CN114996169B - Device diagnosis method, device, electronic device, and storage medium - Google Patents

Device diagnosis method, device, electronic device, and storage medium Download PDF

Info

Publication number
CN114996169B
CN114996169B CN202210932431.6A CN202210932431A CN114996169B CN 114996169 B CN114996169 B CN 114996169B CN 202210932431 A CN202210932431 A CN 202210932431A CN 114996169 B CN114996169 B CN 114996169B
Authority
CN
China
Prior art keywords
access method
security access
target
target security
initial
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210932431.6A
Other languages
Chinese (zh)
Other versions
CN114996169A (en
Inventor
尤超
舒伟
董汉
陈超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Tsing Standard Automobile Technology Co ltd
Original Assignee
Suzhou Tsing Standard Automobile Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Tsing Standard Automobile Technology Co ltd filed Critical Suzhou Tsing Standard Automobile Technology Co ltd
Priority to CN202210932431.6A priority Critical patent/CN114996169B/en
Publication of CN114996169A publication Critical patent/CN114996169A/en
Application granted granted Critical
Publication of CN114996169B publication Critical patent/CN114996169B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/362Software debugging
    • G06F11/366Software debugging using diagnostics
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computing Systems (AREA)
  • Quality & Reliability (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a device diagnosis method and device, electronic equipment and a storage medium. The method comprises the following steps: in the process of diagnosing the equipment, when an initial security access method is executed, a target security access method corresponding to the initial security access method is determined; loading the target security access method, and executing the loaded target security access method based on a reflection mechanism; and when the target security access method is executed, determining a diagnosis flow after the initial security access method, and diagnosing the equipment based on the diagnosis flow. The technical scheme of the embodiment of the invention solves the technical problems of longer development period and higher labor cost of the existing equipment diagnosis mode, realizes the reduction of the development period and the reduction of the labor development cost, and further improves the equipment diagnosis efficiency.

Description

Device diagnosis method, device, electronic device, and storage medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a device diagnosis method and apparatus, an electronic device, and a storage medium.
Background
For device diagnosis, the devices need to be diagnosed according to the diagnostic specification of each device and the corresponding security access algorithm. At present, the diagnostic specifications and security access algorithms of devices produced by different host factories are different. The existing equipment diagnosis mode needs to customize and develop a corresponding diagnosis system aiming at equipment produced by different host factories. Thereby performing equipment diagnosis on the equipment of the corresponding host factory through different diagnosis systems. Therefore, the existing equipment diagnosis mode has the technical problems of long development period and high labor cost.
Disclosure of Invention
In view of the above problems, the present invention provides a device diagnosis method, apparatus, electronic device, and storage medium, so as to reduce development cycle and reduce manual development cost, and further improve device diagnosis efficiency.
According to an aspect of the present invention, there is provided an apparatus diagnosis method including:
in the process of diagnosing the equipment, when an initial security access method is executed, a target security access method corresponding to the initial security access method is determined;
loading the target security access method, and executing the loaded target security access method based on a reflection mechanism;
and when the target security access method is executed, determining a diagnosis flow after the initial security access method, and diagnosing the equipment based on the diagnosis flow.
Optionally, the method further comprises:
and performing method translation processing on the initial security access method based on a preset programming language to obtain the target security access method.
Optionally, after the initial secure access method is translated based on a preset programming language, the method includes:
encrypting the translated method, and taking the encrypted method as a target security access method;
the loading the target security access method and executing the loaded target security access method based on a reflection mechanism comprises the following steps:
and loading the target security access method, decrypting the loaded target security access method to obtain a decrypted method, and executing the decrypted method based on a reflection mechanism.
Optionally, after the encrypting the translated method and taking the encrypted method as a target secure access method, the method further includes:
storing the target security access method into a text file with a preset format;
the method for loading the target secure access comprises the following steps:
and reading the target security access method from the text file and loading.
Optionally, after the reading the target secure access method from the text file, the method further includes:
and dynamically compiling the target security access method to generate a security access executable file.
Optionally, the dynamically compiling the target security access method read from the text file includes:
and calling a predefined method compiling class to perform dynamic compiling processing on the target security access method read from the text file.
Optionally, the encrypting the translated method includes:
and based on a symmetric encryption algorithm, carrying out encryption processing on the translated method.
According to another aspect of the present invention, an equipment diagnostic apparatus is provided. The device includes:
the target method determining module is used for determining a target security access method corresponding to the initial security access method when the initial security access method is executed in the process of diagnosing the equipment;
the target method execution module is used for loading the target security access method and executing the loaded target security access method based on a reflection mechanism;
and the equipment diagnosis module is used for determining a diagnosis flow after the initial security access method after the target security access method is executed, and diagnosing the equipment based on the diagnosis flow.
According to another aspect of the present invention, there is provided an electronic apparatus including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores a computer program executable by the at least one processor, the computer program being executable by the at least one processor to enable the at least one processor to perform the device diagnostic method of any of the embodiments of the present invention.
According to another aspect of the present invention, there is provided a computer-readable storage medium storing computer instructions for causing a processor to implement the device diagnostic method according to any one of the embodiments of the present invention when the computer instructions are executed.
According to the technical scheme of the embodiment of the invention, in the process of diagnosing the equipment, when the initial security access method is executed, the target security access method corresponding to the initial security access method is determined. After determining the target security method, the target security access method may be loaded and the loaded target security access method may be executed based on the reflection mechanism. In the embodiment of the invention, the target security access method is executed by reflection based on the reflection mechanism, so that the dynamic calling of the method can be realized, the flexibility and the expansibility of the program are improved, and the coupling between codes is reduced. And when the target security access method is executed, determining a diagnosis flow after the initial security access method, and diagnosing the equipment based on the diagnosis flow. The technical scheme of the embodiment of the invention solves the technical problems of longer development period and higher labor cost of the existing equipment diagnosis mode, realizes the reduction of the development period and the reduction of the labor development cost, and further improves the equipment diagnosis efficiency.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present invention, nor do they necessarily limit the scope of the invention. Other features of the present invention will become apparent from the following description.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flow chart of a device diagnosis method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of an apparatus diagnostic device according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of another device diagnostic apparatus according to a second embodiment of the present invention;
fig. 4 is a schematic structural diagram of an electronic device according to a third embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "comprises" and "comprising," and any variations thereof, in the description and claims of this invention and the above-described drawings are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements explicitly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It is understood that before the technical solutions disclosed in the embodiments of the present disclosure are used, the type, the use range, the use scene, etc. of the personal information related to the present disclosure should be informed to the user and obtain the authorization of the user through a proper manner according to the relevant laws and regulations.
For example, in response to receiving an active request from a user, a prompt message is sent to the user to explicitly prompt the user that the requested operation to be performed would require the acquisition and use of personal information to the user. Thus, the user can autonomously select whether to provide personal information to software or hardware such as an electronic device, an application program, a server, or a storage medium that performs the operations of the disclosed technical solution, according to the prompt information.
As an optional but non-limiting implementation manner, in response to receiving an active request from the user, the manner of sending the prompt information to the user may be, for example, a pop-up window, and the prompt information may be presented in a text manner in the pop-up window. In addition, a selection control for providing personal information to the electronic device by the user's selection of "agreeing" or "disagreeing" can be carried in the pop-up window.
It is understood that the above notification and user authorization process is only illustrative and not limiting, and other ways of satisfying relevant laws and regulations may be applied to the implementation of the present disclosure.
It will be appreciated that the data involved in the subject technology, including but not limited to the data itself, the acquisition or use of the data, should comply with the requirements of the corresponding laws and regulations and related regulations.
Example one
Fig. 1 is a flowchart of an apparatus diagnosis method according to an embodiment of the present invention, where the present embodiment is applicable to a scenario of diagnosing an apparatus, the method may be executed by an apparatus diagnosis device, the apparatus diagnosis device may be implemented in a form of hardware and/or software, and the apparatus diagnosis device may be configured in an electronic apparatus such as a computer or a server.
As shown in fig. 1, the method of the present embodiment includes:
s110, in the process of diagnosing the equipment, when the initial security access method is executed, determining a target security access method corresponding to the initial security access method.
A device is understood to mean a device to be diagnosed, for example a motor vehicle, an electric vehicle or an aircraft. In an embodiment of the present invention, the devices to be diagnosed may be devices produced by different host factories having the same diagnostic specifications. The number of devices may be one, two or more. The initial security access method may be understood as a security access algorithm that needs to be executed by default in the process of diagnosing the device. It should be noted that the initial security access methods corresponding to the devices with the same diagnostic specifications, which are produced by different host factories, may be the same or different. The target security access method can be understood as a preset security access method which needs to be executed in the process of diagnosing the equipment. In an embodiment of the invention, each device produced by a different host factory has the same diagnostic specification. In the process of diagnosing each device, when the initial secure access method corresponding to each device is executed, the target secure access method corresponding to each initial secure access method may be determined based on a correspondence between a preset initial secure access method and a target secure access method.
In the embodiment of the invention, the target security access method is obtained by the following method:
and performing method translation processing on the initial security access method based on a preset programming language to obtain the target security access method. The preset programming language may be a computer programming language selected according to actual needs, for example, a C # language, a C language, or the like, for writing the target secure access method.
It should be noted that, in the embodiment of the present invention, the code file storing the target secure access method is relatively independent from the code file for diagnosing the device. In practical applications, the code file storing the target secure access method can be flexibly created, that is, the code corresponding to the target secure access method is a flexibly created code, and the codes can be assembled during operation or in the operation process without being linked with the code for diagnosing the device.
And S120, loading the target security access method, and executing the loaded target security access method based on a reflection mechanism.
Specifically, after the target security access method is determined, the target security access method may be loaded to the memory. The loaded target secure access method may then be executed based on the reflection mechanism reflection. The reflection-based execution of the loaded target security access method may be understood as that, when the initial security access method is executed, a default diagnostic execution flow is changed, and the target security access method is executed in a reflection manner. That is, the transition is from executing the initial secure access method to executing the target secure access method. In the embodiment of the present invention, the target security access method may be performed by reflection by an Assembly (Assembly).
It should be noted that, in the embodiment of the present invention, the advantage of executing the loaded target secure access method based on the reflection mechanism is that the code segments can be dynamically operated, and the diagnosis of the device can be realized without changing the initial code, thereby reducing the development cost.
S130, after the target security access method is executed, determining a diagnosis flow after the initial security access method, and diagnosing the equipment based on the diagnosis flow.
Specifically, after the reflection execution completes the target security access method, the diagnostic flow following the initial security access method may be determined. The device may then be diagnosed according to a diagnostic procedure following the initial secure access method.
Optionally, after the initial secure access method is translated based on a preset programming language, the method includes: and encrypting the translated method, and taking the encrypted method as a target security access method.
Specifically, after the initial secure access method is translated based on a preset programming language, a translated method can be obtained. After the translated method is obtained, the translated method can be encrypted through a preset encryption algorithm. Thus, the method after the encryption processing can be obtained, and in this case, the method after the encryption processing can be used as the target secure access method. By doing so, the security of the target secure access method can be improved, and the secure access method can be prevented from being maliciously attacked or tampered.
Alternatively, the preset Encryption algorithm may include a symmetric Encryption algorithm (DES algorithm). The encryption processing of the translated method comprises the following steps: and based on a symmetric encryption algorithm, carrying out encryption processing on the translated method. It should be noted that, in the embodiment of the present invention, the symmetric encryption algorithm is used to perform encryption processing on the method, which not only has small calculation amount, fast encryption speed and high encryption efficiency, but also has high cracking difficulty. The safety of the method is further improved.
On the basis, loading the target security access method, and executing the loaded target security access method based on a reflection mechanism, wherein the method comprises the following steps: and loading the target security access method, decrypting the loaded target security access method to obtain a decrypted method, and executing the decrypted method based on a reflection mechanism.
Specifically, a target secure access method is loaded. At this time, the loaded target secure access method is an encrypted target secure access method. Then, after the encrypted target security access method is loaded, the encrypted target security access method may be decrypted based on a decryption algorithm corresponding to the preset encryption algorithm. So that a decrypted method can be obtained. The decrypted method is then executed based on a reflection mechanism.
Optionally, after the encrypting the translated method and taking the encrypted method as a target secure access method, the method further includes: and storing the target security access method into a text file with a preset format.
The preset format may be a format of a text file for storing the target security access algorithm, which is set according to actual requirements. Illustratively, the preset format may be a txt format.
In one embodiment, after obtaining the target access method, it is understood that after obtaining the code of the target method, the code of the target access method may be stored in a text file in a pre-established preset format. On the basis, the loading of the target secure access method comprises the following steps: and reading the target security access method from the text file, and loading.
In order to facilitate more rapid and effective invoking of the target secure access method, after reading the target secure access method from the text file, the method further includes: and dynamically compiling the target security access method to generate a security access executable file.
The security access executable file may be an executable file generated by dynamically compiling codes of the target security access method. Optionally, the file format of the secure access executable file may be a dll format file.
In this embodiment of the present invention, the dynamic compiling process for the target secure access method includes: and reading the target security access method from the text file by calling a predefined method compiling class, and performing dynamic compiling processing.
The predefined method compilation classes may include, but are not limited to, the ChalopCoprovider class, the ComilerParameters class, and the ComilerResults class, among others.
It should be noted that there are various implementation platforms of the technical solution of the embodiment of the present invention, which are not specifically limited herein, and for example, the implementation platform may be a net development platform.
According to the technical scheme of the embodiment of the invention, in the process of diagnosing the equipment, when the initial security access method is executed, the target security access method corresponding to the initial security access method is determined. After determining the target security method, the target security access method may be loaded and the loaded target security access method may be executed based on a reflection mechanism. In the embodiment of the invention, the target security access method is executed by reflection based on the reflection mechanism, so that the dynamic calling of the method can be realized, the flexibility and the expansibility of the program are improved, and the coupling between codes is reduced. And when the target security access method is executed, determining a diagnosis flow after the initial security access method, and diagnosing the equipment based on the diagnosis flow. The technical scheme of the embodiment of the invention solves the technical problems of longer development period and higher labor cost of the existing equipment diagnosis mode, realizes the reduction of the development period and the reduction of the labor development cost, and further improves the equipment diagnosis efficiency.
Example two
Fig. 2 is a schematic structural diagram of an apparatus diagnosis device according to a second embodiment of the present invention. As shown in fig. 2, the apparatus includes: a target method determination module 210, a target method execution module 220, and a device diagnostic module 230.
The target method determining module 210 is configured to determine, when an initial secure access method is executed in a process of diagnosing a device, a target secure access method corresponding to the initial secure access method; a target method executing module 220, configured to load the target security access method, and execute the loaded target security access method based on a reflection mechanism; and the device diagnosis module 230 is configured to determine a diagnosis process after the initial security access method after the target security access method is executed, and diagnose the device based on the diagnosis process.
According to the technical scheme of the embodiment of the invention, in the process of diagnosing the equipment, when the initial security access method is executed, the target security access method corresponding to the initial security access method is determined. After determining the target security method, the target security access method may be loaded and the loaded target security access method may be executed based on a reflection mechanism. In the embodiment of the invention, the target security access method is executed by reflection based on the reflection mechanism, so that the dynamic calling of the method can be realized, the flexibility and the expansibility of the program are improved, and the coupling between codes is reduced. And when the target security access method is executed, determining a diagnosis flow after the initial security access method, and diagnosing the equipment based on the diagnosis flow. The technical scheme of the embodiment of the invention solves the technical problems of longer development period and higher labor cost of the existing equipment diagnosis mode, realizes the reduction of the development period and the reduction of the labor development cost, and further improves the equipment diagnosis efficiency.
Optionally, as shown in fig. 3, the apparatus further includes: and the initial method translation module 207 is configured to perform method translation processing on the initial secure access method based on a preset programming language to obtain the target secure access method.
Optionally, the apparatus further comprises: a method encryption module 208 (see fig. 3) for, after the initial secure access method is translated based on the preset programming language, encrypting the translated method, and taking the encrypted method as a target secure access method;
correspondingly, the target method executing module 220 is configured to load the target security access method, decrypt the loaded target security access method to obtain a decrypted method, and execute the decrypted method based on a reflection mechanism.
Optionally, the apparatus further includes a target method storage module 209 (see fig. 3) configured to store the target secure access method into a text file in a preset format after the translated method is encrypted and the encrypted method is used as the target secure access method;
correspondingly, the target method executing module 220 is configured to read the target secure access method from the text file and load the target secure access method.
Optionally, the apparatus further comprises: and a target method compiling module 221 (see fig. 3) for performing dynamic compiling processing on the target secure access method after the target secure access method is read from the text file, and generating a secure access executable file.
Optionally, the target method compiling module is configured to perform dynamic compiling processing on the target secure access method read from the text file by calling a predefined method compiling class.
Optionally, the method encrypting module 208 is configured to encrypt the translated method based on a symmetric encryption algorithm.
The equipment diagnosis device provided by the embodiment of the invention can execute the equipment diagnosis method provided by any embodiment of the invention, and has corresponding functional modules and beneficial effects of the execution method.
It should be noted that the units and modules included in the equipment diagnosis device are merely divided according to functional logic, but are not limited to the above division as long as the corresponding functions can be realized; in addition, specific names of the functional units are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the embodiment of the invention.
EXAMPLE III
FIG. 4 shows a schematic block diagram of an electronic device 10 that may be used to implement an embodiment of the invention. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital assistants, cellular phones, smart phones, wearable devices (e.g., helmets, glasses, watches, etc.), and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the inventions described and/or claimed herein.
As shown in fig. 4, the electronic device 10 includes at least one processor 11, and a memory communicatively connected to the at least one processor 11, such as a Read Only Memory (ROM) 12, a Random Access Memory (RAM) 13, and the like, wherein the memory stores a computer program executable by the at least one processor, and the processor 11 may perform various suitable actions and processes according to the computer program stored in the Read Only Memory (ROM) 12 or the computer program loaded from the storage unit 18 into the Random Access Memory (RAM) 13. In the Random Access Memory (RAM) 13, various programs and data required for the operation of the electronic device 10 may also be stored. The processor 11, read Only Memory (ROM) 12 and Random Access Memory (RAM) 13 are connected to each other by a bus 14. An input/output (I/O) interface 15 is also connected to the bus 14.
A number of components in the electronic device 10 are connected to an input/output (I/O) interface 15, including: an input unit 16 such as a keyboard, a mouse, or the like; an output unit 17 such as various types of displays, speakers, and the like; a storage unit 18 such as a magnetic disk, an optical disk, or the like; and a communication unit 19 such as a network card, modem, wireless communication transceiver, etc. The communication unit 19 allows the electronic device 10 to exchange information/data with other devices via a computer network such as the internet and/or various telecommunication networks.
The processor 11 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of processor 11 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various dedicated Artificial Intelligence (AI) computing chips, various processors running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, and so forth. The processor 11 performs the various methods and processes described above, such as device diagnostic methods.
In some embodiments, the device diagnostic method may be implemented as a computer program tangibly embodied in a computer-readable storage medium, such as storage unit 18. In some embodiments, part or all of the computer program may be loaded and/or installed onto the electronic device 10 via a Read Only Memory (ROM) 12 and/or the communication unit 19. When the computer program is loaded into Random Access Memory (RAM) 13 and executed by processor 11, one or more steps of the device diagnostic method described above may be performed. Alternatively, in other embodiments, the processor 11 may be configured to perform the device diagnostic method by any other suitable means (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
Computer programs for implementing the methods of the present invention can be written in any combination of one or more programming languages. These computer programs may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the computer programs, when executed by the processor, cause the functions/acts specified in the flowchart and/or block diagram block or blocks to be performed. A computer program can execute entirely on a machine, partly on a machine, as a stand-alone software package partly on a machine and partly on a remote machine or entirely on a remote machine or server.
In the context of the present invention, a computer-readable storage medium may be a tangible medium that can contain, or store a computer program for use by or in connection with an instruction execution system, apparatus, or device. A computer readable storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. Alternatively, the computer readable storage medium may be a machine readable signal medium. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on an electronic device having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user may provide input to the electronic device. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), blockchain networks, and the internet.
The computing system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server can be a cloud server, also called a cloud computing server or a cloud host, and is a host product in a cloud computing service system, so that the defects of high management difficulty and weak service expansibility in the traditional physical host and VPS service are overcome.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present invention may be executed in parallel, sequentially, or in different orders, and are not limited herein as long as the desired results of the technical solution of the present invention can be achieved.
The above-described embodiments should not be construed as limiting the scope of the invention. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made, depending on design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (8)

1. A device diagnostic method, comprising:
in the process of diagnosing the equipment, when an initial security access method is executed, a target security access method corresponding to the initial security access method is determined;
loading the target security access method, and executing the loaded target security access method based on a reflection mechanism;
after the target security access method is executed, determining a diagnosis process after an initial security access method, and diagnosing the equipment based on the diagnosis process;
the target security access method is obtained by performing method translation processing on the initial security access method based on a preset programming language;
after the initial secure access method is translated based on a preset programming language, the method further includes:
encrypting the translated method, and taking the encrypted method as a target security access method;
loading the target security access method, and executing the loaded target security access method based on a reflection mechanism, wherein the method comprises the following steps:
and loading the target security access method, decrypting the loaded target security access method to obtain a decrypted method, and executing the decrypted method based on a reflection mechanism.
2. The method according to claim 1, wherein after the encrypting the translated method, and taking the encrypted method as a target secure access method, the method further comprises:
storing the target security access method into a text file with a preset format;
the target security access method is loaded and comprises the following steps:
and reading the target security access method from the text file and loading.
3. The method of claim 2, further comprising, after reading the target secure access method from the text file:
and dynamically compiling the target security access method to generate a security access executable file.
4. The method of claim 3, wherein dynamically compiling the target secure access method comprises:
and calling a predefined method compiling class to perform dynamic compiling processing on the target security access method read from the text file.
5. The method of claim 1, wherein the encrypting the translated method comprises:
and based on a symmetric encryption algorithm, carrying out encryption processing on the translated method.
6. An equipment diagnostic apparatus, comprising:
the target method determining module is used for determining a target security access method corresponding to the initial security access method when the initial security access method is executed in the process of diagnosing the equipment;
the target method execution module is used for loading the target security access method and executing the loaded target security access method based on a reflection mechanism;
the equipment diagnosis module is used for determining a diagnosis flow after the initial security access method after the target security access method is executed, and diagnosing the equipment based on the diagnosis flow;
the target security access method is obtained by performing method translation processing on the initial security access method based on a preset programming language;
the device further comprises: the method encryption module is used for performing encryption processing on the translated method after the initial security access method is translated based on the preset programming language, and taking the encrypted method as a target security access method;
and the target method execution module is specifically used for loading the target security access method, decrypting the loaded target security access method to obtain a decrypted method, and executing the decrypted method based on a reflection mechanism.
7. An electronic device, characterized in that the electronic device comprises:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the device diagnostic method of any one of claims 1-5.
8. A computer-readable storage medium storing computer instructions for causing a processor to perform the device diagnostic method of any one of claims 1-5 when executed.
CN202210932431.6A 2022-08-04 2022-08-04 Device diagnosis method, device, electronic device, and storage medium Active CN114996169B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210932431.6A CN114996169B (en) 2022-08-04 2022-08-04 Device diagnosis method, device, electronic device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210932431.6A CN114996169B (en) 2022-08-04 2022-08-04 Device diagnosis method, device, electronic device, and storage medium

Publications (2)

Publication Number Publication Date
CN114996169A CN114996169A (en) 2022-09-02
CN114996169B true CN114996169B (en) 2022-10-28

Family

ID=83022958

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210932431.6A Active CN114996169B (en) 2022-08-04 2022-08-04 Device diagnosis method, device, electronic device, and storage medium

Country Status (1)

Country Link
CN (1) CN114996169B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180157808A1 (en) * 2015-08-10 2018-06-07 Line Corporation System and method for code obfuscation of application
CN110109443A (en) * 2019-05-13 2019-08-09 上海英恒电子有限公司 Safety communicating method, device, storage medium and the equipment of vehicle diagnostics
CN113867324A (en) * 2021-10-27 2021-12-31 深圳市元征科技股份有限公司 Vehicle diagnosis method, vehicle-mounted device, terminal, and storage medium
CN114625106A (en) * 2022-03-07 2022-06-14 深圳市元征科技股份有限公司 Vehicle diagnosis method and device, electronic equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180157808A1 (en) * 2015-08-10 2018-06-07 Line Corporation System and method for code obfuscation of application
CN110109443A (en) * 2019-05-13 2019-08-09 上海英恒电子有限公司 Safety communicating method, device, storage medium and the equipment of vehicle diagnostics
CN113867324A (en) * 2021-10-27 2021-12-31 深圳市元征科技股份有限公司 Vehicle diagnosis method, vehicle-mounted device, terminal, and storage medium
CN114625106A (en) * 2022-03-07 2022-06-14 深圳市元征科技股份有限公司 Vehicle diagnosis method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN114996169A (en) 2022-09-02

Similar Documents

Publication Publication Date Title
CN111163096B (en) Method, device, electronic equipment and storage medium for providing data interface service
US10897512B2 (en) Generating push notifications
US10977375B2 (en) Risk assessment of asset leaks in a blockchain
US20180137273A1 (en) Secure debugging in a trustable computing environment
CN111124291B (en) Data storage processing method and device of distributed storage system and electronic equipment
US11303587B2 (en) Chatbot information processing
CN114996169B (en) Device diagnosis method, device, electronic device, and storage medium
CN111767149A (en) Scheduling method, device, equipment and storage equipment
CN108595973B (en) Instruction determination method, equipment control method, device and system
CN115291973A (en) Method and device for connecting database by application on cloud, electronic equipment and storage medium
CN115333851A (en) Automatic driving data transmission method and device and electronic equipment
CN115309730A (en) Data auditing method and device, electronic equipment and storage medium
CN109462604B (en) Data transmission method, device, equipment and storage medium
CN113741949A (en) Method, device and equipment for generating application program installation package and storage medium
US10893041B2 (en) Single use passcode authentication
CN112968876A (en) Content sharing method and device, electronic equipment and storage medium
CN110262756B (en) Method and device for caching data
CN115484149B (en) Network switching method, network switching device, electronic equipment and storage medium
US20230126238A1 (en) Security for usb-based device configuration
CN111680867B (en) Resource allocation method and device and electronic equipment
US20170118293A1 (en) Method and system for efficient task management
US20180097704A1 (en) Determining receptiveness to a new communication
CN115396436A (en) Service access method, device, electronic equipment and medium
CN115270106A (en) Data processing method and device, electronic equipment and storage medium
CN114398616A (en) Login method and device of embedded system, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant