CN113434850A - Anti-theft authentication method and system - Google Patents
Anti-theft authentication method and system Download PDFInfo
- Publication number
- CN113434850A CN113434850A CN202110831143.7A CN202110831143A CN113434850A CN 113434850 A CN113434850 A CN 113434850A CN 202110831143 A CN202110831143 A CN 202110831143A CN 113434850 A CN113434850 A CN 113434850A
- Authority
- CN
- China
- Prior art keywords
- authentication
- tool
- theft
- result
- theft authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
Abstract
The embodiment of the invention provides an anti-theft authentication method and system. The method comprises the following steps: the computer equipment sends an anti-theft authentication request to the measured controller; the measured controller responds to the anti-theft authentication request and sends a data seed to a controller local area network (Can) tool; and the Can tool performs anti-theft authentication on the data seeds through an anti-theft authentication algorithm. According to the technical scheme provided by the embodiment of the invention, complete anti-theft authentication can be carried out, the operation is easy, the time required by the anti-theft authentication is reduced, and the efficiency of the anti-theft authentication is improved.
Description
[ technical field ] A method for producing a semiconductor device
The invention relates to the technical field of security, in particular to an anti-theft authentication method and system.
[ background of the invention ]
Along with the development of science and technology, because people's demand to car security and reliability is higher and higher, prevent that third party's personnel from carrying out illegal repacking to the car to and carry out the change of violating the regulations and refusing regulations to critical spare part, use the theftproof authentication method to protect usually.
The anti-theft authentication method in the related technology mostly adopts a forward functional verification method during testing, can not meet all working condition requirements, improves the time required by anti-theft authentication, and reduces the efficiency of anti-theft authentication.
[ summary of the invention ]
In view of this, embodiments of the present invention provide a method and a system for anti-theft authentication, so as to improve the efficiency of anti-theft authentication.
In one aspect, an embodiment of the present invention provides an anti-theft authentication method, including:
the computer equipment sends an anti-theft authentication request to the measured controller;
the measured controller responds to the anti-theft authentication request and sends a data seed to a controller area network (Can) tool;
and the Can tool carries out anti-theft authentication on the data seeds through an anti-theft authentication algorithm.
Optionally, the Can tool performs anti-theft authentication on the data seed through an anti-theft authentication algorithm, including:
the Can tool calculates the data seeds through an anti-theft authentication algorithm to generate an authentication result;
the Can tool receives a standard result sent by the controller to be tested;
the Can tool determines whether the authentication result is the same as the standard result;
and if the Can tool judges that the authentication result is the same as the standard result, the Can tool sends authentication success information to the measured controller.
Optionally, the Can tool performs anti-theft authentication on the data seed through an anti-theft authentication algorithm, including:
the Can tool calculates the data seeds through an anti-theft authentication algorithm to generate an authentication result;
the Can tool randomly changes one data in the authentication result to generate a changed authentication result;
and the Can tool responds to the changed authentication result and sends authentication failure information to the measured controller.
Optionally, the Can tool performs anti-theft authentication on the data seed through an anti-theft authentication algorithm, including:
the Can tool calculates the data seeds through an anti-theft authentication algorithm to generate an authentication result;
and if the measured controller does not receive the authentication result sent by the Can tool within a set time range, determining that the authentication fails.
Optionally, if the Can tool determines that the authentication result is the same as the standard result, after sending authentication success information to the measured controller, the method includes:
the Can tool sends authentication success information to the computer equipment;
and the computer equipment displays the authentication success information.
Optionally, after the Can tool sends authentication failure information to the measured controller in response to the changed authentication result, the method includes:
the Can tool sending authentication failure information to the computer device;
the computer device displays the authentication failure information.
Optionally, if the measured controller does not receive the authentication information sent by the Can tool within the set time range, after determining that the authentication fails, the method includes:
the measured controller sends authentication failure information to a Can tool;
the Can tool sending authentication failure information to the computer device;
the computer device displays the authentication failure information.
Optionally, the method further comprises:
and if the Can tool judges that the authentication result is different from the standard result, the Can tool sends authentication failure information to the measured controller.
Optionally, the Can tool comprises a programmable Can tool.
In another aspect, an embodiment of the present invention provides an anti-theft authentication system, including: computer equipment, a measured controller and a controller area network (Can) tool;
the computer equipment is used for sending an anti-theft authentication request to the measured controller;
the measured controller is used for responding to the anti-theft authentication request and sending a data seed to the Can tool;
the Can tool is used for performing anti-theft authentication on the data seeds through an anti-theft authentication algorithm.
In the technical scheme of the anti-theft authentication method provided by the embodiment of the invention, computer equipment sends an anti-theft authentication request to a measured controller; the measured controller responds to the anti-theft authentication request and sends a data seed to a controller local area network (Can) tool; and the Can tool performs anti-theft authentication on the data seeds through an anti-theft authentication algorithm. According to the technical scheme provided by the embodiment of the invention, complete anti-theft authentication can be carried out, the operation is easy, the time required by the anti-theft authentication is reduced, and the efficiency of the anti-theft authentication is improved.
[ description of the drawings ]
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive labor.
Fig. 1 is a schematic structural diagram of a system for anti-theft authentication according to an embodiment of the present invention;
fig. 2 is a flowchart of a method for anti-theft authentication according to an embodiment of the present invention;
FIG. 3 is a flow chart of another method for anti-theft authentication according to an embodiment of the present invention;
FIG. 4 is a flow chart of another method for anti-theft authentication according to an embodiment of the present invention;
fig. 5 is a flowchart of another anti-theft authentication method according to an embodiment of the present invention.
[ detailed description ] embodiments
For better understanding of the technical solutions of the present invention, the following detailed descriptions of the embodiments of the present invention are provided with reference to the accompanying drawings.
It should be understood that the described embodiments are only some embodiments of the invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terminology used in the embodiments of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the examples of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be understood that the term "and/or" as used herein is merely one type of associative relationship that describes an associated object, meaning that three types of relationships may exist, e.g., A and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
An embodiment of the present invention provides an anti-theft authentication system, and fig. 1 is a schematic structural diagram of the anti-theft authentication system provided in the embodiment of the present invention, as shown in fig. 1, the system includes: a computer device 1, a measured Controller 2 and a Controller Area Network (CAN) tool 3. The computer equipment 1 is connected with the measured controller 2, and the measured controller 2 is connected with the Can tool 3.
The computer device 1 is used for sending an anti-theft authentication request to the measured controller 2.
The measured controller 2 is configured to send a data seed to the Can tool 3 in response to the anti-theft authentication request.
The Can tool 3 is used for performing anti-theft authentication on the data seeds through an anti-theft authentication algorithm.
In the embodiment of the present invention, the computer device 1 includes a computer.
In the embodiment of the present invention, the measured controller 2 includes an Electronic Control Unit (ECU), a Body Controller (BCM) or a Telematics BOX (T-BOX).
In an embodiment of the present invention, Can tool 3 comprises a programmable Can tool.
In the embodiment of the invention, the Can tool 3 is specifically used for calculating the data seeds through an anti-theft authentication algorithm to generate an authentication result; receiving a standard result sent by the measured controller 2; judging whether the authentication result is the same as the standard result or not; and if the authentication result is the same as the standard result, sending authentication success information to the measured controller 2.
In the embodiment of the invention, the Can tool 3 is further specifically used for calculating the data seeds through an anti-theft authentication algorithm to generate an authentication result; randomly changing one data in the authentication result to generate a changed authentication result; in response to the changed authentication result, authentication failure information is transmitted to the measured controller 2.
In the embodiment of the present invention, the Can tool 3 is further specifically configured to calculate the data seeds through an anti-theft authentication algorithm, and generate an authentication result.
The measured controller 2 is further configured to determine that the authentication fails if the authentication result sent by the Can tool 3 is not received within the set time range.
In the embodiment of the present invention, the computer device 1 is connected to a Can tool 3.
The Can tool 3 is also used to send authentication success information to the computer device 1.
The computer device 1 is also configured to display authentication success information.
In this embodiment of the present invention, the Can tool 3 is further configured to send authentication failure information to the computer device 1.
The computer device 1 is also used to display authentication failure information.
In the embodiment of the present invention, the measured controller 2 is further configured to send authentication failure information to the Can tool 3.
The Can tool 3 is also used to send authentication failure information to the computer device 1.
The computer device 1 is also used to display authentication failure information.
In the embodiment of the present invention, the Can tool 3 is further configured to send authentication failure information to the measured controller 2 if it is determined that the authentication result is different from the standard result.
In the technical scheme provided by the embodiment of the invention, computer equipment sends an anti-theft authentication request to a measured controller; the measured controller responds to the anti-theft authentication request and sends a data seed to a controller local area network (Can) tool; and the Can tool performs anti-theft authentication on the data seeds through an anti-theft authentication algorithm. According to the technical scheme provided by the embodiment of the invention, complete anti-theft authentication can be carried out, the operation is easy, the time required by the anti-theft authentication is reduced, and the efficiency of the anti-theft authentication is improved.
Based on the above anti-theft authentication system, an embodiment of the present invention provides an anti-theft authentication method, and fig. 2 is a flowchart of the anti-theft authentication method provided by the embodiment of the present invention, as shown in fig. 2, the method includes:
In the embodiment of the invention, step 102 includes powering on the measured controller by the program control power supply, initializing the measured controller, and enabling the measured controller to reach the test condition.
And step 104, the measured controller responds to the anti-theft authentication request and sends a data seed to a controller area network (Can) tool.
In this step, the measured controller responds to the anti-theft authentication request, randomly generates a data seed, and sends the data seed to the Can tool.
And 106, the Can tool conducts anti-theft authentication on the data seeds through an anti-theft authentication algorithm.
In the embodiment of the invention, the Can tool writes data to the data seeds according to the anti-theft authentication algorithm, so that the anti-theft authentication of effective data simulation, the anti-theft authentication of invalid data simulation and the anti-theft authentication of null data simulation Can be performed.
In the technical scheme provided by the embodiment of the invention, computer equipment sends an anti-theft authentication request to a measured controller; the measured controller responds to the anti-theft authentication request and sends a data seed to a controller local area network (Can) tool; and the Can tool performs anti-theft authentication on the data seeds through an anti-theft authentication algorithm. According to the technical scheme provided by the embodiment of the invention, complete anti-theft authentication can be carried out, the operation is easy, the time required by the anti-theft authentication is reduced, and the efficiency of the anti-theft authentication is improved.
An embodiment of the present invention provides another anti-theft authentication method, and fig. 3 is a flowchart of another anti-theft authentication method provided in the embodiment of the present invention, as shown in fig. 3, the method includes:
In the embodiment of the present invention, please refer to step 102 for a detailed description of step 202.
And step 204, the measured controller responds to the anti-theft authentication request and sends a data seed to a controller area network (Can) tool.
In the embodiment of the present invention, please refer to step 104 for a detailed description of step 204.
And step 206, the Can tool calculates the data seeds through an anti-theft authentication algorithm to generate an authentication result.
In step 208, the Can tool receives the standard result sent by the controller under test.
In the embodiment of the invention, the measured controller stores the standard result corresponding to the data seed, and sends the standard result to the Can tool.
In the embodiment of the invention, if the Can tool judges that the authentication result is the same as the standard result, the anti-theft authentication is passed, and step 212 is executed; if the Can tool determines that the authentication result is not the same as the standard result, it indicates that the anti-theft authentication is failed, and step 218 is performed.
In this step, the measured controller can continue to operate in response to the authentication success information.
At step 214, the Can tool sends authentication success information to the computer device.
At step 218, the Can tool sends authentication failure information to the measured controller.
In this step, the measured controller can refuse to work in response to the authentication failure information.
Step 218 is followed by: the Can tool sends authentication failure information to the computer device. The computer device displays authentication failure information.
In the technical scheme provided by the embodiment of the invention, computer equipment sends an anti-theft authentication request to a measured controller; the measured controller responds to the anti-theft authentication request and sends a data seed to a controller local area network (Can) tool; and the Can tool performs anti-theft authentication on the data seeds through an anti-theft authentication algorithm. According to the technical scheme provided by the embodiment of the invention, complete anti-theft authentication can be carried out, the operation is easy, the time required by the anti-theft authentication is reduced, and the efficiency of the anti-theft authentication is improved.
An embodiment of the present invention provides another anti-theft authentication method, and fig. 4 is a flowchart of another anti-theft authentication method provided in the embodiment of the present invention, as shown in fig. 4, the method includes:
In the embodiment of the present invention, please refer to step 102 for a detailed description of step 302.
And step 304, the measured controller responds to the anti-theft authentication request and sends a data seed to a controller area network (Can) tool.
In the embodiment of the present invention, please refer to step 104 for a detailed description of step 304.
And step 306, the Can tool calculates the data seeds through an anti-theft authentication algorithm to generate an authentication result.
And step 310, the Can tool responds to the changed authentication result and sends authentication failure information to the measured controller.
In this step, the measured controller can refuse to work in response to the authentication failure information.
At step 312, the Can tool sends authentication failure information to the computer device.
In the technical scheme provided by the embodiment of the invention, computer equipment sends an anti-theft authentication request to a measured controller; the measured controller responds to the anti-theft authentication request and sends a data seed to a controller local area network (Can) tool; and the Can tool performs anti-theft authentication on the data seeds through an anti-theft authentication algorithm. According to the technical scheme provided by the embodiment of the invention, complete anti-theft authentication can be carried out, the operation is easy, the time required by the anti-theft authentication is reduced, and the efficiency of the anti-theft authentication is improved.
An embodiment of the present invention provides another anti-theft authentication method, and fig. 5 is a flowchart of another anti-theft authentication method provided in the embodiment of the present invention, as shown in fig. 5, the method includes:
In the embodiment of the present invention, please refer to step 102 for the detailed description of step 402.
And step 404, the measured controller responds to the anti-theft authentication request and sends a data seed to a controller area network (Can) tool.
In the embodiment of the present invention, please refer to step 104 for a detailed description of step 404.
And 406, calculating the data seeds by the Can tool through an anti-theft authentication algorithm to generate an authentication result.
And step 408, if the measured controller does not receive the authentication result sent by the Can tool within the set time range, determining that the authentication fails.
In the embodiment of the invention, the time range can be set according to the actual situation. For example, the set time range is 3 minutes.
In this step, the Can tool does not send the authentication result to the measured controller.
And step 410, the measured controller sends authentication failure information to the Can tool.
At step 412, the Can tool sends authentication failure information to the computer device.
In the technical scheme provided by the embodiment of the invention, computer equipment sends an anti-theft authentication request to a measured controller; the measured controller responds to the anti-theft authentication request and sends a data seed to a controller local area network (Can) tool; and the Can tool performs anti-theft authentication on the data seeds through an anti-theft authentication algorithm. According to the technical scheme provided by the embodiment of the invention, complete anti-theft authentication can be carried out, the operation is easy, the time required by the anti-theft authentication is reduced, and the efficiency of the anti-theft authentication is improved.
According to the technical scheme provided by the embodiment of the invention, the antitheft authentication Can be completely verified through script editing based on the existing Can tool, the reliability and the practicability of the antitheft authentication method are ensured, all working conditions Can be met, and the quality of the vehicle is ensured. And meanwhile, the test variability and the operability can be realized. The time required by the anti-theft authentication is reduced, and the ordered promotion of the project schedule after the anti-theft authentication is ensured.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.
Claims (10)
1. A method of theft authentication, comprising:
the computer equipment sends an anti-theft authentication request to the measured controller;
the measured controller responds to the anti-theft authentication request and sends a data seed to a controller area network (Can) tool;
and the Can tool carries out anti-theft authentication on the data seeds through an anti-theft authentication algorithm.
2. The method of claim 1, wherein the Can tool performs anti-theft authentication on the data seed through an anti-theft authentication algorithm, comprising:
the Can tool calculates the data seeds through an anti-theft authentication algorithm to generate an authentication result;
the Can tool receives a standard result sent by the controller to be tested;
the Can tool determines whether the authentication result is the same as the standard result;
and if the Can tool judges that the authentication result is the same as the standard result, the Can tool sends authentication success information to the measured controller.
3. The method of claim 1, wherein the Can tool performs anti-theft authentication on the data seed through an anti-theft authentication algorithm, comprising:
the Can tool calculates the data seeds through an anti-theft authentication algorithm to generate an authentication result;
the Can tool randomly changes one data in the authentication result to generate a changed authentication result;
and the Can tool responds to the changed authentication result and sends authentication failure information to the measured controller.
4. The method of claim 1, wherein the Can tool performs anti-theft authentication on the data seed through an anti-theft authentication algorithm, comprising:
the Can tool calculates the data seeds through an anti-theft authentication algorithm to generate an authentication result;
and if the measured controller does not receive the authentication result sent by the Can tool within a set time range, determining that the authentication fails.
5. The method according to claim 2, wherein if the Can tool determines that the authentication result is the same as the standard result, after sending authentication success information to the measured controller, the method comprises:
the Can tool sends authentication success information to the computer equipment;
and the computer equipment displays the authentication success information.
6. The method of claim 3, wherein the Can tool, after sending authentication failure information to the measured controller in response to the changed authentication result, comprises:
the Can tool sending authentication failure information to the computer device;
the computer device displays the authentication failure information.
7. The method according to claim 4, wherein if the measured controller does not receive the authentication information sent by the Can tool within a set time range, after determining that the authentication fails, the method comprises:
the measured controller sends authentication failure information to a Can tool;
the Can tool sending authentication failure information to the computer device;
the computer device displays the authentication failure information.
8. The method of claim 2, further comprising:
and if the Can tool judges that the authentication result is different from the standard result, the Can tool sends authentication failure information to the measured controller.
9. The method of claim 1, wherein the Can tool comprises a programmable Can tool.
10. A system for theft authentication, comprising: computer equipment, a measured controller and a controller area network (Can) tool;
the computer equipment is used for sending an anti-theft authentication request to the measured controller;
the measured controller is used for responding to the anti-theft authentication request and sending a data seed to the Can tool;
the Can tool is used for performing anti-theft authentication on the data seeds through an anti-theft authentication algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110831143.7A CN113434850A (en) | 2021-07-22 | 2021-07-22 | Anti-theft authentication method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110831143.7A CN113434850A (en) | 2021-07-22 | 2021-07-22 | Anti-theft authentication method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113434850A true CN113434850A (en) | 2021-09-24 |
Family
ID=77761309
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110831143.7A Pending CN113434850A (en) | 2021-07-22 | 2021-07-22 | Anti-theft authentication method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113434850A (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN203732981U (en) * | 2014-03-19 | 2014-07-23 | 北京经纬恒润科技有限公司 | Integrated automobile body controller |
CN104029652A (en) * | 2014-06-25 | 2014-09-10 | 奇瑞汽车股份有限公司 | CAN (controller area network)-bus automobile-engine IMMO (immobilizer) system and authentication method thereof |
CN104724057A (en) * | 2015-02-13 | 2015-06-24 | 中国第一汽车股份有限公司 | High-safety hybrid electric automobile electronic lock anti-theft method |
CN105015490A (en) * | 2015-07-24 | 2015-11-04 | 安徽江淮汽车股份有限公司 | Authentication method for antitheft unit of engine |
US20160059825A1 (en) * | 2013-05-08 | 2016-03-03 | Caterpillar Inc. | Vehicle anti-theft apparatus and method |
CN106502236A (en) * | 2016-10-27 | 2017-03-15 | 武汉奥泽电子有限公司 | BCM multimachines automatization test system and method |
US20180337923A1 (en) * | 2017-05-22 | 2018-11-22 | Renesas Electronics Corporation | Authentication method and authentication system |
CN111767528A (en) * | 2019-03-28 | 2020-10-13 | 丰田自动车株式会社 | Vehicle authentication device and vehicle authentication method |
CN112606795A (en) * | 2020-12-28 | 2021-04-06 | 中国第一汽车股份有限公司 | Vehicle transmission system anti-theft control method, device, equipment and storage medium |
-
2021
- 2021-07-22 CN CN202110831143.7A patent/CN113434850A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160059825A1 (en) * | 2013-05-08 | 2016-03-03 | Caterpillar Inc. | Vehicle anti-theft apparatus and method |
CN203732981U (en) * | 2014-03-19 | 2014-07-23 | 北京经纬恒润科技有限公司 | Integrated automobile body controller |
CN104029652A (en) * | 2014-06-25 | 2014-09-10 | 奇瑞汽车股份有限公司 | CAN (controller area network)-bus automobile-engine IMMO (immobilizer) system and authentication method thereof |
CN104724057A (en) * | 2015-02-13 | 2015-06-24 | 中国第一汽车股份有限公司 | High-safety hybrid electric automobile electronic lock anti-theft method |
CN105015490A (en) * | 2015-07-24 | 2015-11-04 | 安徽江淮汽车股份有限公司 | Authentication method for antitheft unit of engine |
CN106502236A (en) * | 2016-10-27 | 2017-03-15 | 武汉奥泽电子有限公司 | BCM multimachines automatization test system and method |
US20180337923A1 (en) * | 2017-05-22 | 2018-11-22 | Renesas Electronics Corporation | Authentication method and authentication system |
CN111767528A (en) * | 2019-03-28 | 2020-10-13 | 丰田自动车株式会社 | Vehicle authentication device and vehicle authentication method |
CN112606795A (en) * | 2020-12-28 | 2021-04-06 | 中国第一汽车股份有限公司 | Vehicle transmission system anti-theft control method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106327344A (en) | Vehicle fault online detection and early warning device based on internet of vehicles and vehicle fault online detection and early warning method thereof | |
CN106059754A (en) | Vehicle data processing method and system, and devices | |
CN108896320A (en) | A kind of system and method for realizing vehicle abnormality monitoring, fault diagnosis and data upgrading | |
CN108804115A (en) | vehicle software installation method and system | |
CN109270919B (en) | A kind of vehicle detection data managing method, analysis method, equipment and server | |
CN110139243B (en) | Vehicle monitoring method, monitoring terminal, vehicle monitoring system and medium | |
CN102402219A (en) | Device and method for acquiring and monitoring automobile information on line based on controller area network (CAN) bus and general packet radio service (GPRS) communication | |
CN112230624A (en) | Control system and method for vehicle door lock | |
CN111381574A (en) | Vehicle remote fault diagnosis system and method | |
WO2023246265A1 (en) | Vehicle fault alarm method and system for liquid crystal instrument system | |
KR20160050976A (en) | System and method for authenticating battery of electric vehicle using battery swapping station | |
CN110290223A (en) | Active upgrade method and system | |
CN111506048A (en) | Vehicle fault early warning method and related equipment | |
CN113849212A (en) | Software upgrading control method and device and electronic equipment | |
CN110738332B (en) | Accident vehicle identification method and system and storage medium | |
CN106371429A (en) | Inside-vehicle equipment centralized detection method and system | |
CN113434850A (en) | Anti-theft authentication method and system | |
CN107978037A (en) | Vehicle shuts management method, client and vehicle | |
CN112298100A (en) | Vehicle and vehicle control method and device | |
CN110588570A (en) | Vehicle-mounted equipment anti-theft method and device, vehicle-mounted anti-theft equipment and storage medium | |
CN111452834B (en) | GMS system-based vehicle-mounted equipment detection system and method | |
CN115220989B (en) | Payment software monitoring method, device and system | |
CN103632412B (en) | Vehicle-mounted data management method and device | |
CN116710917A (en) | Data storage device, data storage method, and data storage program | |
CN106985787A (en) | A kind of anti-stealing method for vehicles, device, system and vehicle |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210924 |
|
RJ01 | Rejection of invention patent application after publication |