EP1646992A2 - Programmation a distance d'un appareil commande par programme - Google Patents

Programmation a distance d'un appareil commande par programme

Info

Publication number
EP1646992A2
EP1646992A2 EP04738890A EP04738890A EP1646992A2 EP 1646992 A2 EP1646992 A2 EP 1646992A2 EP 04738890 A EP04738890 A EP 04738890A EP 04738890 A EP04738890 A EP 04738890A EP 1646992 A2 EP1646992 A2 EP 1646992A2
Authority
EP
European Patent Office
Prior art keywords
interface
legitimation
program data
program
control point
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
EP04738890A
Other languages
German (de)
English (en)
Inventor
Holger Ceskutti
Thomas Sonnenrein
Gerrit De Boer
Norbert Bauer
Peter Engel
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Robert Bosch GmbH
Original Assignee
Robert Bosch GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Robert Bosch GmbH filed Critical Robert Bosch GmbH
Publication of EP1646992A2 publication Critical patent/EP1646992A2/fr
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment

Definitions

  • the present invention relates to methods for remotely programming a program-controlled device and an arrangement with an interface for receiving program data and a legitimation, and a remotely programmable program-controlled device which comprises a processor and a program memory.
  • EDP program for controlling and regulating various functions of the vehicle. Operation of vehicle engines in particular is controlled by means of such control units. Electronic control units require an EDP program to perform their function. Often this EDP program has to be changed later, because program errors are discovered, or given values for operating parameters of a device controlled by the control unit are to be updated or functions of the EDP program are to be expanded or restricted.
  • the control unit has an interface so that corresponding modifications tion of the computer program can be entered into the control unit and stored there in a program memory. To do this, however, the vehicle must go to a workshop where the new program data are imported into the control unit using a workshop tester.
  • the program Since the program is generally of a confidential nature and any unauthorized manipulation of the functioning of the control unit - for example for reasons of liability and / or operational safety of the vehicle - must be prevented, the program data is transmitted using encryption mechanisms specified by the vehicle manufacturer or keys.
  • the secret keys are stored by the manufacturer in the workshop tester and are used by the workshop tester before reprogramming the control unit as its legitimation in front of the control unit.
  • the control unit is protected against direct manipulation, so that it is also not possible to access the control unit's identification algorithms for unauthorized access and to derive the legitimation from this. In order to avoid a cumbersome and time-consuming visit to the workshop, it is desirable to be able to program the control unit remotely, without having to compromise on tamper protection.
  • the arrangement includes an interface for receiving program data from a remote control point over a remote wireless connection.
  • Program data to be transmitted to the control unit of the vehicle are temporarily stored in a buffer memory at the interface and then transferred to a program memory of the control unit. Buffering of the program data is necessary due to the often unstable wireless remote connection, which can often lead to malfunctions such as incorrect data transmission or interruptions in the connection. Only when the program data have been completely received can they be entered into the memory of the control unit, since the operation of the vehicle is interrupted during the process of entering the program data into the memory of the control unit.
  • the present invention provides methods for remotely programming a program-controlled device and an arrangement therefor which enable reprogramming of the program-controlled device with the shortest possible interruption of its normal operation and in which the secrecy ensures legitimation is.
  • an uncontrolled spread of the secret legitimation is prevented by the fact that the legitimation transmitted remotely from the control point to the interface is not buffered by the interface like the program data, but is immediately transmitted to the device, where it is checked for validity , A physical storage of the legitimation at the interface as in the case of the program data or at another location is not necessary for the method to function. This means that the legitimation between the interface and the device is never present in a way that would allow unauthorized access to the legitimation.
  • the legitimation is buffered like the program data at the interface, but its validity is period of time limited.
  • the period of validity should be so short that it expires in the event of unauthorized access to the authentication before the device can be programmed without authorization.
  • the identification and / or the program data are particularly preferably transmitted wirelessly via the remote connection. In principle, this allows the device unlimited mobility. In order to minimize the effect of disturbances that frequently occur during wireless transmission, the method is repeated when such a disturbance occurs, so that error-free transmission of the program data is guaranteed.
  • the program data and / or the legitimation are preferably transmitted from the interface to the device via a wired connection.
  • a wired connection between the interface and the device is particularly useful when the interface and the device, for example, both in a mobile device such as. B. a vehicle or robot.
  • the control body Before transmission of the program data from the control point to the interface, it is possible to read out second data from a memory of the device, for example the program memory, and to transfer it to the control point. In this way, the control body is informed of the current status of the data present in the device. Based on this current state of the second data can then the control body compile the new program data accordingly. For example, values of operating parameters or program parts that are to remain unchanged do not need to be transmitted unnecessarily with the program data from the control point to the interface. A quantity of data of program data to be transmitted can be reduced in this way, which accelerates the remote transmission of the program data and thereby reduces the susceptibility to remote transmission. Before the remote transmission to the control point, the second data is advantageously buffered at the interface.
  • the buffering allows the second data to be transmitted to be collected at the interface with the lowest priority, ie without affecting the tasks to be carried out simultaneously by the device for its normal operation, and then to be transmitted continuously in a short time. In this way, the time period in which the normal operation of the device must be interrupted because there is no valid program for controlling this operation is kept as short as possible.
  • the program memory of the remotely programmable program-controlled device of the arrangement according to the invention can be any type of permanent memory that can be electrically overwritten, such as an EEPROM or a flash memory.
  • the interface can be connected to a control point by means of a wireless remote connection.
  • the long-distance wireless connection can be, for example, a cellular mobile radio connection.
  • the remotely programmable device receives the program data and the legitimation from the control point at the interface, which can be a legitimation with a limited period of validity.
  • the interface either passes the authentication to the flash memory immediately and unbuffered or, if the authentication is valid for a limited time, buffers it like the program data in a buffer memory before it transfers the authentication to the flash memory. In this way, it is avoided that an unauthorized person at any point in the arrangement can access a legitimation with which he can can manipulate the program data at a later time.
  • the device is preferably a control unit that controls a device.
  • the device can be, for example, an engine or another part of a motor vehicle.
  • the arrangement is particularly preferably arranged in a vehicle.
  • Figure 1 is a schematic representation of a remotely programmable device.
  • FIG. 3 shows a flow chart of a second method according to the invention.
  • FIG. 1 shows schematically a remotely programmable device 1, which is a vehicle.
  • the vehicle 1 comprises an engine 2, a control unit 3, an interface 4, an antenna 5 and a wired connection 6 between the control unit 3 and the interface 4.
  • the interface 4 has a buffer memory 7, while the control unit 3 has a flash Memory 8 and a processor 12 has.
  • the vehicle 1 can be connected wirelessly to a control point 9 via the antenna 5.
  • the control point 9 essentially has a computer 10 and an antenna 11.
  • the computer 10 can be a stationary computer, such as a personal computer, or a mobile device, such as a laptop.
  • EDP programs for control and predetermined values for operating parameters of the engine 2 are stored in the flash memory 8 of the control unit 3. These IT programs and operating parameters have to be modified from time to time. This is done via the control point 9.
  • a wireless connection is established between the vehicle 1 and the control point 9 by means of the antennas 5, 11. New program data are transmitted from the control point 9 to the vehicle 1 via this wireless connection and are buffered in the buffer memory 7 of the interface 4.
  • the control point 9 then transmits a legitimation to the interface 4 and from there to the control unit 3.
  • the flash memory 8 takes over the program data temporarily stored in the buffer memory 7. During this short time, the vehicle 1 is out of order.
  • Two methods are preferred for the remote programming of the flash memory 8: are explained in more detail below with the aid of a flow chart in each case.
  • FIG. 2 shows a flow diagram of the first preferred method according to the invention.
  • a wireless connection is established via antennas 5, 11 between control point 9 and vehicle 1.
  • data is read from the flash memory 8 in step 14 and transmitted via the connection 6 to the buffer memory 7, where it is buffered.
  • these data are transmitted remotely from the buffer memory 7 via the interface 4 and the wireless connection between the antennas 5, 11 from the vehicle 1 to the control point 9.
  • the data include one or more checksums calculated from the program data, on the basis of which the success of this remote transmission is checked in step 16 by the computer 10 of the control point 9.
  • steps 15 and 16 are repeated. If faults occurred during the remote transmission of the data, for example because the remote transmission was interrupted or occurred incorrectly, steps 15 and 16 are repeated. If the remote transmission was successful, the control point 9 creates in step 17 with the computer 10 new program data to be programmed into the flash memory 8 on the basis of the data obtained. In particular, the computer 10 checks which operating parameters have to be changed or whether the EDP program of the flash memory 8 has to be expanded or corrected. After creating the new program data, these and the checksums calculated therefrom are transmitted from the control point 9 to the interface 4 of the vehicle 1 via the wireless connection between the antennas 5, 11 in step 18. The program data and checksums are buffered there in the buffer memory 7 in step 19.
  • step 20 the interface 4 checks the integrity of the transmitted program data on the basis of the checksums. If it detects an error in the program data, it returns to step 18 to retransmit.
  • the control point 9 transmits a legitimation in step 21 via the wireless connection of the antennas 5, 11 to the interface 4. From the interface 4, the legitimation in step 22 is immediately and unbuffered via the transfer wired connection 6 to the control unit 3.
  • the processor 12 of the control unit 3 checks the validity in step 23 for its validity. The legitimation is not stored anywhere longer than is necessary so that the processor 12 can decide on its validity. This prevents uncontrolled access to the legitimation.
  • step 23 If the legitimation in step 23 proves not to be valid, this leads to an abort 24 of the method. Is the validity of the legitimacy tion determined, the flash memory 8 takes over in step 25 the program data buffered in the buffer memory 7.
  • step 26 the normal operation of the control unit 3 is resumed on the basis of the updated program now stored in the flash memory 8 and thus of the vehicle 1.
  • step 27 there is a corresponding feedback to the control point 9.
  • the wireless connection between vehicle 1 and control point 9 is then terminated in step 28 and the method is ended.
  • FIG. 2 Another method according to the invention for remote programming of the flash memory 8 can be seen in the flow chart in FIG.
  • This method like the previously described method, is initiated with the same steps 13 to 21, so that reference can be made here to the description of method steps 13 to 21 in FIG. 3 to the corresponding description of method steps 13 to 21 in FIG. 2.
  • the second method according to FIG. 3 in the subsequent step 29 deviates from the first method in that the legitimation is buffered in the buffer memory 7 in step 29.
  • the interface 4 does not need to be able to distinguish between program data and legitimation; it can therefore be constructed more simply than in the case of FIG. 2.
  • the method of FIG. 2 the method of FIG.
  • the legitimation 3 is a legitimation with a time-limited ter period of validity. This means that the legitimation is only recognized by the processor 12 of the control unit 3 as valid within a certain predetermined time interval. For this reason, the physical buffering of the legitimation in the buffer memory 7 does not mean any significant impairment of the security against manipulation, because if an unauthorized person succeeds in finding out the legitimation, he will nevertheless fail to attempt manipulation because the processor 12 will not fail the legitimation that has expired in the meantime recognized more than valid.
  • step 30 the legitimation is transmitted from the interface 4 to the storage unit 3 and in step 31 the processor 12 checks its validity. As mentioned, this validity check also includes a check with regard to the temporal validity of the identification. If the decision regarding the validity of the legitimation is negative and the legitimation is classified as invalid, the procedure is terminated in step 24. If the legitimation is recognized as valid, steps 25 to 28 continue, which correspond to steps 25 to 28 of the flowchart in FIG. 2 and for the description of which reference is again made to the description in FIG. 2 at this point.
  • step 21 of transmitting the legitimation before steps 18 to 20 of transmitting the program data, so that when all the received data are subsequently transmitted to the device in the order in which they were received, the Legitimation arrives first and can be checked by processor 12.
  • Additional protection can be achieved if between checks 25 of the takeover of the program data by the device and 26 of the resumption of normal operation a check of checksums transmitted together with the program data to the device takes place by the processor 12 and if an error is detected step 25 is repeated.
  • Interface 4 can also be assigned its own identification, which must be transmitted to the device every time the device is reprogrammed, just like the control body's authentication, and is checked before the device permits reprogramming.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Selective Calling Equipment (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Procédés de programmation à distance d'un appareil commandé par programme (3) et système comportant une interface (4) destinée à recevoir des données de programme et une clé d'identification et un appareil (3) programmable à distance et commandé par programme qui comprend un processeur (12) et une mémoire de programme (8). Selon lesdits procédés, des données de programme sont transmises à distance d'un poste de commande (9) à une interface (4) et mises en mémoire de manière intermédiaire dans une mémoire tampon (7). Ensuite, une clé d'identification est transmise du poste de commande (9) à l'interface (4) et de cette interface à l'appareil (3). Ledit appareil (3) vérifie la clé d'identification et en cas de résultat positif, extrait les données de programme de la mémoire tampon (7).
EP04738890A 2003-07-14 2004-07-08 Programmation a distance d'un appareil commande par programme Ceased EP1646992A2 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE10331874A DE10331874A1 (de) 2003-07-14 2003-07-14 Fernprogrammieren eines programmgesteuerten Geräts
PCT/DE2004/001474 WO2005008612A2 (fr) 2003-07-14 2004-07-08 Programmation a distance d'un appareil commande par programme

Publications (1)

Publication Number Publication Date
EP1646992A2 true EP1646992A2 (fr) 2006-04-19

Family

ID=34071665

Family Applications (1)

Application Number Title Priority Date Filing Date
EP04738890A Ceased EP1646992A2 (fr) 2003-07-14 2004-07-08 Programmation a distance d'un appareil commande par programme

Country Status (6)

Country Link
US (1) US8060873B2 (fr)
EP (1) EP1646992A2 (fr)
JP (1) JP2007524149A (fr)
CN (1) CN1842765B (fr)
DE (1) DE10331874A1 (fr)
WO (1) WO2005008612A2 (fr)

Families Citing this family (60)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8788092B2 (en) 2000-01-24 2014-07-22 Irobot Corporation Obstacle following sensor scheme for a mobile robot
US8412377B2 (en) 2000-01-24 2013-04-02 Irobot Corporation Obstacle following sensor scheme for a mobile robot
US6956348B2 (en) 2004-01-28 2005-10-18 Irobot Corporation Debris sensor for cleaning apparatus
US7571511B2 (en) 2002-01-03 2009-08-11 Irobot Corporation Autonomous floor-cleaning robot
US6690134B1 (en) 2001-01-24 2004-02-10 Irobot Corporation Method and system for robot localization and confinement
US7429843B2 (en) 2001-06-12 2008-09-30 Irobot Corporation Method and system for multi-mode coverage for an autonomous robot
US8396592B2 (en) 2001-06-12 2013-03-12 Irobot Corporation Method and system for multi-mode coverage for an autonomous robot
US9128486B2 (en) 2002-01-24 2015-09-08 Irobot Corporation Navigational control system for a robotic device
US8386081B2 (en) 2002-09-13 2013-02-26 Irobot Corporation Navigational control system for a robotic device
US8428778B2 (en) 2002-09-13 2013-04-23 Irobot Corporation Navigational control system for a robotic device
DE10331874A1 (de) 2003-07-14 2005-03-03 Robert Bosch Gmbh Fernprogrammieren eines programmgesteuerten Geräts
US7332890B2 (en) 2004-01-21 2008-02-19 Irobot Corporation Autonomous robot auto-docking and energy management systems and methods
DE112005000738T5 (de) 2004-03-29 2007-04-26 Evolution Robotics, Inc., Pasadena Verfahren und Vorrichtung zur Positionsbestimmung unter Verwendung von reflektierten Lichtquellen
US7366589B2 (en) * 2004-05-13 2008-04-29 General Motors Corporation Method and system for remote reflash
ATE536577T1 (de) 2004-06-24 2011-12-15 Irobot Corp Fernbediente ablaufsteuerung und verfahren für eine autonome robotervorrichtung
US7706917B1 (en) 2004-07-07 2010-04-27 Irobot Corporation Celestial navigation system for an autonomous robot
US11209833B2 (en) 2004-07-07 2021-12-28 Irobot Corporation Celestial navigation system for an autonomous vehicle
US8972052B2 (en) 2004-07-07 2015-03-03 Irobot Corporation Celestial navigation system for an autonomous vehicle
US7823169B1 (en) 2004-10-28 2010-10-26 Wheeler Thomas T Performing operations by a first functionality within a second functionality in a same or in a different programming language
US7774789B1 (en) 2004-10-28 2010-08-10 Wheeler Thomas T Creating a proxy object and providing information related to a proxy object
US8266631B1 (en) 2004-10-28 2012-09-11 Curen Software Enterprises, L.L.C. Calling a second functionality by a first functionality
KR101240732B1 (ko) 2005-02-18 2013-03-07 아이로보트 코퍼레이션 습식 및 건식 청소를 위한 자동 표면 청소 로봇
US7620476B2 (en) 2005-02-18 2009-11-17 Irobot Corporation Autonomous surface cleaning robot for dry cleaning
US8392021B2 (en) 2005-02-18 2013-03-05 Irobot Corporation Autonomous surface cleaning robot for wet cleaning
US7797688B1 (en) 2005-03-22 2010-09-14 Dubagunta Saikumar V Integrating applications in multiple languages
US7861212B1 (en) 2005-03-22 2010-12-28 Dubagunta Saikumar V System, method, and computer readable medium for integrating an original application with a remote application
US8578349B1 (en) 2005-03-23 2013-11-05 Curen Software Enterprises, L.L.C. System, method, and computer readable medium for integrating an original language application with a target language application
US8930023B2 (en) 2009-11-06 2015-01-06 Irobot Corporation Localization by learning of wave-signal distributions
JP2007011734A (ja) * 2005-06-30 2007-01-18 Denso Corp 車載制御装置
ES2522926T3 (es) 2005-12-02 2014-11-19 Irobot Corporation Robot Autónomo de Cubrimiento
EP2251757B1 (fr) 2005-12-02 2011-11-23 iRobot Corporation Mobilité de robot de couverture
US8374721B2 (en) 2005-12-02 2013-02-12 Irobot Corporation Robot system
ES2334064T3 (es) 2005-12-02 2010-03-04 Irobot Corporation Robot modular.
EP2816434A3 (fr) 2005-12-02 2015-01-28 iRobot Corporation Robot à couverture autonome
US20070185624A1 (en) * 2006-02-07 2007-08-09 General Motors Corporation Method for remote reprogramming of vehicle flash memory
WO2007137234A2 (fr) 2006-05-19 2007-11-29 Irobot Corporation Dispositif pour débarrasser les robots de nettoyage de débris
US7810140B1 (en) * 2006-05-23 2010-10-05 Lipari Paul A System, method, and computer readable medium for processing a message in a transport
US8417383B2 (en) 2006-05-31 2013-04-09 Irobot Corporation Detecting robot stasis
US7844759B1 (en) 2006-07-28 2010-11-30 Cowin Gregory L System, method, and computer readable medium for processing a message queue
US7949626B1 (en) 2006-12-22 2011-05-24 Curen Software Enterprises, L.L.C. Movement of an agent that utilizes a compiled set of canonical rules
US9311141B2 (en) 2006-12-22 2016-04-12 Callahan Cellular L.L.C. Survival rule usage by software agents
US7698243B1 (en) 2006-12-22 2010-04-13 Hauser Robert R Constructing an agent in a first execution environment using canonical rules
US7660780B1 (en) 2006-12-22 2010-02-09 Patoskie John P Moving an agent from a first execution environment to a second execution environment
US7860517B1 (en) 2006-12-22 2010-12-28 Patoskie John P Mobile device tracking using mobile agent location breadcrumbs
US8132179B1 (en) 2006-12-22 2012-03-06 Curen Software Enterprises, L.L.C. Web service interface for mobile agents
US8423496B1 (en) 2006-12-22 2013-04-16 Curen Software Enterprises, L.L.C. Dynamic determination of needed agent rules
US8200603B1 (en) 2006-12-22 2012-06-12 Curen Software Enterprises, L.L.C. Construction of an agent that utilizes as-needed canonical rules
US7970724B1 (en) 2006-12-22 2011-06-28 Curen Software Enterprises, L.L.C. Execution of a canonical rules based agent
JP4720781B2 (ja) * 2007-05-07 2011-07-13 株式会社デンソー 車両制御装置のデータ書換システム
JP5144752B2 (ja) 2007-05-09 2013-02-13 アイロボット コーポレイション 自律カバレッジロボット
DE102008056745A1 (de) * 2008-11-11 2010-05-12 Continental Automotive Gmbh Vorrichtung zum Steuern einer Fahrzeugfunktion und Verfahren zum Aktualisieren eines Steuergerätes
EP3192419B1 (fr) 2010-02-16 2021-04-07 iRobot Corporation Brosse d'aspirateur
JP5331081B2 (ja) * 2010-10-15 2013-10-30 トヨタ自動車株式会社 情報処理装置、ナビゲーション装置、データ更新方法
JP5240316B2 (ja) * 2010-10-26 2013-07-17 株式会社デンソー 車両乗員非操作運転システム
US20130204495A1 (en) * 2012-02-02 2013-08-08 Ford Global Technologies, Llc System and method for monitoring and regulating a vehicle
DE102012024010A1 (de) 2012-12-06 2014-06-12 Volkswagen Aktiengesellschaft Verfahren für ein Fahrzeug
US20150095898A1 (en) * 2013-09-27 2015-04-02 Ford Global Technologies, Llc Method and Apparatus for Tailored Wireless Module Updating
US20170311161A1 (en) * 2014-12-02 2017-10-26 Carrier Corporation Remote programming for access control system with virtual card data
US9972321B2 (en) * 2016-01-27 2018-05-15 Bristol, Inc. Voice interfaces in process control systems
US10031740B2 (en) * 2016-10-24 2018-07-24 Lear Corporation Method for programming vehicle electronic control modules

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030061518A1 (en) * 2001-09-25 2003-03-27 Kabushiki Kaisha Toshiba Device authentication management system

Family Cites Families (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4325146A (en) * 1979-12-20 1982-04-13 Lennington John W Non-synchronous object identification system
CA2053261A1 (fr) * 1989-04-28 1990-10-29 Gary D. Hornbuckle Methode et dispositif pour controler et surveiller a distance l'utilisation d'un logiciel
US4994675A (en) * 1989-04-28 1991-02-19 Rebo Research, Inc. Method and apparatus for checking continuity of optic transmission
US5237603A (en) * 1989-12-11 1993-08-17 Sony Corporation Cordless telephone which intermittently monitors predetermined channels from all available channels
US6031825A (en) * 1992-08-18 2000-02-29 Nokia Mobile Phones Limited Infrared audio link in mobile phone
US6028537A (en) * 1996-06-14 2000-02-22 Prince Corporation Vehicle communication and remote control system
US5914976A (en) * 1997-01-08 1999-06-22 W. L. Gore & Associates, Inc. VCSEL-based multi-wavelength transmitter and receiver modules for serial and parallel optical links
US6385723B1 (en) * 1997-05-15 2002-05-07 Mondex International Limited Key transformation unit for an IC card
US6175924B1 (en) * 1997-06-20 2001-01-16 International Business Machines Corp. Method and apparatus for protecting application data in secure storage areas
JP2000172648A (ja) * 1998-12-10 2000-06-23 Nippon Telegr & Teleph Corp <Ntt> ディジタル情報保護装置及びディジタル情報保護方法並びにディジタル情報保護プログラムを記録した記憶媒体
US6487717B1 (en) 1999-01-15 2002-11-26 Cummins, Inc. System and method for transmission of application software to an embedded vehicle computer
US6272402B1 (en) * 1999-07-15 2001-08-07 Navistar International Transportation Corp. Remote interface modules with programmable functions
WO2001031437A1 (fr) * 1999-10-27 2001-05-03 Fujitsu Limited Procede de gestion de programmes pour ordinateur comportant un support d'enregistrement, ordinateur et support d'enregistrement
US6604038B1 (en) * 1999-11-09 2003-08-05 Power Talk, Inc. Apparatus, method, and computer program product for establishing a remote data link with a vehicle with minimal data transmission delay
FR2805365B1 (fr) 2000-02-22 2002-11-29 Peugeot Citroen Automobiles Sa Systeme de reprogrammation a distance d'au moins un calculateur d'un systeme informatique embarque a bord d'un vehicule automobile
EP1384148A2 (fr) 2000-08-02 2004-01-28 Siemens VDO Automotive Corporation Reprogrammation sans fil d'unite de commande electronique de vehicule
DE10038096A1 (de) 2000-08-04 2002-02-14 Bosch Gmbh Robert Verfahren und System zur Übertragung von Daten
JP4581200B2 (ja) 2000-08-31 2010-11-17 ソニー株式会社 個人認証システム、個人認証方法、および情報処理装置、並びにプログラム提供媒体
US6470132B1 (en) * 2000-09-05 2002-10-22 Nokia Mobile Phones Ltd. Optical hinge apparatus
US6728603B2 (en) * 2001-02-08 2004-04-27 Electronic Data Systems Corporation System and method for managing wireless vehicular communications
US7093244B2 (en) * 2001-04-18 2006-08-15 Domosys Corporation Method of remotely upgrading firmware in field-deployed devices
US7269482B1 (en) * 2001-04-20 2007-09-11 Vetronix Corporation In-vehicle information system and software framework
US20020181055A1 (en) * 2001-04-20 2002-12-05 Grant Christiansen System and method for embedding control information within an optical wireless link
JP2002333989A (ja) * 2001-05-10 2002-11-22 Hitachi Ltd 車両への情報配信システム及びその方法
DE10131395B4 (de) 2001-06-28 2006-08-17 Daimlerchrysler Ag Verfahren zum Übertragen von Software- Modulen
US7155321B2 (en) * 2001-08-06 2006-12-26 Idsc Holdings Llc System, method and computer program product for remote vehicle diagnostics, monitoring, configuring and reprogramming
JP3863401B2 (ja) 2001-10-12 2006-12-27 株式会社東芝 ソフトウェア処理装置
JP3750587B2 (ja) * 2001-11-05 2006-03-01 日本電気株式会社 折り畳み式携帯電話機
FR2834360B1 (fr) * 2001-12-31 2004-03-19 Bosch Gmbh Robert Procede et installation de mise a jour d'un logiciel de calculateur embarque dans un vehicule automobile
DE10213165B3 (de) * 2002-03-23 2004-01-29 Daimlerchrysler Ag Verfahren und Vorrichtung zum Übernehmen von Daten
US7010289B2 (en) * 2002-05-24 2006-03-07 General Motors Corporation Method and system for vehicle data upload
US20040054444A1 (en) * 2002-09-16 2004-03-18 Abeska Edward J. Method of uploading data from a vehicle
DE10331874A1 (de) 2003-07-14 2005-03-03 Robert Bosch Gmbh Fernprogrammieren eines programmgesteuerten Geräts
US7366589B2 (en) * 2004-05-13 2008-04-29 General Motors Corporation Method and system for remote reflash

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030061518A1 (en) * 2001-09-25 2003-03-27 Kabushiki Kaisha Toshiba Device authentication management system

Also Published As

Publication number Publication date
US8060873B2 (en) 2011-11-15
JP2007524149A (ja) 2007-08-23
CN1842765B (zh) 2011-06-15
CN1842765A (zh) 2006-10-04
WO2005008612A3 (fr) 2006-03-23
WO2005008612A2 (fr) 2005-01-27
DE10331874A1 (de) 2005-03-03
US20060220900A1 (en) 2006-10-05

Similar Documents

Publication Publication Date Title
WO2005008612A2 (fr) Programmation a distance d&#39;un appareil commande par programme
DE102006011685B4 (de) Sicherheitssystem mit gegenseitiger Berechtigungsüberprüfung mit Wiederherstellung aus einer teilweisen Programmierung
DE10131395B4 (de) Verfahren zum Übertragen von Software- Modulen
DE102008056745A1 (de) Vorrichtung zum Steuern einer Fahrzeugfunktion und Verfahren zum Aktualisieren eines Steuergerätes
DE112007001608T5 (de) Kontrolle von Flottenfahrzeugen mit üblichen Transmittern
EP1883867A1 (fr) Procede pour regler un appareil de terrain electrique
WO2019081395A1 (fr) Procédé et dispositif de mise à jour de logiciel d&#39;un appareil de commande d&#39;un véhicule à moteur
DE112004000132T5 (de) Antidiebstahlsystem
DE10322748B4 (de) Elektronische Steuereinrichtung
WO2017178211A1 (fr) Procédé de mise en oeuvre d&#39;un dispositif de commande d&#39;un véhicule, dispositif de commande, système de mise en oeuvre, véhicule à moteur
DE102005009639A1 (de) Verfahren und Vorrichtung zum Sichern individueller Einstellungsdaten
EP0937845A1 (fr) Système de déblocage de fonction des moyens
EP2753042B1 (fr) Authentification d&#39;au moins deux engins agricoles couplés par un bus de données
WO2005016708A1 (fr) Appareil de commande et de regulation embarque dans un vehicule automobile et procede pour le faire fonctionner
EP0567858B1 (fr) Méthode pour charger une séquence de commandes d&#39;opération nécessaire pour opérer un dispositif électrique commandé par un programme
EP3306856B1 (fr) Procédé de fourniture d&#39;une liaison de communication sécurisée entre les composants d&#39;une chaîne de fonctions à sécurité critique
DE102016209379A1 (de) Verfahren und System zur Autorisierung einer Bedienung eines Fahrzeugs
DE102009058754A1 (de) Verfahren zur Reprogrammierung eines oder mehrerer Steuergeräte eines Fahrzeugs und Steuergerät
EP3306507B1 (fr) Composants pour une chaîne fonctionnelle critique pour la sécurité
EP3306514B1 (fr) Procédé et dispositif de certification d&#39;une chaîne de fonctions critique pour la sécurité
DE102008020560A1 (de) Verfahren zur Erweiterung von Software für ein Steuergerät eines Fahrzeugs und entsprechend ausgestaltete Datenlesevorrichtung sowie Schlüssel und Fahrzeug
EP3531276A1 (fr) Module de communication ainsi que procédé d&#39;installation d&#39;un tel module de communication
DE10246060B4 (de) Vorrichtung zur sicheren Signalerzeugung
DE10334086B4 (de) Motorsteuer-Vorrichtung
DE102012018613A1 (de) Verfahren und Vorrichtung für einen gesicherten Zugriff auf zumindest ein Steuergerät eines Fahrzeugs

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL HR LT LV MK

RIC1 Information provided on ipc code assigned before grant

Ipc: G06F 9/445 20060101AFI20060419BHEP

PUAK Availability of information related to the publication of the international search report

Free format text: ORIGINAL CODE: 0009015

DAX Request for extension of the european patent (deleted)
RBV Designated contracting states (corrected)

Designated state(s): DE FR GB

17P Request for examination filed

Effective date: 20060925

RBV Designated contracting states (corrected)

Designated state(s): DE FR GB

17Q First examination report despatched

Effective date: 20070126

REG Reference to a national code

Ref country code: DE

Ref legal event code: R003

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED

18R Application refused

Effective date: 20180423