CN111327689A - Method for realizing remote upgrading of vehicle ECU (electronic control Unit) based on UDS (Universal data System) communication protocol - Google Patents
Method for realizing remote upgrading of vehicle ECU (electronic control Unit) based on UDS (Universal data System) communication protocol Download PDFInfo
- Publication number
- CN111327689A CN111327689A CN202010074474.6A CN202010074474A CN111327689A CN 111327689 A CN111327689 A CN 111327689A CN 202010074474 A CN202010074474 A CN 202010074474A CN 111327689 A CN111327689 A CN 111327689A
- Authority
- CN
- China
- Prior art keywords
- ecu
- vehicle
- upgrading
- upgrade
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 45
- 238000004891 communication Methods 0.000 title claims abstract description 22
- 230000008569 process Effects 0.000 claims abstract description 29
- 230000005540 biological transmission Effects 0.000 claims description 18
- 230000006870 function Effects 0.000 claims description 15
- 230000008672 reprogramming Effects 0.000 claims description 15
- 238000003745 diagnosis Methods 0.000 claims description 12
- 102100032312 Brevican core protein Human genes 0.000 claims description 6
- 101000731086 Homo sapiens Brevican core protein Proteins 0.000 claims description 6
- 230000009471 action Effects 0.000 claims description 6
- 238000003860 storage Methods 0.000 claims description 6
- 230000009191 jumping Effects 0.000 claims description 5
- 230000003213 activating effect Effects 0.000 claims description 3
- 238000006243 chemical reaction Methods 0.000 claims description 3
- 238000009826 distribution Methods 0.000 claims description 3
- 238000007689 inspection Methods 0.000 claims description 3
- 238000004321 preservation Methods 0.000 claims description 3
- 230000004044 response Effects 0.000 claims description 3
- 230000000977 initiatory effect Effects 0.000 claims 1
- 238000002360 preparation method Methods 0.000 claims 1
- 230000006855 networking Effects 0.000 abstract description 4
- 238000012544 monitoring process Methods 0.000 abstract description 3
- 238000013523 data management Methods 0.000 abstract description 2
- 230000007246 mechanism Effects 0.000 abstract description 2
- 238000011084 recovery Methods 0.000 abstract description 2
- 238000012384 transportation and delivery Methods 0.000 abstract description 2
- 238000007726 management method Methods 0.000 description 10
- 238000005516 engineering process Methods 0.000 description 3
- 125000004122 cyclic group Chemical group 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000003466 welding Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60W—CONJOINT CONTROL OF VEHICLE SUB-UNITS OF DIFFERENT TYPE OR DIFFERENT FUNCTION; CONTROL SYSTEMS SPECIALLY ADAPTED FOR HYBRID VEHICLES; ROAD VEHICLE DRIVE CONTROL SYSTEMS FOR PURPOSES NOT RELATED TO THE CONTROL OF A PARTICULAR SUB-UNIT
- B60W50/00—Details of control systems for road vehicle drive control not related to the control of a particular sub-unit, e.g. process diagnostic or vehicle driver interfaces
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/04—Programme control other than numerical control, i.e. in sequence controllers or logic controllers
- G05B19/042—Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/40—Bus networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/322—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/329—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60W—CONJOINT CONTROL OF VEHICLE SUB-UNITS OF DIFFERENT TYPE OR DIFFERENT FUNCTION; CONTROL SYSTEMS SPECIALLY ADAPTED FOR HYBRID VEHICLES; ROAD VEHICLE DRIVE CONTROL SYSTEMS FOR PURPOSES NOT RELATED TO THE CONTROL OF A PARTICULAR SUB-UNIT
- B60W50/00—Details of control systems for road vehicle drive control not related to the control of a particular sub-unit, e.g. process diagnostic or vehicle driver interfaces
- B60W2050/0062—Adapting control system settings
- B60W2050/0075—Automatic parameter input, automatic initialising or calibrating means
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60W—CONJOINT CONTROL OF VEHICLE SUB-UNITS OF DIFFERENT TYPE OR DIFFERENT FUNCTION; CONTROL SYSTEMS SPECIALLY ADAPTED FOR HYBRID VEHICLES; ROAD VEHICLE DRIVE CONTROL SYSTEMS FOR PURPOSES NOT RELATED TO THE CONTROL OF A PARTICULAR SUB-UNIT
- B60W50/00—Details of control systems for road vehicle drive control not related to the control of a particular sub-unit, e.g. process diagnostic or vehicle driver interfaces
- B60W2050/0062—Adapting control system settings
- B60W2050/0075—Automatic parameter input, automatic initialising or calibrating means
- B60W2050/0083—Setting, resetting, calibration
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60W—CONJOINT CONTROL OF VEHICLE SUB-UNITS OF DIFFERENT TYPE OR DIFFERENT FUNCTION; CONTROL SYSTEMS SPECIALLY ADAPTED FOR HYBRID VEHICLES; ROAD VEHICLE DRIVE CONTROL SYSTEMS FOR PURPOSES NOT RELATED TO THE CONTROL OF A PARTICULAR SUB-UNIT
- B60W2556/00—Input parameters relating to data
- B60W2556/45—External transmission of data to or from the vehicle
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/40—Bus networks
- H04L2012/40208—Bus networks characterized by the use of a particular bus standard
- H04L2012/40215—Controller Area Network CAN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/40—Bus networks
- H04L2012/40267—Bus for use in transportation systems
- H04L2012/40273—Bus for use in transportation systems the transportation system being a vehicle
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Mechanical Engineering (AREA)
- Transportation (AREA)
- Computer Hardware Design (AREA)
- Human Computer Interaction (AREA)
- Medical Informatics (AREA)
- General Health & Medical Sciences (AREA)
- Stored Programmes (AREA)
Abstract
The invention relates to a device and a method for remotely upgrading vehicle ECUs, and provides a method for remotely upgrading the vehicle ECUs based on a UDS communication protocol, aiming at the current situation that different vehicle factories need to independently develop respective vehicle ECU remote upgrading systems. According to the invention, a vehicle UDS diagnostic protocol and a remote monitoring platform scheme are worked out based on CAN communication data of a vehicle, data upgrading of a vehicle ECU is realized remotely through a hardware vehicle-mounted terminal 4G module, the ECU does not need to be upgraded manually on line, the upgrading time of the vehicle ECU CAN be set at the background, and the ECU is automatically upgraded through remote networking after the set time is reached. An ECU delivery recovery mechanism is specified in the UDS protocol, so that the conditions of ECU crash damage, data loss and the like caused by networking failure in the upgrading process are avoided. According to the invention, the cloud platform, the vehicle-mounted hardware and the data management algorithm are established, and the encryption security access is carried out by combining the UDS diagnostic protocol, so that the ECU is safer and more convenient to upgrade.
Description
Technical Field
The invention relates to a vehicle ECU remote upgrading device and a method, in particular to a method for realizing vehicle ECU remote upgrading based on a UDS communication protocol.
Background
Automobiles are more and more popular in life, and after mass production, many problems often occur to more and more automobiles, automobile factories need to upgrade sold automobile ECUs (Electronic Control units, also called as "driving computers", "vehicle-mounted computers", and the like), generally, automobile owners need to drive the automobiles to a specified 4S store or return to the factory, and the ECUs are upgraded manually by special workers. At present, in a traditional upgrading program method, a worker ECU is used for detaching a board or welding a circuit chip, and a lower computer is used for manually downloading the line for flashing, so that a large part of work occupied by time, manpower and financial resources is caused, the working efficiency is low, and errors are easy to make.
Vehicle remote control and data monitoring have many applications in the field of intelligent science and technology. Vehicle ECU remote upgrade has been applied to existing vehicles; however, different vehicle factories need to independently develop respective vehicle ECU remote upgrading systems.
Disclosure of Invention
The invention provides a method for realizing remote upgrading of vehicle ECU (electronic control unit) based on a UDS (universal data system) communication protocol, aiming at the current situation that different vehicle factories need to independently develop respective vehicle ECU remote upgrading systems.
The invention is realized by adopting the following technical scheme: the method for realizing the remote upgrade of the vehicle ECU based on the UDS communication protocol comprises an equipment cloud server, a vehicle-mounted TBOX (Telematics BOX), a TSP (Telematics Service Provider) management system and a vehicle-mounted ECU.
The UDS diagnosis upgrading process comprises the following steps:
UDS (unified diagnostic services) is directed to all ECUs of a vehicle. It is only an application layer protocol (ISO 14229-1), so it CAN be implemented on both CAN lines and even Ethernet. And the UDS provides a basic framework of diagnostic services, and a host factory and a part supplier can select to implement part of the diagnostic services or customize the diagnostic services into a plurality of privatized diagnostic services according to actual conditions.
The vehicle-mounted ECU of the whole vehicle is connected with the vehicle-mounted TBOX through a CAN bus; the CAN bus is divided into a power CAN bus PTCAN, a vehicle body CAN bus BCAN and an information CAN bus InfoCAN (shown in figure 1); the PTCAN is connected with: the system comprises a vehicle control unit VCU, a battery management system BMS, a direct current conversion CDU, a front motor controller MCUF, a rear motor controller MCUR, an electric power steering system EPS and an anti-lock brake system ABS; the BCAN is connected with: the system comprises a vehicle control unit VCU, an air bag ACU, an air conditioner AC, a compressor ACCM, an anti-pinch PWU and a vehicle body module BCM; connected to the InfoCAN are: the system comprises a vehicle control unit VCU, a combination instrument IC and a pedestrian early warning AVAS.
Vehicle-mounted ECU bootloader diagnostic upgrade protocol (as shown in fig. 2): ECU Bootloader starts the time sequence, in Bootloader mode, uses three diagnosis conversation modes: a default session mode, an extended session mode and a programming session mode; if the ECU receives "10 h02 h" under the correct conditions, the ECU asserts the external reprogramming request flag and executes an ECU restart.
1. The first step is to pre-program the file upgrading process:
an ECU upgrading preprogramming step, wherein after the TBOX receives a TSP platform instruction, the TBOX downloads a flash file from the TSP, and then carries out edition recognition on the ECU for preprogramming, and the specific flow is as follows (as shown in figure 3):
1) reading hardware version number of ECU: 22hF1h93 h;
2) reading version number of boot software: 22hF1h95 h;
3) diagnostic session control 10h 03 h: preprogramming requires that a non-default session mode be initiated in order to disable normal communication between ECUs and control the DTC (diagnostic trouble Code) settings. This is done by using a diagnostic session control (10h) service with the session type being an extended session mode. The request is sent to all ECUs through functional addressing by using a single-frame request message;
4) routine control, checking preprogrammed conditions: 31h 01h FFh 02h, through which the ECU programming conditions are checked to ensure system safety, the preprogrammed check conditions being determined by the ECU, which should refuse programming if there are any unsafe factors;
5) function request, disable DTC storage: 85h02h, prohibiting the DTC from storing fault information, and preventing the influence on the reprogramming communication network;
6) function request, disable non-diagnostic communication: 85h03h, the receiving and sending of the non-diagnosis message are forbidden, and the influence on the reprogramming communication network is prevented.
2. The second step is the upgrading process of the main programming file:
the ECU upgrades the main programming step, which is followed by the pre-programming step. The main programming sequence is the application of a single ECU programming event, so all requests for service use physical addressing, the specific flow is as follows (as shown in fig. 4):
1) diagnostic session control 10h 02 h: after receiving that an addressing mode is physical addressing and a subfunction is a diagnosis session control 10h service of a programming session, the ECU starts a Bootloader and allocates all resources required by programming; the ECU needs to send a positive response first and then executes the action of jumping to a programming mode;
2) secure access 27h 03h/04 h: the programming event must be through a secure access 27h service that is mandatory in emission-related and security systems, which other systems do not require to use. Before downloading, the safe access process is mandatory, and only a legal diagnostic instrument can download the ECU;
3) writing fingerprint information: 2EhF1h84h, writing the serial number of year, month, day and equipment;
4) downloading the FlashDriver, controlling the routine, and checking the integrity of the FlashDriver: 31h 01h F1h A0h, which is used to check the integrity of the logic block;
5) routine control, erasing program memory: 31h 01h FFh00h, in order to allow application software and data downloading, the memory of the ECU is erased; this step is performed by the routine control service 31h to erase the memory; if the memory erasing routine is called to be executed, the flag bit of the application software is set to be invalid;
6) drive download 34h, 36h, 37h, 31 h: when the memory drive is not stored in the nonvolatile storage unit of the ECU, the downloading of the memory drive is executed; the downloading is performed according to the following sequence: requesting downloading, transmitting data and requesting transmission to quit; after all bytes have been downloaded, a "check program integrity" routine 31h 01h F1h A0h is used to check that all bytes were transferred correctly;
7) after the integrity check, judging whether other data blocks need to be downloaded, if so, jumping to 31h FFh00h), and if not, continuing to go downwards;
8) routine control, checking for programmed dependencies: 31h 01h FFh 01h, TBOX will start a routine to trigger the ECU to check for reprogramming dependencies once all application software or data blocks/modules are downloaded; the ECU vendor defines the inspection content, but must ensure compatibility and consistency of all logic blocks;
9) resetting the ECU: the 11h 01h diagnostic instrument uses physical addressing to send an ECU reset 11h service request message with a reset type of hard reset to the CAN network; the ECU finishes the reprogramming process through the ECU reset service request and returns to the normal operation mode; the memory drive code must be completely cleared from the RAM cache to avoid accidentally activating code that may perform unintended memory erasures or program operations;
3. the third step is a flash process:
program download (as shown in fig. 5): each successive block (also called segment, which may be a complete piece of application software or data or a portion of application software or data) of application software or data is downloaded into the ECU nonvolatile memory, and the data transmission is completed according to the following service sequence:
requesting to download 34 h;
transmitting data 36 h;
request transmission exit 37 h;
when the length of a single application software or data block exceeds the cache size of a network layer, the single application software or data block needs a plurality of data transmission 36h request messages to complete transmission;
secondly, remote upgrade management:
2.1 remote upgrade management
According to the scheme, the ECU software and hardware versions of the vehicle can be managed in the whole life cycle of the vehicle, the upgrading task is automatically issued differentially by issuing the upgrading package, and the vehicle is appointed to be upgraded at the preset time. In the downloading and upgrading process, the platform has a corresponding remote downloading and upgrading strategy and a version rollback function. After the download is finished and the upgrade is finished, the platform can count the success rate of the batch upgrade and the failure reason. The remote upgrade flow is shown in fig. 6.
2.2 background upgrade flow description:
1. the operator provides the upgrade version and the software package to the Tsp, and the Tsp verifies the validity of the upgrade package and then issues the version update to an OTA (Over-the-Air Technology) database through the platform.
2. And after the platform releases the upgrading task and reaches the specified time, the Tsp verifies the difference between the version and the current version again, determines the upgrading range and makes a complete packet/difference packet.
3. When the update message is confirmed to be issued, the Tsp OTA server informs the vehicle T-Box that the new software version exists. And returning the version information by the T-box.
And 4, the Tsp determines the content of the differential version and then transmits the content back to the T-box, and the T-box communicates with the Tsp to obtain the version number.
5. And when the downloading condition is met, the T-box carries out the downloading process. The midway interruption judges whether the time exceeds 2 hours or not to decide the breakpoint continuous transmission or the re-downloading.
6. After the upgrade package is completely downloaded through the downloading process, the integrity of the CRC (Cyclic Redundancy Check) electronic signature is checked.
7. And judging whether the T-box has higher-priority events or not so as to perform upgrading action.
8. And after the upgrade is finished, transmitting the upgrade result and the current version information back to the Tsp for preservation and coverage.
2.3 software data packet encryption:
encryption the upgrade software package is encrypted using AES-128. The vendor generates an AES-128 key, which is kept secret and can only be used once. A new AES-128 key will be generated the next time. The delivered software package should contain the encrypted upgrade software package, the electronic certificate, and the encrypted AES-128 key. The encrypted AES-128 key is protected by the RSA encryption method using a private key, the public key of which is contained in the electronic certificate.
Thirdly, the equipment cloud server is implemented:
the cloud platform architecture of the device cloud server comprises a value-added application layer, an application management layer, a big data service layer, a basic service layer, a data access layer and a device access layer; the cloud platform architecture is subdivided in a modularization mode, and the modularization design can ensure the opening of basic functions and the expansion of later functions and business volumes, so that the disorder of functions and logic is avoided.
In specific implementation, the equipment cloud server is a cloud server based on Hua;
meanwhile, the cloud server of the device is required to have load balancing service so as to realize cloud service of flow distribution, and an effective and transparent method is provided for expanding the bandwidth of the network device and the server. The load balancing service increases the throughput, strengthens the network data processing capacity, and improves the flexibility and the usability of the network and the capacity of an application system to deal with high load. The load balancing service can be generally used as a network entrance of the application system, and distributes the user request to the cloud server cluster, so that the elastic expansion of the application system is realized.
According to the invention, a vehicle UDS diagnostic protocol and a remote monitoring platform scheme are worked out based on CAN communication data of a vehicle, data upgrading of a vehicle ECU is realized remotely through a hardware vehicle-mounted terminal 4G module, the ECU does not need to be upgraded manually on line, the upgrading time of the vehicle ECU CAN be set at the background, and the ECU is automatically upgraded through remote networking after the set time is reached. An ECU delivery recovery mechanism is specified in the UDS protocol, so that the conditions of ECU crash damage, data loss and the like caused by networking failure in the upgrading process are avoided. According to the invention, the cloud platform, the vehicle-mounted hardware and the data management algorithm are established, and the encryption security access is carried out by combining the UDS diagnostic protocol, so that the ECU is safer and more convenient to upgrade.
Drawings
FIG. 1 is a vehicle network topology of the present invention;
FIG. 2 is a flow chart of a vehicle-mounted ECU bootloader diagnostic upgrade protocol;
FIG. 3 is a flow chart of an ECU upgrade pre-programmed protocol;
FIG. 4 is a flowchart of an ECU upgrade main programming protocol;
FIG. 5 is a flowchart of program download;
FIG. 6 is a remote upgrade flow diagram.
Detailed Description
The method for realizing the remote upgrade of the vehicle ECU based on the UDS communication protocol comprises an equipment cloud server, a vehicle-mounted TBOX (Telematics BOX), a TSP (Telematics Service Provider) management system and a vehicle-mounted ECU.
The UDS diagnosis upgrading process comprises the following steps:
UDS (unified diagnostic services) is directed to all ECUs of a vehicle. It is only an application layer protocol (ISO 14229-1), so it CAN be implemented on both CAN lines and even Ethernet. And the UDS provides a basic framework of diagnostic services, and a host factory and a part supplier can select to implement part of the diagnostic services or customize the diagnostic services into a plurality of privatized diagnostic services according to actual conditions.
The vehicle-mounted ECU of the whole vehicle is connected with the vehicle-mounted TBOX through a CAN bus; the CAN bus is divided into a power CAN bus PTCAN, a vehicle body CAN bus BCAN and an information CAN bus InfoCAN (shown in figure 1); the PTCAN is connected with: the system comprises a vehicle control unit VCU, a battery management system BMS, a direct current conversion CDU, a front motor controller MCUF, a rear motor controller MCUR, an electric power steering system EPS and an anti-lock brake system ABS; the BCAN is connected with: the system comprises a vehicle control unit VCU, an air bag ACU, an air conditioner AC, a compressor ACCM, an anti-pinch PWU and a vehicle body module BCM; connected to the InfoCAN are: the system comprises a vehicle control unit VCU, a combination instrument IC and a pedestrian early warning AVAS.
Vehicle-mounted ECU bootloader diagnostic upgrade protocol (as shown in fig. 2): ECU Bootloader starts the time sequence, in Bootloader mode, uses three diagnosis conversation modes: a default session mode, an extended session mode and a programming session mode; if the ECU receives "10 h02 h" under the correct conditions, the ECU asserts the external reprogramming request flag and executes an ECU restart.
1. The first step is to pre-program the file upgrading process:
an ECU upgrading preprogramming step, wherein after the TBOX receives a TSP platform instruction, the TBOX downloads a flash file from the TSP, and then carries out edition recognition on the ECU for preprogramming, and the specific flow is as follows (as shown in figure 3):
1) reading hardware version number of ECU: 22hF1h93 h;
2) reading version number of boot software: 22hF1h95 h;
3) diagnostic session control 10h 03 h: preprogramming requires that a non-default session mode be initiated in order to disable normal communication between ECUs and control the DTC (diagnostic trouble Code) settings. This is done by using a diagnostic session control (10h) service with the session type being an extended session mode. The request is sent to all ECUs through functional addressing by using a single-frame request message;
4) routine control, checking preprogrammed conditions: 31h 01h FFh 02h, through which the ECU programming conditions are checked to ensure system safety, the preprogrammed check conditions being determined by the ECU, which should refuse programming if there are any unsafe factors;
5) function request, disable DTC storage: 85h02h, prohibiting the DTC from storing fault information, and preventing the influence on the reprogramming communication network;
6) function request, disable non-diagnostic communication: 85h03h, the receiving and sending of the non-diagnosis message are forbidden, and the influence on the reprogramming communication network is prevented.
2. The second step is the upgrading process of the main programming file:
the ECU upgrades the main programming step, which is followed by the pre-programming step. The main programming sequence is the application of a single ECU programming event, so all requests for service use physical addressing, the specific flow is as follows (as shown in fig. 4):
1) diagnostic session control 10h 02 h: after receiving that an addressing mode is physical addressing and a subfunction is a diagnosis session control 10h service of a programming session, the ECU starts a Bootloader and allocates all resources required by programming; the ECU needs to send a positive response first and then executes the action of jumping to a programming mode;
2) secure access 27h 03h/04 h: the programming event must be through a secure access 27h service that is mandatory in emission-related and security systems, which other systems do not require to use. Before downloading, the safe access process is mandatory, and only a legal diagnostic instrument can download the ECU;
3) writing fingerprint information: 2EhF1h84h, writing the serial number of year, month, day and equipment;
4) downloading the FlashDriver, controlling the routine, and checking the integrity of the FlashDriver: 31h 01h F1h A0h, which is used to check the integrity of the logic block;
5) routine control, erasing program memory: 31h 01h FFh00h, in order to allow application software and data downloading, the memory of the ECU is erased; this step is performed by the routine control service 31h to erase the memory; if the memory erasing routine is called to be executed, the flag bit of the application software is set to be invalid;
6) drive download 34h, 36h, 37h, 31 h: when the memory drive is not stored in the nonvolatile storage unit of the ECU, the downloading of the memory drive is executed; the downloading is performed according to the following sequence: requesting downloading, transmitting data and requesting transmission to quit; after all bytes have been downloaded, a "check program integrity" routine 31h 01h F1h A0h is used to check that all bytes were transferred correctly;
7) after the integrity check, judging whether other data blocks need to be downloaded, if so, jumping to 31h FFh00h), and if not, continuing to go downwards;
8) routine control, checking for programmed dependencies: 31h 01h FFh 01h, TBOX will start a routine to trigger the ECU to check for reprogramming dependencies once all application software or data blocks/modules are downloaded; the ECU vendor defines the inspection content, but must ensure compatibility and consistency of all logic blocks;
9) resetting the ECU: the 11h 01h diagnostic instrument uses physical addressing to send an ECU reset 11h service request message with a reset type of hard reset to the CAN network; the ECU finishes the reprogramming process through the ECU reset service request and returns to the normal operation mode; the memory drive code must be completely cleared from the RAM cache to avoid accidentally activating code that may perform unintended memory erasures or program operations;
3. the third step is a flash process:
program download (as shown in fig. 5): each successive block (also called segment, which may be a complete piece of application software or data or a portion of application software or data) of application software or data is downloaded into the ECU nonvolatile memory, and the data transmission is completed according to the following service sequence:
requesting to download 34 h;
transmitting data 36 h;
request transmission exit 37 h;
when the length of a single application software or data block exceeds the cache size of a network layer, the single application software or data block needs a plurality of data transmission 36h request messages to complete transmission;
secondly, remote upgrade management:
2.1 remote upgrade management
According to the scheme, the ECU software and hardware versions of the vehicle can be managed in the whole life cycle of the vehicle, the upgrading task is automatically issued differentially by issuing the upgrading package, and the vehicle is appointed to be upgraded at the preset time. In the downloading and upgrading process, the platform has a corresponding remote downloading and upgrading strategy and a version rollback function. After the download is finished and the upgrade is finished, the platform can count the success rate of the batch upgrade and the failure reason. The remote upgrade flow is shown in fig. 6.
2.2 background upgrade flow description:
1. the operator provides the upgrade version and the software package to the Tsp, and the Tsp verifies the validity of the upgrade package and then issues the version update to an OTA (Over-the-Air Technology) database through the platform.
2. And after the platform releases the upgrading task and reaches the specified time, the Tsp verifies the difference between the version and the current version again, determines the upgrading range and makes a complete packet/difference packet.
3. When the update message is confirmed to be issued, the Tsp OTA server informs the vehicle T-Box that the new software version exists. And returning the version information by the T-box.
And 4, the Tsp determines the content of the differential version and then transmits the content back to the T-box, and the T-box communicates with the Tsp to obtain the version number.
5. And when the downloading condition is met, the T-box carries out the downloading process. The midway interruption judges whether the time exceeds 2 hours or not to decide the breakpoint continuous transmission or the re-downloading.
6. After the upgrade package is completely downloaded through the downloading process, the integrity of the CRC (Cyclic Redundancy Check) electronic signature is checked.
7. And judging whether the T-box has higher-priority events or not so as to perform upgrading action.
8. And after the upgrade is finished, transmitting the upgrade result and the current version information back to the Tsp for preservation and coverage.
2.3 software data packet encryption:
encryption the upgrade software package is encrypted using AES-128. The vendor generates an AES-128 key, which is kept secret and can only be used once. A new AES-128 key will be generated the next time. The delivered software package should contain the encrypted upgrade software package, the electronic certificate, and the encrypted AES-128 key. The encrypted AES-128 key is protected by the RSA encryption method using a private key, the public key of which is contained in the electronic certificate.
Thirdly, the equipment cloud server is implemented:
the cloud platform architecture of the device cloud server comprises a value-added application layer, an application management layer, a big data service layer, a basic service layer, a data access layer and a device access layer; the cloud platform architecture is subdivided in a modularization mode, and the modularization design can ensure the opening of basic functions and the expansion of later functions and business volumes, so that the disorder of functions and logic is avoided.
During specific implementation, the equipment cloud server is based on the cloud server, and main performance parameters of the equipment cloud server are as follows:
meanwhile, the cloud server of the device is required to have load balancing service so as to realize cloud service of flow distribution, and an effective and transparent method is provided for expanding the bandwidth of the network device and the server. The load balancing service increases the throughput, strengthens the network data processing capacity, and improves the flexibility and the usability of the network and the capacity of an application system to deal with high load. The load balancing service can be generally used as a network entrance of the application system, and distributes the user request to the cloud server cluster, so that the elastic expansion of the application system is realized.
The main performance parameters of the network security of the cloud server of the equipment are as follows:
Claims (1)
1. a method for realizing remote upgrading of a vehicle ECU (electronic control unit) based on a UDS (Universal data System) communication protocol comprises an equipment cloud server, a vehicle-mounted TBOX (tunnel boring machine), a TSP (Total suspended particulate) management system and a vehicle-mounted ECU; it is characterized in that the preparation method is characterized in that,
the UDS diagnosis upgrading process comprises the following steps:
the vehicle-mounted ECU of the whole vehicle is connected with the vehicle-mounted TBOX through a CAN bus; the CAN bus is divided into a power CAN bus PTCAN, a vehicle body CAN bus BCAN and an information CAN bus infoCAN; the PTCAN is connected with: the system comprises a vehicle control unit VCU, a battery management system BMS, a direct current conversion CDU, a front motor controller MCUF, a rear motor controller MCUR, an electric power steering system EPS and an anti-lock brake system ABS; the BCAN is connected with: the system comprises a vehicle control unit VCU, an air bag ACU, an air conditioner AC, a compressor ACCM, an anti-pinch PWU and a vehicle body module BCM; connected to the InfoCAN are: the system comprises a vehicle control unit VCU, a combination instrument IC and a pedestrian early warning AVAS;
the vehicle-mounted ECU bootloader diagnosis upgrading protocol comprises the following steps: ECU Bootloader starts the time sequence, in Bootloader mode, uses three diagnosis conversation modes: a default session mode, an extended session mode and a programming session mode; if the ECU receives 10h 02h under the correct condition, the ECU determines the position of the external reprogramming request mark to be valid and executes the ECU restart;
1. the first step is to pre-program the file upgrading process:
and (3) ECU upgrading and preprogramming, wherein after the TBOX receives a TSP platform instruction, the TBOX downloads a flash file from the TSP, and then carries out version identification on the ECU for preprogramming, and the specific flow is as follows:
1) reading hardware version number of ECU: 22hF1h93 h;
2) reading version number of boot software: 22hF1h95 h;
3) diagnostic session control 10h 03 h: to disable normal communication between ECUs and control DTC settings, pre-programming requires initiation of a non-default session mode; this is done by controlling the 10h service using a diagnostic session of which the session type is an extended session mode; the request is sent to all ECUs through functional addressing by using a single-frame request message;
4) routine control, checking preprogrammed conditions: 31h 01h FFh 02h, through which the ECU programming conditions are checked to ensure system safety, the preprogrammed check conditions being determined by the ECU, which should refuse programming if there are any unsafe factors;
5) function request, disable DTC storage: 85h02h, prohibiting the DTC from storing fault information, and preventing the influence on the reprogramming communication network;
6) function request, disable non-diagnostic communication: 85h03h, the receiving and sending of the non-diagnostic message are forbidden, and the influence on the reprogramming communication network is prevented;
2. the second step is the upgrading process of the main programming file:
an ECU upgrading main programming step, which is a main programming step after the pre-programming step; the main programming sequence is the application of a single ECU programming event, so all requests for service use physical addressing, the specific flow is as follows:
1) diagnostic session control 10h 02 h: after receiving that an addressing mode is physical addressing and a subfunction is a diagnosis session control 10h service of a programming session, the ECU starts a Bootloader and allocates all resources required by programming; the ECU needs to send a positive response first and then executes the action of jumping to a programming mode;
2) secure access 27h 03h/04 h: the programming event must be through a secure access 27h service that is mandatory in emission-related and security systems, other systems do not require the use of this service; before downloading, the safe access process is mandatory, and only a legal diagnostic instrument can download the ECU;
3) writing fingerprint information: 2EhF1h84h, writing the serial number of year, month, day and equipment;
4) downloading the FlashDriver, controlling the routine, and checking the integrity of the FlashDriver: 31h 01h F1h A0h, which is used to check the integrity of the logic block;
5) routine control, erasing program memory: 31h 01h FFh00h, in order to allow application software and data downloading, the memory of the ECU is erased; this step is performed by the routine control service 31h to erase the memory; if the memory erasing routine is called to be executed, the flag bit of the application software is set to be invalid;
6) drive download 34h, 36h, 37h, 31 h: when the memory drive is not stored in the nonvolatile storage unit of the ECU, the downloading of the memory drive is executed; the downloading is performed according to the following sequence: requesting downloading, transmitting data and requesting transmission to quit; after all bytes have been downloaded, a "check program integrity" routine 31h 01h F1h A0h is used to check that all bytes were transferred correctly;
7) after the integrity check, judging whether other data blocks need to be downloaded, if so, skipping to 31hFFh 00h, and if not, continuing to go downwards;
8) routine control, checking for programmed dependencies: 31h 01h FFh 01h, TBOX will start a routine to trigger the ECU to check for reprogramming dependencies once all application software or data blocks/modules are downloaded; the ECU vendor defines the inspection content, but must ensure compatibility and consistency of all logic blocks;
9) resetting the ECU: the 11h 01h diagnostic instrument uses physical addressing to send an ECU reset 11h service request message with a reset type of hard reset to the CAN network; the ECU finishes the reprogramming process through the ECU reset service request and returns to the normal operation mode; the memory drive code must be completely cleared from the RAM cache to avoid accidentally activating code that may perform unintended memory erasures or program operations;
3. the third step is a flash process:
and (3) program downloading: each successive data block of application software or data is downloaded into the ECU non-volatile memory, and the data transmission is completed following the following service sequence:
requesting to download 34 h;
transmitting data 36 h;
request transmission exit 37 h;
when the length of a single application software or data block exceeds the cache size of a network layer, the single application software or data block needs a plurality of data transmission 36h request messages to complete transmission;
secondly, remote upgrade management:
2.1 remote upgrade management
Managing the software and hardware versions of the vehicle ECU in the whole life cycle of the vehicle, automatically performing differential release upgrading tasks by releasing an upgrading package, and designating the vehicle to be upgraded at preset time; in the downloading and upgrading process, the platform has a corresponding remote downloading and upgrading strategy and a version rollback function; after the download is finished and the upgrade is finished, the platform can count the success rate of the batch upgrade and the failure reason;
2.2 background upgrade flow description:
1. the operator provides the upgrade version and the software package to the Tsp, and the Tsp verifies the validity of the upgrade package and then releases the version to be updated to the OTA database through the platform;
2. after the platform releases the upgrading task and reaches the designated time, the Tsp verifies the difference between the version and the current version again, determines the upgrading range and makes a complete packet/difference packet;
3. when the upgrade message is confirmed to be issued, the Tsp OTA server informs the vehicle T-Box that a new software version exists; returning version information by the T-box;
the Tsp determines the content of the differential version and then transmits the content back to the T-box, and the T-box communicates with the Tsp to obtain the version number;
5. when the downloading condition is met, the T-box carries out the downloading process; judging whether the midway interruption exceeds 2 hours or not to decide breakpoint transmission or re-downloading;
6. after the upgrade package is completely downloaded in the downloading process, checking CRC; electronic signature integrity;
7. judging whether an event with higher priority exists by the T-box so as to carry out upgrading action;
8. after the upgrade is finished, transmitting the upgrade result and the current version information back to the Tsp for preservation and coverage;
2.3 software data packet encryption:
encryption uses AES-128 to encrypt the upgrade software package; the supplier generates an AES-128 key, keeps secret and can only be used once; the next time a new AES-128 key will be generated; the delivered software package should contain the encrypted upgrade software package, the electronic certificate, and the encrypted AES-128 key; the encrypted AES-128 key is protected by the RSA encryption method using a private key, the public key of which is contained in the electronic certificate;
thirdly, the equipment cloud server is implemented:
the cloud platform architecture of the device cloud server comprises a value-added application layer, an application management layer, a big data service layer, a basic service layer, a data access layer and a device access layer;
the equipment cloud server is a cloud server based on China;
meanwhile, the cloud server of the device is required to have load balancing service so as to realize cloud service of flow distribution, and an effective and transparent method is provided for expanding the bandwidth of the network device and the server; the load balancing service serves as a network entrance of the application system, and distributes the user request to the cloud server cluster, so that elastic expansion of the application system is achieved.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010074474.6A CN111327689A (en) | 2020-01-22 | 2020-01-22 | Method for realizing remote upgrading of vehicle ECU (electronic control Unit) based on UDS (Universal data System) communication protocol |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010074474.6A CN111327689A (en) | 2020-01-22 | 2020-01-22 | Method for realizing remote upgrading of vehicle ECU (electronic control Unit) based on UDS (Universal data System) communication protocol |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111327689A true CN111327689A (en) | 2020-06-23 |
Family
ID=71172110
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010074474.6A Pending CN111327689A (en) | 2020-01-22 | 2020-01-22 | Method for realizing remote upgrading of vehicle ECU (electronic control Unit) based on UDS (Universal data System) communication protocol |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111327689A (en) |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112114832A (en) * | 2020-09-21 | 2020-12-22 | 华人运通(上海)云计算科技有限公司 | Vehicle upgrade control method, terminal device, vehicle, and computer storage medium |
CN112527352A (en) * | 2020-12-08 | 2021-03-19 | 航天科技控股集团股份有限公司 | Method for intelligent configuration reading analysis based on diagnostic protocol |
CN112529219A (en) * | 2020-12-17 | 2021-03-19 | 武汉光庭信息技术股份有限公司 | Method and system for upgrading ECU of whole vehicle |
CN112596447A (en) * | 2020-12-23 | 2021-04-02 | 潍柴动力股份有限公司 | Method and device for determining length of ECU (electronic control Unit) flash data, electronic equipment and medium |
CN112667280A (en) * | 2020-12-30 | 2021-04-16 | 中车大连机车研究所有限公司 | Centralized control system for locomotive-mounted application software based on Git technology |
CN113194441A (en) * | 2021-04-30 | 2021-07-30 | 江苏徐工工程机械研究院有限公司 | Engineering machinery vehicle communication system and method and remote upgrading method |
CN113204356A (en) * | 2021-06-02 | 2021-08-03 | 吉林大学 | Application program dynamic updating method for vehicle-mounted embedded equipment |
CN113411180A (en) * | 2020-09-22 | 2021-09-17 | 郑州嘉晨电器有限公司 | Data encryption bus self-adaptive industrial equipment remote upgrading system |
CN113419755A (en) * | 2021-06-04 | 2021-09-21 | 江铃汽车股份有限公司 | Automobile ECU program flashing method and system, readable storage medium and computer equipment |
CN113472884A (en) * | 2021-06-30 | 2021-10-01 | 潍柴动力股份有限公司 | OTA (over the air) upgrading method and device |
CN113741393A (en) * | 2021-09-03 | 2021-12-03 | 东风汽车集团股份有限公司 | Vehicle safety network architecture based on central gateway and diagnosis method thereof |
CN114217596A (en) * | 2021-12-15 | 2022-03-22 | 安徽江淮汽车集团股份有限公司 | Intelligent diagnosis upgrading system and method based on Internet of vehicles |
CN114398066A (en) * | 2022-01-07 | 2022-04-26 | 中通客车股份有限公司 | Software upgrading method, system and application of domain controller |
CN114880002A (en) * | 2022-07-12 | 2022-08-09 | 江铃汽车股份有限公司 | OTA data flashing method and system |
CN114936047A (en) * | 2022-04-21 | 2022-08-23 | 江铃汽车股份有限公司 | Factory setting restoration method and system for IVI (interactive virtual infrastructure) system, electronic equipment and storage medium |
CN115022223A (en) * | 2022-06-06 | 2022-09-06 | 深圳市赛格车圣科技有限公司 | Method and system for carrying out automatic test on TBOX through UDS |
CN115314522A (en) * | 2022-07-25 | 2022-11-08 | 北京经纬恒润科技股份有限公司 | Vehicle-mounted operating system |
CN115421756A (en) * | 2022-09-16 | 2022-12-02 | 杭州云动智能汽车技术有限公司 | Service type gateway upgrading method |
CN115857885A (en) * | 2022-12-27 | 2023-03-28 | 深圳市浩科智联科技有限公司 | SOC software-based automobile theme UI full-process development, test and deployment system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160371076A1 (en) * | 2015-06-16 | 2016-12-22 | Lear Corporation | METHOD FOR UPDATING VEHICLE ECUs USING DIFFERENTIAL UPDATE PACKAGES |
CN109040205A (en) * | 2018-07-18 | 2018-12-18 | 北京车和家信息技术有限公司 | The method and device of vehicle upgrading |
CN110474961A (en) * | 2019-07-14 | 2019-11-19 | 江苏开沃汽车有限公司 | Pure electricity passenger car is based on CAN bus and realizes multi-channel long OTA upgrade method |
-
2020
- 2020-01-22 CN CN202010074474.6A patent/CN111327689A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160371076A1 (en) * | 2015-06-16 | 2016-12-22 | Lear Corporation | METHOD FOR UPDATING VEHICLE ECUs USING DIFFERENTIAL UPDATE PACKAGES |
CN106257420A (en) * | 2015-06-16 | 2016-12-28 | 李尔公司 | For the method using difference update bag to update ECU |
CN109040205A (en) * | 2018-07-18 | 2018-12-18 | 北京车和家信息技术有限公司 | The method and device of vehicle upgrading |
CN110474961A (en) * | 2019-07-14 | 2019-11-19 | 江苏开沃汽车有限公司 | Pure electricity passenger car is based on CAN bus and realizes multi-channel long OTA upgrade method |
Non-Patent Citations (1)
Title |
---|
詹克旭: "基于UDS协议的汽车ECU升级方案", 《计算机应用于软件》 * |
Cited By (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112114832B (en) * | 2020-09-21 | 2024-03-15 | 华人运通(上海)云计算科技有限公司 | Vehicle upgrade control method, terminal device, vehicle, and computer storage medium |
CN112114832A (en) * | 2020-09-21 | 2020-12-22 | 华人运通(上海)云计算科技有限公司 | Vehicle upgrade control method, terminal device, vehicle, and computer storage medium |
CN113411180A (en) * | 2020-09-22 | 2021-09-17 | 郑州嘉晨电器有限公司 | Data encryption bus self-adaptive industrial equipment remote upgrading system |
CN112527352A (en) * | 2020-12-08 | 2021-03-19 | 航天科技控股集团股份有限公司 | Method for intelligent configuration reading analysis based on diagnostic protocol |
CN112529219A (en) * | 2020-12-17 | 2021-03-19 | 武汉光庭信息技术股份有限公司 | Method and system for upgrading ECU of whole vehicle |
CN112596447A (en) * | 2020-12-23 | 2021-04-02 | 潍柴动力股份有限公司 | Method and device for determining length of ECU (electronic control Unit) flash data, electronic equipment and medium |
CN112667280A (en) * | 2020-12-30 | 2021-04-16 | 中车大连机车研究所有限公司 | Centralized control system for locomotive-mounted application software based on Git technology |
CN112667280B (en) * | 2020-12-30 | 2024-06-04 | 中车大连机车研究所有限公司 | Locomotive vehicle-mounted application software centralized control system based on Git technology |
CN113194441A (en) * | 2021-04-30 | 2021-07-30 | 江苏徐工工程机械研究院有限公司 | Engineering machinery vehicle communication system and method and remote upgrading method |
CN113204356A (en) * | 2021-06-02 | 2021-08-03 | 吉林大学 | Application program dynamic updating method for vehicle-mounted embedded equipment |
CN113204356B (en) * | 2021-06-02 | 2023-11-07 | 吉林大学 | Application program dynamic updating method for vehicle-mounted embedded equipment |
CN113419755A (en) * | 2021-06-04 | 2021-09-21 | 江铃汽车股份有限公司 | Automobile ECU program flashing method and system, readable storage medium and computer equipment |
CN113472884A (en) * | 2021-06-30 | 2021-10-01 | 潍柴动力股份有限公司 | OTA (over the air) upgrading method and device |
CN113741393A (en) * | 2021-09-03 | 2021-12-03 | 东风汽车集团股份有限公司 | Vehicle safety network architecture based on central gateway and diagnosis method thereof |
CN113741393B (en) * | 2021-09-03 | 2023-03-24 | 东风汽车集团股份有限公司 | Vehicle safety network architecture based on central gateway and diagnosis method thereof |
CN114217596A (en) * | 2021-12-15 | 2022-03-22 | 安徽江淮汽车集团股份有限公司 | Intelligent diagnosis upgrading system and method based on Internet of vehicles |
CN114398066A (en) * | 2022-01-07 | 2022-04-26 | 中通客车股份有限公司 | Software upgrading method, system and application of domain controller |
CN114936047A (en) * | 2022-04-21 | 2022-08-23 | 江铃汽车股份有限公司 | Factory setting restoration method and system for IVI (interactive virtual infrastructure) system, electronic equipment and storage medium |
CN115022223A (en) * | 2022-06-06 | 2022-09-06 | 深圳市赛格车圣科技有限公司 | Method and system for carrying out automatic test on TBOX through UDS |
CN114880002B (en) * | 2022-07-12 | 2022-09-06 | 江铃汽车股份有限公司 | OTA data flashing method and system |
CN114880002A (en) * | 2022-07-12 | 2022-08-09 | 江铃汽车股份有限公司 | OTA data flashing method and system |
CN115314522A (en) * | 2022-07-25 | 2022-11-08 | 北京经纬恒润科技股份有限公司 | Vehicle-mounted operating system |
CN115421756A (en) * | 2022-09-16 | 2022-12-02 | 杭州云动智能汽车技术有限公司 | Service type gateway upgrading method |
CN115421756B (en) * | 2022-09-16 | 2023-07-18 | 杭州云动智能汽车技术有限公司 | Service type gateway upgrading method |
CN115857885A (en) * | 2022-12-27 | 2023-03-28 | 深圳市浩科智联科技有限公司 | SOC software-based automobile theme UI full-process development, test and deployment system |
CN115857885B (en) * | 2022-12-27 | 2023-09-22 | 深圳市浩科智联科技有限公司 | Automobile theme UI full-flow development test deployment system based on SOC software |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111327689A (en) | Method for realizing remote upgrading of vehicle ECU (electronic control Unit) based on UDS (Universal data System) communication protocol | |
CN110474961B (en) | Method for realizing multi-path remote OTA (over the air) upgrading of pure passenger vehicle based on CAN (controller area network) bus | |
US11907698B2 (en) | Vehicle electronic control system, vehicle master device, method for controlling transmission of data storage bank information and computer program product for controlling transmission of data storage bank information | |
US11683197B2 (en) | Vehicle master device, update data distribution control method, computer program product and data structure of specification data | |
US11669323B2 (en) | Vehicle electronic control system, program update notification control method and computer program product | |
US11989546B2 (en) | Vehicle electronic control system, vehicle master device, and rewrite instruction program product under specific mode | |
US11671498B2 (en) | Vehicle master device, update data verification method and computer program product | |
CN108647040A (en) | A kind of Bootloader frameworks based on PEPS system and write with a brush dipped in Chinese ink method | |
US20210157573A1 (en) | Vehicle electronic control system, progress screen display control method and computer program product | |
CN109582340A (en) | A kind of method and system of electric car remote upgrade | |
US11999360B2 (en) | Vehicle master device, control method for executing rollback, computer program product for executing rollback and data structure of specification data | |
US11822366B2 (en) | Electronic control unit, vehicle electronic control system, rewrite execution method, rewrite execution program, and data structure of specification data | |
US20210155177A1 (en) | Vehicle electronic control system, distribution package download determination method and computer program product | |
US20210155173A1 (en) | Vehicle master device, vehicle electronic control system, activation request instruction method and computer program product | |
US11467821B2 (en) | Vehicle master device, installation instruction determination method and computer program product | |
US11928459B2 (en) | Electronic control unit, retry point specifying method and computer program product for specifying retry point | |
US20210157574A1 (en) | Vehicle master device, non-rewrite target power supply administration method and computer program product | |
CN109086058A (en) | Onboard program upgrade-system | |
CN111480141A (en) | Method and device for updating software of a motor vehicle control device | |
US11941384B2 (en) | Vehicle master device, rewrite target group administration method, computer program product and data structure of specification data | |
CN110825403A (en) | Method and system for flashing ECU (electronic control Unit) of automobile | |
CN102135922A (en) | Method and system for refreshing application program | |
US11926270B2 (en) | Display control device, rewrite progress display control method and computer program product | |
US20220179643A1 (en) | Vehicle master device, vehicle electronic control system, configuration setting information rewrite instruction method, and configuration setting information rewrite instruction program product | |
CN112698857A (en) | Data flashing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200623 |
|
RJ01 | Rejection of invention patent application after publication |