CN113778489B - Method and system for supporting non-stop OTA from hardware level - Google Patents

Method and system for supporting non-stop OTA from hardware level Download PDF

Info

Publication number
CN113778489B
CN113778489B CN202111075849.1A CN202111075849A CN113778489B CN 113778489 B CN113778489 B CN 113778489B CN 202111075849 A CN202111075849 A CN 202111075849A CN 113778489 B CN113778489 B CN 113778489B
Authority
CN
China
Prior art keywords
firmware
memory bank
firmware program
version
ota
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111075849.1A
Other languages
Chinese (zh)
Other versions
CN113778489A (en
Inventor
唐有
冯华
徐江波
马华
冷勇
向鹏程
李澜涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Thinktech Information Technology Co ltd
Original Assignee
Shanghai Thinktech Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Thinktech Information Technology Co ltd filed Critical Shanghai Thinktech Information Technology Co ltd
Priority to CN202111075849.1A priority Critical patent/CN113778489B/en
Publication of CN113778489A publication Critical patent/CN113778489A/en
Application granted granted Critical
Publication of CN113778489B publication Critical patent/CN113778489B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates

Abstract

The application relates to a method and a system for supporting a non-stop OTA from a hardware level. The method has the advantages that the current version firmware program and the updated version firmware program are respectively stored through two different storage bodies, the read/write operation of the running current version firmware program and the updated version firmware program are mutually independent, the conflict of the read/write process can be effectively avoided, the non-stop OTA is supported from the hardware level, meanwhile, the hardware cryptographic engine module supports the full hardware implementation of the national cryptographic algorithm core operation and the full hardware implementation of the international algorithm core operation, and the protection measure against the side channel attack is realized. In addition, the functions of legality authentication, firmware program decryption and firmware program integrity verification are realized by calling the hardware cryptographic engine through the bottom-layer driver, and high security of the OTA process of the vehicle-mounted chip is ensured.

Description

Method and system for supporting non-stop OTA from hardware level
Technical Field
The application relates to the technical field of vehicle-mounted chips, in particular to a method and a system for supporting a non-stop OTA from a hardware level.
Background
Over The Air (OTA) technology, in particular, enables remote management of software through a mobile communication interface. In the field of Internet of vehicles, more and more importance is attached to whether a vehicle-mounted ECU can remotely upgrade firmware and the safety of an upgrade process, and the vehicle-mounted ECU relates to various large-function fields of the whole vehicle, such as links of a central control screen, battery management, power control and the like. The key role of OTA is to repair systematic defects existing in the car itself, and the car manufacturer can quickly process the car anywhere without recalling the car, including pushing new functions to the car or improving performance parameters. The vehicle-mounted chip OTA ensures the information safety in the firmware upgrading process and also ensures the functional safety in the upgrading time period.
The OTA with high-level information security and high reliability is supported by a hardware technology of a bottom layer of a vehicle-mounted chip, and the main stream vehicle-mounted chip which is applied on a large scale at present still mostly adopts a mode of parking OTA, so that the OTA is difficult to effectively support without parking, and the information security is ensured by adopting a security scheme of a software layer, so that the security level which can be achieved is not high.
Disclosure of Invention
In view of the foregoing, it is necessary to provide a method and a system capable of supporting the non-stop OTA from the hardware level and providing the information security technical support from the hardware level, so as to ensure the high security of the OTA process of the on-vehicle chip.
A system for supporting an over-the-air OTA from a hardware level, the system comprising: the device comprises a secure storage unit module, a hardware password engine module and a bottom layer driver module;
the safe memory unit module comprises two or more single-port memory banks or one or more multi-port memory banks; the different memory areas of the multi-port memory bank or the single-port memory bank are used for forming a first memory bank and a second memory bank; the first storage body is used for storing a current version firmware program; the second storage body is used for storing firmware programs of the upgrade version;
the hardware cipher engine module is used for carrying out validity authentication, firmware program decryption and firmware program integrity verification on the firmware program of the upgrade version;
the bottom layer driver module is used for driving the hardware cryptographic engine module and the secure storage unit module.
In one embodiment, the system further comprises a kernel; the kernel is used for coordinating software and hardware resources related to the secure storage unit, the hardware cryptographic engine module and the bottom layer driver module, and is an independent kernel or a kernel shared by other subsystems of the vehicle-mounted chip.
In one embodiment, the system further comprises a read-write control circuit; the read-write control circuit is used for realizing memory encryption and memory read-write access control in the safe memory unit module in cooperation with the bottom driving module.
In one embodiment, when the secure memory unit module adopts two or more single-port memory banks, one single-port memory bank is used for storing the firmware program of the current version, and the other single-port memory bank is used for storing the firmware program of the updated version;
when the secure memory unit module adopts one or more multi-port memory banks, two different memory areas of one multi-port memory bank are used for respectively storing the current version firmware program and the updated version firmware program.
A method for supporting a no-parking OTA from a hardware level, the method comprising:
acquiring firmware upgrading information of a vehicle-mounted chip; the firmware upgrade information comprises an upgrade version firmware program;
the firmware version number information, the file source information and the available space size information of a storage body in the safe storage unit module of the firmware program of the upgrade version are obtained through a bottom layer driver module; the safe memory unit module comprises two or more single-port memory banks or one or more multi-port memory banks; the different memory areas of the multi-port memory bank or the single-port memory bank are used for forming a first memory bank and a second memory bank;
identifying the firmware version number information and authenticating the file source information through a hardware password engine module, and judging whether to upgrade the firmware according to the firmware version number information, the verification result of the file source information and the space size information;
if the firmware is upgraded, writing the firmware program with the upgraded version into the second storage body;
and after the upgrading is finished and the verification is passed, switching the main program entry address of the vehicle-mounted chip through the bottom layer driver module to finish the non-stop OTA.
In one embodiment, the method further comprises: if the firmware is upgraded, writing the firmware program with the upgraded version into the second storage body;
if the firmware is not updated, the writing operation of the firmware program of the updated version and the modification of the main program entry address of the vehicle-mounted chip are not performed.
In one embodiment, the method further comprises: carrying out the integrity verification of the firmware program of the upgrade version by calculating and comparing whether the hash value of the firmware program file packet of the upgrade version is matched with a preset value;
and if the verification is passed, switching the main program entry address of the vehicle-mounted chip by the bottom layer driver module to finish the non-stop OTA.
In one embodiment, the method further comprises: after the upgrading is completed and the verification is passed, switching the main program entry address of the vehicle-mounted chip through the bottom layer driver module to complete the non-stop OTA;
the upgrade is not completed or the verification is not passed, and the modification of the main program entry address of the vehicle-mounted chip is not performed.
According to the method and the system for supporting the non-stop OTA from the hardware level, the current version firmware program and the updated version firmware program are respectively stored through the two different storage bodies, and the read/write operation of the running current version firmware program and the updated version firmware program are mutually independent, so that the collision of the read/write process can be effectively avoided, the non-stop OTA is supported from the hardware level, meanwhile, the hardware cryptographic engine module supports the full hardware implementation of the national cryptographic algorithm core operation and the full hardware implementation of the international algorithm core operation, and the protection measure for resisting the side channel attack is realized. In addition, the functions of legality authentication, firmware program decryption and firmware program integrity verification are realized by calling the hardware cryptographic engine through the bottom-layer driver, and high security of the OTA process of the vehicle-mounted chip is ensured.
Drawings
FIG. 1 is a schematic diagram of an OTA system of a vehicle-mounted chip in one embodiment;
FIG. 2 is a flow diagram of a method for supporting a non-stop OTA from a hardware level provided in one embodiment;
fig. 3 is a general flow diagram of performing OTA operations in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
A system for supporting an over-the-air OTA from a hardware level, the system comprising: the device comprises a secure storage unit module, a hardware password engine module and a bottom layer driver module;
the safe memory unit module comprises two or more single-port memory banks or one or more multi-port memory banks; the different memory areas of the multiport memory bank or the single-port memory bank are used for forming a first memory bank and a second memory bank; the first memory bank is used for storing the firmware program of the current version; the second memory bank is used for storing firmware program of upgrade version;
the hardware cipher engine module is used for carrying out validity authentication, firmware program decryption and firmware program integrity verification on the firmware program of the updated version;
the bottom layer driver module is used for driving the hardware cryptographic engine module and the secure storage unit module.
In one embodiment, as shown in fig. 1, the OTA function subsystem at the vehicle-mounted chip end includes a secure storage unit, a hardware cryptographic engine, a bottom driver, and a kernel. The safe memory unit of the chip adopts two or more single-port memory banks or one or more multi-port memory banks, and the matched control circuit supports memory encryption and memory read-write access control. The chip has a hardware cryptographic engine, and the functions of legality authentication, firmware program decryption and firmware program integrity verification on the newly upgraded firmware are realized by calling the engine in the bottom-layer driver. The bottom layer driver of the chip realizes that the previous version is reversed when the new firmware is not successfully upgraded, and the bottom layer driver also realizes a mechanism for preventing the firmware version from being degraded. The OTA function subsystem of the chip adopts a kernel shared by other function subsystems, or can adopt an independent kernel, and the kernel is used for uniformly managing related software and hardware resources of the OTA function subsystem of the vehicle-mounted chip so as to coordinate a safe storage unit, a hardware password engine module, a bottom layer driver module and the like to realize complete OTA functions.
The prior art is mainly based on a single-port memory bank (such as single-port Flash), the read/write operation of running the firmware program of the current version and the firmware program of the updated version are not independent, the conflict of the read/write process is difficult to avoid, and meanwhile, the information security is ensured by adopting a security scheme of a software layer, so that the security level is not high.
The invention respectively stores the firmware of the current version and the firmware of the new upgrade by adding two or more single-port memory banks at the vehicle-mounted chip end, or divides a multi-port memory bank into two different memory areas at the logic level by a read-write control circuit and a bottom layer driver by adding one or more multi-port memory banks at the vehicle-mounted chip end. When two or more single-port memory banks are adopted, the respective read/write operations of the memory bank of the current version program and the memory bank storing the new upgrade firmware are mutually independent, and the multi-port memory bank supports simultaneous read/write operations, so that the collision of the read/write processes can be effectively avoided, and the non-stop OTA is supported from the hardware level. Whether two single-port memory banks or one multi-port memory bank are adopted, the memory banks can be abstracted into a logic memory bank through a read-write control circuit and a bottom layer driver, and when the chip is applied to a scene in which OTA (over the air) function is not required to be supported, the memory bank resources of the chip can be fully utilized.
The hardware cipher engine in the invention supports the full hardware realization of the core operation of the national cipher algorithm, and also supports the full hardware realization of the core operation of the international algorithm, and the algorithms realize the protection measures against the side channel attack. And the functions of legality authentication, firmware program decryption and firmware program integrity verification on the newly upgraded firmware are realized by calling the engine in the bottom-layer driver, information security technical support is provided from the hardware level, and the high security of the OTA process of the vehicle-mounted chip is ensured.
In one embodiment, as shown in fig. 2, a method for supporting a non-stop OTA from a hardware level is provided, where the method includes:
step 202, obtaining firmware upgrade information of the vehicle-mounted chip.
The firmware upgrade information includes an upgrade version firmware program.
And 204, obtaining firmware version number information, file source information of the firmware program of the updated version and available space size information of a storage body in the safe storage unit module through the bottom layer driver module.
The safe memory unit module comprises two or more single-port memory banks or one or more multi-port memory banks; the different memory areas of the multiport memory bank or the single-port memory bank are used for forming a first memory bank and a second memory bank; the first memory bank is used for storing the firmware program of the current version; the second memory bank is used for storing the firmware program of the upgrade version.
Step 206, identifying the firmware version number information and the authentication file source information by the hardware password engine module, and judging whether to upgrade the firmware according to the verification result of the firmware version number information and the file source information and the space size information.
Step 208, if the firmware is updated, writing the updated version of the firmware program into the second memory bank.
Step 210, after the upgrade is completed and the verification is passed, the primary program entry address of the vehicle-mounted chip is switched through the bottom layer driver module, so as to complete the non-stop OTA.
According to the method and the system for supporting the non-stop OTA from the hardware level, the current version firmware program and the updated version firmware program are respectively stored through the two different storage bodies, and the read/write operation of the running current version firmware program and the updated version firmware program are mutually independent, so that the collision of the read/write process can be effectively avoided, the non-stop OTA is supported from the hardware level, meanwhile, the hardware cryptographic engine module supports the full hardware implementation of the national cryptographic algorithm core operation and the full hardware implementation of the international algorithm core operation, and the protection measure for resisting the side channel attack is realized. In addition, the functions of legality authentication, firmware program decryption and firmware program integrity verification are realized by calling the hardware cryptographic engine through the bottom-layer driver, and high security of the OTA process of the vehicle-mounted chip is ensured.
It should be understood that, although the steps in the flowchart of fig. 2 are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in fig. 2 may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor do the order in which the sub-steps or stages are performed necessarily performed in sequence, but may be performed alternately or alternately with at least a portion of the sub-steps or stages of other steps or other steps.
In one embodiment, the method further comprises: if the firmware is upgraded, writing the firmware program with the upgraded version into the second storage body; if the firmware is not updated, the writing operation of the firmware program of the updated version and the modification of the main program entry address of the vehicle-mounted chip are not performed.
Specifically, assuming that there are a memory bank a and a memory bank B, if the current version firmware program is stored in the memory bank a, writing the updated version firmware program into the memory bank B; if the current version of the firmware program is stored in the memory bank B, the updated version of the firmware program is written into the memory bank A.
In one embodiment, the method further comprises: carrying out the integrity verification of the firmware program of the upgrade version by calculating and comparing whether the hash value of the firmware program file packet of the upgrade version is matched with a preset value; if the verification is passed, the primary program entry address of the vehicle-mounted chip is switched through the bottom layer driver module, and the non-stop OTA is completed.
In one embodiment, the method further comprises: after the upgrading is finished and the verification is passed, switching the main program entry address of the vehicle-mounted chip through the bottom layer driver module to finish the non-stop OTA; the upgrade is not completed or the verification is not passed, and the modification of the main program entry address of the vehicle-mounted chip is not performed.
In a specific embodiment, as shown in fig. 3, an OTA procedure is provided, including:
1. the vehicle-mounted chip runs a firmware program of the current V1.0 version;
2. the vehicle-mounted chip receives the upgrading instruction and prepares to upgrade the current firmware to the V1.1 version;
3. the firmware program at the bottom layer of the chip judges whether the firmware program has upgrading conditions, such as identifying whether the version number of the firmware to be upgraded is compliant, authenticating the source legitimacy of the firmware, whether the space size of a storage body is enough, and the like;
4. the upgrade process is executed (the upgrade process can be in a non-stop state), firstly, the program file package is received, and the integrity is confirmed after the reception is finished, for example, whether the hash values of the program file package are matched or not is calculated and compared;
5. switching the main program entry address, namely updating the starting vector table;
6. and (4) powering up again, starting from the new program to execute, and executing the V1.1 version firmware program.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples merely represent a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the invention. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application is to be determined by the claims appended hereto.

Claims (8)

1. A system for supporting an over-the-air OTA from a hardware level, the system comprising: the device comprises a secure storage unit module, a hardware password engine module and a bottom layer driver module;
the safe memory unit module comprises two or more single-port memory banks or one or more multi-port memory banks; the different memory areas of the multi-port memory bank or the single-port memory bank are used for forming a first memory bank and a second memory bank; the first storage body is used for storing a current version firmware program; the second storage body is used for storing firmware programs of the upgrade version; when the safe memory unit module adopts two or more single-port memory banks, one single-port memory bank is used as the first memory bank, and the other single-port memory bank is used as the second memory bank; when the safety memory unit module adopts one or more multi-port memory banks, two different memory areas of one multi-port memory bank are respectively used as the first memory bank and the second memory bank; the read/write operations of the first memory bank and the second memory bank are independent of each other;
the hardware cipher engine module is used for carrying out validity authentication, firmware program decryption and firmware program integrity verification on the firmware program of the upgrade version;
the bottom layer driver module is used for driving the hardware cryptographic engine module and the secure storage unit module.
2. The system of claim 1, wherein the system further comprises a kernel; the kernel is used for coordinating software and hardware resources related to the secure storage unit, the hardware cryptographic engine module and the bottom layer driver module.
3. The system of claim 2, wherein the kernel is a stand-alone kernel or a kernel shared with other subsystems of the on-board chip.
4. The system of claim 3, further comprising a read-write control circuit; the read-write control circuit is used for realizing memory encryption and memory read-write access control in the safe memory unit module in cooperation with the bottom driving module.
5. A method for supporting a no-parking OTA from a hardware level, the method comprising:
acquiring firmware upgrading information of a vehicle-mounted chip; the firmware upgrade information comprises an upgrade version firmware program;
the firmware version number information, the file source information and the available space size information of a storage body in the safe storage unit module of the firmware program of the upgrade version are obtained through a bottom layer driver module; the safe memory unit module comprises two or more single-port memory banks or one or more multi-port memory banks; the different memory areas of the multi-port memory bank or the single-port memory bank are used for forming a first memory bank and a second memory bank; the first storage body is used for storing a current version firmware program; the second storage body is used for storing firmware programs of the upgrade version; when the safe memory unit module adopts two or more single-port memory banks, one single-port memory bank is used as the first memory bank, and the other single-port memory bank is used as the second memory bank; when the safety memory unit module adopts one or more multi-port memory banks, two different memory areas of one multi-port memory bank are respectively used as the first memory bank and the second memory bank; the read/write operations of the first memory bank and the second memory bank are independent of each other;
identifying the firmware version number information and authenticating the file source information through a hardware password engine module, and judging whether to upgrade the firmware according to the firmware version number information, the verification result of the file source information and the space size information;
if the firmware is upgraded, writing the firmware program with the upgraded version into the second storage body;
and after the upgrading is finished and the verification is passed, switching the main program entry address of the vehicle-mounted chip through the bottom layer driver module to finish the non-stop OTA.
6. The method of claim 5, wherein writing the upgraded version of the firmware program to the second memory bank if a firmware upgrade is performed, further comprising:
if the firmware is upgraded, writing the firmware program with the upgraded version into the second storage body;
if the firmware is not updated, the writing operation of the firmware program of the updated version and the modification of the main program entry address of the vehicle-mounted chip are not performed.
7. The method of claim 6, wherein after the upgrade is completed and the verification is passed, switching the main program entry address of the on-board chip through the bottom driver module to complete the on-board OTA, comprising:
calculating and comparing whether the hash value of the firmware program file packet of the upgrade version is matched with a preset value, and verifying the integrity of the firmware program of the upgrade version through the hardware cryptographic engine module;
and if the verification is passed, switching the main program entry address of the vehicle-mounted chip by the bottom layer driver module to finish the non-stop OTA.
8. The method of claim 7, wherein after the upgrade is completed and the verification is passed, switching the main program entry address of the on-board chip through the bottom driver module to complete the on-board OTA, comprising:
after the upgrading is completed and the verification is passed, switching the main program entry address of the vehicle-mounted chip through the bottom layer driver module to complete the non-stop OTA;
the upgrade is not completed or the verification is not passed, and the modification of the main program entry address of the vehicle-mounted chip is not performed.
CN202111075849.1A 2021-09-14 2021-09-14 Method and system for supporting non-stop OTA from hardware level Active CN113778489B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111075849.1A CN113778489B (en) 2021-09-14 2021-09-14 Method and system for supporting non-stop OTA from hardware level

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111075849.1A CN113778489B (en) 2021-09-14 2021-09-14 Method and system for supporting non-stop OTA from hardware level

Publications (2)

Publication Number Publication Date
CN113778489A CN113778489A (en) 2021-12-10
CN113778489B true CN113778489B (en) 2024-01-30

Family

ID=78843784

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111075849.1A Active CN113778489B (en) 2021-09-14 2021-09-14 Method and system for supporting non-stop OTA from hardware level

Country Status (1)

Country Link
CN (1) CN113778489B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109697081A (en) * 2018-12-19 2019-04-30 广州小鹏汽车科技有限公司 Firmware security upgrading method, device, onboard system and vehicle
CN110233906A (en) * 2019-07-19 2019-09-13 上海擎感智能科技有限公司 A kind of OTA Engine Version update method and system, storage medium and OTA terminal
CN110351314A (en) * 2018-04-03 2019-10-18 厦门雅迅网络股份有限公司 The remote upgrade method and computer readable storage medium of automobile controller
CN111045714A (en) * 2019-12-19 2020-04-21 歌尔股份有限公司 Firmware updating method and device, earphone and computer readable storage medium
CN111562935A (en) * 2020-07-14 2020-08-21 江苏海平面数据科技有限公司 OTA security upgrading system and upgrading method thereof
CN112035152A (en) * 2020-08-24 2020-12-04 成都三零嘉微电子有限公司 Secure processing system and method for SoC chip firmware upgrade
CN112148326A (en) * 2020-08-31 2020-12-29 山东省科学院自动化研究所 Remote updating method, device and system for Internet of things equipment firmware
CN113225729A (en) * 2020-01-21 2021-08-06 荣耀终端有限公司 OTA (over the air) upgrading method and device and readable storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110351314A (en) * 2018-04-03 2019-10-18 厦门雅迅网络股份有限公司 The remote upgrade method and computer readable storage medium of automobile controller
CN109697081A (en) * 2018-12-19 2019-04-30 广州小鹏汽车科技有限公司 Firmware security upgrading method, device, onboard system and vehicle
CN110233906A (en) * 2019-07-19 2019-09-13 上海擎感智能科技有限公司 A kind of OTA Engine Version update method and system, storage medium and OTA terminal
CN111045714A (en) * 2019-12-19 2020-04-21 歌尔股份有限公司 Firmware updating method and device, earphone and computer readable storage medium
WO2021120327A1 (en) * 2019-12-19 2021-06-24 歌尔股份有限公司 Firmware updating method and apparatus, and headset and computer readable storage medium
CN113225729A (en) * 2020-01-21 2021-08-06 荣耀终端有限公司 OTA (over the air) upgrading method and device and readable storage medium
CN111562935A (en) * 2020-07-14 2020-08-21 江苏海平面数据科技有限公司 OTA security upgrading system and upgrading method thereof
CN112035152A (en) * 2020-08-24 2020-12-04 成都三零嘉微电子有限公司 Secure processing system and method for SoC chip firmware upgrade
CN112148326A (en) * 2020-08-31 2020-12-29 山东省科学院自动化研究所 Remote updating method, device and system for Internet of things equipment firmware

Also Published As

Publication number Publication date
CN113778489A (en) 2021-12-10

Similar Documents

Publication Publication Date Title
CN107113167B (en) Management device, key generation device, vehicle, maintenance tool, management system, management method, and computer program
EP3889766A1 (en) Secure firmware upgrade method, device, on-board system, and vehicle
US10706646B2 (en) Vehicle diagnostic device and method of managing certificate thereof
JP6228093B2 (en) system
CN107409045B (en) Management device, management method, and storage medium
US10423401B2 (en) Method for updating software of a control device of a vehicle
JP6190443B2 (en) In-vehicle computer system, vehicle, management method, and computer program
US11182485B2 (en) In-vehicle apparatus for efficient reprogramming and controlling method thereof
US9787677B2 (en) Method of authenticating can packets using mixture of MACs and apparatus for implementing the same
CN113709695B (en) Authorization method and system for vehicle use
CN113805908A (en) Firmware update system and method
CN101923476A (en) File installation system and file installation method
CN111508110B (en) Method and device for realizing remote locking of vehicle
CN113268742A (en) Data authorization method and device and electronic equipment
US9298949B2 (en) Method for programming a mobile end device chip
US20120330498A1 (en) Secure data store for vehicle networks
US9336410B2 (en) Nonvolatile memory internal signature generation
KR101806719B1 (en) The electronic control unit possible auto setting of memory area according to secure boot and method for secure boot using the same
JP2019020872A (en) Electronic control apparatus and program falsification detection method
CN113778489B (en) Method and system for supporting non-stop OTA from hardware level
JP2018042256A (en) System and management method
Freiwald et al. Safe and secure software updates over the air for electronic brake control systems
Steurich et al. Feasibility study for a secure and seamless integration of over the air software update capability in an advanced board net architecture
CN114756827A (en) License file management method, device and equipment
CN111142902A (en) Upgraded firmware protection method and device for processor and vehicle

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant