CN113867818B - Method, device, computer equipment and medium for generating ini file - Google Patents

Method, device, computer equipment and medium for generating ini file Download PDF

Info

Publication number
CN113867818B
CN113867818B CN202111140709.8A CN202111140709A CN113867818B CN 113867818 B CN113867818 B CN 113867818B CN 202111140709 A CN202111140709 A CN 202111140709A CN 113867818 B CN113867818 B CN 113867818B
Authority
CN
China
Prior art keywords
ini file
authentication information
ini
configuration
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111140709.8A
Other languages
Chinese (zh)
Other versions
CN113867818A (en
Inventor
武聪魁
张良
马光伟
王欣伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Weichai Power Co Ltd
Weifang Weichai Power Technology Co Ltd
Original Assignee
Weichai Power Co Ltd
Weifang Weichai Power Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Weichai Power Co Ltd, Weifang Weichai Power Technology Co Ltd filed Critical Weichai Power Co Ltd
Priority to CN202111140709.8A priority Critical patent/CN113867818B/en
Publication of CN113867818A publication Critical patent/CN113867818A/en
Priority to PCT/CN2022/121994 priority patent/WO2023051573A1/en
Application granted granted Critical
Publication of CN113867818B publication Critical patent/CN113867818B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4403Processor initialisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4411Configuring for operating with peripheral devices; Loading of device drivers

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a method, a device, computer equipment and a medium for generating an ini file. The generation method of the ini file comprises the following steps: determining the configuration parameter information of the current ini file to be written and configuring the time stamp of the ini file; and determining the ini file authentication information corresponding to the current writing ini file according to the ini file configuration parameter information and the timestamp of the configuration ini file, and generating a target ini file containing the ini file authentication information. The technical scheme of the embodiment of the invention is used for improving the safety of the ini file and protecting the safety of the configuration information.

Description

Method, device, computer equipment and medium for generating ini file
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to a method, a device, computer equipment and a medium for generating an ini file.
Background
An ini file is an abbreviation of Initialization File, i.e., an initialization file, which is a file used to set parameters for operating system or program initialization, and its contents are typically some variables and values or link statements of a database, etc. The ini file consists of sections, keys, values, for example: [ EcuVersion ], version=WISEC10-P201-V174, where [ EcuVersion ] is a section, version is a key, and WISEC10-P201-V174 is a value.
Because the ini file has a simple structure and is easy to manufacture, users familiar with a program system can easily forge the ini file, the system or the terminal can be configured at will, the effective management of the ini file is lacking in the current stage, the falsification of system information and data is easy to cause, and the data security of a client side when the ini file is generated and used cannot be ensured.
Disclosure of Invention
The embodiment of the invention provides a method, a device, computer equipment and a medium for generating an ini file, which are used for improving the safety of the ini file and protecting the safety of configuration information.
In a first aspect, an embodiment of the present invention provides a method for generating an ini file, where the method includes:
determining the configuration parameter information of the current ini file to be written and configuring the time stamp of the ini file;
and determining the ini file authentication information corresponding to the current writing ini file according to the ini file configuration parameter information and the timestamp of the configuration ini file, and generating a target ini file containing the ini file authentication information.
Further, the ini file configuration parameter information comprises ECU version authentication information, variable name authentication information and variable number authentication information;
determining the ini file authentication information corresponding to the current writing ini file according to the ini file configuration parameter information and the timestamp of the configuration ini file comprises the following steps:
and determining the ini file authentication information corresponding to the current updating ini file according to the ECU version authentication information, the variable name authentication information, the variable number authentication information and the timestamp of the configuration ini file.
Further, the ini file authentication information includes 10 authentication bytes;
the ECU version authentication information comprises 1 authentication byte, the variable name authentication information comprises 1 authentication byte, the variable number authentication information comprises 1 authentication byte, and the timestamp of the configuration ini file comprises 7 authentication bytes.
Further, the ECU version authentication information, the variable name authentication information, the variable number authentication information, and the timestamp of the configuration ini file are configured in 16-ary numbers.
Further, determining a timestamp of a configuration ini file of the current swipe ini file includes:
determining legal use starting time and legal use ending time of the current writing ini file, and determining the timestamp of the configuration ini file according to the legal use starting time and the legal use ending time.
Further, the generating method of the ini file further comprises the following steps:
acquiring the current use time of an ini file to be refreshed, and legal use starting time and legal use ending time corresponding to the ini file to be refreshed;
if the current use time is between the legal use starting time and the legal use ending time, the to-be-written ini file is considered to pass the ini file authentication; and if the current use time is not between the legal use starting time and the legal use ending time, stopping the brushing process of the to-be-brushed-written ini file.
Further, the generating method of the ini file further comprises the following steps:
and storing the target ini file into a memory.
In a second aspect, an embodiment of the present invention further provides an apparatus for generating an ini file, where the apparatus includes:
the information generation module is used for determining the configuration parameter information of the current ini file and the timestamp of the configuration ini file;
the file generation module is used for determining the ini file authentication information corresponding to the current writing ini file according to the ini file configuration parameter information and the time stamp of the configuration ini file, and generating a target ini file containing the ini file authentication information.
In a third aspect, an embodiment of the present invention further provides a computer apparatus, including:
one or more processors;
a storage means for storing a plurality of programs,
when at least one of the plurality of programs is executed by the one or more processors, the one or more processors are caused to implement a method for generating an ini file provided by an embodiment of the first aspect of the present invention.
In a fourth aspect, an embodiment of the present invention further provides a computer readable storage medium, where a computer program is stored, where the program when executed by a processor implements a method for generating an ini file provided by an embodiment of the first aspect of the present invention.
According to the technical scheme, the ini file configuration parameter information of the current writing ini file and the time stamp of the configuration ini file are determined; and determining the ini file authentication information corresponding to the current writing ini file according to the ini file configuration parameter information and the timestamp of the configuration ini file, and generating a target ini file containing the ini file authentication information. The method solves the problem that the lack of effective management of the ini file at the present stage is easy to cause the tampering of system information and data, and cannot ensure the data security of the client when the ini file is generated and used, so as to improve the security of the ini file and protect the security of configuration information.
Drawings
Fig. 1 is a flowchart of a method for generating an ini file according to an embodiment of the present invention;
fig. 2 is a flowchart of a method for generating an ini file according to a second embodiment of the present invention;
fig. 3 is a block diagram of an ini file generating device according to a third embodiment of the present invention;
fig. 4 is a schematic hardware structure of a computer device according to a fourth embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the following detailed description of specific embodiments of the present invention is given with reference to the accompanying drawings. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting thereof.
It should be further noted that, for convenience of description, only some, but not all of the matters related to the present invention are shown in the accompanying drawings. Before discussing exemplary embodiments in more detail, it should be mentioned that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart depicts operations (or steps) as a sequential process, many of the operations can be performed in parallel, concurrently, or at the same time. Furthermore, the order of the operations may be rearranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figures. The processes may correspond to methods, functions, procedures, subroutines, and the like.
When the ECU (Electronic Control Unit ) writes variables, the ini file format used is typically as follows:
start byte Fields Data type Description and requirements
0 ECU software editionThe book is provided with STRING ASCII, maximum 20Bytes
20 Variable information WORD Key, value
The ini file is easy to manufacture and crack, and further causes the tampering of program system information and data. In order to solve the existing technical problems, a method, a device, a computer device and a medium for generating an ini file are provided, so that the safety of the ini file is improved, and the safety of configuration information is protected.
Example 1
Fig. 1 is a flowchart of an ini file generation method provided in an embodiment of the present invention, where the embodiment is applicable to a case of effectively managing encryption and authentication of an ini file, the ini file generation method may be performed by an ini file generation device, and the ini file generation device may be implemented in a software and/or hardware form. The generation method of the ini file specifically comprises the following steps:
s110, determining the configuration parameter information of the current ini file to be written and configuring the timestamp of the ini file.
The ini file configuration parameter information comprises ECU version authentication information, variable name authentication information and variable number authentication information.
Specifically, the ini file authentication information corresponding to the current writing ini file is determined according to the ini file configuration parameter information and the timestamp of the configuration ini file, and is: and determining the ini file authentication information corresponding to the current updating ini file according to the ECU version authentication information, the variable name authentication information, the variable number authentication information and the timestamp of the configuration ini file.
On the basis of the above, the ECU version authentication information, the variable name authentication information, the variable number authentication information, and the timestamp of the configuration ini file are configured in 16-ary numbers.
In this embodiment, the ECU version information of the current update ini file is stripped of special characters, the rest is converted into 16-ary numbers, and after all the characters are added and summed, only the 16-ary numbers with the lowest two digits are reserved as ECU version authentication information. The ECU version information may be generated by the ECU by self-configuration, or may be preset in the program system by those skilled in the art, which is not limited in this embodiment.
And acquiring all variables of the current writing ini file, converting characters corresponding to initial letters of all variable names into 16-system numbers, adding and summing, and only retaining the 16-system numbers with the lowest two digits as variable name authentication information.
On the basis of the above, the number of all the variables of the current writing ini file is obtained, the number of the variables is converted into 16-system numbers, and only the 16-system numbers with the lowest two digits are reserved and used as the variable number authentication information. The number of variables currently written into the ini file is determined by the ini file, and the embodiment does not excessively describe the number of variables, and the specific number of readable variables is determined.
Further, determining a timestamp of a configuration ini file of the current swipe ini file includes: determining legal use starting time and legal use ending time of the current writing ini file, and determining the timestamp of the configuration ini file according to the legal use starting time and the legal use ending time.
Wherein, the time stamp of the configuration ini file prescribes the legal use time of the ini file, and the legal use time of the ini file comprises the legal use starting time and the legal use ending time.
In this embodiment, the legal use start time and the legal use end time of the current writing ini file are converted into 16 numbers as one value, and the timestamp of the configuration ini file is generated.
In one embodiment, the ini file authentication information comprises 10 authentication bytes; the ECU version authentication information comprises 1 authentication byte, the variable name authentication information comprises 1 authentication byte, the variable number authentication information comprises 1 authentication byte, and the timestamp of the configuration ini file comprises 7 authentication bytes.
S120, determining the ini file authentication information corresponding to the current writing ini file according to the ini file configuration parameter information and the timestamp of the configuration ini file, and generating a target ini file containing the ini file authentication information.
It can be understood that the four items of the ECU version authentication information, the variable name authentication information, the variable number authentication information and the timestamp of the configuration ini file together form the ini file authentication information corresponding to the current writing ini file, so as to realize the function of encrypting the ini file and make the ini file safer.
When the ini file is generated, the ini file authentication information of the current ini file is added to obtain the target ini file containing the ini file authentication information, so that the client is effectively prevented from maliciously tampering with the refreshing data and the content of the ini file, and the information security of a program system and a terminal is ensured.
On the basis of the above embodiment, the method for generating an ini file further includes: acquiring the current use time of an ini file to be refreshed, and legal use starting time and legal use ending time corresponding to the ini file to be refreshed; if the current use time is between the legal use starting time and the legal use ending time, the to-be-written ini file is considered to pass the ini file authentication; and if the current use time is not between the legal use starting time and the legal use ending time, stopping the brushing process of the to-be-brushed-written ini file.
On the basis, if the current use time of the ini file to be refreshed is determined before the ini file to be refreshed is read, and the timestamp of the configuration ini file in the ini file authentication information corresponding to the ini file to be refreshed is obtained through the ini file authentication information corresponding to the ini file to be refreshed, so that the legal use start time and the legal use end time corresponding to the ini file to be refreshed are obtained.
If the current use time is between the legal use starting time and the legal use ending time, the to-be-refreshed ini file is considered to pass the ini file authentication, namely the to-be-refreshed ini file is in a legal time period; if the current use time is not between the legal use starting time and the legal use ending time, the authentication of the ini file cannot be passed, namely the ini file to be refreshed is not in the legal time period, and the refreshing process of the ini file to be refreshed is stopped, so that the legal use of the ini file is ensured, and the safety of configuration information is protected.
In an embodiment, the method for generating an ini file further includes: and storing the target ini file into a memory.
It will be appreciated that the target ini file containing the ini file authentication information is stored in the memory of the program system. When the generation information and legal use time of the ini file to be refreshed are required to be queried, the generation information and the corresponding ini file authentication information content of the ini file can be traced back through the ini file authentication information of the ini file to be refreshed by querying the ini file containing the ini file authentication information stored in the memory of the program system, so that the storage history of the ini file can be conveniently queried, and the safety of the ini file is improved.
According to the technical scheme, the ini file configuration parameter information of the current writing ini file and the time stamp of the configuration ini file are determined; and determining the ini file authentication information corresponding to the current writing ini file according to the ini file configuration parameter information and the timestamp of the configuration ini file, and generating a target ini file containing the ini file authentication information. The method solves the problem that the lack of effective management of the ini file at the present stage is easy to cause the tampering of system information and data, and cannot ensure the data security of the client when the ini file is generated and used, so as to improve the security of the ini file and protect the security of configuration information.
Example two
Fig. 2 is a flowchart of a method for generating an ini file according to a second embodiment of the present invention, where the method is optimized based on the foregoing embodiment.
Correspondingly, the method of the embodiment specifically comprises the following steps:
s210, determining ECU version authentication information, variable name authentication information and variable number authentication information of the current updating ini file.
In an embodiment, the ECU version authentication information includes 1 authentication byte, taking ECU version number WISE63-P920-V102 as an example, removing special characters, taking ECU version number WISE63P920V102, summing all characters to obtain 61B, and not counting overflow, and only keeping the 16-ary number of the lowest two bits, namely, the length of the last two bytes is 1B, and 1B is used as the ECU version authentication information of 1 authentication byte.
The variable name authentication information comprises 1 authentication byte, assuming that an ini file has three variables ACComp_tiTrqDes_ C, ACComp _tiTrqDyn_C and ACComp_tiTrqResv_C, converting characters corresponding to initial AAA of all variable names into 16-system numbers, adding and summing to obtain C3, and if the overflow part of the sum is not calculated, taking the C3 as the variable name authentication information of the 1 authentication bytes.
The variable number authentication information comprises 1 authentication byte, for example, 312 variables in an ini file are converted into a 16-system number of 138, the overflow part after conversion is not counted, and only the 16-system number of the lowest two bits is reserved, so that 38 is used as the variable number authentication information of 1 authentication byte.
S220, determining legal use starting time and legal use ending time of the current writing ini file, and determining the timestamp of the configuration ini file according to the legal use starting time and the legal use ending time.
In an embodiment, the timestamp of the configuration ini file includes 7 authentication bytes, for example, if the legal use time of the configuration ini file is set from 2021, 8, 1, to 2021, 12, 1, the value 2021080120211201 is taken, converted into a 16-ary number 72E2962A0B701, and the length is 7 bytes, if the length is less than 7 bytes, the configuration ini file is complemented with 0 at the high order, and 072E2962A0B701 is the timestamp of the configuration ini file with 7 authentication bytes.
S230, determining the ini file authentication information corresponding to the current writing ini file according to the ECU version authentication information, the variable name authentication information, the variable number authentication information and the timestamp of the configuration ini file.
In this embodiment, the ini file authentication information includes 10 authentication bytes; the ECU version authentication information comprises 1 authentication byte, the variable name authentication information comprises 1 authentication byte, the variable number authentication information comprises 1 authentication byte, and the timestamp of the configuration ini file comprises 7 authentication bytes.
Based on the above, four items of the ECU version authentication information, the variable name authentication information, the variable number authentication information and the timestamp of the configuration ini file together form the ini file authentication information corresponding to the current swipe ini file, that is, the ini file authentication information is 1B C3 38 072E2962A0B701, and total 10 authentication bytes are formed.
S240, generating a target ini file containing the ini file authentication information.
Specifically, when an ini file is generated, the ini file authentication information of the current writing ini file is added to obtain a target ini file containing the ini file authentication information.
S250, storing the target ini file into a memory.
Specifically, the generated ini file and the generated ini file authentication information, namely the target ini file, are recorded, and the ini file authentication information are stored in a memory of a program system, so that the generation information of the corresponding ini file can be queried through the ini file authentication information later.
In another embodiment, the current use time of the ini file to be refreshed is obtained, and the legal use starting time and the legal use ending time corresponding to the ini file to be refreshed are obtained; if the current use time is between the legal use starting time and the legal use ending time, the to-be-written ini file is considered to pass the ini file authentication; and if the current use time is not between the legal use starting time and the legal use ending time, stopping the brushing process of the to-be-brushed-written ini file.
According to the technical scheme, the ini file authentication information is added when the ini file is generated, the ini file authentication information comprises 10 length authentication bytes, namely, 10 length authentication bytes are added in the ini file, so that the effect of encrypting the ini file can be achieved, the ini file is safer, the client is effectively prevented from maliciously tampering with the refreshing data and content of the ini file, the information safety of a system and a terminal is ensured, meanwhile, the generation information and the corresponding content of the ini file can be traced, and the history record of the ini file can be conveniently inquired. On the other hand, the ini file authentication information includes a time stamp for configuring the ini file, and defines a legal use time of the ini file.
Example III
Fig. 3 is a block diagram of an ini file generating device according to a third embodiment of the present invention, where the present embodiment is applicable to a case of effectively managing encryption authentication of an ini file.
As shown in fig. 3, the generating device of the ini file includes: an information generation module 310 and a file generation module 320, wherein:
an information generating module 310, configured to determine the configuration parameter information of the ini file currently being written and the timestamp of the configuration ini file;
the file generating module 320 is configured to determine, according to the ini file configuration parameter information and the timestamp of the configured ini file, ini file authentication information corresponding to the current updated ini file, and generate a target ini file including the ini file authentication information.
The generating device of the ini file in the embodiment determines the configuration parameter information of the ini file currently written and the timestamp of the configuration ini file; and determining the ini file authentication information corresponding to the current writing ini file according to the ini file configuration parameter information and the timestamp of the configuration ini file, and generating a target ini file containing the ini file authentication information. The method solves the problem that the lack of effective management of the ini file at the present stage is easy to cause the tampering of system information and data, and cannot ensure the data security of the client when the ini file is generated and used, so as to improve the security of the ini file and protect the security of configuration information.
On the basis of the above embodiments, the ini file configuration parameter information includes ECU version authentication information, variable name authentication information, and variable number authentication information;
determining the ini file authentication information corresponding to the current writing ini file according to the ini file configuration parameter information and the timestamp of the configuration ini file comprises the following steps:
and determining the ini file authentication information corresponding to the current updating ini file according to the ECU version authentication information, the variable name authentication information, the variable number authentication information and the timestamp of the configuration ini file.
On the basis of the above embodiments, the ini file authentication information includes 10 authentication bytes;
the ECU version authentication information comprises 1 authentication byte, the variable name authentication information comprises 1 authentication byte, the variable number authentication information comprises 1 authentication byte, and the timestamp of the configuration ini file comprises 7 authentication bytes.
On the basis of the above embodiments, the ECU version authentication information, the variable name authentication information, the variable number authentication information, and the timestamp of the configuration ini file are configured in 16-ary numbers.
On the basis of the above embodiments, determining the timestamp of the configuration ini file of the current brushing ini file includes:
determining legal use starting time and legal use ending time of the current writing ini file, and determining the timestamp of the configuration ini file according to the legal use starting time and the legal use ending time.
On the basis of the above embodiments, the generating device of the ini file further includes:
the time acquisition module is used for acquiring the current use time of the to-be-brushed-written ini file, and legal use starting time and legal use ending time corresponding to the to-be-brushed-written ini file;
the refreshing judgment module is used for considering that the to-be-refreshed ini file passes the ini file authentication if the current use time is between the legal use start time and the legal use end time; and if the current use time is not between the legal use starting time and the legal use ending time, stopping the brushing process of the to-be-brushed-written ini file.
On the basis of the above embodiments, the generating device of the ini file further includes:
and the file storage module is used for storing the target ini file into a memory.
The generation device of the ini file provided by the above embodiments can execute the generation method of the ini file provided by any embodiment of the present invention, and has the corresponding functional module and beneficial effects of executing the generation method of the ini file.
Example IV
Fig. 4 is a schematic structural diagram of a computer device according to a fourth embodiment of the present invention, and as shown in fig. 4, the computer device includes a processor 410, a memory 420, an input device 430 and an output device 440; the number of processors 410 in the computer device may be one or more, one processor 410 being taken as an example in fig. 4; the processor 410, memory 420, input device 430, and output device 440 in the computer device may be connected by a bus or other means, for example in fig. 4.
The memory 420 is a computer-readable storage medium, and may be used to store a software program, a computer-executable program, and modules, such as program instructions/modules corresponding to the generation method of an ini file in the embodiment of the present invention (for example, the information generation module 310 and the file generation module 320 in the generation apparatus of an ini file). The processor 410 executes various functional applications of the computer device and data processing by running software programs, instructions and modules stored in the memory 420, i.e. implements the above-described generation method of the ini file.
Memory 420 may include primarily a program storage area and a data storage area, wherein the program storage area may store an operating system, at least one application program required for functionality; the storage data area may store data created according to the use of the terminal, etc. In addition, memory 420 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid-state storage device. In some examples, memory 420 may further include memory remotely located relative to processor 410, which may be connected to the computer device via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input means 430 may be used to receive entered numeric or character information and to generate key signal inputs related to user settings and function control of the computer device. The output 440 may include a display device such as a display screen.
Example five
A fifth embodiment of the present invention also provides a storage medium containing computer-executable instructions, which when executed by a computer processor, are for performing a method of generating an ini file, the method of generating an ini file comprising:
determining the configuration parameter information of the current ini file to be written and configuring the time stamp of the ini file;
and determining the ini file authentication information corresponding to the current writing ini file according to the ini file configuration parameter information and the timestamp of the configuration ini file, and generating a target ini file containing the ini file authentication information.
Of course, the storage medium containing the computer executable instructions provided in the embodiments of the present invention is not limited to the above-described method operations, and may also perform the related operations in the method for generating an ini file provided in any embodiment of the present invention.
From the above description of embodiments, it will be clear to a person skilled in the art that the present invention may be implemented by means of software and necessary general purpose hardware, but of course also by means of hardware, although in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product, which may be stored in a computer readable storage medium, such as a floppy disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a FLASH Memory (FLASH), a hard disk or an optical disk of a computer, etc., and include several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments of the present invention.
It should be noted that, in the embodiment of the generating device of the ini file, each unit and module included are only divided according to the functional logic, but not limited to the above-mentioned division, so long as the corresponding functions can be implemented; in addition, the specific names of the functional units are also only for distinguishing from each other, and are not used to limit the protection scope of the present invention.
Note that the above is only a preferred embodiment of the present invention and the technical principle applied. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, while the invention has been described in connection with the above embodiments, the invention is not limited to the embodiments, but may be embodied in many other equivalent forms without departing from the spirit or scope of the invention, which is set forth in the following claims.

Claims (9)

1. The method for generating the ini file is characterized by comprising the following steps of:
determining the configuration parameter information of the current ini file to be written and configuring the time stamp of the ini file;
determining the ini file authentication information corresponding to the current writing ini file according to the ini file configuration parameter information and the time stamp of the configuration ini file, and generating a target ini file containing the ini file authentication information;
determining a timestamp of a configuration ini file currently brushing the ini file, comprising:
determining legal use starting time and legal use ending time of the current writing ini file, and determining the timestamp of the configuration ini file according to the legal use starting time and the legal use ending time.
2. The ini file generation method according to claim 1, wherein the ini file configuration parameter information includes ECU version authentication information, variable name authentication information, and variable number authentication information;
determining the ini file authentication information corresponding to the current writing ini file according to the ini file configuration parameter information and the timestamp of the configuration ini file comprises the following steps:
and determining the ini file authentication information corresponding to the current updating ini file according to the ECU version authentication information, the variable name authentication information, the variable number authentication information and the timestamp of the configuration ini file.
3. The ini file generating method according to claim 2, wherein the ini file authentication information includes 10 authentication bytes;
the ECU version authentication information comprises 1 authentication byte, the variable name authentication information comprises 1 authentication byte, the variable number authentication information comprises 1 authentication byte, and the timestamp of the configuration ini file comprises 7 authentication bytes.
4. The ini file generation method according to claim 2, wherein the ECU version authentication information, the variable name authentication information, the variable number authentication information, and the timestamp of the configuration ini file are configured in 16 digits.
5. The ini file generating method as set forth in claim 1, further comprising:
acquiring the current use time of an ini file to be refreshed, and legal use starting time and legal use ending time corresponding to the ini file to be refreshed;
if the current use time is between the legal use starting time and the legal use ending time, the to-be-written ini file is considered to pass the ini file authentication; and if the current use time is not between the legal use starting time and the legal use ending time, stopping the brushing process of the to-be-brushed-written ini file.
6. The ini file generating method as set forth in claim 1, further comprising:
and storing the target ini file into a memory.
7. An ini file generation device, comprising:
the information generation module is used for determining the configuration parameter information of the current ini file and the timestamp of the configuration ini file;
the file generation module is used for determining the ini file authentication information corresponding to the current writing ini file according to the ini file configuration parameter information and the time stamp of the configuration ini file, and generating a target ini file containing the ini file authentication information;
determining a timestamp of a configuration ini file currently brushing the ini file, comprising:
determining legal use starting time and legal use ending time of the current writing ini file, and determining the timestamp of the configuration ini file according to the legal use starting time and the legal use ending time.
8. A computer device, the computer device comprising:
one or more processors;
a storage means for storing one or more programs;
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of generating an ini file as claimed in any one of claims 1-6.
9. A computer-readable storage medium, on which a computer program is stored, characterized in that the program, when being executed by a processor, implements the method of generating an ini file according to any one of claims 1-6.
CN202111140709.8A 2021-09-28 2021-09-28 Method, device, computer equipment and medium for generating ini file Active CN113867818B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202111140709.8A CN113867818B (en) 2021-09-28 2021-09-28 Method, device, computer equipment and medium for generating ini file
PCT/CN2022/121994 WO2023051573A1 (en) 2021-09-28 2022-09-28 Method and apparatus for generating ini file, computer device, and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111140709.8A CN113867818B (en) 2021-09-28 2021-09-28 Method, device, computer equipment and medium for generating ini file

Publications (2)

Publication Number Publication Date
CN113867818A CN113867818A (en) 2021-12-31
CN113867818B true CN113867818B (en) 2024-04-16

Family

ID=78991688

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111140709.8A Active CN113867818B (en) 2021-09-28 2021-09-28 Method, device, computer equipment and medium for generating ini file

Country Status (2)

Country Link
CN (1) CN113867818B (en)
WO (1) WO2023051573A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113867818B (en) * 2021-09-28 2024-04-16 潍柴动力股份有限公司 Method, device, computer equipment and medium for generating ini file

Citations (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2270577A1 (en) * 2009-06-30 2011-01-05 Essilor International (Compagnie Générale D'Optique) Method of and apparatus for generating a surface of an optical lens
CN102833264A (en) * 2012-09-07 2012-12-19 北京星网锐捷网络技术有限公司 Method and device for preventing authenticated user from escaping from fee through agent and authenticated client side
US9298371B1 (en) * 2014-12-22 2016-03-29 American Megatrends, Inc. System and method of reducing write cycles and increasing longevity of non-volatile memory in baseboard management controller (BMC)
CN106850311A (en) * 2017-03-03 2017-06-13 上海蔚来汽车有限公司 For the data safe transmission system and method for firmware upgrade
CN107015914A (en) * 2016-01-28 2017-08-04 长城汽车股份有限公司 Data scaling method and system
CN107273749A (en) * 2017-05-31 2017-10-20 武汉英泰斯特电子技术有限公司 A kind of vehicle ECU file securities write with a brush dipped in Chinese ink method and system
EP3249955A1 (en) * 2016-05-23 2017-11-29 Oticon A/s A configurable hearing aid comprising a beamformer filtering unit and a gain unit
CN107450931A (en) * 2017-08-15 2017-12-08 竞技世界(北京)网络技术有限公司 Visualizing editing method and device based on INI configuration files
CN107637014A (en) * 2017-08-02 2018-01-26 福建联迪商用设备有限公司 Configurable POS key is to generation method, storage medium
CN107800819A (en) * 2017-11-17 2018-03-13 深圳市泉眼网络科技有限公司 A kind of generation method of file identification, device and server
CN107918863A (en) * 2017-10-19 2018-04-17 阿里巴巴集团控股有限公司 Preposition processing and collocation method, device and equipment based on financial product
CN107919955A (en) * 2017-12-28 2018-04-17 北京奇虎科技有限公司 A kind of vehicle network safety certifying method, system, vehicle, device and medium
CN109212999A (en) * 2018-07-20 2019-01-15 北京航空航天大学 The intelligent generation method and system of digital satellite emulation operating condition
CN109445892A (en) * 2018-10-15 2019-03-08 珠海格力电器股份有限公司 A kind of data display method, device, electronic equipment and storage medium
CN109871225A (en) * 2019-02-22 2019-06-11 北京经纬恒润科技有限公司 Electronic control unit ECU upgrade method and ECU
CN109947465A (en) * 2019-03-29 2019-06-28 北京经纬恒润科技有限公司 A kind of data processing method and system
CN110138774A (en) * 2019-05-14 2019-08-16 重庆天蓬网络有限公司 A kind of hold-up interception method of the general CC attack of dynamic configuration
CN110196715A (en) * 2019-06-25 2019-09-03 上海仪电汽车电子系统有限公司 A kind of code generating system and method
CN110213113A (en) * 2019-06-19 2019-09-06 武汉虹信通信技术有限责任公司 The WEB configuring management method of base station and base station
CN110365540A (en) * 2019-07-30 2019-10-22 上海朝旭电子科技有限公司 A kind of security system data processing equipment
CN110460581A (en) * 2019-07-12 2019-11-15 捷德(中国)信息科技有限公司 Sharing files method, equipment, SE device, is shared end and medium at system
CN110673892A (en) * 2019-09-17 2020-01-10 中电万维信息技术有限责任公司 Interface unified calling method based on component configuration
CN110824982A (en) * 2019-10-23 2020-02-21 武汉光庭信息技术股份有限公司 ECU remote debugging method, server and storage medium
CN110990282A (en) * 2019-12-04 2020-04-10 中国直升机设计研究所 Automatic unit testing method
CN111010305A (en) * 2019-12-23 2020-04-14 烽火通信科技股份有限公司 Configuration management system and method based on NETCONF protocol
CN111182066A (en) * 2019-12-31 2020-05-19 青梧桐有限责任公司 Log level dynamic adjustment method based on token authentication
CN111274385A (en) * 2019-08-29 2020-06-12 无锡畅云网络有限公司 Log clustering classification technology based on text similarity
CN111353168A (en) * 2020-02-27 2020-06-30 闻泰通讯股份有限公司 Multimedia file management method, device, equipment and storage medium
CN111464639A (en) * 2020-03-31 2020-07-28 潍柴动力股份有限公司 Data acquisition method and device, storage medium and processor
CN112084159A (en) * 2020-07-28 2020-12-15 重庆攸亮科技股份有限公司 File synchronization system and method based on Bluetooth communication
CN112202665A (en) * 2020-09-30 2021-01-08 郑州信大捷安信息技术股份有限公司 Vehicle-mounted security gateway and data communication method thereof
CN112363984A (en) * 2020-11-13 2021-02-12 北京天融信网络安全技术有限公司 In-vehicle safety rule file generation method and device
CN112540958A (en) * 2020-12-08 2021-03-23 北京百度网讯科技有限公司 File processing method, device, equipment and computer storage medium
CN112749383A (en) * 2019-10-29 2021-05-04 上海商汤智能科技有限公司 Software authentication method and related product
CN112883382A (en) * 2021-03-03 2021-06-01 一汽解放汽车有限公司 Vehicle flashing method, vehicle networking box, vehicle and storage medium
CN112988218A (en) * 2021-02-05 2021-06-18 上海航天卫星应用有限公司 Configurable information flow management method and system

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6574657B1 (en) * 1999-05-03 2003-06-03 Symantec Corporation Methods and apparatuses for file synchronization and updating using a signature list
US7007049B2 (en) * 2002-11-18 2006-02-28 Innopath Software, Inc. Device memory management during electronic file updating
WO2008130610A1 (en) * 2007-04-20 2008-10-30 Mark Williams Vertical curve system for surface grading
US7720659B2 (en) * 2007-06-30 2010-05-18 Schlumberger Technology Corporation Simulating fluid flow in reservoir with modified grid
US9627081B2 (en) * 2007-10-05 2017-04-18 Kinglite Holdings Inc. Manufacturing mode for secure firmware using lock byte
US9135268B2 (en) * 2009-12-30 2015-09-15 Symantec Corporation Locating the latest version of replicated data files
US8838848B2 (en) * 2012-09-14 2014-09-16 Dell Products Lp Systems and methods for intelligent system profile unique data management
US10536314B2 (en) * 2016-06-03 2020-01-14 Centre Of Excellence In Wireless Technology OFDMA apparatus and method thereof for performing OFDM based communication in wireless communication system
CN113867818B (en) * 2021-09-28 2024-04-16 潍柴动力股份有限公司 Method, device, computer equipment and medium for generating ini file

Patent Citations (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2270577A1 (en) * 2009-06-30 2011-01-05 Essilor International (Compagnie Générale D'Optique) Method of and apparatus for generating a surface of an optical lens
CN102833264A (en) * 2012-09-07 2012-12-19 北京星网锐捷网络技术有限公司 Method and device for preventing authenticated user from escaping from fee through agent and authenticated client side
US9298371B1 (en) * 2014-12-22 2016-03-29 American Megatrends, Inc. System and method of reducing write cycles and increasing longevity of non-volatile memory in baseboard management controller (BMC)
CN107015914A (en) * 2016-01-28 2017-08-04 长城汽车股份有限公司 Data scaling method and system
EP3249955A1 (en) * 2016-05-23 2017-11-29 Oticon A/s A configurable hearing aid comprising a beamformer filtering unit and a gain unit
CN106850311A (en) * 2017-03-03 2017-06-13 上海蔚来汽车有限公司 For the data safe transmission system and method for firmware upgrade
CN107273749A (en) * 2017-05-31 2017-10-20 武汉英泰斯特电子技术有限公司 A kind of vehicle ECU file securities write with a brush dipped in Chinese ink method and system
CN107637014A (en) * 2017-08-02 2018-01-26 福建联迪商用设备有限公司 Configurable POS key is to generation method, storage medium
CN107450931A (en) * 2017-08-15 2017-12-08 竞技世界(北京)网络技术有限公司 Visualizing editing method and device based on INI configuration files
CN107918863A (en) * 2017-10-19 2018-04-17 阿里巴巴集团控股有限公司 Preposition processing and collocation method, device and equipment based on financial product
CN107800819A (en) * 2017-11-17 2018-03-13 深圳市泉眼网络科技有限公司 A kind of generation method of file identification, device and server
CN107919955A (en) * 2017-12-28 2018-04-17 北京奇虎科技有限公司 A kind of vehicle network safety certifying method, system, vehicle, device and medium
CN109212999A (en) * 2018-07-20 2019-01-15 北京航空航天大学 The intelligent generation method and system of digital satellite emulation operating condition
CN109445892A (en) * 2018-10-15 2019-03-08 珠海格力电器股份有限公司 A kind of data display method, device, electronic equipment and storage medium
CN109871225A (en) * 2019-02-22 2019-06-11 北京经纬恒润科技有限公司 Electronic control unit ECU upgrade method and ECU
CN109947465A (en) * 2019-03-29 2019-06-28 北京经纬恒润科技有限公司 A kind of data processing method and system
CN110138774A (en) * 2019-05-14 2019-08-16 重庆天蓬网络有限公司 A kind of hold-up interception method of the general CC attack of dynamic configuration
CN110213113A (en) * 2019-06-19 2019-09-06 武汉虹信通信技术有限责任公司 The WEB configuring management method of base station and base station
CN110196715A (en) * 2019-06-25 2019-09-03 上海仪电汽车电子系统有限公司 A kind of code generating system and method
CN110460581A (en) * 2019-07-12 2019-11-15 捷德(中国)信息科技有限公司 Sharing files method, equipment, SE device, is shared end and medium at system
CN110365540A (en) * 2019-07-30 2019-10-22 上海朝旭电子科技有限公司 A kind of security system data processing equipment
CN111274385A (en) * 2019-08-29 2020-06-12 无锡畅云网络有限公司 Log clustering classification technology based on text similarity
CN110673892A (en) * 2019-09-17 2020-01-10 中电万维信息技术有限责任公司 Interface unified calling method based on component configuration
CN110824982A (en) * 2019-10-23 2020-02-21 武汉光庭信息技术股份有限公司 ECU remote debugging method, server and storage medium
CN112749383A (en) * 2019-10-29 2021-05-04 上海商汤智能科技有限公司 Software authentication method and related product
CN110990282A (en) * 2019-12-04 2020-04-10 中国直升机设计研究所 Automatic unit testing method
CN111010305A (en) * 2019-12-23 2020-04-14 烽火通信科技股份有限公司 Configuration management system and method based on NETCONF protocol
CN111182066A (en) * 2019-12-31 2020-05-19 青梧桐有限责任公司 Log level dynamic adjustment method based on token authentication
CN111353168A (en) * 2020-02-27 2020-06-30 闻泰通讯股份有限公司 Multimedia file management method, device, equipment and storage medium
CN111464639A (en) * 2020-03-31 2020-07-28 潍柴动力股份有限公司 Data acquisition method and device, storage medium and processor
CN112084159A (en) * 2020-07-28 2020-12-15 重庆攸亮科技股份有限公司 File synchronization system and method based on Bluetooth communication
CN112202665A (en) * 2020-09-30 2021-01-08 郑州信大捷安信息技术股份有限公司 Vehicle-mounted security gateway and data communication method thereof
CN112363984A (en) * 2020-11-13 2021-02-12 北京天融信网络安全技术有限公司 In-vehicle safety rule file generation method and device
CN112540958A (en) * 2020-12-08 2021-03-23 北京百度网讯科技有限公司 File processing method, device, equipment and computer storage medium
CN112988218A (en) * 2021-02-05 2021-06-18 上海航天卫星应用有限公司 Configurable information flow management method and system
CN112883382A (en) * 2021-03-03 2021-06-01 一汽解放汽车有限公司 Vehicle flashing method, vehicle networking box, vehicle and storage medium

Also Published As

Publication number Publication date
WO2023051573A1 (en) 2023-04-06
CN113867818A (en) 2021-12-31

Similar Documents

Publication Publication Date Title
CN107819569B (en) The encryption method and terminal device of log-on message
CA2906475C (en) Method and apparatus for substitution scheme for anonymizing personally identifiable information
CN108090567A (en) Power communication system method for diagnosing faults and device
CN110662184A (en) Information pushing method and device, computer equipment and storage medium
CN109493043A (en) The blocking method, apparatus of transaction record, electronic equipment and storage medium
CN108875077B (en) Column storage method and device of database, server and storage medium
CN104572781A (en) Method and device for generating transaction log
CN104966026A (en) Arithmetical operation system
CN111580965A (en) Data request processing method and system
CN112636957A (en) Early warning method and device based on log, server and storage medium
CN113867818B (en) Method, device, computer equipment and medium for generating ini file
CN113364753A (en) Anti-crawler method and device, electronic equipment and computer readable storage medium
CN110019205B (en) Data storage and restoration method and device and computer equipment
CN111090616B (en) File management method, corresponding device, equipment and storage medium
CN111797285A (en) Character string fuzzy matching method, device, equipment and readable storage medium
CN111984989A (en) Method, device, system and medium for verifying, issuing and accessing URL (uniform resource locator)
CN111104693A (en) Android platform software data cracking method, terminal device and storage medium
CN110851446B (en) Data table generation method and device, computer equipment and storage medium
CN113674083A (en) Internet financial platform credit risk monitoring method, device and computer system
CN112559497A (en) Data processing method, information transmission method and device and electronic equipment
CN112883301A (en) Method and device for generating short link based on 55 system and storage medium
CN115439118B (en) Digital certificate storage management method based on blockchain
CN112202822B (en) Database injection detection method and device, electronic equipment and storage medium
CN104821873B (en) A kind of implementation method of cryptosecurity
CN110727654B (en) Data extraction method and device for distributed system, server and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant