CN113536241A - Countable software authorization method for vehicle-mounted system - Google Patents

Countable software authorization method for vehicle-mounted system Download PDF

Info

Publication number
CN113536241A
CN113536241A CN202110607343.4A CN202110607343A CN113536241A CN 113536241 A CN113536241 A CN 113536241A CN 202110607343 A CN202110607343 A CN 202110607343A CN 113536241 A CN113536241 A CN 113536241A
Authority
CN
China
Prior art keywords
authorization
file
vehicle
central control
software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110607343.4A
Other languages
Chinese (zh)
Other versions
CN113536241B (en
Inventor
肖文平
林刚
高传明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Hinge Electronic Technologies Co Ltd
Original Assignee
Shanghai Hinge Electronic Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Hinge Electronic Technologies Co Ltd filed Critical Shanghai Hinge Electronic Technologies Co Ltd
Priority to CN202110607343.4A priority Critical patent/CN113536241B/en
Publication of CN113536241A publication Critical patent/CN113536241A/en
Application granted granted Critical
Publication of CN113536241B publication Critical patent/CN113536241B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • G06F21/1011Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The invention provides a countable software authorization method for a vehicle-mounted system, which comprises the following steps: acquiring hardware fingerprint information, and generating an authorization file by an authorization code generation tool according to the hardware fingerprint information, wherein the authorization file comprises a single first authorization code or a batch of first authorization codes; when the software version is integrated, the authorization file is deployed to a specific position of a file system and written into the vehicle-mounted equipment; when the vehicle-mounted equipment is started, the application service judges the authorization state of the vehicle-mounted equipment by loading the authorization authentication library and calling an authorization authentication library interface, and executes preset operation according to the authorization state. According to the technical scheme provided by the invention, the authorization codes required by the equipment are deployed to the specific path of the file system in batches when software is integrated in advance, so that the software authorization is simple and quick, and complicated steps are avoided.

Description

Countable software authorization method for vehicle-mounted system
Technical Field
The invention relates to the field of vehicles, in particular to a countable software authorization method for a vehicle-mounted system.
Background
In actual product application, different software functions and use time limits need to be opened for different application scenes, so that different encryption authorization parameters are needed to control the use of software. In a traditional authorization mode, the only machine identification code of the equipment needs to be known, after the only machine identification code is copied, information is fed back to a supplier, a cabin software supplier generates authorization code plaintext from the information and provides the authorization code plaintext to a manufacturer, after the manufacturer takes the authorization code, the manufacturer needs to search which authorization code corresponds to which machine, if the authorization is wrong, the authorization fails, so the authorization code needs to be accurately input into corresponding intelligent cabin platform software to complete the authorization, and the authorization mode is inconvenient for counting the currently authorized quantity. And after the machine is delivered from the factory, manually inputting the authorization code again to finish authorization, otherwise, the machine cannot be normally used.
In order to solve various inconveniences in authorization, the invention adopts a batch authorization and real-time automatic authorization mode to solve various inconveniences of the traditional authorization method so as to achieve the effect that one-time authorization can be used normally for a lifetime.
Disclosure of Invention
Based on the defects in the prior art, the invention provides a countable software authorization method for a vehicle-mounted system, which is characterized by at least comprising the following steps:
acquiring hardware fingerprint information, and generating an authorization file by an authorization code generation tool according to the hardware fingerprint information, wherein the authorization file comprises a single first authorization code or a batch of first authorization codes; when the software version is integrated, the authorization file is deployed to a specific position of a file system and written into the vehicle-mounted equipment;
when the vehicle-mounted equipment is started, the application service judges the authorization state of the vehicle-mounted equipment by loading the authorization authentication library and calling an authorization authentication library interface, and executes preset operation according to the authorization state.
A countable software authorization method for a vehicle-mounted system is characterized by further obtaining one or more of a CPU ID, an EMMC ID and an MAC ID of vehicle-mounted equipment, splicing the CPU ID, the EMMC ID and the MAC ID into hardware identification information, and extracting corresponding characters from the hardware identification information according to preset rules to generate hardware fingerprint information;
the hardware fingerprint information comprises information provided by one or more vehicle-mounted devices.
A countable software authorization method for an on-board system is disclosed, and further an authorization file generation method comprises the following steps:
an authorization code generation tool reads hardware fingerprint information;
and the authorization code generation tool calls a first preset function to generate a first authorization code and packages the first authorization code into an authorization file.
A countable software authorization method of a vehicle-mounted system, further, if the apparatus is authorized, the application service continues to finish starting; if the device is not authorized, the application service is blocked in the authorization authentication library and cannot be started, and the application service is forbidden to provide the service.
A countable software authorization method for a vehicle-mounted system is characterized in that when an authorization authentication library interface is called, whether an authorization file exists in an authorization file deployment position in an operating system is checked, if the authorization file does not exist, sleep is carried out for a preset time, and after the sleep is finished, whether the authorization file exists is continuously checked.
A countable software authorization method for a vehicle-mounted system is characterized in that if an authorization file exists, current machine hardware fingerprint information is acquired, then a second preset function is called to obtain a second authorization code, the authorization file is read from a specific position of a file system, and the first authorization code is acquired;
judging whether the first authorization code is matched with the second authorization code;
if the matching is carried out, the interface of the authorization authentication library returns True, and the calling of the interface of the authorization authentication library is finished;
if not, sleeping for a preset time, and continuing to detect from the beginning after the sleep is finished.
A software authorization method for counting of an on-board system further comprises the following steps: and authorizing the central control HMI connected with the vehicle-mounted equipment, wherein the authorization of the central control HMI provides services through an authorization authentication service application.
A countable software authorization method for a vehicle-mounted system is characterized in that after normal starting of an authorization authentication service application is completed, whether a current central control HMI is authorized or not is detected, if the authorization authentication service application is authorized, authorized information is notified to the central control HMI in a broadcasting mode, and a central control image is normally displayed after the central control HMI is started.
A countable software authorization method for a vehicle-mounted system is characterized in that after normal starting of an authorization authentication service application is completed, the central control HMI is detected to be unauthorized after the start, and the authorization authentication service application continuously executes the following steps:
firstly, an authorization authentication service application firstly searches whether an authorization file is deployed at a specified position of a system, if so, acquires the hardware fingerprint information of the current equipment, then calls a second preset function to calculate to obtain a second authorization code, and compares whether a matched first authorization code exists in the authorization file;
if the matched first authorization code exists, the matched first authorization code is written into a system appointed storage position, authorized information is notified to the central control HMI in a broadcasting mode, and the central control HMI normally displays a central control picture after starting is completed;
if not, a message is broadcast to the central HMI and the device needs authorization for reuse.
A countable software authorization method of a vehicle-mounted system comprises the following steps that if an authorized file is not deployed at a designated position of the system, whether the authorized file exists in external equipment or not is searched, if the authorized file exists in the external equipment, current equipment hardware fingerprint information is obtained, then a second preset function is called to calculate a second authorized code, whether a first authorized code matched with the second authorized code exists in the authorized file or not is compared, if the first authorized code exists, the matched first authorized code is written into the designated storage position of the system, authorized information is notified to a central control HMI in a broadcasting mode, and a central control image is normally displayed after the central control HMI is started;
if the first authorization code matched with the second authorization code does not exist in the authorization file, the central control HMI is notified, and the equipment needs authorization for reuse;
if the external equipment does not have the authorization file, the central control HMI is informed that the equipment needs authorization for reuse.
Has the advantages that:
1. according to the technical scheme provided by the invention, the authorization codes required by the equipment are deployed to the specific path of the file system in batch when the software is integrated in advance, the traditional authorization mode that the equipment supplier needs to install the software in the equipment and feeds back the information to the software supplier after registering is avoided, and the software supplier generates the authorization code plaintext according to the information and feeds back the authorization code plaintext to the equipment supplier, so that the software authorization is simple and rapid, and the complicated steps are avoided.
2. According to the technical scheme provided by the invention, the hardware fingerprint information of the vehicle-mounted equipment is used for acquiring the hardware characteristic value of the combined user machine, then the machine identifier is constructed according to the preset rule, and the first authorization code is generated, so that the software safety is effectively ensured, and a hacker is prevented from modifying the hardware identifier to cheat the machine to obtain authorization.
3. In the technical scheme provided by the invention, after the system is started, the application service calls the interface of the authorization and authentication library to judge whether the machine is authorized, when the interface of the authorization and authentication library is called, the authorization and authentication library judges the authorization state of the current equipment, and if the equipment is authorized, the authorization and authentication library starts an authorization flow; and automatically starting an authorization process at intervals under the condition that an authorization file is not found. Through the design, once the authorization authentication library detects that the equipment has the authorization file, the authorization authentication library can automatically complete the whole authorization process, and the complicated steps that the traditional authorization mode needs to manually complete authorization are avoided.
4. In the technical scheme provided by the invention, the authorization code can be incrementally generated by the authorization file generated by the authorization tool, and the authorization code generated at the last time can contain the authorization code generated in the past, so that an incremental generation mode is realized, and the information such as the number of authorized equipment can be conveniently counted.
Drawings
The following drawings are only schematic illustrations and explanations of the present invention, and do not limit the scope of the present invention.
Fig. 1 is a schematic diagram illustrating generation of an authorization file including a first authorization code according to an embodiment of the present invention.
Fig. 2 is a flowchart illustrating an authorization file generation process including a first authorization code or a batch authorization code according to an embodiment of the present invention.
Fig. 3 is a schematic diagram illustrating a method for writing an authorization file into a vehicle-mounted device according to an embodiment of the present invention.
Fig. 4 is a schematic diagram illustrating an authorization method of a device to be authorized according to an embodiment of the present invention.
Fig. 5 is a schematic diagram illustrating an authorization method of a central control HMI device according to an embodiment of the present invention.
Detailed Description
For a more clear understanding of the technical features, objects, and effects herein, embodiments of the present invention will now be described with reference to the accompanying drawings, in which like reference numerals refer to like parts throughout. For the sake of simplicity, the drawings are schematic representations of relevant parts of the invention and are not intended to represent actual structures as products. In addition, for simplicity and clarity of understanding, only one of the components having the same structure or function is schematically illustrated or labeled in some of the drawings.
As for the control system, the functional module, application program (APP), is well known to those skilled in the art, and may take any suitable form, either hardware or software, and may be a plurality of functional modules arranged discretely, or a plurality of functional units integrated into one piece of hardware. In its simplest form, the control system may be a controller, such as a combinational logic controller, a micro-programmed controller, or the like, so long as the operations described herein are enabled. Of course, the control system may also be integrated as a different module into one physical device without departing from the basic principle and scope of the invention.
The term "connected" in the present invention may include direct connection, indirect connection, communication connection, and electrical connection, unless otherwise specified.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, values, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, values, steps, operations, elements, components, and/or groups thereof. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items
It should be understood that the term "vehicle" or "vehicular" or other similar terms as used herein generally includes motor vehicles such as passenger automobiles including Sport Utility Vehicles (SUVs), buses, trucks, various commercial vehicles, watercraft including a variety of boats, ships, aircraft, and the like, and includes hybrid vehicles, electric vehicles, plug-in hybrid electric vehicles, hydrogen-powered vehicles, and other alternative fuel vehicles (e.g., fuels derived from non-petroleum sources). As referred to herein, a hybrid vehicle is a vehicle having two or more power sources, such as both gasoline-powered and electric-powered vehicles.
Further, the controller of the present disclosure may be embodied as a non-transitory computer readable medium on a computer readable medium containing executable program instructions executed by a processor, controller, or the like. Examples of computer readable media include, but are not limited to, ROM, RAM, Compact Disc (CD) -ROM, magnetic tape, floppy disk, flash drive, smart card, and optical data storage device. The computer readable recording medium CAN also be distributed over network coupled computer systems so that the computer readable medium is stored and executed in a distributed fashion, such as by a telematics server or Controller Area Network (CAN).
The embodiment provides a countable software authorization method for a vehicle-mounted system, and with reference to fig. 1 to 5, the method specifically includes:
acquiring hardware fingerprint information, and generating an authorization file by an authorization code generation tool according to the hardware fingerprint information;
when the software version is integrated, the authorization file is deployed to a specific position of a file system and written into the vehicle-mounted equipment;
when the vehicle-mounted equipment is started, the application service judges the authorization state of the vehicle-mounted equipment by loading the authorization authentication library and calling an authorization authentication library interface, and executes preset operation according to the authorization state;
the authorization file comprises a single first authorization code or a batch of first authorization codes;
specifically, the hardware fingerprint information may be an ID of a hardware device, and the embedded devices have ID identifiers, such as: the method includes the steps that a CPU ID, an EMMC ID, an MAC ID and the like can be selected as hardware fingerprint information, and the EMMC ID is led into an authorization code generation tool to generate a first authorization code;
in particular, since the hardware ID is not a unique identifier, the modification can be made by software or by modifying the bios of the motherboard.
To prevent human tampering, software authorization is obtained in a disguised manner. The embodiment provides another method, where the embedded devices all have a CPU, an EMMC (internal memory), an MAC (network card), and the like, and according to these hardware devices, one or more of a CPU ID, an EMMC ID, and an MAC ID are selected and spliced into hardware identification information, and if the CPU ID and the EMMC ID are selected, the CPU ID and the EMMC ID are spliced into hardware identification information, and then corresponding characters are extracted from the hardware identification information according to a preset rule to generate hardware fingerprint information, where the preset rule may adopt a function operation, and the function operation adopts a logic operation, and or, xor, or not, and the like.
Specifically, in the prior art, after the unique machine identification code is copied, the authorization code feeds back information to the provider, and the provider provides the information to the user one by one, which is cumbersome. In order to solve the problem, in the embodiment, when the software version is integrated, the vehicle-mounted device includes a plurality of pieces of hardware fingerprint information by querying the hardware fingerprint information of the vehicle-mounted device, in other words, when the device is sold to an end user, when the software is integrated into the device, the hardware fingerprint information is obtained from a device manufacturer in a batch, then the authorization code generation tool is called to generate the authorization file in a batch, and the authorization file in a batch is deployed to a specific position of the file system and written into the vehicle-mounted device.
Specifically, referring to fig. 2 and 3, hardware fingerprint information is collected, the hardware fingerprint information includes single or batch fingerprint information, the hardware fingerprint information is read by an authorization code generation tool, a first preset function is called to generate a single first authorization code or a batch first authorization code according to the hardware fingerprint information, and finally the single authorization code or the batch authorization code or the dynamic product authorization code is packaged into an authorization file.
The authorization file generated by the authorization code generation tool generates the authorization codes in an incremental manner, the authorization file generated at the later time contains the authorization codes generated in the past, and batch authorization codes are generated in an incremental manner.
The authorization code generation tool can be realized by a computer or a special mobile terminal device.
Specifically, when the software version is integrated into the device, the authorization state of the device is controlled by the authorization authentication library;
the authorization authentication library may be an installation package in this embodiment, may be installed in the device through subsequent downloading, or may be integrated into the device in advance.
When the vehicle-mounted device is started, the application services of the vehicle-mounted device, such as AudioService, MediaService, BTService, and wifi service, are installed, and the authorization code authentication library is loaded in sequence, the interface function in the library is called, and whether the current cabin is authorized or not is confirmed.
Specifically, referring to fig. 4, if the device is authorized, the application service continues to complete the startup; if the device is not authorized, the application service is blocked in the authorization authentication library and cannot be started, and the application service is forbidden to provide the service.
When the interface of the authorization authentication library is called, checking whether an authorization file exists in an authorization file deployment position in an operating system, if the authorization file does not exist, sleeping for a preset time, and continuously checking whether the authorization file exists after the sleeping is finished;
if the authorization file exists, reading the file to obtain a first authorization code, obtaining the hardware fingerprint information of the current device, calling a second preset function according to the fingerprint information to calculate a second authorization code, matching the first authorization code with the second authorization code, and if the first authorization code is matched with the second authorization code, continuing to start the service. If not, sleeping for a preset time, and continuously checking whether an authorization file exists after the sleep is finished;
in this embodiment, the second preset function is built in the authorization authentication library, the second preset function may be the same as or different from the first preset function, when the second preset function is the same as the first preset function, the calculated first authorization code is the same as the second authorization code, and the authorization codes are considered to be matched, otherwise, the authorization codes are considered to be unmatched. The first preset function and the second preset function can be hash functions, and authorization codes with equal length and fixed character number can be generated according to the hardware fingerprint information through the hash functions.
In the technical scheme provided by this embodiment, if the first preset function is the same as the second preset function, this manner is relatively simple and low in cost, and only one authorization code generation tool needs to be developed, and the authorization authentication library is the same as the authorization code generation tool, but if the user knows the path of the file system where the authorization code file exists, the user can obtain the hardware fingerprint information through the authorization authentication library to generate the second authorization code, store the second authorization code in the path the same as the specified first authorization file, and call the authorization authentication library again to generate the second authorization code, obviously, the two generated authorization codes are the same. In this way, the device can be used after authorization even if the authorization file is not written. To address this problem, the present invention provides additional embodiments: preferably, the first preset function is different from the second preset function;
the first authorization code generated by the first preset function is different from the second authorization code generated by the second preset function, and the matching verification rule met by the first authorization code and the second authorization code is written in the authorization authentication library in advance;
and then judging whether the first authorization code and the second authorization code meet the matching authentication rule in the authorization authentication library, and if so, authorizing. Otherwise, authorization is denied.
The device provided by the embodiment is mainly applied to vehicles, and particularly, the authorization of the central control HMI connected with the vehicle-mounted device provides services through an authorization authentication service application.
The HMI (human Machine interface) is a human-computer interaction interface and is displayed through a display screen. Specifically, in the embodiment, the HMI is a single device, but since the HMI is only a device with a display interface, an authorization manner such as an in-vehicle device cannot be adopted, and an authorization file is directly written into the HMI. Therefore, in order to solve the problem, the present invention provides another embodiment, in which the authorization authentication service application is provided in the vehicle-mounted device to complete remote authorization, so as to implement local authorization and remote use.
Specifically, after the authorization authentication service application is normally started, whether the current central control HMI is authorized to use or not is detected, if the authorization authentication service application is authorized, the authorized information is notified to the central control HMI in a broadcasting mode, and a central control picture is normally displayed after the central control HMI is started.
After the normal starting of the authorization authentication service application is completed, the current central control HMI is detected to be unauthorized after the start, and the authorization authentication service application continuously executes the following steps:
firstly, an authorization authentication service firstly searches whether an authorization file is deployed at a specified position of a system, if so, acquires the hardware fingerprint information of the current equipment, then calls a second preset function to calculate to obtain a second authorization code, and compares whether a matched first authorization code exists in the authorization file;
if the matched first authorization code exists, the matched first authorization code is written into a system appointed storage position, authorized information is notified to the central control HMI in a broadcasting mode, and the central control HMI normally displays a central control picture after starting is completed;
if not, a message is broadcast to the HMI that the device needs authorization for reuse.
Secondly, if the system does not have a deployed authorization file at the specified position, searching whether the authorization file exists in the external equipment or not, if the authorization file exists in the external equipment, acquiring the hardware fingerprint information of the current equipment, calling a second preset function to calculate to obtain a second authorization code, comparing whether a first authorization code matched with the second authorization code exists in the authorization file or not, if so, writing the matched first authorization code into the specified storage position of the system, notifying the authorized information to the central control HMI in a broadcasting mode, and normally displaying a central control picture after the central control HMI is started;
if the first authorization code matched with the second authorization code does not exist in the authorization file, the central control HMI is notified, and the equipment needs authorization for reuse;
if there are no authorization files in the USB, the HMI is notified that the device needs authorization for reuse.
Through the design, once the authorization authentication library detects that the equipment or the external equipment has the authorization file, the authorization authentication library can automatically complete the whole authorization process, so that the complicated steps that the traditional authorization mode needs to manually complete authorization are avoided;
the authorization code is generated in an incremental manner through the authorization file generated by the authorization tool, which is equivalent to the authorization code generated at the last time including the authorization code generated in the past, so that an incremental manner is realized, and statistics of information such as the number of authorized devices is facilitated.
What has been described above is only a preferred embodiment of the present invention, and the present invention is not limited to the above examples. It is clear to those skilled in the art that the form in this embodiment is not limited thereto, and the adjustable manner is not limited thereto. It is to be understood that other modifications and variations, which may be directly derived or suggested to one skilled in the art without departing from the basic concept of the invention, are to be considered as included within the scope of the invention.

Claims (10)

1. A countable software authorization method for a vehicle-mounted system is characterized by at least comprising the following steps:
acquiring hardware fingerprint information, and generating an authorization file by an authorization code generation tool according to the hardware fingerprint information, wherein the authorization file comprises a single first authorization code or a batch of first authorization codes; when the software version is integrated, the authorization file is deployed to a specific position of a file system and written into the vehicle-mounted equipment;
when the vehicle-mounted equipment is started, the application service judges the authorization state of the vehicle-mounted equipment by loading the authorization authentication library and calling an authorization authentication library interface, and executes preset operation according to the authorization state.
2. The countable software authorization method of the vehicle-mounted system according to claim 1, characterized in that one or more of the CPUID, EMMCID and MACID of the vehicle-mounted device are obtained and spliced into hardware identification information, and corresponding characters are extracted from the hardware identification information according to preset rules to generate hardware fingerprint information;
the hardware fingerprint information comprises information provided by one or more vehicle-mounted devices.
3. The countable software authorization method for the vehicle-mounted system according to claim 1, wherein the authorization file generation method comprises the following steps:
an authorization code generation tool reads hardware fingerprint information;
and the authorization code generation tool calls a first preset function to generate a first authorization code and packages the first authorization code into an authorization file.
4. The on-board system countable software authorization method of claim 1, wherein if the device is authorized, the application service continues to finish starting; if the device is not authorized, the application service is blocked in the authorization authentication library and cannot be started, and the application service is forbidden to provide the service.
5. The countable software authorization method for the vehicle-mounted system as claimed in claim 1, wherein when the authorization authentication library interface is called, whether the authorization file exists in the deployment position of the authorization file in the operating system is checked, if the authorization file does not exist, the sleep is performed for a preset time, and after the sleep is finished, whether the authorization file exists is continuously checked.
6. The countable software authorization method for the vehicle-mounted system according to claim 5, characterized in that if the authorization file exists, the fingerprint information of the current machine hardware is obtained, then a second preset function is called to obtain a second authorization code, the authorization file is read from a specific position of the file system, and the first authorization code is obtained;
judging whether the first authorization code is matched with the second authorization code;
if the matching is carried out, the interface of the authorization authentication library returns True, and the calling of the interface of the authorization authentication library is finished;
if not, sleeping for a preset time, and continuing to detect from the beginning after the sleep is finished.
7. The method for authorizing software countable by an on-board system as recited in claim 1, further comprising: and authorizing the central control HMI connected with the vehicle-mounted equipment, wherein the authorization of the central control HMI provides services through an authorization authentication service application.
8. The countable software authorization method for the vehicle-mounted system as claimed in claim 7, wherein after the normal start of the authorization authentication service application is completed, whether the current central control HMI is authorized or not is detected, if the authorization authentication service application is authorized, the authorized information is notified to the central control HMI in a broadcasting mode, and after the start of the central control HMI is completed, the central control image is normally displayed.
9. The countable software authorization method for the vehicle-mounted system according to claim 7, wherein after the normal start of the authorization authentication service application is completed, the central control HMI is detected to be unauthorized after the normal start, and the authorization authentication service application continuously executes the following steps:
firstly, an authorization authentication service application firstly searches whether an authorization file is deployed at a specified position of a system, if so, acquires the hardware fingerprint information of the current equipment, then calls a second preset function to calculate to obtain a second authorization code, and compares whether a matched first authorization code exists in the authorization file;
if the matched first authorization code exists, the matched first authorization code is written into a system appointed storage position, authorized information is notified to the central control HMI in a broadcasting mode, and the central control HMI normally displays a central control picture after starting is completed;
if not, a message is broadcast to the central HMI and the device needs authorization for reuse.
10. The countable software authorization method of the vehicle-mounted system according to claim 9, characterized in that, in the second step, if there is no deployed authorization file in the designated location of the system, it finds out whether there is an authorization file in the external device, if there is an authorization file in the external device, it obtains the hardware fingerprint information of the current device, then calls a second preset function to calculate and obtain a second authorization code, compares whether there is a first authorization code matching with the second authorization code in the authorization file, if there is, writes the matching first authorization code into the designated storage location of the system, and then notifies the authorized information to the central control HMI through broadcasting, and after the start of the central control HMI is completed, it normally displays the central control image;
if the first authorization code matched with the second authorization code does not exist in the authorization file, the central control HMI is notified, and the equipment needs authorization for reuse;
if the external equipment does not have the authorization file, the central control HMI is informed that the equipment needs authorization for reuse.
CN202110607343.4A 2021-06-01 2021-06-01 Countable software authorization method for vehicle-mounted system Active CN113536241B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110607343.4A CN113536241B (en) 2021-06-01 2021-06-01 Countable software authorization method for vehicle-mounted system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110607343.4A CN113536241B (en) 2021-06-01 2021-06-01 Countable software authorization method for vehicle-mounted system

Publications (2)

Publication Number Publication Date
CN113536241A true CN113536241A (en) 2021-10-22
CN113536241B CN113536241B (en) 2024-05-28

Family

ID=78124545

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110607343.4A Active CN113536241B (en) 2021-06-01 2021-06-01 Countable software authorization method for vehicle-mounted system

Country Status (1)

Country Link
CN (1) CN113536241B (en)

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090249065A1 (en) * 2008-03-04 2009-10-01 Apple Inc. System and method of authorizing execution of software code based on at least one installed profile
CN102016866A (en) * 2008-03-04 2011-04-13 苹果公司 System and method of authorizing execution of software code in a device based on entitlements granted to a carrier
CN103929670A (en) * 2014-04-30 2014-07-16 深圳市九洲电器有限公司 Set top box programming method and system
CN104811322A (en) * 2013-12-17 2015-07-29 深圳市伊爱高新技术开发有限公司 Method for remotely upgrading GPS vehicle-mounted terminals in batch mode
CN105512519A (en) * 2015-11-30 2016-04-20 北大方正集团有限公司 Digital resource copyright protection method, opening method and device, and hardware storage device
CN107065630A (en) * 2017-06-06 2017-08-18 鲁毅 A kind of power equipment case opened by centralized control system mandate and control method
CN109960900A (en) * 2019-03-29 2019-07-02 富士施乐实业发展(中国)有限公司 A kind of registration code generating method and system
CN110032834A (en) * 2018-01-12 2019-07-19 厦门雅迅网络股份有限公司 System authorization control method, terminal device and storage medium
CN111159657A (en) * 2019-11-22 2020-05-15 深圳智链物联科技有限公司 Application program authentication method and system
CN111222104A (en) * 2019-12-31 2020-06-02 苏州思必驰信息科技有限公司 Method, device and system for authorizing embedded device by using hardware dongle
CN111274553A (en) * 2020-01-20 2020-06-12 深圳市米勒沙容达汽车科技有限公司 Automatic software authorization method and system, server and terminal equipment
CN111475795A (en) * 2020-04-12 2020-07-31 广州通达汽车电气股份有限公司 Method and device for unified authentication and authorization facing to multiple applications
CN112463720A (en) * 2020-12-18 2021-03-09 中国计量大学上虞高等研究院有限公司 Online protection system and online protection method of embedded SoC software
CN112632484A (en) * 2020-12-28 2021-04-09 深圳创维-Rgb电子有限公司 Software authorization method and device and computer equipment
CN112685698A (en) * 2020-12-07 2021-04-20 湖南麒麟信安科技股份有限公司 Software authorization method and system based on USB Key
CN112861103A (en) * 2021-03-13 2021-05-28 辛巴网络科技(南京)有限公司 Vehicle-mounted multi-terminal equipment unified account gateway login authentication method

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090249065A1 (en) * 2008-03-04 2009-10-01 Apple Inc. System and method of authorizing execution of software code based on at least one installed profile
CN102016866A (en) * 2008-03-04 2011-04-13 苹果公司 System and method of authorizing execution of software code in a device based on entitlements granted to a carrier
CN104811322A (en) * 2013-12-17 2015-07-29 深圳市伊爱高新技术开发有限公司 Method for remotely upgrading GPS vehicle-mounted terminals in batch mode
CN103929670A (en) * 2014-04-30 2014-07-16 深圳市九洲电器有限公司 Set top box programming method and system
CN105512519A (en) * 2015-11-30 2016-04-20 北大方正集团有限公司 Digital resource copyright protection method, opening method and device, and hardware storage device
CN107065630A (en) * 2017-06-06 2017-08-18 鲁毅 A kind of power equipment case opened by centralized control system mandate and control method
CN110032834A (en) * 2018-01-12 2019-07-19 厦门雅迅网络股份有限公司 System authorization control method, terminal device and storage medium
CN109960900A (en) * 2019-03-29 2019-07-02 富士施乐实业发展(中国)有限公司 A kind of registration code generating method and system
CN111159657A (en) * 2019-11-22 2020-05-15 深圳智链物联科技有限公司 Application program authentication method and system
CN111222104A (en) * 2019-12-31 2020-06-02 苏州思必驰信息科技有限公司 Method, device and system for authorizing embedded device by using hardware dongle
CN111274553A (en) * 2020-01-20 2020-06-12 深圳市米勒沙容达汽车科技有限公司 Automatic software authorization method and system, server and terminal equipment
CN111475795A (en) * 2020-04-12 2020-07-31 广州通达汽车电气股份有限公司 Method and device for unified authentication and authorization facing to multiple applications
CN112685698A (en) * 2020-12-07 2021-04-20 湖南麒麟信安科技股份有限公司 Software authorization method and system based on USB Key
CN112463720A (en) * 2020-12-18 2021-03-09 中国计量大学上虞高等研究院有限公司 Online protection system and online protection method of embedded SoC software
CN112632484A (en) * 2020-12-28 2021-04-09 深圳创维-Rgb电子有限公司 Software authorization method and device and computer equipment
CN112861103A (en) * 2021-03-13 2021-05-28 辛巴网络科技(南京)有限公司 Vehicle-mounted multi-terminal equipment unified account gateway login authentication method

Also Published As

Publication number Publication date
CN113536241B (en) 2024-05-28

Similar Documents

Publication Publication Date Title
CN110071904B (en) Detection method and system of vehicle-mounted terminal, server and storage medium
CN105589719A (en) System for remotely upgrading full vehicle-mounted controller softwares and upgrading method thereof
CN111708584A (en) Vehicle diagnosis method and device, diagnosis equipment and storage medium
CN113282072A (en) Vehicle remote diagnosis method, device, storage medium and system
CN105573787A (en) Software upgrade method and device based on vehicular T-Box
CN108303268B (en) Configuration method and device of automobile diagnosis function and automobile diagnosis equipment
US20220277599A1 (en) Supplementing Vehicle Service Content with Scan Tool Initialization Links
CN113335208A (en) Reverse image offline configuration method and system, storage medium and computer equipment
CN111931160B (en) Authority verification method, authority verification device, terminal and storage medium
US20020042878A1 (en) Data transmission method
CN109977039A (en) HD encryption method for storing cipher key, device, equipment and readable storage medium storing program for executing
CN112232464A (en) Vehicle-mounted terminal and vehicle authentication method thereof
CN112346904A (en) Smart electric meter calibration method and device, smart electric meter and storage medium
CN112738046A (en) One-key login method, terminal and system server
US20200184744A1 (en) Vehicle Scan Tool Configured to Receive Automated Initialization Requests
CN108241798B (en) Method, device and system for preventing machine refreshing
CN113536241B (en) Countable software authorization method for vehicle-mounted system
CN113254047A (en) Vehicle configuration upgrading method, vehicle-mounted terminal, server, vehicle and medium
CN109699030B (en) Unmanned aerial vehicle authentication method, device, equipment and computer readable storage medium
CN114115170B (en) Method and device for determining vehicle configuration module and after-sale diagnostic instrument
CN107872786B (en) Control method and smart card
US11544051B2 (en) Vehicle update system and method
CN110784767B (en) Television license code writing method and device
CN114281065A (en) Electronic control unit flashing method and device for vehicle and diagnostic equipment
CN113806131A (en) Access control method and device for fault code library, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant