CN113923622A - Method for upgrading vehicle-mounted controller based on mobile phone Bluetooth key - Google Patents
Method for upgrading vehicle-mounted controller based on mobile phone Bluetooth key Download PDFInfo
- Publication number
- CN113923622A CN113923622A CN202111159630.XA CN202111159630A CN113923622A CN 113923622 A CN113923622 A CN 113923622A CN 202111159630 A CN202111159630 A CN 202111159630A CN 113923622 A CN113923622 A CN 113923622A
- Authority
- CN
- China
- Prior art keywords
- vehicle
- updated
- mobile phone
- software
- software package
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72406—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/72412—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/009—Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
- H04W12/106—Packet or message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/14—Direct-mode setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/19—Connection re-establishment
Abstract
The invention relates to a method for upgrading a vehicle-mounted controller based on a mobile phone Bluetooth key, which comprises the following steps: the gateway of the vehicle reads the current software version of each vehicle-mounted controller and uploads the current software version to the mobile phone APP; the mobile phone APP uploads the current software version of the vehicle-mounted controller to a background server; when receiving the software information to be updated sent by the background server, displaying the software information to be updated and outputting information for requesting a user to confirm whether the software information to be updated enters updating; after receiving the confirmation information, initiating a software package request to a background server; receiving a software package to be updated encrypted by a background server through PKI, and carrying out PKI decryption on the received software package to be updated; carrying out SDK encryption on the software package to be updated after PKI decryption, carrying out SDK encryption on the software package to be updated after the SDK encryption, and sending the software package to be updated after the SDK encryption to a gateway of a vehicle; and the gateway of the vehicle carries out SDK decryption on the received software package to be updated and then carries out vehicle-mounted controller software upgrading on the basis of the decrypted software package to be updated.
Description
Technical Field
The invention belongs to the technical field of vehicle-mounted controller software upgrading (OTA), and particularly relates to a method for upgrading a vehicle-mounted controller based on a mobile phone Bluetooth key.
Background
Modern vehicle software has The requirements of problem rectification, function upgrading and function interface optimization, and is currently realized through OTA (over The air), namely, a cloud upgrading technology is used for providing software upgrading services for equipment with networking functions, including upgrading of a driver, a system, functions, applications and The like. OTA is divided into two categories: SOTA (software Over The air) and FOTA (firmware Over The air), wherein The SOTA is mainly used for upgrading application programs, such as map software and audio and video software. FOTA refers to downloading firmware or updating flash memory, etc. to a device or controller. Compared with the SOTA which needs to directly refresh and rewrite the controller due to the FOTA, the safety and the reliability of the controller are more challenging. The upgrade environment needs an effective protection mechanism for encryption and decryption signatures, encrypted channels, secure boot, and the like. The existing FOTA is updated and refreshed mainly through vehicle TBOX networking, and has a complete scheme for safety and effectiveness. But there is no effective and reliable solution to implement FOTA upgrades for vehicles without a TBOX configuration. With the development of key digitalization, more and more vehicles are provided with a mobile phone Bluetooth key function. The mobile phone Bluetooth key system has a high-safety architecture system, covers PKI, a mobile terminal safety library, a vehicle-mounted safety chip and the like, and is sufficient for supporting encrypted transmission and safety upgrading of vehicle-mounted controller software.
The prior art provides a vehicle networking terminal supporting other ECU FOTA upgrading and an implementation method (CN 201811139711.1), and provides a vehicle controller upgrading system formed on the basis of a vehicle networking platform, a vehicle TBOX terminal and ECU components. However, the above solutions have to carry a TBOX terminal on the vehicle end, and when the vehicle is not configured with TBOX, none of the above solutions can upgrade FOTA for the vehicle-mounted controller.
The prior art also provides an upgrading method of the vehicle-mounted communication device, the vehicle-mounted communication device and a mobile terminal (CN 109525961A), and provides a technical means for upgrading the vehicle-mounted communication device by establishing Bluetooth connection between a vehicle and a mobile phone and transmitting an upgrading file to the vehicle-mounted communication device by the mobile phone; the vehicle-mounted control device, the terminal device, and the vehicle control program updating method and system (CN 106154997A) provide a method for updating the vehicle-side controller after the terminal device and the vehicle-mounted communication module are wirelessly communicated for identification and authentication. According to the two schemes, the software of the vehicle-mounted controller is upgraded by utilizing Bluetooth communication, how to safely store the software flashing packet in the mobile phone end and how to encrypt and transmit the software flashing packet to the vehicle-mounted communication device by using Bluetooth at the mobile phone end are not realized, how to verify and decrypt the flashing packet by the vehicle-mounted communication device is realized, the whole link has no effective data encryption protection, and the risk of vehicle driving safety caused by hacking, cracking, tampering and flashing data exists in any link.
Disclosure of Invention
The invention aims to provide a method for upgrading an on-board controller based on a mobile phone Bluetooth key, which can realize safe and effective upgrading of the on-board controller for vehicles without networking function.
The technical scheme of the invention is as follows:
the invention provides a method for upgrading a vehicle-mounted controller based on a mobile phone Bluetooth key, which comprises the following steps:
step S101, establishing Bluetooth connection between a mobile phone APP and a gateway of a vehicle through a Bluetooth module of the vehicle;
step S102, a gateway of a vehicle reads the current software version of each vehicle-mounted controller and uploads the current software version to a mobile phone APP;
step S103, uploading the current software version of the vehicle-mounted controller to a background server by the mobile phone APP so as to judge whether the vehicle-mounted controller needing to be updated exists;
step S104, when receiving the software information to be updated sent by the background server, the mobile phone APP displays the software information to be updated and outputs information for requesting a user to confirm whether to enter the updating;
step S105, after receiving the information confirmed by the user, the mobile phone APP initiates a software package request to a background server;
step S106, the mobile phone APP receives the software package to be updated, which is encrypted by the background server through PKI based on the software package request, and carries out PKI decryption on the received software package to be updated;
step S107, the mobile phone APP carries out SDK encryption on the software package to be updated after PKI decryption, and then sends the software package to be updated after SDK encryption to a gateway of a vehicle after SDK encryption;
and S108, the gateway of the vehicle carries out SDK decryption on the received software package to be updated, and then carries out vehicle-mounted controller software upgrading on the basis of the decrypted software package to be updated.
Preferably, before the step S107, the method further comprises:
step S109, judging whether the Bluetooth connection with the gateway of the vehicle is disconnected; if not, directly entering step S107;
and step S110, if the vehicle is disconnected, reestablishing the Bluetooth connection with the gateway of the vehicle, and then entering step S107.
Preferably, in step S104, the software information to be updated includes: list information of the software to be updated, specific updating content corresponding to each software and the size of the software package.
Preferably, in step S106, the mobile phone APP calculates the received software package to be updated through the HUSH algorithm to obtain a first integrity metric value, performs signature verification through the public key to obtain a second integrity metric value, and completes decryption of the PKI of the received software package to be updated if the first integrity metric value is the same as the second integrity metric value.
Preferably, the method further comprises:
and step S111, receiving and displaying the information which is sent by the gateway of the vehicle and finishes upgrading the vehicle-mounted controller.
The invention has the following advantages:
this scheme is directed against the vehicle that does not network but has the bluetooth key function, the mode of the safe channel upgrading vehicle-mounted controller through the transmission of cell-phone bluetooth key system encryption is provided, cell-phone bluetooth key system has PKI encryption system at the background server, cell-phone APP has white box safety algorithm, vehicle-mounted bluetooth has hardware security chip, entire system data link is for encrypting the transmission, security and validity of data when having guaranteed vehicle-mounted controller and upgrading, and also effectively reduced development risk and recall the cost. The software upgrading of the vehicle-mounted controller can be realized without networking the vehicle, so that the TBOX cost can be saved; the upgrade package is downloaded and installed separately, users can download to the mobile phone in any place with network, upgrade time and place to the vehicle carried controller are chosen flexibly; the safe information transmission channel established by the Bluetooth key system is multiplexed, full link encryption transmission and anti-cracking tampering are realized, and the installation of the flash packet is safe and reliable in transmission.
Drawings
FIG. 1 is a block diagram of the present invention;
FIG. 2 is a schematic diagram of a verification based on signature technology;
FIG. 3 is a diagram of a Bluetooth key secure channel establishment process;
FIG. 4 is a flow chart of the present invention.
Detailed Description
The invention is further described below with reference to the accompanying drawings.
The invention relates to a design scheme for upgrading a vehicle-mounted controller based on a Bluetooth key, which comprises the following steps as shown in figures 1 and 4:
step S101: the mobile phone APP is connected with the gateway of the vehicle through the Bluetooth module of the vehicle.
After a user searches for the vehicle-end Bluetooth through the mobile phone APP, the white box algorithm SDK carried in the mobile phone APP performs security authentication with the security chip of the Bluetooth module, and a Bluetooth key security channel is established if the authentication is successful.
Step S102: the gateway reads the software and hardware version information of the vehicle-mounted controller, and uploads the current version information of the vehicle-mounted controller to the mobile phone APP when the mobile phone Bluetooth key is used.
And step S103, uploading the current version information of the vehicle-mounted controller to a background server by the mobile phone APP, and comparing the version information by the background server to judge whether the vehicle-mounted server needing to be updated exists.
And step S104, when receiving the software information to be updated sent by the background server, the mobile phone APP displays the software information to be updated and outputs information for requesting a user to confirm whether to enter the updating.
Step S105, after receiving the information confirmed by the user, the mobile phone APP initiates a software package request to the background server.
And step S106, the mobile phone APP receives the software package to be updated, which is encrypted by the background server through PKI based on the software package request, and carries out PKI decryption on the received software package to be updated.
Specifically, in the background server, a vehicle-mounted software management system (VSM) performs software version management and update strategy management for controller software upgrading, a key management system (PKI) performs encryption and signature on a software program package, and a remote service providing management platform (TSP) realizes pushing of upgrade data to a mobile phone terminal.
And after downloading the software package to be updated, the mobile phone APP carries out verification based on a signature technology, the integrity and the legality of the update package are confirmed, if the update package is incomplete or quit according to an illegal rule, and if the update package is not updated, the mobile phone APP quits reminding.
The verification principle based on the signature technology is shown in fig. 2, after the software to be updated is packaged by the background server, the integrity metric value of the software package to be updated is obtained through the HASH algorithm, and then the signature is carried out through a private Key (Priv _ Key). After the encrypted software package to be updated is downloaded to a mobile phone APP, the integrity and the legality of the signature are checked for the first time, a first integrity measurement value is obtained through a HASH algorithm, a signature in the software package to be updated is checked for the second integrity measurement value through a public Key (Pub _ Key), and whether the first integrity measurement value and the second integrity measurement value are the same or not is compared, if the first integrity measurement value and the second integrity measurement value are the same, the signature is checked for qualification, and if the first integrity measurement value and the second integrity measurement value are not the same, the signature fails.
And step S107, the mobile phone APP carries out SDK encryption on the software package to be updated after PKI decryption, and then carries out SDK encryption on the software package to be updated after the SDK encryption and sends the software package to be updated to a gateway of the vehicle.
And S108, the gateway of the vehicle carries out SDK decryption on the received software package to be updated, and then carries out vehicle-mounted controller software upgrading on the basis of the decrypted software package to be updated.
In the embodiment, the software to be updated is encrypted and wirelessly transmitted to prevent relay attack in the transmission process, the hardware security chip of the CC EAL5+ decrypts, and under the condition that the vehicle does not contain TBOX, the reliable transmission of the software to be updated is realized through a security channel provided by a Bluetooth module of the vehicle.
In this embodiment, the process of establishing the bluetooth channel between the mobile phone APP and the vehicle is as shown in fig. 3:
1. a mobile phone APP initiates a request for establishing a secure channel; 2. the safety SDK assembles data, encrypts the data and sends the data through the APP; 3. the mobile phone APP sends the encrypted data to the vehicle-end Bluetooth module through Bluetooth; 4. the MCU of the vehicle-end Bluetooth module transmits the received encrypted data to the security chip through the SPI for unpacking and informs the MCU to perform corresponding processing; 5. after the MCU of the vehicle-end Bluetooth module informs the processing result to the security chip, the security chip assembles data, and the assembled data is sent to the MCU; 6. the MCU of the vehicle-end Bluetooth module transmits the assembled data to the mobile phone end through Bluetooth; 7. the mobile phone APP receives the ciphertext data and sends the ciphertext data to the safe SDK for unpacking; 8. and the safety SDK carries out unpacking and decryption on the data and informs the result to the mobile phone APP.
Claims (5)
1. A method for upgrading an on-board controller based on a mobile phone Bluetooth key is characterized by comprising the following steps:
step S101, establishing Bluetooth connection between a mobile phone APP and a gateway of a vehicle through a Bluetooth module of the vehicle;
step S102, a gateway of a vehicle reads the current software version of each vehicle-mounted controller and uploads the current software version to a mobile phone APP;
step S103, uploading the current software version of the vehicle-mounted controller to a background server by the mobile phone APP so as to judge whether the vehicle-mounted controller needing to be updated exists;
step S104, when receiving the software information to be updated sent by the background server, the mobile phone APP displays the software information to be updated and outputs information for requesting a user to confirm whether to enter the updating;
step S105, after receiving the information confirmed by the user, the mobile phone APP initiates a software package request to a background server;
step S106, the mobile phone APP receives the software package to be updated, which is encrypted by the background server through PKI based on the software package request, and carries out PKI decryption on the received software package to be updated;
step S107, the mobile phone APP carries out SDK encryption on the software package to be updated after PKI decryption, and then sends the software package to be updated after SDK encryption to a gateway of a vehicle after SDK encryption;
and S108, the gateway of the vehicle carries out SDK decryption on the received software package to be updated, and then carries out vehicle-mounted controller software upgrading on the basis of the decrypted software package to be updated.
2. The method for upgrading the vehicle-mounted controller based on the mobile phone Bluetooth key of claim 1, wherein before the step S107, the method further comprises:
step S109, judging whether the Bluetooth connection with the gateway of the vehicle is disconnected; if the vehicle is disconnected, the Bluetooth connection with the gateway of the vehicle is reestablished; if not, the process proceeds directly to step S107.
3. The method for upgrading the vehicle-mounted controller based on the mobile phone Bluetooth key as claimed in claim 1, wherein in step S104, the software information to be updated includes: list information of the software to be updated, specific updating content corresponding to each software and the size of the software package.
4. The method for upgrading the vehicle-mounted controller based on the mobile phone bluetooth key as claimed in claim 1, wherein in step S106, the mobile phone APP calculates the received software package to be updated through the HUSH algorithm to obtain a first integrity metric value, performs signature verification through a public key to obtain a second integrity metric value, and completes the PKI decryption of the received software package to be updated if the first integrity metric value is the same as the second integrity metric value.
5. The method for upgrading the vehicle-mounted controller based on the mobile phone Bluetooth key as claimed in claim 1, wherein the method further comprises:
and step S111, receiving and displaying the information which is sent by the gateway of the vehicle and finishes upgrading the vehicle-mounted controller.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111159630.XA CN113923622A (en) | 2021-09-30 | 2021-09-30 | Method for upgrading vehicle-mounted controller based on mobile phone Bluetooth key |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111159630.XA CN113923622A (en) | 2021-09-30 | 2021-09-30 | Method for upgrading vehicle-mounted controller based on mobile phone Bluetooth key |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113923622A true CN113923622A (en) | 2022-01-11 |
Family
ID=79237335
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111159630.XA Withdrawn CN113923622A (en) | 2021-09-30 | 2021-09-30 | Method for upgrading vehicle-mounted controller based on mobile phone Bluetooth key |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113923622A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114499851A (en) * | 2022-01-30 | 2022-05-13 | 重庆长安汽车股份有限公司 | Method for realizing safe filling of root key based on end-cloud integration |
CN114826911A (en) * | 2022-03-10 | 2022-07-29 | 浙江零跑科技股份有限公司 | OTA upgrading implementation method combining automobile and mobile phone |
CN114882617A (en) * | 2022-03-25 | 2022-08-09 | 潍柴动力股份有限公司 | Multi-terminal emergency unlocking method and device |
CN115242634A (en) * | 2022-07-05 | 2022-10-25 | 蔚来汽车科技(安徽)有限公司 | Software upgrading method, device and storage medium |
CN115278592A (en) * | 2022-06-06 | 2022-11-01 | 重庆长安汽车股份有限公司 | Vehicle offline self-checking system and method for detecting Bluetooth key function |
CN116056045A (en) * | 2023-03-31 | 2023-05-02 | 江铃汽车股份有限公司 | AB point customer parking remote upgrading method and system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110855558A (en) * | 2018-08-21 | 2020-02-28 | 上海博泰悦臻网络技术服务有限公司 | Internet of vehicles gateway and CANoverTCP/IP protocol connection implementation method, ECU and upgrading method |
CN111343064A (en) * | 2020-02-29 | 2020-06-26 | 东风汽车集团有限公司 | System and method for upgrading software of automobile control system |
WO2020211016A1 (en) * | 2019-04-17 | 2020-10-22 | 华为技术有限公司 | Device upgrade method and related device |
CN112130875A (en) * | 2020-08-27 | 2020-12-25 | 长城汽车股份有限公司 | Vehicle ECU software upgrading method, device and system |
CN112585905A (en) * | 2019-11-12 | 2021-03-30 | 华为技术有限公司 | Equipment upgrading method and related equipment |
CN112799706A (en) * | 2019-11-14 | 2021-05-14 | 华为技术有限公司 | Vehicle upgrade package processing method and device |
-
2021
- 2021-09-30 CN CN202111159630.XA patent/CN113923622A/en not_active Withdrawn
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110855558A (en) * | 2018-08-21 | 2020-02-28 | 上海博泰悦臻网络技术服务有限公司 | Internet of vehicles gateway and CANoverTCP/IP protocol connection implementation method, ECU and upgrading method |
WO2020211016A1 (en) * | 2019-04-17 | 2020-10-22 | 华为技术有限公司 | Device upgrade method and related device |
CN112543927A (en) * | 2019-04-17 | 2021-03-23 | 华为技术有限公司 | Equipment upgrading method and related equipment |
CN112585905A (en) * | 2019-11-12 | 2021-03-30 | 华为技术有限公司 | Equipment upgrading method and related equipment |
CN112799706A (en) * | 2019-11-14 | 2021-05-14 | 华为技术有限公司 | Vehicle upgrade package processing method and device |
CN111343064A (en) * | 2020-02-29 | 2020-06-26 | 东风汽车集团有限公司 | System and method for upgrading software of automobile control system |
CN112130875A (en) * | 2020-08-27 | 2020-12-25 | 长城汽车股份有限公司 | Vehicle ECU software upgrading method, device and system |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114499851A (en) * | 2022-01-30 | 2022-05-13 | 重庆长安汽车股份有限公司 | Method for realizing safe filling of root key based on end-cloud integration |
CN114499851B (en) * | 2022-01-30 | 2023-05-26 | 重庆长安汽车股份有限公司 | Method for realizing safe filling of root keys based on end cloud integration |
CN114826911A (en) * | 2022-03-10 | 2022-07-29 | 浙江零跑科技股份有限公司 | OTA upgrading implementation method combining automobile and mobile phone |
CN114882617A (en) * | 2022-03-25 | 2022-08-09 | 潍柴动力股份有限公司 | Multi-terminal emergency unlocking method and device |
CN115278592A (en) * | 2022-06-06 | 2022-11-01 | 重庆长安汽车股份有限公司 | Vehicle offline self-checking system and method for detecting Bluetooth key function |
CN115278592B (en) * | 2022-06-06 | 2024-03-15 | 重庆长安汽车股份有限公司 | Vehicle offline self-checking system and method for detecting Bluetooth key function |
CN115242634A (en) * | 2022-07-05 | 2022-10-25 | 蔚来汽车科技(安徽)有限公司 | Software upgrading method, device and storage medium |
CN115242634B (en) * | 2022-07-05 | 2024-03-12 | 蔚来汽车科技(安徽)有限公司 | Software upgrading method, device and storage medium |
CN116056045A (en) * | 2023-03-31 | 2023-05-02 | 江铃汽车股份有限公司 | AB point customer parking remote upgrading method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113923622A (en) | Method for upgrading vehicle-mounted controller based on mobile phone Bluetooth key | |
US10965450B2 (en) | In-vehicle networking | |
US8972736B2 (en) | Fully authenticated content transmission from a provider to a recipient device via an intermediary device | |
CN108419233B (en) | Over-the-air update security | |
US10999078B2 (en) | Software distribution processing device, software distribution processing method, and vehicle | |
CN111510485B (en) | OTA upgrade package downloading method, device, vehicle end and server | |
EP3780481B1 (en) | Method for upgrading vehicle-mounted device, and related device | |
US8582775B2 (en) | Method of securing and authenticating data using micro-certificates | |
US9132790B2 (en) | In-vehicle network system | |
CN111279310A (en) | Vehicle-mounted equipment upgrading method and related equipment | |
CN112543927B (en) | Equipment upgrading method and related equipment | |
US20220276855A1 (en) | Method and apparatus for processing upgrade package of vehicle | |
US20080189695A1 (en) | Updating of Data Instructions | |
CN110572418A (en) | Vehicle identity authentication method and device, computer equipment and storage medium | |
US9706372B2 (en) | Secure SMS messaging | |
CN110891257A (en) | Internet vehicle remote upgrading system and method with anti-attack bidirectional authentication | |
CN114327532A (en) | Automobile OTA (over the air) upgrade information security implementation method based on digital signature and encryption | |
CN115665138A (en) | Automobile OTA (over the air) upgrading system and method | |
CN113572795A (en) | Vehicle safety communication method and system and vehicle-mounted terminal | |
CN113163375B (en) | Air certificate issuing method and system based on NB-IoT communication module | |
CN117097462A (en) | Vehicle-mounted intelligent software upgrading encryption system based on quantum key system | |
CN109802929B (en) | Client program upgrading method based on dual systems and computer readable storage medium | |
CN115119208A (en) | Upgrade package encryption and decryption methods and devices | |
CN111464554B (en) | Vehicle information safety control method and system | |
CN112839019A (en) | Vehicle-mounted data transmission method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20220111 |
|
WW01 | Invention patent application withdrawn after publication |