CN117459392A - Network intrusion type node upgrading method, device, terminal equipment and storage medium - Google Patents

Network intrusion type node upgrading method, device, terminal equipment and storage medium Download PDF

Info

Publication number
CN117459392A
CN117459392A CN202311312883.5A CN202311312883A CN117459392A CN 117459392 A CN117459392 A CN 117459392A CN 202311312883 A CN202311312883 A CN 202311312883A CN 117459392 A CN117459392 A CN 117459392A
Authority
CN
China
Prior art keywords
network
node
control node
upgrade
slave
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311312883.5A
Other languages
Chinese (zh)
Inventor
黄登高
雷晶晶
黄少鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xinwangda Power Technology Co ltd
Original Assignee
Xinwangda Power Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xinwangda Power Technology Co ltd filed Critical Xinwangda Power Technology Co ltd
Priority to CN202311312883.5A priority Critical patent/CN117459392A/en
Publication of CN117459392A publication Critical patent/CN117459392A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • H04L41/082Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/309Measuring or estimating channel quality parameters
    • H04B17/318Received signal strength
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic

Abstract

The invention discloses a network intrusion type node upgrading method, a device, terminal equipment and a storage medium, wherein the method comprises the following steps: taking an established network between a master control node and each slave control node as a first network; acquiring an identity of a battery pack; constructing an intrusion node, and transmitting the identity to the intrusion node so that the intrusion node performs the following operations: accessing a database according to the identity, and acquiring network access rights and an upgrade package of a first network from the database; establishing network connection with the master control node and each slave control node according to the network access authority to generate a second network; and sending an upgrade package to the master control node and each slave control node through a second network so that the master control node and each slave control node are upgraded according to the upgrade package. By implementing the method and the device, the data storage capacity of the master control node can be reduced.

Description

Network intrusion type node upgrading method, device, terminal equipment and storage medium
Technical Field
The present invention relates to the field of wireless battery management technologies, and in particular, to a method, an apparatus, a terminal device, and a storage medium for network intrusion type node upgrade.
Background
With the wide application of wireless communication technology in the field of automotive battery management systems, over-the-air technology (OAD) may be used to help a primary manufacturer of an automobile enterprise or automobile factory to upgrade, repair and manage firmware or software of a battery management system.
When the existing WBMS (wireless battery management system) is used for system upgrade, the current WBMS is mainly connected with external equipment through a main control end to finish the downloading of all node upgrade packages, and the main control end transmits all node upgrade packages to a main control node; in an area network constructed by the wireless battery management system, a master control node plays a role of an OAD distributor, and the upgrade package stored in the master control node is distributed to each slave control node so that the slave control node finishes upgrading when receiving the upgrade package. The upgrade method relies on the master control node to distribute upgrade packets to the slave control nodes, so that the equipment where the master control node is located is required to reserve a storage space for storing the upgrade packets.
Disclosure of Invention
The embodiment of the invention provides a network invasive node upgrading method, a device, terminal equipment and a storage medium, which can reduce the data storage capacity of a main control node.
An embodiment of the present invention provides a method for upgrading a node of a network intrusion type, including:
taking an established network between a master control node and each slave control node as a first network;
acquiring an identity of a battery pack;
constructing an intrusion node, and transmitting the identity to the intrusion node so that the intrusion node performs the following operations:
accessing a database according to the identity, and acquiring network access rights and an upgrade package of a first network from the database;
establishing network connection with the master control node and each slave control node according to the network access authority to generate a second network;
and sending an upgrade package to the master control node and each slave control node through a second network so that the master control node and each slave control node are upgraded according to the upgrade package.
Further, the method further comprises the following steps:
when a network connection is established with the master control node and each slave control node according to the network access authority to generate a second network, the first network is closed;
and closing the second network after the main control node and each slave control node finish upgrading according to the upgrading packet, and restarting the first network.
Further, after restarting the first network, further comprising:
and monitoring the network quality of the first network, and deleting the second network after the network quality of the first network is monitored to be normal.
Further, the sending, by the second network, an upgrade packet to the master control node and each slave control node, so that the master control node and each slave control node perform an upgrade according to the upgrade packet, including:
acquiring the MAC address of each slave node, and sending an upgrade packet to each slave node according to the MAC address of each slave node so that each slave node finishes the upgrade of the own node after receiving the upgrade packet;
and acquiring the MAC address of the main control node, and sending an upgrade packet to the main control node according to the MAC address of the main control node, so that the main control node finishes the upgrade of the main control node after receiving the upgrade packet.
On the basis of the method item embodiments, the invention correspondingly provides device item embodiments;
an embodiment of the present invention correspondingly provides a network intrusive node upgrade apparatus, including: the system comprises a first network determining module, an identity obtaining module and an upgrading module;
the first network determining module is used for taking an established network between the master control node and each slave control node as a first network;
the identity acquisition module is used for acquiring the identity of the battery pack;
the upgrade module is configured to construct an intrusion node, and transmit the identity identifier to the intrusion node, so that the intrusion node performs the following operations: accessing a database according to the identity, and acquiring network access rights and an upgrade package of a first network from the database; establishing network connection with the master control node and each slave control node according to the network access authority to generate a second network; and sending an upgrade package to the master control node and each slave control node through a second network so that the master control node and each slave control node are upgraded according to the upgrade package.
Further, the system also comprises a network control module;
the network control module is used for closing the first network when establishing network connection with the master control node and each slave control node according to the network access authority to generate a second network; and closing the second network after the main control node and each slave control node finish upgrading according to the upgrading packet, and restarting the first network.
Further, the system also comprises a network quality monitoring module;
the network quality monitoring module is used for monitoring the network quality of the first network, and deleting the second network after monitoring that the network quality of the first network is normal.
Further, the sending, by the second network, an upgrade packet to the master control node and each slave control node, so that the master control node and each slave control node perform an upgrade according to the upgrade packet, including:
acquiring the MAC address of each slave node, and sending an upgrade packet to each slave node according to the MAC address of each slave node so that each slave node finishes the upgrade of the own node after receiving the upgrade packet;
and acquiring the MAC address of the main control node, and sending an upgrade packet to the main control node according to the MAC address of the main control node, so that the main control node finishes the upgrade of the main control node after receiving the upgrade packet.
Another embodiment of the present invention provides a terminal device, including a processor, a memory, and a computer program stored in the memory and configured to be executed by the processor, where the processor implements a network intrusive node upgrade method according to the embodiment of the present invention when executing the computer program.
Another embodiment of the present invention provides a storage medium, where the storage medium includes a stored computer program, and when the computer program runs, controls a device where the storage medium is located to execute a network intrusion type node upgrading method according to the embodiment of the present invention.
The invention has the following beneficial effects: the invention provides a network intrusion type node upgrading method, a device, terminal equipment and a storage medium; the method comprises the steps of constructing an intrusion node, acquiring access rights of a first network where a master control node and slave control nodes are located from a database through the intrusion node, simultaneously acquiring a required upgrade package, enabling the intrusion node to intrude into the first network according to the access rights of the first network, establishing a second network with the master control node and the slave control nodes, and then after the second network is established, sending an upgrade package to the slave control nodes and the master control nodes by the intrusion node to finish upgrading the master control nodes and the slave control nodes; by constructing the mode that the invasive node acquires the upgrade package and invades the first network to upgrade the master control node and the slave control node, the master control node is not required to reserve a storage space for storing the upgrade package, and the data storage capacity of the master control node is reduced.
Drawings
Fig. 1 is a flow chart of a network intrusion type node upgrading method according to an embodiment of the present invention.
Fig. 2 is a system block diagram of a network intrusive node upgrade method according to an embodiment of the present invention.
Fig. 3 is a schematic structural diagram of a network intrusion type node upgrade apparatus according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
As shown in fig. 1, a method for upgrading a node of network intrusion according to an embodiment of the present invention includes:
step S1: taking an established network between a master control node and each slave control node as a first network;
step S2: acquiring an identity of a battery pack;
step S3: constructing an intrusion node, and transmitting the identity to the intrusion node so that the intrusion node performs the following operations:
step S301: accessing a database according to the identity, and acquiring network access rights and an upgrade package of a first network from the database;
step S302: establishing network connection with the master control node and each slave control node according to the network access authority to generate a second network;
step S303: and sending an upgrade package to the master control node and each slave control node through a second network so that the master control node and each slave control node are upgraded according to the upgrade package.
Fig. 2 is a system block diagram of a network intrusion type node upgrade method according to the present embodiment.
For step S1, in the wireless battery management system, there is a master node and several slave nodes (i.e., slave node No. … in fig. 2, slave node No. n). The master control node establishes data communication connection with the slave control No. 1 node and the slave control No. 2 node … slave control No. n node respectively, and the network A constructed by the master control node and each slave control node connected with the master control node is the first network.
For step S2, the ID identifier of the battery pack (i.e. the ID identifier of the battery pack) is obtained by the code scanner. Optionally, in one aspect, an operator may use a code scanning gun to scan the code of the battery pack where the master control node and each slave control node are located, so as to obtain the ID identifier of the battery pack. On the other hand, non-manual equipment such as a program control mechanical arm and the like can be used for replacing operators to scan the code of the battery pack where the master control node and each slave control node are located by using the code scanning gun so as to acquire the ID identification number of the battery pack.
And for the step S3, constructing an intrusion node, and transmitting the battery pack ID identification number acquired by the code scanning gun in the step S2 to the constructed intrusion node.
For step S301: the intrusion node accesses a cloud database of the wireless battery management system according to the acquired battery pack ID identification number, and acquires the network access authority of the network A (namely the first network) from the cloud database. Meanwhile, the intrusion node acquires an upgrade package for upgrading each node from the cloud database according to the acquired battery package ID identification number.
For step S302: according to the acquired access rights of the network A, the intrusion node respectively establishes data communication connection with the master control node, the slave control No. 1 node and the slave control No. 2 node … slave control No. n node, and establishes a network B (namely the second network) among the intrusion node, the master control node, the slave control No. 1 node and the slave control No. 2 node … slave control No. n node, so that the intrusion of the intrusion node to the network A is completed, and meanwhile, the construction of the network B containing the intrusion node is completed.
For step S303: in a preferred embodiment, the sending, by the second network, an upgrade packet to the master node and each slave node, so that the master node and each slave node perform an upgrade according to the upgrade packet, includes: acquiring the MAC address of each slave node, and sending an upgrade packet to each slave node according to the MAC address of each slave node so that each slave node finishes the upgrade of the own node after receiving the upgrade packet; and acquiring the MAC address of the main control node, and sending an upgrade packet to the main control node according to the MAC address of the main control node, so that the main control node finishes the upgrade of the main control node after receiving the upgrade packet.
Specifically, the intrusion node firstly acquires the MAC addresses of the slave No. 1 node and the slave No. 2 node … slave No. n node, and based on the acquired MAC addresses of the slave nodes, sends the upgrade packet to the MAC address corresponding to each slave node, so that the upgrade packet can be accurately sent to the corresponding slave node, and the slave node can complete the upgrade of the own node after acquiring the upgrade packet. After the upgrade of all the slave nodes is finished, the intrusion node exits the data interaction with the slave nodes. The intrusion node acquires the MAC address of the main control node, and sends an upgrade packet to the main control node according to the MAC address of the main control node, so that the main control node finishes the upgrade of the self node after receiving the upgrade packet. After the upgrade of the main control node is completed, the intrusion node exits the data interaction with the main control node. Preferably, after each slave control node and the master control node complete the upgrade of the own node according to the received upgrade packet, feedback information of the upgrade completion is sent to the intrusion node, so that the intrusion node can monitor the upgrade condition of each slave control node and the master control node.
In a preferred embodiment, further comprising: when a network connection is established with the master control node and each slave control node according to the network access authority to generate a second network, the first network is closed; and closing the second network after the main control node and each slave control node finish upgrading according to the upgrading packet, and restarting the first network.
Specifically, in step S302, after the network B (i.e., the second network) is established between the slave n nodes according to the intrusion node, the master node, the slave 1 node, and the slave 2 node …, the network a (i.e., the first network) is closed, and only the network B is opened. After the intrusion node finishes upgrading the master control node and all the slave control nodes in step S303, the network B is closed and the network a is restarted.
In a preferred embodiment, after restarting the first network, further comprising: and monitoring the network quality of the first network, and deleting the second network after the network quality of the first network is monitored to be normal.
Specifically, after restarting the network a (i.e., the first network described above), the network quality of the network a needs to be monitored. By detecting the received signal strength (Received Signal Strength Indicator, abbreviated as RSSI) of the network a, it is determined whether the received signal strength of the network a after restarting is not lower than the received signal strength of the initial established network a in step S1, and if not lower than the received signal strength of the initial established network a in step S1, the network quality of the network a is considered to be normal. Optionally, the network quality of the network a may be detected by the PDR network security model, and the network quality of the network a may be determined according to the values of the indexes of the PDR network security model in the process of detecting the network a. When the network quality of the network A is monitored to be normal, namely the network A can be used normally, the intrusion node is completely exited, and the network B containing the intrusion node is deleted.
On the basis of the method item embodiments, the invention correspondingly provides the device item embodiments.
As shown in fig. 3, an embodiment of the present invention provides a node upgrade apparatus of network intrusion type, including: the system comprises a first network determining module, an identity obtaining module and an upgrading module;
the first network determining module is used for taking an established network between the master control node and each slave control node as a first network;
the identity acquisition module is used for acquiring the identity of the battery pack;
the upgrade module is configured to construct an intrusion node, and transmit the identity identifier to the intrusion node, so that the intrusion node performs the following operations: accessing a database according to the identity, and acquiring network access rights and an upgrade package of a first network from the database; establishing network connection with the master control node and each slave control node according to the network access authority to generate a second network; and sending an upgrade package to the master control node and each slave control node through a second network so that the master control node and each slave control node are upgraded according to the upgrade package.
In a preferred embodiment, the system further comprises a network control module;
the network control module is used for closing the first network when establishing network connection with the master control node and each slave control node according to the network access authority to generate a second network; and closing the second network after the main control node and each slave control node finish upgrading according to the upgrading packet, and restarting the first network.
In a preferred embodiment, the system further comprises a network quality monitoring module;
the network quality monitoring module is used for monitoring the network quality of the first network, and deleting the second network after monitoring that the network quality of the first network is normal.
In a preferred embodiment, the sending, by the second network, an upgrade packet to the master node and each slave node, so that the master node and each slave node perform an upgrade according to the upgrade packet, includes:
acquiring the MAC address of each slave node, and sending an upgrade packet to each slave node according to the MAC address of each slave node so that each slave node finishes the upgrade of the own node after receiving the upgrade packet;
and acquiring the MAC address of the main control node, and sending an upgrade packet to the main control node according to the MAC address of the main control node, so that the main control node finishes the upgrade of the main control node after receiving the upgrade packet.
It should be noted that the above-described apparatus embodiments are merely illustrative, and the units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. In addition, in the drawings of the embodiment of the device provided by the invention, the connection relation between the modules represents that the modules have communication connection, and can be specifically implemented as one or more communication buses or signal lines. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
It will be clear to those skilled in the art that, for convenience and brevity, the specific working process of the apparatus described above may refer to the corresponding process in the foregoing method embodiment, which is not described herein again.
On the basis of the method item embodiment, the invention correspondingly provides a terminal equipment item embodiment.
An embodiment of the present invention provides a terminal device, including a processor, a memory, and a computer program stored in the memory and configured to be executed by the processor, where the processor implements a network intrusive node upgrade method according to any one of the present invention when executing the computer program.
The terminal device may be a computing device such as a desktop computer, a notebook computer, a palm computer, a cloud server, etc. The terminal device may include, but is not limited to, a processor, a memory.
The processor may be a central processing unit (Central Processing Unit, CPU), other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), off-the-shelf programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. The general purpose processor may be a microprocessor or the processor may be any conventional processor or the like, which is a control center of the terminal device, and which connects various parts of the entire terminal device using various interfaces and lines.
Based on the method item embodiments, the invention correspondingly provides storage medium item embodiments.
An embodiment of the present invention provides a storage medium, where the storage medium includes a stored computer program, and when the computer program runs, controls a device where the storage medium is located to execute a network intrusion type node upgrading method according to any one of the present invention.
The memory may be used to store the computer program, and the processor may implement various functions of the terminal device by running or executing the computer program stored in the memory and invoking data stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function, and the like; the storage data area may store data created according to the use of the cellular phone, etc. In addition, the memory may include high-speed random access memory, and may also include non-volatile memory, such as a hard disk, memory, plug-in hard disk, smart Media Card (SMC), secure Digital (SD) Card, flash Card (Flash Card), at least one disk storage device, flash memory device, or other volatile solid-state storage device.
The storage medium is a computer readable storage medium, and the computer program is stored in the computer readable storage medium, and when executed by a processor, the computer program can implement the steps of the above-mentioned method embodiments. Wherein the computer program comprises computer program code which may be in source code form, object code form, executable file or some intermediate form etc. The computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), an electrical carrier signal, a telecommunications signal, a software distribution medium, and so forth.
While the foregoing is directed to the preferred embodiments of the present invention, it will be appreciated by those skilled in the art that changes and modifications may be made without departing from the principles of the invention, such changes and modifications are also intended to be within the scope of the invention.

Claims (10)

1. A method for network intrusive node upgrades, comprising:
taking an established network between a master control node and each slave control node as a first network;
acquiring an identity of a battery pack;
constructing an intrusion node, and transmitting the identity to the intrusion node so that the intrusion node performs the following operations:
accessing a database according to the identity, and acquiring network access rights and an upgrade package of a first network from the database;
establishing network connection with the master control node and each slave control node according to the network access authority to generate a second network;
and sending an upgrade package to the master control node and each slave control node through a second network so that the master control node and each slave control node are upgraded according to the upgrade package.
2. The method for network intrusive node upgrade of claim 1, further comprising:
when a network connection is established with the master control node and each slave control node according to the network access authority to generate a second network, the first network is closed;
and closing the second network after the main control node and each slave control node finish upgrading according to the upgrading packet, and restarting the first network.
3. The method of node upgrade of network intrusion according to claim 2, further comprising, after restarting the first network:
and monitoring the network quality of the first network, and deleting the second network after the network quality of the first network is monitored to be normal.
4. The method for upgrading a node of network intrusion according to claim 1, wherein the step of transmitting an upgrade packet to the master node and each slave node through the second network so that the master node and each slave node are upgraded according to the upgrade packet includes:
acquiring the MAC address of each slave node, and sending an upgrade packet to each slave node according to the MAC address of each slave node so that each slave node finishes the upgrade of the own node after receiving the upgrade packet;
and acquiring the MAC address of the main control node, and sending an upgrade packet to the main control node according to the MAC address of the main control node, so that the main control node finishes the upgrade of the main control node after receiving the upgrade packet.
5. A network intrusive node upgrade apparatus, comprising: the system comprises a first network determining module, an identity obtaining module and an upgrading module;
the first network determining module is used for taking an established network between the master control node and each slave control node as a first network;
the identity acquisition module is used for acquiring the identity of the battery pack;
the upgrade module is configured to construct an intrusion node, and transmit the identity identifier to the intrusion node, so that the intrusion node performs the following operations: accessing a database according to the identity, and acquiring network access rights and an upgrade package of a first network from the database; establishing network connection with the master control node and each slave control node according to the network access authority to generate a second network; and sending an upgrade package to the master control node and each slave control node through a second network so that the master control node and each slave control node are upgraded according to the upgrade package.
6. The network intrusion type node upgrade apparatus of claim 5, further comprising a network control module;
the network control module is used for closing the first network when establishing network connection with the master control node and each slave control node according to the network access authority to generate a second network; and closing the second network after the main control node and each slave control node finish upgrading according to the upgrading packet, and restarting the first network.
7. The network intrusion type node upgrade apparatus of claim 6, further comprising a network quality monitoring module;
the network quality monitoring module is used for monitoring the network quality of the first network, and deleting the second network after monitoring that the network quality of the first network is normal.
8. The network intrusion type node upgrade apparatus according to claim 5, wherein the transmitting an upgrade packet to the master control node and each slave control node through the second network so that the master control node and each slave control node perform an upgrade according to the upgrade packet, comprises:
acquiring the MAC address of each slave node, and sending an upgrade packet to each slave node according to the MAC address of each slave node so that each slave node finishes the upgrade of the own node after receiving the upgrade packet;
and acquiring the MAC address of the main control node, and sending an upgrade packet to the main control node according to the MAC address of the main control node, so that the main control node finishes the upgrade of the main control node after receiving the upgrade packet.
9. A terminal device comprising a processor, a memory and a computer program stored in the memory and configured to be executed by the processor, the processor implementing a network intrusive node upgrade method according to any one of claims 1 to 4 when executing the computer program.
10. A storage medium comprising a stored computer program, wherein the computer program, when run, controls a device in which the storage medium is located to perform a network-intrusive node upgrade method according to any one of claims 1 to 4.
CN202311312883.5A 2023-10-11 2023-10-11 Network intrusion type node upgrading method, device, terminal equipment and storage medium Pending CN117459392A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311312883.5A CN117459392A (en) 2023-10-11 2023-10-11 Network intrusion type node upgrading method, device, terminal equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311312883.5A CN117459392A (en) 2023-10-11 2023-10-11 Network intrusion type node upgrading method, device, terminal equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117459392A true CN117459392A (en) 2024-01-26

Family

ID=89590111

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311312883.5A Pending CN117459392A (en) 2023-10-11 2023-10-11 Network intrusion type node upgrading method, device, terminal equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117459392A (en)

Similar Documents

Publication Publication Date Title
US9615346B2 (en) Method and apparatus for notifying information change in wireless communication system
CN101657036B (en) Method for updating correspondence of terminal identification and user identification, equipment and system thereof
US9313650B2 (en) Communications system, mobile communications device, transition control device, transition control method, and transition control program
CN110856126A (en) Information reporting and receiving method, terminal equipment and storage medium
CN112667601A (en) Block chain identifier management method, terminal device and computer-readable storage medium
CN113094087A (en) Software configuration method, electronic device and storage medium
CN116760822A (en) Method, system and device for transmitting files of Internet of things equipment
JP2008030691A (en) Message management device of vehicular control system, and vehicular control system
EP3091435A1 (en) Resource management method and device for terminal system
CN112202879B (en) Middleware management method and device, electronic equipment and storage medium
US11836045B2 (en) Electronic control device having a non-volatile memory with a reserved area storing failure data
US11108588B2 (en) Configuration information to an internet of things multiplexer
CN112306041A (en) Vehicle configuration information writing method and device and electronic equipment
CN117459392A (en) Network intrusion type node upgrading method, device, terminal equipment and storage medium
CN112637821B (en) Management platform and management method of vehicle communication chip and vehicle communication management system
CN111246447A (en) eUICC signed data management method, eUICC signed data management module, eUICC signed data management terminal and eUICC signed data management storage medium
WO2019232677A1 (en) Permission management method, system, mobile terminal, shared charging device, and server
CN114546842A (en) Interface test method and device, storage medium and electronic equipment
CN114125812A (en) Data synchronization method, device, server and storage medium
CN110659299B (en) Data updating method and device and front-end development client
CN115480802B (en) Lithium battery BMS (battery management system) Internet of things system updating method, device, medium and equipment
US20100293260A1 (en) Use of an identification information in a network management
US9948499B2 (en) Location of unidirectional handover relationships
CN112203264A (en) Equipment pairing method applied to equipment group and equipment in equipment group
CN112714020B (en) Method and device for determining validity of data, storage medium and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination