CN113778489B - Method and system for supporting non-stop OTA from hardware level - Google Patents
Method and system for supporting non-stop OTA from hardware level Download PDFInfo
- Publication number
- CN113778489B CN113778489B CN202111075849.1A CN202111075849A CN113778489B CN 113778489 B CN113778489 B CN 113778489B CN 202111075849 A CN202111075849 A CN 202111075849A CN 113778489 B CN113778489 B CN 113778489B
- Authority
- CN
- China
- Prior art keywords
- firmware
- memory bank
- firmware program
- version
- ota
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 40
- 238000012795 verification Methods 0.000 claims abstract description 27
- 230000004048 modification Effects 0.000 claims description 7
- 238000012986 modification Methods 0.000 claims description 7
- 230000008569 process Effects 0.000 abstract description 15
- 230000006870 function Effects 0.000 abstract description 12
- 238000010586 diagram Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000007547 defect Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
Abstract
The application relates to a method and a system for supporting a non-stop OTA from a hardware level. The method has the advantages that the current version firmware program and the updated version firmware program are respectively stored through two different storage bodies, the read/write operation of the running current version firmware program and the updated version firmware program are mutually independent, the conflict of the read/write process can be effectively avoided, the non-stop OTA is supported from the hardware level, meanwhile, the hardware cryptographic engine module supports the full hardware implementation of the national cryptographic algorithm core operation and the full hardware implementation of the international algorithm core operation, and the protection measure against the side channel attack is realized. In addition, the functions of legality authentication, firmware program decryption and firmware program integrity verification are realized by calling the hardware cryptographic engine through the bottom-layer driver, and high security of the OTA process of the vehicle-mounted chip is ensured.
Description
Technical Field
The application relates to the technical field of vehicle-mounted chips, in particular to a method and a system for supporting a non-stop OTA from a hardware level.
Background
Over The Air (OTA) technology, in particular, enables remote management of software through a mobile communication interface. In the field of Internet of vehicles, more and more importance is attached to whether a vehicle-mounted ECU can remotely upgrade firmware and the safety of an upgrade process, and the vehicle-mounted ECU relates to various large-function fields of the whole vehicle, such as links of a central control screen, battery management, power control and the like. The key role of OTA is to repair systematic defects existing in the car itself, and the car manufacturer can quickly process the car anywhere without recalling the car, including pushing new functions to the car or improving performance parameters. The vehicle-mounted chip OTA ensures the information safety in the firmware upgrading process and also ensures the functional safety in the upgrading time period.
The OTA with high-level information security and high reliability is supported by a hardware technology of a bottom layer of a vehicle-mounted chip, and the main stream vehicle-mounted chip which is applied on a large scale at present still mostly adopts a mode of parking OTA, so that the OTA is difficult to effectively support without parking, and the information security is ensured by adopting a security scheme of a software layer, so that the security level which can be achieved is not high.
Disclosure of Invention
In view of the foregoing, it is necessary to provide a method and a system capable of supporting the non-stop OTA from the hardware level and providing the information security technical support from the hardware level, so as to ensure the high security of the OTA process of the on-vehicle chip.
A system for supporting an over-the-air OTA from a hardware level, the system comprising: the device comprises a secure storage unit module, a hardware password engine module and a bottom layer driver module;
the safe memory unit module comprises two or more single-port memory banks or one or more multi-port memory banks; the different memory areas of the multi-port memory bank or the single-port memory bank are used for forming a first memory bank and a second memory bank; the first storage body is used for storing a current version firmware program; the second storage body is used for storing firmware programs of the upgrade version;
the hardware cipher engine module is used for carrying out validity authentication, firmware program decryption and firmware program integrity verification on the firmware program of the upgrade version;
the bottom layer driver module is used for driving the hardware cryptographic engine module and the secure storage unit module.
In one embodiment, the system further comprises a kernel; the kernel is used for coordinating software and hardware resources related to the secure storage unit, the hardware cryptographic engine module and the bottom layer driver module, and is an independent kernel or a kernel shared by other subsystems of the vehicle-mounted chip.
In one embodiment, the system further comprises a read-write control circuit; the read-write control circuit is used for realizing memory encryption and memory read-write access control in the safe memory unit module in cooperation with the bottom driving module.
In one embodiment, when the secure memory unit module adopts two or more single-port memory banks, one single-port memory bank is used for storing the firmware program of the current version, and the other single-port memory bank is used for storing the firmware program of the updated version;
when the secure memory unit module adopts one or more multi-port memory banks, two different memory areas of one multi-port memory bank are used for respectively storing the current version firmware program and the updated version firmware program.
A method for supporting a no-parking OTA from a hardware level, the method comprising:
acquiring firmware upgrading information of a vehicle-mounted chip; the firmware upgrade information comprises an upgrade version firmware program;
the firmware version number information, the file source information and the available space size information of a storage body in the safe storage unit module of the firmware program of the upgrade version are obtained through a bottom layer driver module; the safe memory unit module comprises two or more single-port memory banks or one or more multi-port memory banks; the different memory areas of the multi-port memory bank or the single-port memory bank are used for forming a first memory bank and a second memory bank;
identifying the firmware version number information and authenticating the file source information through a hardware password engine module, and judging whether to upgrade the firmware according to the firmware version number information, the verification result of the file source information and the space size information;
if the firmware is upgraded, writing the firmware program with the upgraded version into the second storage body;
and after the upgrading is finished and the verification is passed, switching the main program entry address of the vehicle-mounted chip through the bottom layer driver module to finish the non-stop OTA.
In one embodiment, the method further comprises: if the firmware is upgraded, writing the firmware program with the upgraded version into the second storage body;
if the firmware is not updated, the writing operation of the firmware program of the updated version and the modification of the main program entry address of the vehicle-mounted chip are not performed.
In one embodiment, the method further comprises: carrying out the integrity verification of the firmware program of the upgrade version by calculating and comparing whether the hash value of the firmware program file packet of the upgrade version is matched with a preset value;
and if the verification is passed, switching the main program entry address of the vehicle-mounted chip by the bottom layer driver module to finish the non-stop OTA.
In one embodiment, the method further comprises: after the upgrading is completed and the verification is passed, switching the main program entry address of the vehicle-mounted chip through the bottom layer driver module to complete the non-stop OTA;
the upgrade is not completed or the verification is not passed, and the modification of the main program entry address of the vehicle-mounted chip is not performed.
According to the method and the system for supporting the non-stop OTA from the hardware level, the current version firmware program and the updated version firmware program are respectively stored through the two different storage bodies, and the read/write operation of the running current version firmware program and the updated version firmware program are mutually independent, so that the collision of the read/write process can be effectively avoided, the non-stop OTA is supported from the hardware level, meanwhile, the hardware cryptographic engine module supports the full hardware implementation of the national cryptographic algorithm core operation and the full hardware implementation of the international algorithm core operation, and the protection measure for resisting the side channel attack is realized. In addition, the functions of legality authentication, firmware program decryption and firmware program integrity verification are realized by calling the hardware cryptographic engine through the bottom-layer driver, and high security of the OTA process of the vehicle-mounted chip is ensured.
Drawings
FIG. 1 is a schematic diagram of an OTA system of a vehicle-mounted chip in one embodiment;
FIG. 2 is a flow diagram of a method for supporting a non-stop OTA from a hardware level provided in one embodiment;
fig. 3 is a general flow diagram of performing OTA operations in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
A system for supporting an over-the-air OTA from a hardware level, the system comprising: the device comprises a secure storage unit module, a hardware password engine module and a bottom layer driver module;
the safe memory unit module comprises two or more single-port memory banks or one or more multi-port memory banks; the different memory areas of the multiport memory bank or the single-port memory bank are used for forming a first memory bank and a second memory bank; the first memory bank is used for storing the firmware program of the current version; the second memory bank is used for storing firmware program of upgrade version;
the hardware cipher engine module is used for carrying out validity authentication, firmware program decryption and firmware program integrity verification on the firmware program of the updated version;
the bottom layer driver module is used for driving the hardware cryptographic engine module and the secure storage unit module.
In one embodiment, as shown in fig. 1, the OTA function subsystem at the vehicle-mounted chip end includes a secure storage unit, a hardware cryptographic engine, a bottom driver, and a kernel. The safe memory unit of the chip adopts two or more single-port memory banks or one or more multi-port memory banks, and the matched control circuit supports memory encryption and memory read-write access control. The chip has a hardware cryptographic engine, and the functions of legality authentication, firmware program decryption and firmware program integrity verification on the newly upgraded firmware are realized by calling the engine in the bottom-layer driver. The bottom layer driver of the chip realizes that the previous version is reversed when the new firmware is not successfully upgraded, and the bottom layer driver also realizes a mechanism for preventing the firmware version from being degraded. The OTA function subsystem of the chip adopts a kernel shared by other function subsystems, or can adopt an independent kernel, and the kernel is used for uniformly managing related software and hardware resources of the OTA function subsystem of the vehicle-mounted chip so as to coordinate a safe storage unit, a hardware password engine module, a bottom layer driver module and the like to realize complete OTA functions.
The prior art is mainly based on a single-port memory bank (such as single-port Flash), the read/write operation of running the firmware program of the current version and the firmware program of the updated version are not independent, the conflict of the read/write process is difficult to avoid, and meanwhile, the information security is ensured by adopting a security scheme of a software layer, so that the security level is not high.
The invention respectively stores the firmware of the current version and the firmware of the new upgrade by adding two or more single-port memory banks at the vehicle-mounted chip end, or divides a multi-port memory bank into two different memory areas at the logic level by a read-write control circuit and a bottom layer driver by adding one or more multi-port memory banks at the vehicle-mounted chip end. When two or more single-port memory banks are adopted, the respective read/write operations of the memory bank of the current version program and the memory bank storing the new upgrade firmware are mutually independent, and the multi-port memory bank supports simultaneous read/write operations, so that the collision of the read/write processes can be effectively avoided, and the non-stop OTA is supported from the hardware level. Whether two single-port memory banks or one multi-port memory bank are adopted, the memory banks can be abstracted into a logic memory bank through a read-write control circuit and a bottom layer driver, and when the chip is applied to a scene in which OTA (over the air) function is not required to be supported, the memory bank resources of the chip can be fully utilized.
The hardware cipher engine in the invention supports the full hardware realization of the core operation of the national cipher algorithm, and also supports the full hardware realization of the core operation of the international algorithm, and the algorithms realize the protection measures against the side channel attack. And the functions of legality authentication, firmware program decryption and firmware program integrity verification on the newly upgraded firmware are realized by calling the engine in the bottom-layer driver, information security technical support is provided from the hardware level, and the high security of the OTA process of the vehicle-mounted chip is ensured.
In one embodiment, as shown in fig. 2, a method for supporting a non-stop OTA from a hardware level is provided, where the method includes:
step 202, obtaining firmware upgrade information of the vehicle-mounted chip.
The firmware upgrade information includes an upgrade version firmware program.
And 204, obtaining firmware version number information, file source information of the firmware program of the updated version and available space size information of a storage body in the safe storage unit module through the bottom layer driver module.
The safe memory unit module comprises two or more single-port memory banks or one or more multi-port memory banks; the different memory areas of the multiport memory bank or the single-port memory bank are used for forming a first memory bank and a second memory bank; the first memory bank is used for storing the firmware program of the current version; the second memory bank is used for storing the firmware program of the upgrade version.
Step 206, identifying the firmware version number information and the authentication file source information by the hardware password engine module, and judging whether to upgrade the firmware according to the verification result of the firmware version number information and the file source information and the space size information.
Step 208, if the firmware is updated, writing the updated version of the firmware program into the second memory bank.
Step 210, after the upgrade is completed and the verification is passed, the primary program entry address of the vehicle-mounted chip is switched through the bottom layer driver module, so as to complete the non-stop OTA.
According to the method and the system for supporting the non-stop OTA from the hardware level, the current version firmware program and the updated version firmware program are respectively stored through the two different storage bodies, and the read/write operation of the running current version firmware program and the updated version firmware program are mutually independent, so that the collision of the read/write process can be effectively avoided, the non-stop OTA is supported from the hardware level, meanwhile, the hardware cryptographic engine module supports the full hardware implementation of the national cryptographic algorithm core operation and the full hardware implementation of the international algorithm core operation, and the protection measure for resisting the side channel attack is realized. In addition, the functions of legality authentication, firmware program decryption and firmware program integrity verification are realized by calling the hardware cryptographic engine through the bottom-layer driver, and high security of the OTA process of the vehicle-mounted chip is ensured.
It should be understood that, although the steps in the flowchart of fig. 2 are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in fig. 2 may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor do the order in which the sub-steps or stages are performed necessarily performed in sequence, but may be performed alternately or alternately with at least a portion of the sub-steps or stages of other steps or other steps.
In one embodiment, the method further comprises: if the firmware is upgraded, writing the firmware program with the upgraded version into the second storage body; if the firmware is not updated, the writing operation of the firmware program of the updated version and the modification of the main program entry address of the vehicle-mounted chip are not performed.
Specifically, assuming that there are a memory bank a and a memory bank B, if the current version firmware program is stored in the memory bank a, writing the updated version firmware program into the memory bank B; if the current version of the firmware program is stored in the memory bank B, the updated version of the firmware program is written into the memory bank A.
In one embodiment, the method further comprises: carrying out the integrity verification of the firmware program of the upgrade version by calculating and comparing whether the hash value of the firmware program file packet of the upgrade version is matched with a preset value; if the verification is passed, the primary program entry address of the vehicle-mounted chip is switched through the bottom layer driver module, and the non-stop OTA is completed.
In one embodiment, the method further comprises: after the upgrading is finished and the verification is passed, switching the main program entry address of the vehicle-mounted chip through the bottom layer driver module to finish the non-stop OTA; the upgrade is not completed or the verification is not passed, and the modification of the main program entry address of the vehicle-mounted chip is not performed.
In a specific embodiment, as shown in fig. 3, an OTA procedure is provided, including:
1. the vehicle-mounted chip runs a firmware program of the current V1.0 version;
2. the vehicle-mounted chip receives the upgrading instruction and prepares to upgrade the current firmware to the V1.1 version;
3. the firmware program at the bottom layer of the chip judges whether the firmware program has upgrading conditions, such as identifying whether the version number of the firmware to be upgraded is compliant, authenticating the source legitimacy of the firmware, whether the space size of a storage body is enough, and the like;
4. the upgrade process is executed (the upgrade process can be in a non-stop state), firstly, the program file package is received, and the integrity is confirmed after the reception is finished, for example, whether the hash values of the program file package are matched or not is calculated and compared;
5. switching the main program entry address, namely updating the starting vector table;
6. and (4) powering up again, starting from the new program to execute, and executing the V1.1 version firmware program.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples merely represent a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the invention. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application is to be determined by the claims appended hereto.
Claims (8)
1. A system for supporting an over-the-air OTA from a hardware level, the system comprising: the device comprises a secure storage unit module, a hardware password engine module and a bottom layer driver module;
the safe memory unit module comprises two or more single-port memory banks or one or more multi-port memory banks; the different memory areas of the multi-port memory bank or the single-port memory bank are used for forming a first memory bank and a second memory bank; the first storage body is used for storing a current version firmware program; the second storage body is used for storing firmware programs of the upgrade version; when the safe memory unit module adopts two or more single-port memory banks, one single-port memory bank is used as the first memory bank, and the other single-port memory bank is used as the second memory bank; when the safety memory unit module adopts one or more multi-port memory banks, two different memory areas of one multi-port memory bank are respectively used as the first memory bank and the second memory bank; the read/write operations of the first memory bank and the second memory bank are independent of each other;
the hardware cipher engine module is used for carrying out validity authentication, firmware program decryption and firmware program integrity verification on the firmware program of the upgrade version;
the bottom layer driver module is used for driving the hardware cryptographic engine module and the secure storage unit module.
2. The system of claim 1, wherein the system further comprises a kernel; the kernel is used for coordinating software and hardware resources related to the secure storage unit, the hardware cryptographic engine module and the bottom layer driver module.
3. The system of claim 2, wherein the kernel is a stand-alone kernel or a kernel shared with other subsystems of the on-board chip.
4. The system of claim 3, further comprising a read-write control circuit; the read-write control circuit is used for realizing memory encryption and memory read-write access control in the safe memory unit module in cooperation with the bottom driving module.
5. A method for supporting a no-parking OTA from a hardware level, the method comprising:
acquiring firmware upgrading information of a vehicle-mounted chip; the firmware upgrade information comprises an upgrade version firmware program;
the firmware version number information, the file source information and the available space size information of a storage body in the safe storage unit module of the firmware program of the upgrade version are obtained through a bottom layer driver module; the safe memory unit module comprises two or more single-port memory banks or one or more multi-port memory banks; the different memory areas of the multi-port memory bank or the single-port memory bank are used for forming a first memory bank and a second memory bank; the first storage body is used for storing a current version firmware program; the second storage body is used for storing firmware programs of the upgrade version; when the safe memory unit module adopts two or more single-port memory banks, one single-port memory bank is used as the first memory bank, and the other single-port memory bank is used as the second memory bank; when the safety memory unit module adopts one or more multi-port memory banks, two different memory areas of one multi-port memory bank are respectively used as the first memory bank and the second memory bank; the read/write operations of the first memory bank and the second memory bank are independent of each other;
identifying the firmware version number information and authenticating the file source information through a hardware password engine module, and judging whether to upgrade the firmware according to the firmware version number information, the verification result of the file source information and the space size information;
if the firmware is upgraded, writing the firmware program with the upgraded version into the second storage body;
and after the upgrading is finished and the verification is passed, switching the main program entry address of the vehicle-mounted chip through the bottom layer driver module to finish the non-stop OTA.
6. The method of claim 5, wherein writing the upgraded version of the firmware program to the second memory bank if a firmware upgrade is performed, further comprising:
if the firmware is upgraded, writing the firmware program with the upgraded version into the second storage body;
if the firmware is not updated, the writing operation of the firmware program of the updated version and the modification of the main program entry address of the vehicle-mounted chip are not performed.
7. The method of claim 6, wherein after the upgrade is completed and the verification is passed, switching the main program entry address of the on-board chip through the bottom driver module to complete the on-board OTA, comprising:
calculating and comparing whether the hash value of the firmware program file packet of the upgrade version is matched with a preset value, and verifying the integrity of the firmware program of the upgrade version through the hardware cryptographic engine module;
and if the verification is passed, switching the main program entry address of the vehicle-mounted chip by the bottom layer driver module to finish the non-stop OTA.
8. The method of claim 7, wherein after the upgrade is completed and the verification is passed, switching the main program entry address of the on-board chip through the bottom driver module to complete the on-board OTA, comprising:
after the upgrading is completed and the verification is passed, switching the main program entry address of the vehicle-mounted chip through the bottom layer driver module to complete the non-stop OTA;
the upgrade is not completed or the verification is not passed, and the modification of the main program entry address of the vehicle-mounted chip is not performed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111075849.1A CN113778489B (en) | 2021-09-14 | 2021-09-14 | Method and system for supporting non-stop OTA from hardware level |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111075849.1A CN113778489B (en) | 2021-09-14 | 2021-09-14 | Method and system for supporting non-stop OTA from hardware level |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113778489A CN113778489A (en) | 2021-12-10 |
CN113778489B true CN113778489B (en) | 2024-01-30 |
Family
ID=78843784
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111075849.1A Active CN113778489B (en) | 2021-09-14 | 2021-09-14 | Method and system for supporting non-stop OTA from hardware level |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113778489B (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109697081A (en) * | 2018-12-19 | 2019-04-30 | 广州小鹏汽车科技有限公司 | Firmware security upgrading method, device, onboard system and vehicle |
CN110233906A (en) * | 2019-07-19 | 2019-09-13 | 上海擎感智能科技有限公司 | A kind of OTA Engine Version update method and system, storage medium and OTA terminal |
CN110351314A (en) * | 2018-04-03 | 2019-10-18 | 厦门雅迅网络股份有限公司 | The remote upgrade method and computer readable storage medium of automobile controller |
CN111045714A (en) * | 2019-12-19 | 2020-04-21 | 歌尔股份有限公司 | Firmware updating method and device, earphone and computer readable storage medium |
CN111562935A (en) * | 2020-07-14 | 2020-08-21 | 江苏海平面数据科技有限公司 | OTA security upgrading system and upgrading method thereof |
CN112035152A (en) * | 2020-08-24 | 2020-12-04 | 成都三零嘉微电子有限公司 | Secure processing system and method for SoC chip firmware upgrade |
CN112148326A (en) * | 2020-08-31 | 2020-12-29 | 山东省科学院自动化研究所 | Remote updating method, device and system for Internet of things equipment firmware |
CN113225729A (en) * | 2020-01-21 | 2021-08-06 | 荣耀终端有限公司 | OTA (over the air) upgrading method and device and readable storage medium |
-
2021
- 2021-09-14 CN CN202111075849.1A patent/CN113778489B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110351314A (en) * | 2018-04-03 | 2019-10-18 | 厦门雅迅网络股份有限公司 | The remote upgrade method and computer readable storage medium of automobile controller |
CN109697081A (en) * | 2018-12-19 | 2019-04-30 | 广州小鹏汽车科技有限公司 | Firmware security upgrading method, device, onboard system and vehicle |
CN110233906A (en) * | 2019-07-19 | 2019-09-13 | 上海擎感智能科技有限公司 | A kind of OTA Engine Version update method and system, storage medium and OTA terminal |
CN111045714A (en) * | 2019-12-19 | 2020-04-21 | 歌尔股份有限公司 | Firmware updating method and device, earphone and computer readable storage medium |
WO2021120327A1 (en) * | 2019-12-19 | 2021-06-24 | 歌尔股份有限公司 | Firmware updating method and apparatus, and headset and computer readable storage medium |
CN113225729A (en) * | 2020-01-21 | 2021-08-06 | 荣耀终端有限公司 | OTA (over the air) upgrading method and device and readable storage medium |
CN111562935A (en) * | 2020-07-14 | 2020-08-21 | 江苏海平面数据科技有限公司 | OTA security upgrading system and upgrading method thereof |
CN112035152A (en) * | 2020-08-24 | 2020-12-04 | 成都三零嘉微电子有限公司 | Secure processing system and method for SoC chip firmware upgrade |
CN112148326A (en) * | 2020-08-31 | 2020-12-29 | 山东省科学院自动化研究所 | Remote updating method, device and system for Internet of things equipment firmware |
Also Published As
Publication number | Publication date |
---|---|
CN113778489A (en) | 2021-12-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107113167B (en) | Management device, key generation device, vehicle, maintenance tool, management system, management method, and computer program | |
EP3889766A1 (en) | Secure firmware upgrade method, device, on-board system, and vehicle | |
US10706646B2 (en) | Vehicle diagnostic device and method of managing certificate thereof | |
JP6228093B2 (en) | system | |
CN107409045B (en) | Management device, management method, and storage medium | |
US10423401B2 (en) | Method for updating software of a control device of a vehicle | |
JP6190443B2 (en) | In-vehicle computer system, vehicle, management method, and computer program | |
US11182485B2 (en) | In-vehicle apparatus for efficient reprogramming and controlling method thereof | |
US9787677B2 (en) | Method of authenticating can packets using mixture of MACs and apparatus for implementing the same | |
CN113709695B (en) | Authorization method and system for vehicle use | |
CN113805908A (en) | Firmware update system and method | |
CN101923476A (en) | File installation system and file installation method | |
CN111508110B (en) | Method and device for realizing remote locking of vehicle | |
CN113268742A (en) | Data authorization method and device and electronic equipment | |
US9298949B2 (en) | Method for programming a mobile end device chip | |
US20120330498A1 (en) | Secure data store for vehicle networks | |
US9336410B2 (en) | Nonvolatile memory internal signature generation | |
KR101806719B1 (en) | The electronic control unit possible auto setting of memory area according to secure boot and method for secure boot using the same | |
JP2019020872A (en) | Electronic control apparatus and program falsification detection method | |
CN113778489B (en) | Method and system for supporting non-stop OTA from hardware level | |
JP2018042256A (en) | System and management method | |
Freiwald et al. | Safe and secure software updates over the air for electronic brake control systems | |
Steurich et al. | Feasibility study for a secure and seamless integration of over the air software update capability in an advanced board net architecture | |
CN114756827A (en) | License file management method, device and equipment | |
CN111142902A (en) | Upgraded firmware protection method and device for processor and vehicle |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |