platform, the vehicle-mounted hardware and the data management algorithm are established, and the encryption security access is carried out by combining the UDS diagnostic protocol, so that the ECU is safer and more convenient to upgrade.
Drawings
FIG. 1 is a vehicle network topology of the present invention;
FIG. 2 is a flow chart of a vehicle-mounted ECU bootloader diagnostic upgrade protocol;
FIG. 3 is a flow chart of an ECU upgrade pre-programmed protocol;
FIG. 4 is a flowchart of an ECU upgrade main programming protocol;
FIG. 5 is a flowchart of program download;
FIG. 6 is a remote upgrade flow diagram.
Detailed Description
The method for realizing the remote upgrade of the vehicle ECU based on the UDS communication protocol comprises an equipment cloud server, a vehicle-mounted TBOX (Telematics BOX), a TSP (Telematics Service Provider) management system and a vehicle-mounted ECU.
The UDS diagnosis upgrading process comprises the following steps:
UDS (unified diagnostic services) is directed to all ECUs of a vehicle. It is only an application layer protocol (ISO 14229-1), so it CAN be implemented on both CAN lines and even Ethernet. And the UDS provides a basic framework of diagnostic services, and a host factory and a part supplier can select to implement part of the diagnostic services or customize the diagnostic services into a plurality of privatized diagnostic services according to actual conditions.
The vehicle-mounted ECU of the whole vehicle is connected with the vehicle-mounted TBOX through a CAN bus; the CAN bus is divided into a power CAN bus PTCAN, a vehicle body CAN bus BCAN and an information CAN bus InfoCAN (shown in figure 1); the PTCAN is connected with: the system comprises a vehicle control unit VCU, a battery management system BMS, a direct current conversion CDU, a front motor controller MCUF, a rear motor controller MCUR, an electric power steering system EPS and an anti-lock brake system ABS; the BCAN is connected with: the system comprises a vehicle control unit VCU, an air bag ACU, an air conditioner AC, a compressor ACCM, an anti-pinch PWU and a vehicle body module BCM; connected to the InfoCAN are: the system comprises a vehicle control unit VCU, a combination instrument IC and a pedestrian early warning AVAS.
Vehicle-mounted ECU bootloader diagnostic upgrade protocol (as shown in fig. 2): ECU Bootloader starts the time sequence, in Bootloader mode, uses three diagnosis conversation modes: a default session mode, an extended session mode and a programming session mode; if the ECU receives "10 h02 h" under the correct conditions, the ECU asserts the external reprogramming request flag and executes an ECU restart.
1. The first step is to pre-program the file upgrading process:
an ECU upgrading preprogramming step, wherein after the TBOX receives a TSP platform instruction, the TBOX downloads a flash file from the TSP, and then carries out edition recognition on the ECU for preprogramming, and the specific flow is as follows (as shown in figure 3):
1) reading hardware version number of ECU: 22hF1h93 h;
2) reading version number of boot software: 22hF1h95 h;
3) diagnostic session control 10h 03 h: preprogramming requires that a non-default session mode be initiated in order to disable normal communication between ECUs and control the DTC (diagnostic trouble Code) settings. This is done by using a diagnostic session control (10h) service with the session type being an extended session mode. The request is sent to all ECUs through functional addressing by using a single-frame request message;
4) routine control, checking preprogrammed conditions: 31h 01h FFh 02h, through which the ECU programming conditions are checked to ensure system safety, the preprogrammed check conditions being determined by the ECU, which should refuse programming if there are any unsafe factors;
5) function request, disable DTC storage: 85h02h, prohibiting the DTC from storing fault information, and preventing the influence on the reprogramming communication network;
6) function request, disable non-diagnostic communication: 85h03h, the receiving and sending of the non-diagnosis message are forbidden, and the influence on the reprogramming communication network is prevented.
2. The second step is the upgrading process of the main programming file:
the ECU upgrades the main programming step, which is followed by the pre-programming step. The main programming sequence is the application of a single ECU programming event, so all requests for service use physical addressing, the specific flow is as follows (as shown in fig. 4):
1) diagnostic session control 10h 02 h: after receiving that an addressing mode is physical addressing and a subfunction is a diagnosis session control 10h service of a programming session, the ECU starts a Bootloader and allocates all resources required by programming; the ECU needs to send a positive response first and then executes the action of jumping to a programming mode;
2) secure access 27h 03h/04 h: the programming event must be through a secure access 27h service that is mandatory in emission-related and security systems, which other systems do not require to use. Before downloading, the safe access process is mandatory, and only a legal diagnostic instrument can download the ECU;
3) writing fingerprint information: 2EhF1h84h, writing the serial number of year, month, day and equipment;
4) downloading the FlashDriver, controlling the routine, and checking the integrity of the FlashDriver: 31h 01h F1h A0h, which is used to check the integrity of the logic block;
5) routine control, erasing program memory: 31h 01h FFh00h, in order to allow application software and data downloading, the memory of the ECU is erased; this step is performed by the routine control service 31h to erase the memory; if the memory erasing routine is called to be executed, the flag bit of the application software is set to be invalid;
6) drive download 34h, 36h, 37h, 31 h: when the memory drive is not stored in the nonvolatile storage unit of the ECU, the downloading of the memory drive is executed; the downloading is performed according to the following sequence: requesting downloading, transmitting data and requesting transmission to quit; after all bytes have been downloaded, a "check program integrity" routine 31h 01h F1h A0h is used to check that all bytes were transferred correctly;
7) after the integrity check, judging whether other data blocks need to be downloaded, if so, jumping to 31h FFh00h), and if not, continuing to go downwards;
8) routine control, checking for programmed dependencies: 31h 01h FFh 01h, TBOX will start a routine to trigger the ECU to check for reprogramming dependencies once all application software or data blocks/modules are downloaded; the ECU vendor defines the inspection content, but must ensure compatibility and consistency of all logic blocks;
9) resetting the ECU: the 11h 01h diagnostic instrument uses physical addressing to send an ECU reset 11h service request message with a reset type of hard reset to the CAN network; the ECU finishes the reprogramming process through the ECU reset service request and returns to the normal operation mode; the memory drive code must be completely cleared from the RAM cache to avoid accidentally activating code that may perform unintended memory erasures or program operations;
3. the third step is a flash process:
program download (as shown in fig. 5): each successive block (also called segment, which may be a complete piece of application software or data or a portion of application software or data) of application software or data is downloaded into the ECU nonvolatile memory, and the data transmission is completed according to the following service sequence:
requesting to download 34 h;
transmitting data 36 h;
request transmission exit 37 h;
when the length of a single application software or data block exceeds the cache size of a network layer, the single application software or data block needs a plurality of data transmission 36h request messages to complete transmission;
secondly, remote upgrade management:
2.1 remote upgrade management
According to the scheme, the ECU software and hardware versions of the vehicle can be managed in the whole life cycle of the vehicle, the upgrading task is automatically issued differentially by issuing the upgrading package, and the vehicle is appointed to be upgraded at the preset time. In the downloading and upgrading process, the platform has a corresponding remote downloading and upgrading strategy and a version rollback function. After the download is finished and the upgrade is finished, the platform can count the success rate of the batch upgrade and the failure reason. The remote upgrade flow is shown in fig. 6.
2.2 background upgrade flow description:
1. the operator provides the upgrade version and the software package to the Tsp, and the Tsp verifies the validity of the upgrade package and then issues the version update to an OTA (Over-the-Air Technology) database through the platform.
2. And after the platform releases the upgrading task and reaches the specified time, the Tsp verifies the difference between the version and the current version again, determines the upgrading range and makes a complete packet/difference packet.
3. When the update message is confirmed to be issued, the Tsp OTA server informs the vehicle T-Box that the new software version exists. And returning the version information by the T-box.
And 4, the Tsp determines the content of the differential version and then transmits the content back to the T-box, and the T-box communicates with the Tsp to obtain the version number.
5. And when the downloading condition is met, the T-box carries out the downloading process. The midway interruption judges whether the time exceeds 2 hours or not to decide the breakpoint continuous transmission or the re-downloading.
6. After the upgrade package is completely downloaded through the downloading process, the integrity of the CRC (Cyclic Redundancy Check) electronic signature is checked.
7. And judging whether the T-box has higher-priority events or not so as to perform upgrading action.
8. And after the upgrade is finished, transmitting the upgrade result and the current version information back to the Tsp for preservation and coverage.
2.3 software data packet encryption:
encryption the upgrade software package is encrypted using AES-128. The vendor generates an AES-128 key, which is kept secret and can only be used once. A new AES-128 key will be generated the next time. The delivered software package should contain the encrypted upgrade software package, the electronic certificate, and the encrypted AES-128 key. The encrypted AES-128 key is protected by the RSA encryption method using a private key, the public key of which is contained in the electronic certificate.
Thirdly, the equipment cloud server is implemented:
the cloud platform architecture of the device cloud server comprises a value-added application layer, an application management layer, a big data service layer, a basic service layer, a data access layer and a device access layer; the cloud platform architecture is subdivided in a modularization mode, and the modularization design can ensure the opening of basic functions and the expansion of later functions and business volumes, so that the disorder of functions and logic is avoided.
During specific implementation, the equipment cloud server is based on the cloud server, and main performance parameters of the equipment cloud server are as follows:
Figure BDA0002378309510000091
Figure BDA0002378309510000101
meanwhile, the cloud server of the device is required to have load balancing service so as to realize cloud service of flow distribution, and an effective and transparent method is provided for expanding the bandwidth of the network device and the server. The load balancing service increases the throughput, strengthens the network data processing capacity, and improves the flexibility and the usability of the network and the capacity of an application system to deal with high load. The load balancing service can be generally used as a network entrance of the application system, and distributes the user request to the cloud server cluster, so that the elastic expansion of the application system is realized.
The main performance parameters of the network security of the cloud server of the equipment are as follows:
Figure BDA0002378309510000102
Figure BDA0002378309510000111

Claims (1)

1. a method for realizing remote upgrading of a vehicle ECU (electronic control unit) based on a UDS (Universal data System) communication protocol comprises an equipment cloud server, a vehicle-mounted TBOX (tunnel boring machine), a TSP (Total suspended particulate) management system and a vehicle-mounted ECU; it is characterized in that the preparation method is characterized in that,
the UDS diagnosis upgrading process comprises the following steps:
the vehicle-mounted ECU of the whole vehicle is connected with the vehicle-mounted TBOX through a CAN bus; the CAN bus is divided into a power CAN bus PTCAN, a vehicle body CAN bus BCAN and an information CAN bus infoCAN; the PTCAN is connected with: the system comprises a vehicle control unit VCU, a battery management system BMS, a direct current conversion CDU, a front motor controller MCUF, a rear motor controller MCUR, an electric power steering system EPS and an anti-lock brake system ABS; the BCAN is connected with: the system comprises a vehicle control unit VCU, an air bag ACU, an air conditioner AC, a compressor ACCM, an anti-pinch PWU and a vehicle body module BCM; connected to the InfoCAN are: the system comprises a vehicle control unit VCU, a combination instrument IC and a pedestrian early warning AVAS;
the vehicle-mounted ECU bootloader diagnosis upgrading protocol comprises the following steps: ECU Bootloader starts the time sequence, in Bootloader mode, uses three diagnosis conversation modes: a default session mode, an extended session mode and a programming session mode; if the ECU receives 10h 02h under the correct condition, the ECU determines the position of the external reprogramming request mark to be valid and executes the ECU restart;
1. the first step is to pre-program the file upgrading process:
and (3) ECU upgrading and preprogramming, wherein after the TBOX receives a TSP platform instruction, the TBOX downloads a flash file from the TSP, and then carries out version identification on the ECU for preprogramming, and the specific flow is as follows:
1) reading hardware version number of ECU: 22hF1h93 h;
2) reading version number of boot software: 22hF1h95 h;
3) diagnostic session control 10h 03 h: to disable normal communication between ECUs and control DTC settings, pre-programming requires initiation of a non-default session mode; this is done by controlling the 10h service using a diagnostic session of which the session type is an extended session mode; the request is sent to all ECUs through functional addressing by using a single-frame request message;
4) routine control, checking preprogrammed conditions: 31h 01h FFh 02h, through which the ECU programming conditions are checked to ensure system safety, the preprogrammed check conditions being determined by the ECU, which should refuse programming if there are any unsafe factors;
5) function request, disable DTC storage: 85h02h, prohibiting the DTC from storing fault information, and preventing the influence on the reprogramming communication network;
6) function request, disable non-diagnostic communication: 85h03h, the receiving and sending of the non-diagnostic message are forbidden, and the influence on the reprogramming communication network is prevented;
2. the second step is the upgrading process of the main programming file:
an ECU upgrading main programming step, which is a main programming step after the pre-programming step; the main programming sequence is the application of a single ECU programming event, so all requests for service use physical addressing, the specific flow is as follows:
1) diagnostic session control 10h 02 h: after receiving that an addressing mode is physical addressing and a subfunction is a diagnosis session control 10h service of a programming session, the ECU starts a Bootloader and allocates all resources required by programming; the ECU needs to send a positive response first and then executes the action of jumping to a programming mode;
2) secure access 27h 03h/04 h: the programming event must be through a secure access 27h service that is mandatory in emission-related and security systems, other systems do not require the use of this service; before downloading, the safe access process is mandatory, and only a legal diagnostic instrument can download the ECU;
3) writing fingerprint information: 2EhF1h84h, writing the serial number of year, month, day and equipment;
4) downloading the FlashDriver, controlling the routine, and checking the integrity of the FlashDriver: 31h 01h F1h A0h, which is used to check the integrity of the logic block;
5) routine control, erasing program memory: 31h 01h FFh00h, in order to allow application software and data downloading, the memory of the ECU is erased; this step is performed by the routine control service 31h to erase the memory; if the memory erasing routine is called to be executed, the flag bit of the application software is set to be invalid;
6) drive download 34h, 36h, 37h, 31 h: when the memory drive is not stored in the nonvolatile storage unit of the ECU, the downloading of the memory drive is executed; the downloading is performed according to the following sequence: requesting downloading, transmitting data and requesting transmission to quit; after all bytes have been downloaded, a "check program integrity" routine 31h 01h F1h A0h is used to check that all bytes were transferred correctly;
7) after the integrity check, judging whether other data blocks need to be downloaded, if so, skipping to 31hFFh 00h, and if not, continuing to go downwards;
8) routine control, checking for programmed dependencies: 31h 01h FFh 01h, TBOX will start a routine to trigger the ECU to check for reprogramming dependencies once all application software or data blocks/modules are downloaded; the ECU vendor defines the inspection content, but must ensure compatibility and consistency of all logic blocks;
9) resetting the ECU: the 11h 01h diagnostic instrument uses physical addressing to send an ECU reset 11h service request message with a reset type of hard reset to the CAN network; the ECU finishes the reprogramming process through the ECU reset service request and returns to the normal operation mode; the memory drive code must be completely cleared from the RAM cache to avoid accidentally activating code that may perform unintended memory erasures or program operations;
3. the third step is a flash process:
and (3) program downloading: each successive data block of application software or data is downloaded into the ECU non-volatile memory, and the data transmission is completed following the following service sequence:
requesting to download 34 h;
transmitting data 36 h;
request transmission exit 37 h;
when the length of a single application software or data block exceeds the cache size of a network layer, the single application software or data block needs a plurality of data transmission 36h request messages to complete transmission;
secondly, remote upgrade management:
2.1 remote upgrade management
Managing the software and hardware versions of the vehicle ECU in the whole life cycle of the vehicle, automatically performing differential release upgrading tasks by releasing an upgrading package, and designating the vehicle to be upgraded at preset time; in the downloading and upgrading process, the platform has a corresponding remote downloading and upgrading strategy and a version rollback function; after the download is finished and the upgrade is finished, the platform can count the success rate of the batch upgrade and the failure reason;
2.2 background upgrade flow description:
1. the operator provides the upgrade version and the software package to the Tsp, and the Tsp verifies the validity of the upgrade package and then releases the version to be updated to the OTA database through the platform;
2. after the platform releases the upgrading task and reaches the designated time, the Tsp verifies the difference between the version and the current version again, determines the upgrading range and makes a complete packet/difference packet;
3. when the upgrade message is confirmed to be issued, the Tsp OTA server informs the vehicle T-Box that a new software version exists; returning version information by the T-box;
the Tsp determines the content of the differential version and then transmits the content back to the T-box, and the T-box communicates with the Tsp to obtain the version number;
5. when the downloading condition is met, the T-box carries out the downloading process; judging whether the midway interruption exceeds 2 hours or not to decide breakpoint transmission or re-downloading;
6. after the upgrade package is completely downloaded in the downloading process, checking CRC; electronic signature integrity;
7. judging whether an event with higher priority exists by the T-box so as to carry out upgrading action;
8. after the upgrade is finished, transmitting the upgrade result and the current version information back to the Tsp for preservation and coverage;
2.3 software data packet encryption:
encryption uses AES-128 to encrypt the upgrade software package; the supplier generates an AES-128 key, keeps secret and can only be used once; the next time a new AES-128 key will be generated; the delivered software package should contain the encrypted upgrade software package, the electronic certificate, and the encrypted AES-128 key; the encrypted AES-128 key is protected by the RSA encryption method using a private key, the public key of which is contained in the electronic certificate;
thirdly, the equipment cloud server is implemented:
the cloud platform architecture of the device cloud server comprises a value-added application layer, an application management layer, a big data service layer, a basic service layer, a data access layer and a device access layer;
the equipment cloud server is a cloud server based on China;
meanwhile, the cloud server of the device is required to have load balancing service so as to realize cloud service of flow distribution, and an effective and transparent method is provided for expanding the bandwidth of the network device and the server; the load balancing service serves as a network entrance of the application system, and distributes the user request to the cloud server cluster, so that elastic expansion of the application system is achieved.
CN202010074474.6A 2020-01-22 2020-01-22 Method for realizing remote upgrading of vehicle ECU (electronic control Unit) based on UDS (Universal data System) communication protocol Pending CN111327689A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010074474.6A CN111327689A (en) 2020-01-22 2020-01-22 Method for realizing remote upgrading of vehicle ECU (electronic control Unit) based on UDS (Universal data System) communication protocol

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010074474.6A CN111327689A (en) 2020-01-22 2020-01-22 Method for realizing remote upgrading of vehicle ECU (electronic control Unit) based on UDS (Universal data System) communication protocol

Publications (1)

Publication Number Publication Date
CN111327689A true CN111327689A (en) 2020-06-23

Family

ID=71172110

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010074474.6A Pending CN111327689A (en) 2020-01-22 2020-01-22 Method for realizing remote upgrading of vehicle ECU (electronic control Unit) based on UDS (Universal data System) communication protocol

Country Status (1)

Country Link
CN (1) CN111327689A (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112114832A (en) * 2020-09-21 2020-12-22 华人运通(上海)云计算科技有限公司 Vehicle upgrade control method, terminal device, vehicle, and computer storage medium
CN112527352A (en) * 2020-12-08 2021-03-19 航天科技控股集团股份有限公司 Method for intelligent configuration reading analysis based on diagnostic protocol
CN112529219A (en) * 2020-12-17 2021-03-19 武汉光庭信息技术股份有限公司 Method and system for upgrading ECU of whole vehicle
CN112596447A (en) * 2020-12-23 2021-04-02 潍柴动力股份有限公司 Method and device for determining length of ECU (electronic control Unit) flash data, electronic equipment and medium
CN112667280A (en) * 2020-12-30 2021-04-16 中车大连机车研究所有限公司 Centralized control system for locomotive-mounted application software based on Git technology
CN113194441A (en) * 2021-04-30 2021-07-30 江苏徐工工程机械研究院有限公司 Engineering machinery vehicle communication system and method and remote upgrading method
CN113204356A (en) * 2021-06-02 2021-08-03 吉林大学 Application program dynamic updating method for vehicle-mounted embedded equipment
CN113411180A (en) * 2020-09-22 2021-09-17 郑州嘉晨电器有限公司 Data encryption bus self-adaptive industrial equipment remote upgrading system
CN113419755A (en) * 2021-06-04 2021-09-21 江铃汽车股份有限公司 Automobile ECU program flashing method and system, readable storage medium and computer equipment
CN113472884A (en) * 2021-06-30 2021-10-01 潍柴动力股份有限公司 OTA (over the air) upgrading method and device
CN113741393A (en) * 2021-09-03 2021-12-03 东风汽车集团股份有限公司 Vehicle safety network architecture based on central gateway and diagnosis method thereof
CN114217596A (en) * 2021-12-15 2022-03-22 安徽江淮汽车集团股份有限公司 Intelligent diagnosis upgrading system and method based on Internet of vehicles
CN114398066A (en) * 2022-01-07 2022-04-26 中通客车股份有限公司 Software upgrading method, system and application of domain controller
CN114880002A (en) * 2022-07-12 2022-08-09 江铃汽车股份有限公司 OTA data flashing method and system
CN114936047A (en) * 2022-04-21 2022-08-23 江铃汽车股份有限公司 Factory setting restoration method and system for IVI (interactive virtual infrastructure) system, electronic equipment and storage medium
CN115022223A (en) * 2022-06-06 2022-09-06 深圳市赛格车圣科技有限公司 Method and system for carrying out automatic test on TBOX through UDS
CN115314522A (en) * 2022-07-25 2022-11-08 北京经纬恒润科技股份有限公司 Vehicle-mounted operating system
CN115421756A (en) * 2022-09-16 2022-12-02 杭州云动智能汽车技术有限公司 Service type gateway upgrading method
CN115857885A (en) * 2022-12-27 2023-03-28 深圳市浩科智联科技有限公司 SOC software-based automobile theme UI full-process development, test and deployment system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160371076A1 (en) * 2015-06-16 2016-12-22 Lear Corporation METHOD FOR UPDATING VEHICLE ECUs USING DIFFERENTIAL UPDATE PACKAGES
CN109040205A (en) * 2018-07-18 2018-12-18 北京车和家信息技术有限公司 The method and device of vehicle upgrading
CN110474961A (en) * 2019-07-14 2019-11-19 江苏开沃汽车有限公司 Pure electricity passenger car is based on CAN bus and realizes multi-channel long OTA upgrade method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160371076A1 (en) * 2015-06-16 2016-12-22 Lear Corporation METHOD FOR UPDATING VEHICLE ECUs USING DIFFERENTIAL UPDATE PACKAGES
CN106257420A (en) * 2015-06-16 2016-12-28 李尔公司 For the method using difference update bag to update ECU
CN109040205A (en) * 2018-07-18 2018-12-18 北京车和家信息技术有限公司 The method and device of vehicle upgrading
CN110474961A (en) * 2019-07-14 2019-11-19 江苏开沃汽车有限公司 Pure electricity passenger car is based on CAN bus and realizes multi-channel long OTA upgrade method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
詹克旭: "基于UDS协议的汽车ECU升级方案", 《计算机应用于软件》 *

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112114832B (en) * 2020-09-21 2024-03-15 华人运通(上海)云计算科技有限公司 Vehicle upgrade control method, terminal device, vehicle, and computer storage medium
CN112114832A (en) * 2020-09-21 2020-12-22 华人运通(上海)云计算科技有限公司 Vehicle upgrade control method, terminal device, vehicle, and computer storage medium
CN113411180A (en) * 2020-09-22 2021-09-17 郑州嘉晨电器有限公司 Data encryption bus self-adaptive industrial equipment remote upgrading system
CN112527352A (en) * 2020-12-08 2021-03-19 航天科技控股集团股份有限公司 Method for intelligent configuration reading analysis based on diagnostic protocol
CN112529219A (en) * 2020-12-17 2021-03-19 武汉光庭信息技术股份有限公司 Method and system for upgrading ECU of whole vehicle
CN112596447A (en) * 2020-12-23 2021-04-02 潍柴动力股份有限公司 Method and device for determining length of ECU (electronic control Unit) flash data, electronic equipment and medium
CN112667280A (en) * 2020-12-30 2021-04-16 中车大连机车研究所有限公司 Centralized control system for locomotive-mounted application software based on Git technology
CN112667280B (en) * 2020-12-30 2024-06-04 中车大连机车研究所有限公司 Locomotive vehicle-mounted application software centralized control system based on Git technology
CN113194441A (en) * 2021-04-30 2021-07-30 江苏徐工工程机械研究院有限公司 Engineering machinery vehicle communication system and method and remote upgrading method
CN113204356A (en) * 2021-06-02 2021-08-03 吉林大学 Application program dynamic updating method for vehicle-mounted embedded equipment
CN113204356B (en) * 2021-06-02 2023-11-07 吉林大学 Application program dynamic updating method for vehicle-mounted embedded equipment
CN113419755A (en) * 2021-06-04 2021-09-21 江铃汽车股份有限公司 Automobile ECU program flashing method and system, readable storage medium and computer equipment
CN113472884A (en) * 2021-06-30 2021-10-01 潍柴动力股份有限公司 OTA (over the air) upgrading method and device
CN113741393A (en) * 2021-09-03 2021-12-03 东风汽车集团股份有限公司 Vehicle safety network architecture based on central gateway and diagnosis method thereof
CN113741393B (en) * 2021-09-03 2023-03-24 东风汽车集团股份有限公司 Vehicle safety network architecture based on central gateway and diagnosis method thereof
CN114217596A (en) * 2021-12-15 2022-03-22 安徽江淮汽车集团股份有限公司 Intelligent diagnosis upgrading system and method based on Internet of vehicles
CN114398066A (en) * 2022-01-07 2022-04-26 中通客车股份有限公司 Software upgrading method, system and application of domain controller
CN114936047A (en) * 2022-04-21 2022-08-23 江铃汽车股份有限公司 Factory setting restoration method and system for IVI (interactive virtual infrastructure) system, electronic equipment and storage medium
CN115022223A (en) * 2022-06-06 2022-09-06 深圳市赛格车圣科技有限公司 Method and system for carrying out automatic test on TBOX through UDS
CN114880002B (en) * 2022-07-12 2022-09-06 江铃汽车股份有限公司 OTA data flashing method and system
CN114880002A (en) * 2022-07-12 2022-08-09 江铃汽车股份有限公司 OTA data flashing method and system
CN115314522A (en) * 2022-07-25 2022-11-08 北京经纬恒润科技股份有限公司 Vehicle-mounted operating system
CN115421756A (en) * 2022-09-16 2022-12-02 杭州云动智能汽车技术有限公司 Service type gateway upgrading method
CN115421756B (en) * 2022-09-16 2023-07-18 杭州云动智能汽车技术有限公司 Service type gateway upgrading method
CN115857885A (en) * 2022-12-27 2023-03-28 深圳市浩科智联科技有限公司 SOC software-based automobile theme UI full-process development, test and deployment system
CN115857885B (en) * 2022-12-27 2023-09-22 深圳市浩科智联科技有限公司 Automobile theme UI full-flow development test deployment system based on SOC software

Similar Documents

Publication Publication Date Title
CN111327689A (en) Method for realizing remote upgrading of vehicle ECU (electronic control Unit) based on UDS (Universal data System) communication protocol
CN110474961B (en) Method for realizing multi-path remote OTA (over the air) upgrading of pure passenger vehicle based on CAN (controller area network) bus
US11907698B2 (en) Vehicle electronic control system, vehicle master device, method for controlling transmission of data storage bank information and computer program product for controlling transmission of data storage bank information
US11683197B2 (en) Vehicle master device, update data distribution control method, computer program product and data structure of specification data
US11669323B2 (en) Vehicle electronic control system, program update notification control method and computer program product
US11989546B2 (en) Vehicle electronic control system, vehicle master device, and rewrite instruction program product under specific mode
US11671498B2 (en) Vehicle master device, update data verification method and computer program product
CN108647040A (en) A kind of Bootloader frameworks based on PEPS system and write with a brush dipped in Chinese ink method
US20210157573A1 (en) Vehicle electronic control system, progress screen display control method and computer program product
CN109582340A (en) A kind of method and system of electric car remote upgrade
US11999360B2 (en) Vehicle master device, control method for executing rollback, computer program product for executing rollback and data structure of specification data
US11822366B2 (en) Electronic control unit, vehicle electronic control system, rewrite execution method, rewrite execution program, and data structure of specification data
US20210155177A1 (en) Vehicle electronic control system, distribution package download determination method and computer program product
US20210155173A1 (en) Vehicle master device, vehicle electronic control system, activation request instruction method and computer program product
US11467821B2 (en) Vehicle master device, installation instruction determination method and computer program product
US11928459B2 (en) Electronic control unit, retry point specifying method and computer program product for specifying retry point
US20210157574A1 (en) Vehicle master device, non-rewrite target power supply administration method and computer program product
CN109086058A (en) Onboard program upgrade-system
CN111480141A (en) Method and device for updating software of a motor vehicle control device
US11941384B2 (en) Vehicle master device, rewrite target group administration method, computer program product and data structure of specification data
CN110825403A (en) Method and system for flashing ECU (electronic control Unit) of automobile
CN102135922A (en) Method and system for refreshing application program
US11926270B2 (en) Display control device, rewrite progress display control method and computer program product
US20220179643A1 (en) Vehicle master device, vehicle electronic control system, configuration setting information rewrite instruction method, and configuration setting information rewrite instruction program product
CN112698857A (en) Data flashing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200623

RJ01 Rejection of invention patent application after publication