CN113923622A - Method for upgrading vehicle-mounted controller based on mobile phone Bluetooth key - Google Patents

Method for upgrading vehicle-mounted controller based on mobile phone Bluetooth key Download PDF

Info

Publication number
CN113923622A
CN113923622A CN202111159630.XA CN202111159630A CN113923622A CN 113923622 A CN113923622 A CN 113923622A CN 202111159630 A CN202111159630 A CN 202111159630A CN 113923622 A CN113923622 A CN 113923622A
Authority
CN
China
Prior art keywords
vehicle
updated
mobile phone
software
software package
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202111159630.XA
Other languages
Chinese (zh)
Inventor
杨凤
刘平
刘洋
张一强
何文
冯超
姚迪
刘启贤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Changan Automobile Co Ltd
Original Assignee
Chongqing Changan Automobile Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Changan Automobile Co Ltd filed Critical Chongqing Changan Automobile Co Ltd
Priority to CN202111159630.XA priority Critical patent/CN113923622A/en
Publication of CN113923622A publication Critical patent/CN113923622A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72406User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72412User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/009Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/19Connection re-establishment

Abstract

The invention relates to a method for upgrading a vehicle-mounted controller based on a mobile phone Bluetooth key, which comprises the following steps: the gateway of the vehicle reads the current software version of each vehicle-mounted controller and uploads the current software version to the mobile phone APP; the mobile phone APP uploads the current software version of the vehicle-mounted controller to a background server; when receiving the software information to be updated sent by the background server, displaying the software information to be updated and outputting information for requesting a user to confirm whether the software information to be updated enters updating; after receiving the confirmation information, initiating a software package request to a background server; receiving a software package to be updated encrypted by a background server through PKI, and carrying out PKI decryption on the received software package to be updated; carrying out SDK encryption on the software package to be updated after PKI decryption, carrying out SDK encryption on the software package to be updated after the SDK encryption, and sending the software package to be updated after the SDK encryption to a gateway of a vehicle; and the gateway of the vehicle carries out SDK decryption on the received software package to be updated and then carries out vehicle-mounted controller software upgrading on the basis of the decrypted software package to be updated.

Description

Method for upgrading vehicle-mounted controller based on mobile phone Bluetooth key
Technical Field
The invention belongs to the technical field of vehicle-mounted controller software upgrading (OTA), and particularly relates to a method for upgrading a vehicle-mounted controller based on a mobile phone Bluetooth key.
Background
Modern vehicle software has The requirements of problem rectification, function upgrading and function interface optimization, and is currently realized through OTA (over The air), namely, a cloud upgrading technology is used for providing software upgrading services for equipment with networking functions, including upgrading of a driver, a system, functions, applications and The like. OTA is divided into two categories: SOTA (software Over The air) and FOTA (firmware Over The air), wherein The SOTA is mainly used for upgrading application programs, such as map software and audio and video software. FOTA refers to downloading firmware or updating flash memory, etc. to a device or controller. Compared with the SOTA which needs to directly refresh and rewrite the controller due to the FOTA, the safety and the reliability of the controller are more challenging. The upgrade environment needs an effective protection mechanism for encryption and decryption signatures, encrypted channels, secure boot, and the like. The existing FOTA is updated and refreshed mainly through vehicle TBOX networking, and has a complete scheme for safety and effectiveness. But there is no effective and reliable solution to implement FOTA upgrades for vehicles without a TBOX configuration. With the development of key digitalization, more and more vehicles are provided with a mobile phone Bluetooth key function. The mobile phone Bluetooth key system has a high-safety architecture system, covers PKI, a mobile terminal safety library, a vehicle-mounted safety chip and the like, and is sufficient for supporting encrypted transmission and safety upgrading of vehicle-mounted controller software.
The prior art provides a vehicle networking terminal supporting other ECU FOTA upgrading and an implementation method (CN 201811139711.1), and provides a vehicle controller upgrading system formed on the basis of a vehicle networking platform, a vehicle TBOX terminal and ECU components. However, the above solutions have to carry a TBOX terminal on the vehicle end, and when the vehicle is not configured with TBOX, none of the above solutions can upgrade FOTA for the vehicle-mounted controller.
The prior art also provides an upgrading method of the vehicle-mounted communication device, the vehicle-mounted communication device and a mobile terminal (CN 109525961A), and provides a technical means for upgrading the vehicle-mounted communication device by establishing Bluetooth connection between a vehicle and a mobile phone and transmitting an upgrading file to the vehicle-mounted communication device by the mobile phone; the vehicle-mounted control device, the terminal device, and the vehicle control program updating method and system (CN 106154997A) provide a method for updating the vehicle-side controller after the terminal device and the vehicle-mounted communication module are wirelessly communicated for identification and authentication. According to the two schemes, the software of the vehicle-mounted controller is upgraded by utilizing Bluetooth communication, how to safely store the software flashing packet in the mobile phone end and how to encrypt and transmit the software flashing packet to the vehicle-mounted communication device by using Bluetooth at the mobile phone end are not realized, how to verify and decrypt the flashing packet by the vehicle-mounted communication device is realized, the whole link has no effective data encryption protection, and the risk of vehicle driving safety caused by hacking, cracking, tampering and flashing data exists in any link.
Disclosure of Invention
The invention aims to provide a method for upgrading an on-board controller based on a mobile phone Bluetooth key, which can realize safe and effective upgrading of the on-board controller for vehicles without networking function.
The technical scheme of the invention is as follows:
the invention provides a method for upgrading a vehicle-mounted controller based on a mobile phone Bluetooth key, which comprises the following steps:
step S101, establishing Bluetooth connection between a mobile phone APP and a gateway of a vehicle through a Bluetooth module of the vehicle;
step S102, a gateway of a vehicle reads the current software version of each vehicle-mounted controller and uploads the current software version to a mobile phone APP;
step S103, uploading the current software version of the vehicle-mounted controller to a background server by the mobile phone APP so as to judge whether the vehicle-mounted controller needing to be updated exists;
step S104, when receiving the software information to be updated sent by the background server, the mobile phone APP displays the software information to be updated and outputs information for requesting a user to confirm whether to enter the updating;
step S105, after receiving the information confirmed by the user, the mobile phone APP initiates a software package request to a background server;
step S106, the mobile phone APP receives the software package to be updated, which is encrypted by the background server through PKI based on the software package request, and carries out PKI decryption on the received software package to be updated;
step S107, the mobile phone APP carries out SDK encryption on the software package to be updated after PKI decryption, and then sends the software package to be updated after SDK encryption to a gateway of a vehicle after SDK encryption;
and S108, the gateway of the vehicle carries out SDK decryption on the received software package to be updated, and then carries out vehicle-mounted controller software upgrading on the basis of the decrypted software package to be updated.
Preferably, before the step S107, the method further comprises:
step S109, judging whether the Bluetooth connection with the gateway of the vehicle is disconnected; if not, directly entering step S107;
and step S110, if the vehicle is disconnected, reestablishing the Bluetooth connection with the gateway of the vehicle, and then entering step S107.
Preferably, in step S104, the software information to be updated includes: list information of the software to be updated, specific updating content corresponding to each software and the size of the software package.
Preferably, in step S106, the mobile phone APP calculates the received software package to be updated through the HUSH algorithm to obtain a first integrity metric value, performs signature verification through the public key to obtain a second integrity metric value, and completes decryption of the PKI of the received software package to be updated if the first integrity metric value is the same as the second integrity metric value.
Preferably, the method further comprises:
and step S111, receiving and displaying the information which is sent by the gateway of the vehicle and finishes upgrading the vehicle-mounted controller.
The invention has the following advantages:
this scheme is directed against the vehicle that does not network but has the bluetooth key function, the mode of the safe channel upgrading vehicle-mounted controller through the transmission of cell-phone bluetooth key system encryption is provided, cell-phone bluetooth key system has PKI encryption system at the background server, cell-phone APP has white box safety algorithm, vehicle-mounted bluetooth has hardware security chip, entire system data link is for encrypting the transmission, security and validity of data when having guaranteed vehicle-mounted controller and upgrading, and also effectively reduced development risk and recall the cost. The software upgrading of the vehicle-mounted controller can be realized without networking the vehicle, so that the TBOX cost can be saved; the upgrade package is downloaded and installed separately, users can download to the mobile phone in any place with network, upgrade time and place to the vehicle carried controller are chosen flexibly; the safe information transmission channel established by the Bluetooth key system is multiplexed, full link encryption transmission and anti-cracking tampering are realized, and the installation of the flash packet is safe and reliable in transmission.
Drawings
FIG. 1 is a block diagram of the present invention;
FIG. 2 is a schematic diagram of a verification based on signature technology;
FIG. 3 is a diagram of a Bluetooth key secure channel establishment process;
FIG. 4 is a flow chart of the present invention.
Detailed Description
The invention is further described below with reference to the accompanying drawings.
The invention relates to a design scheme for upgrading a vehicle-mounted controller based on a Bluetooth key, which comprises the following steps as shown in figures 1 and 4:
step S101: the mobile phone APP is connected with the gateway of the vehicle through the Bluetooth module of the vehicle.
After a user searches for the vehicle-end Bluetooth through the mobile phone APP, the white box algorithm SDK carried in the mobile phone APP performs security authentication with the security chip of the Bluetooth module, and a Bluetooth key security channel is established if the authentication is successful.
Step S102: the gateway reads the software and hardware version information of the vehicle-mounted controller, and uploads the current version information of the vehicle-mounted controller to the mobile phone APP when the mobile phone Bluetooth key is used.
And step S103, uploading the current version information of the vehicle-mounted controller to a background server by the mobile phone APP, and comparing the version information by the background server to judge whether the vehicle-mounted server needing to be updated exists.
And step S104, when receiving the software information to be updated sent by the background server, the mobile phone APP displays the software information to be updated and outputs information for requesting a user to confirm whether to enter the updating.
Step S105, after receiving the information confirmed by the user, the mobile phone APP initiates a software package request to the background server.
And step S106, the mobile phone APP receives the software package to be updated, which is encrypted by the background server through PKI based on the software package request, and carries out PKI decryption on the received software package to be updated.
Specifically, in the background server, a vehicle-mounted software management system (VSM) performs software version management and update strategy management for controller software upgrading, a key management system (PKI) performs encryption and signature on a software program package, and a remote service providing management platform (TSP) realizes pushing of upgrade data to a mobile phone terminal.
And after downloading the software package to be updated, the mobile phone APP carries out verification based on a signature technology, the integrity and the legality of the update package are confirmed, if the update package is incomplete or quit according to an illegal rule, and if the update package is not updated, the mobile phone APP quits reminding.
The verification principle based on the signature technology is shown in fig. 2, after the software to be updated is packaged by the background server, the integrity metric value of the software package to be updated is obtained through the HASH algorithm, and then the signature is carried out through a private Key (Priv _ Key). After the encrypted software package to be updated is downloaded to a mobile phone APP, the integrity and the legality of the signature are checked for the first time, a first integrity measurement value is obtained through a HASH algorithm, a signature in the software package to be updated is checked for the second integrity measurement value through a public Key (Pub _ Key), and whether the first integrity measurement value and the second integrity measurement value are the same or not is compared, if the first integrity measurement value and the second integrity measurement value are the same, the signature is checked for qualification, and if the first integrity measurement value and the second integrity measurement value are not the same, the signature fails.
And step S107, the mobile phone APP carries out SDK encryption on the software package to be updated after PKI decryption, and then carries out SDK encryption on the software package to be updated after the SDK encryption and sends the software package to be updated to a gateway of the vehicle.
And S108, the gateway of the vehicle carries out SDK decryption on the received software package to be updated, and then carries out vehicle-mounted controller software upgrading on the basis of the decrypted software package to be updated.
In the embodiment, the software to be updated is encrypted and wirelessly transmitted to prevent relay attack in the transmission process, the hardware security chip of the CC EAL5+ decrypts, and under the condition that the vehicle does not contain TBOX, the reliable transmission of the software to be updated is realized through a security channel provided by a Bluetooth module of the vehicle.
In this embodiment, the process of establishing the bluetooth channel between the mobile phone APP and the vehicle is as shown in fig. 3:
1. a mobile phone APP initiates a request for establishing a secure channel; 2. the safety SDK assembles data, encrypts the data and sends the data through the APP; 3. the mobile phone APP sends the encrypted data to the vehicle-end Bluetooth module through Bluetooth; 4. the MCU of the vehicle-end Bluetooth module transmits the received encrypted data to the security chip through the SPI for unpacking and informs the MCU to perform corresponding processing; 5. after the MCU of the vehicle-end Bluetooth module informs the processing result to the security chip, the security chip assembles data, and the assembled data is sent to the MCU; 6. the MCU of the vehicle-end Bluetooth module transmits the assembled data to the mobile phone end through Bluetooth; 7. the mobile phone APP receives the ciphertext data and sends the ciphertext data to the safe SDK for unpacking; 8. and the safety SDK carries out unpacking and decryption on the data and informs the result to the mobile phone APP.

Claims (5)

1. A method for upgrading an on-board controller based on a mobile phone Bluetooth key is characterized by comprising the following steps:
step S101, establishing Bluetooth connection between a mobile phone APP and a gateway of a vehicle through a Bluetooth module of the vehicle;
step S102, a gateway of a vehicle reads the current software version of each vehicle-mounted controller and uploads the current software version to a mobile phone APP;
step S103, uploading the current software version of the vehicle-mounted controller to a background server by the mobile phone APP so as to judge whether the vehicle-mounted controller needing to be updated exists;
step S104, when receiving the software information to be updated sent by the background server, the mobile phone APP displays the software information to be updated and outputs information for requesting a user to confirm whether to enter the updating;
step S105, after receiving the information confirmed by the user, the mobile phone APP initiates a software package request to a background server;
step S106, the mobile phone APP receives the software package to be updated, which is encrypted by the background server through PKI based on the software package request, and carries out PKI decryption on the received software package to be updated;
step S107, the mobile phone APP carries out SDK encryption on the software package to be updated after PKI decryption, and then sends the software package to be updated after SDK encryption to a gateway of a vehicle after SDK encryption;
and S108, the gateway of the vehicle carries out SDK decryption on the received software package to be updated, and then carries out vehicle-mounted controller software upgrading on the basis of the decrypted software package to be updated.
2. The method for upgrading the vehicle-mounted controller based on the mobile phone Bluetooth key of claim 1, wherein before the step S107, the method further comprises:
step S109, judging whether the Bluetooth connection with the gateway of the vehicle is disconnected; if the vehicle is disconnected, the Bluetooth connection with the gateway of the vehicle is reestablished; if not, the process proceeds directly to step S107.
3. The method for upgrading the vehicle-mounted controller based on the mobile phone Bluetooth key as claimed in claim 1, wherein in step S104, the software information to be updated includes: list information of the software to be updated, specific updating content corresponding to each software and the size of the software package.
4. The method for upgrading the vehicle-mounted controller based on the mobile phone bluetooth key as claimed in claim 1, wherein in step S106, the mobile phone APP calculates the received software package to be updated through the HUSH algorithm to obtain a first integrity metric value, performs signature verification through a public key to obtain a second integrity metric value, and completes the PKI decryption of the received software package to be updated if the first integrity metric value is the same as the second integrity metric value.
5. The method for upgrading the vehicle-mounted controller based on the mobile phone Bluetooth key as claimed in claim 1, wherein the method further comprises:
and step S111, receiving and displaying the information which is sent by the gateway of the vehicle and finishes upgrading the vehicle-mounted controller.
CN202111159630.XA 2021-09-30 2021-09-30 Method for upgrading vehicle-mounted controller based on mobile phone Bluetooth key Withdrawn CN113923622A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111159630.XA CN113923622A (en) 2021-09-30 2021-09-30 Method for upgrading vehicle-mounted controller based on mobile phone Bluetooth key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111159630.XA CN113923622A (en) 2021-09-30 2021-09-30 Method for upgrading vehicle-mounted controller based on mobile phone Bluetooth key

Publications (1)

Publication Number Publication Date
CN113923622A true CN113923622A (en) 2022-01-11

Family

ID=79237335

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111159630.XA Withdrawn CN113923622A (en) 2021-09-30 2021-09-30 Method for upgrading vehicle-mounted controller based on mobile phone Bluetooth key

Country Status (1)

Country Link
CN (1) CN113923622A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114499851A (en) * 2022-01-30 2022-05-13 重庆长安汽车股份有限公司 Method for realizing safe filling of root key based on end-cloud integration
CN114826911A (en) * 2022-03-10 2022-07-29 浙江零跑科技股份有限公司 OTA upgrading implementation method combining automobile and mobile phone
CN114882617A (en) * 2022-03-25 2022-08-09 潍柴动力股份有限公司 Multi-terminal emergency unlocking method and device
CN115242634A (en) * 2022-07-05 2022-10-25 蔚来汽车科技(安徽)有限公司 Software upgrading method, device and storage medium
CN115278592A (en) * 2022-06-06 2022-11-01 重庆长安汽车股份有限公司 Vehicle offline self-checking system and method for detecting Bluetooth key function
CN116056045A (en) * 2023-03-31 2023-05-02 江铃汽车股份有限公司 AB point customer parking remote upgrading method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110855558A (en) * 2018-08-21 2020-02-28 上海博泰悦臻网络技术服务有限公司 Internet of vehicles gateway and CANoverTCP/IP protocol connection implementation method, ECU and upgrading method
CN111343064A (en) * 2020-02-29 2020-06-26 东风汽车集团有限公司 System and method for upgrading software of automobile control system
WO2020211016A1 (en) * 2019-04-17 2020-10-22 华为技术有限公司 Device upgrade method and related device
CN112130875A (en) * 2020-08-27 2020-12-25 长城汽车股份有限公司 Vehicle ECU software upgrading method, device and system
CN112585905A (en) * 2019-11-12 2021-03-30 华为技术有限公司 Equipment upgrading method and related equipment
CN112799706A (en) * 2019-11-14 2021-05-14 华为技术有限公司 Vehicle upgrade package processing method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110855558A (en) * 2018-08-21 2020-02-28 上海博泰悦臻网络技术服务有限公司 Internet of vehicles gateway and CANoverTCP/IP protocol connection implementation method, ECU and upgrading method
WO2020211016A1 (en) * 2019-04-17 2020-10-22 华为技术有限公司 Device upgrade method and related device
CN112543927A (en) * 2019-04-17 2021-03-23 华为技术有限公司 Equipment upgrading method and related equipment
CN112585905A (en) * 2019-11-12 2021-03-30 华为技术有限公司 Equipment upgrading method and related equipment
CN112799706A (en) * 2019-11-14 2021-05-14 华为技术有限公司 Vehicle upgrade package processing method and device
CN111343064A (en) * 2020-02-29 2020-06-26 东风汽车集团有限公司 System and method for upgrading software of automobile control system
CN112130875A (en) * 2020-08-27 2020-12-25 长城汽车股份有限公司 Vehicle ECU software upgrading method, device and system

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114499851A (en) * 2022-01-30 2022-05-13 重庆长安汽车股份有限公司 Method for realizing safe filling of root key based on end-cloud integration
CN114499851B (en) * 2022-01-30 2023-05-26 重庆长安汽车股份有限公司 Method for realizing safe filling of root keys based on end cloud integration
CN114826911A (en) * 2022-03-10 2022-07-29 浙江零跑科技股份有限公司 OTA upgrading implementation method combining automobile and mobile phone
CN114882617A (en) * 2022-03-25 2022-08-09 潍柴动力股份有限公司 Multi-terminal emergency unlocking method and device
CN115278592A (en) * 2022-06-06 2022-11-01 重庆长安汽车股份有限公司 Vehicle offline self-checking system and method for detecting Bluetooth key function
CN115278592B (en) * 2022-06-06 2024-03-15 重庆长安汽车股份有限公司 Vehicle offline self-checking system and method for detecting Bluetooth key function
CN115242634A (en) * 2022-07-05 2022-10-25 蔚来汽车科技(安徽)有限公司 Software upgrading method, device and storage medium
CN115242634B (en) * 2022-07-05 2024-03-12 蔚来汽车科技(安徽)有限公司 Software upgrading method, device and storage medium
CN116056045A (en) * 2023-03-31 2023-05-02 江铃汽车股份有限公司 AB point customer parking remote upgrading method and system

Similar Documents

Publication Publication Date Title
CN113923622A (en) Method for upgrading vehicle-mounted controller based on mobile phone Bluetooth key
US10965450B2 (en) In-vehicle networking
US8972736B2 (en) Fully authenticated content transmission from a provider to a recipient device via an intermediary device
CN108419233B (en) Over-the-air update security
US10999078B2 (en) Software distribution processing device, software distribution processing method, and vehicle
CN111510485B (en) OTA upgrade package downloading method, device, vehicle end and server
EP3780481B1 (en) Method for upgrading vehicle-mounted device, and related device
US8582775B2 (en) Method of securing and authenticating data using micro-certificates
US9132790B2 (en) In-vehicle network system
CN111279310A (en) Vehicle-mounted equipment upgrading method and related equipment
CN112543927B (en) Equipment upgrading method and related equipment
US20220276855A1 (en) Method and apparatus for processing upgrade package of vehicle
US20080189695A1 (en) Updating of Data Instructions
CN110572418A (en) Vehicle identity authentication method and device, computer equipment and storage medium
US9706372B2 (en) Secure SMS messaging
CN110891257A (en) Internet vehicle remote upgrading system and method with anti-attack bidirectional authentication
CN114327532A (en) Automobile OTA (over the air) upgrade information security implementation method based on digital signature and encryption
CN115665138A (en) Automobile OTA (over the air) upgrading system and method
CN113572795A (en) Vehicle safety communication method and system and vehicle-mounted terminal
CN113163375B (en) Air certificate issuing method and system based on NB-IoT communication module
CN117097462A (en) Vehicle-mounted intelligent software upgrading encryption system based on quantum key system
CN109802929B (en) Client program upgrading method based on dual systems and computer readable storage medium
CN115119208A (en) Upgrade package encryption and decryption methods and devices
CN111464554B (en) Vehicle information safety control method and system
CN112839019A (en) Vehicle-mounted data transmission method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20220111

WW01 Invention patent application withdrawn after publication