WO2024007987A1 - 数字钥匙系统的车端固件升级方法、装置、设备及介质 - Google Patents

数字钥匙系统的车端固件升级方法、装置、设备及介质 Download PDF

Info

Publication number
WO2024007987A1
WO2024007987A1 PCT/CN2023/104718 CN2023104718W WO2024007987A1 WO 2024007987 A1 WO2024007987 A1 WO 2024007987A1 CN 2023104718 W CN2023104718 W CN 2023104718W WO 2024007987 A1 WO2024007987 A1 WO 2024007987A1
Authority
WO
WIPO (PCT)
Prior art keywords
upgrade
vehicle
security chip
digital key
security
Prior art date
Application number
PCT/CN2023/104718
Other languages
English (en)
French (fr)
Inventor
董馨
南洋
李长龙
柳旭
李想
刘闯
吴莹
Original Assignee
中国第一汽车股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中国第一汽车股份有限公司 filed Critical 中国第一汽车股份有限公司
Publication of WO2024007987A1 publication Critical patent/WO2024007987A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates

Definitions

  • Embodiments of the present application relate to the technical field of digital keys, for example, to a vehicle-end firmware upgrade method, device, equipment and medium for a digital key system.
  • Digital key is a business function built based on the integrated security system of car, mobile phone and cloud.
  • the security policies of the car are all encapsulated in the security chip and exist in the form of security applications. Updating the security system means that the security software of the car, mobile phone and cloud needs to be updated simultaneously.
  • Related technologies generally use online upgrades of security chips to update security applications for car-side security strategies, so that the security policies of the car-side devices can be updated as a whole following the version iterations of mobile phones and clouds. In this way, the security policies already used by users can be updated. The vehicle in your hand can enjoy the latest security protection in real time, ensuring the consistency and integrity of the digital key business.
  • the digital key main module cannot guarantee real-time Internet access. For example, in underground garages or tunnels with poor transmission signals, security chip upgrades through the cloud Trusted Service Manager (TSM) will cause The delay causes the digital key security upgrade to fail to be completed.
  • TSM cloud Trusted Service Manager
  • This application provides a vehicle-side firmware upgrade method, device, equipment and medium for a digital key system, and sinks the TSM components required for the upgrade to the vehicle-side local, so as to realize the local TSM components in the vehicle-side firmware and the security chip. Real-time interaction ensures that the upgrade of the vehicle-side security chip can be implemented stably.
  • Embodiments of the present application provide a vehicle-side firmware upgrade method for a digital key system.
  • the vehicle-side firmware includes a vehicle-side gateway and a digital key main module.
  • the digital key main module includes a local trust management system TSM component and a security chip;
  • the method includes:
  • the vehicle-side gateway downloads the upgrade software and authentication key from the upgrade platform
  • the digital key main module receives the upgrade software and the authentication key
  • the local TSM component determines whether the security chip enters upgrade mode
  • the software of the security chip is upgraded through the security channel.
  • Embodiments of the present application also provide a vehicle-side firmware upgrade device for a digital key system.
  • the vehicle-side firmware includes a vehicle-side gateway and a digital key main module.
  • the digital key main module includes a local trust management system TSM component and a security chip. ;
  • the vehicle-side gateway is configured to download the upgrade software and authentication key from the upgrade platform, the digital key main module is configured to receive the upgrade software and the authentication key, and the local TSM component is configured to determine the security Whether the chip enters the upgrade mode;
  • the vehicle-end firmware upgrade device of the digital key system also includes:
  • a secure channel establishment unit configured to establish a secure channel between the local TSM component and the security chip based on the authentication key when the local TSM component determines that the security chip enters the upgrade mode
  • An identification unit configured to identify whether the space of the security chip meets the upgrade conditions
  • An upgrade unit is configured to upgrade the software of the security chip through the security channel when the recognition unit recognizes that the space of the security chip meets the upgrade conditions.
  • Embodiments of the present application also provide a vehicle-side firmware upgrade device for a digital key system, including: one or more processors; a memory configured to store one or more programs; when the one or more programs are When executed by one or more processors, the one or more processors implement the in-vehicle firmware upgrade method of the digital key system described in the above embodiment.
  • Embodiments of the present application also provide a computer-readable storage medium on which a computer program is stored.
  • the program is executed by a processor, the vehicle-side firmware upgrade method of the digital key system described in the above embodiments is implemented.
  • Figure 1 is a flow chart of a vehicle-side firmware upgrade method of a digital key system provided by an embodiment of the present application
  • Figure 2 is a flow chart of another vehicle-side firmware upgrade method of a digital key system provided by an embodiment of the present application
  • Figure 3 shows details of a vehicle-side firmware upgrade method of a digital key system provided by an embodiment of the present application. flow chart;
  • Figure 4 is a structural block diagram of a vehicle-side firmware upgrade device of a digital key system provided by an embodiment of the present application
  • Figure 5 is a schematic diagram of the hardware structure of a device provided by an embodiment of the present application.
  • FIG. 1 is a flow chart of a vehicle-side firmware upgrade method of a digital key system provided by an embodiment of the present application. This embodiment can be applied to the situation of updating the vehicle-side security application of the digital key system. This method can be performed by a digital key system.
  • the vehicle-side firmware upgrade device of the system is executed, and the device can be implemented in the form of software and/or hardware.
  • the device can be configured in terminal equipment/server/vehicle controller.
  • the vehicle-side firmware includes the vehicle-side gateway and the digital key main module.
  • the digital key main module includes the local trust management system TSM component and security chip.
  • Embodiment 1 of the present application provides a vehicle-end firmware upgrade method for a digital key system, including the following steps:
  • the vehicle-side gateway downloads the upgrade software and authentication key from the upgrade platform.
  • the vehicle-side gateway is the core control device of the automotive network system and is responsible for coordinating protocol conversion, data exchange and fault diagnosis between bus networks and data networks with different structures and characteristics.
  • the upgrade platform can be understood as a business download platform.
  • the upgrade platform integrates a variety of security application software and business application software to provide safe and stable system firmware and application upgrade services for vehicle-side equipment. For example, when upgrading the vehicle-side firmware of the digital key system, the upgrade software to be updated and the authentication key required to encrypt and decrypt the data are downloaded from the upgrade platform through the vehicle-side gateway.
  • the TSM component in the embodiment of this application includes a local TSM component located on the car side and a cloud TSM component embedded in the digital key platform, and the authentication key is based on the cloud trust management system (i.e., embedded in the digital key platform) that supports security chips. Cloud TSM component), but does not affect the technical purpose of this application to reduce the number of interactions between the cloud and the security chip.
  • the digital key main module receives the upgrade software and authentication key.
  • the digital key main module is installed on the vehicle and is a communication unit that realizes wireless data transmission between the vehicle and the terminal device.
  • wireless communication transmission is used through the digital key main module in the vehicle-end firmware. technology, receiving the upgrade software and authentication key downloaded from the vehicle-side gateway.
  • the local TSM component in the digital key master module receives the upgrade software and authentication keys.
  • the local TSM component determines whether the security chip enters the upgrade mode; in response to the determination result that the security chip enters the upgrade mode, establish a secure channel between the local TSM component and the security chip based on the authentication key.
  • Establishing a secure channel between the local TSM component and the security chip based on the authentication key is performed by the local TSM component.
  • the local TSM component is a trust management system installed on the car side; the security chip is equivalent to a trustworthy platform, which encapsulates the security policies of the car side in the security chip.
  • the security chip exists in the form of a security application. By integrating the security chip The safety application in the vehicle is iteratively updated based on the cloud version to ensure that the vehicle in the user's hands can enjoy the latest safety protection in real time.
  • the digital key main module After the digital key main module receives the upgrade software and authentication key, it will judge the status of the security chip through the local TSM component to determine whether the security chip has entered the upgrade mode. When it is determined that the security chip has entered the upgrade mode, , a secure channel between the local TSM component and the security chip will be established based on the authentication key, so that the local TSM component and the security chip can interact in real time.
  • the local TSM component determines whether the security chip enters the upgrade mode, it also includes: exiting the upgrade process in response to the determination result that the security chip does not enter the upgrade mode.
  • the digital key main module receives the upgrade software and authentication key, it will judge the status of the security chip through the local TSM component to determine whether the security chip has entered the upgrade mode. When the local TSM component determines that the security chip has not Entering upgrade mode, the local TSM component exits the upgrade process.
  • the local TSM component identifies the storage space of the security chip and determines whether the storage space of the security chip meets the conditions required for upgrading the software. If the preset conditions for upgrade are met, the local TSM component passes The established security channel carries out system upgrades to the security chip software, ensuring that the on-board security chip upgrade can be implemented stably.
  • identifying whether the space of the security chip meets the upgrade conditions it also includes: responding to the identification result that the space of the security chip does not meet the upgrade conditions, exiting the upgrade process, and feeding back to the upgrade platform through the car-side gateway. error message.
  • the storage space of the security chip will be identified to determine whether the storage space of the security chip meets the conditions required for upgrading the software. If it does not meet the prerequisites required for the upgrade, If the storage space conditions are met, the upgrade process will be exited and an error message will be sent. The error message will be returned to the car-side gateway through the digital key main module, and the error message will be fed back to the upgrade platform through the car-side gateway to avoid the failure of the security chip due to insufficient memory. The software upgrade failed, further ensuring the reliability of the vehicle-side security chip upgrade.
  • the technical solution of this embodiment downloads the upgrade software and authentication key from the upgrade platform through the vehicle-side gateway.
  • the digital key main module receives the upgrade software and authentication key.
  • the local TSM component determines whether the security chip enters the upgrade mode. In response to the security chip entering Based on the judgment result of the upgrade mode, establish a secure channel between the local TSM component and the security chip based on the authentication key, and identify whether the space of the security chip meets the upgrade conditions. In response to the identification result that the space of the security chip meets the upgrade conditions, the security channel is verified through the secure channel.
  • the chip software is upgraded.
  • the local TSM components of the car interact with the security chip in real time, reducing the number of interactions between the cloud and the security chip, ensuring the smooth progress of the upgrade process and avoiding digital key masters.
  • the module upgrades the security chip through the cloud TSM, delays may occur and the upgrade cannot be completed, and the entire process of the security chip upgrade can be monitored to ensure that the upgrade of the vehicle-side security chip can be implemented stably.
  • FIG. 2 is a flow chart of a vehicle-side firmware upgrade method of a digital key system provided by an embodiment of the present application.
  • This embodiment is a refinement of the above technical solution and is suitable for updating the vehicle-side security application of the digital key system.
  • This method can be executed by the vehicle-side firmware upgrade device of the digital key system.
  • the vehicle-side gateway before the vehicle-side gateway downloads the upgrade software and authentication key from the upgrade platform, it also includes: a security chip upgrade preparation stage.
  • the upgrade platform includes an over-the-air technology OTA platform and a digital key DK business platform.
  • Embodiment 2 of the present application provides a vehicle-end firmware upgrade method for a digital key system, including the following steps:
  • the OTA platform reads the security element serial number (Security Element Identity Document, SEID) and software version number of the security chip through the vehicle-side gateway.
  • SEID Security Element Identity Document
  • the secure element serial number SEID is equivalent to the identification code and is used to authenticate each secure element.
  • the software version number refers to the way the software sets the version number.
  • the naming format of the software version number is generally the GNU style version number naming format, the Windows style version number naming format and the Net Framework style version number naming format. This embodiment is for security
  • the naming format of the chip’s software version number is not specifically limited.
  • the over-the-air download technology OTA platform when the car is powered on, the over-the-air download technology OTA platform will The automotive network system reads the security element serial number and software version number of the security chip to determine the basic information of the security chip.
  • the local TSM component in the digital key main module will establish communication with the security chip and transfer the basic information of the security chip. The information is integrated and fed back to the vehicle-side gateway through network transmission to facilitate accurate judgment on the upgrade of the security chip.
  • the vehicle-side gateway sends the SEID and software version number of the security chip to the OTA platform.
  • the OTA platform maintains the SEID and software version number of the security chip and the version number information of each vehicle, and compares the software version number of the security chip with each vehicle. Compare the version number information of the car to check whether there is an upgrade request.
  • the vehicle-side gateway can send the SEID and software version number of the security chip to the OTA platform through the 4G channel.
  • the information can also be transmitted through other methods. This embodiment does not specifically limit the specific transmission method. .
  • the OTA platform In response to the query result that there is an upgrade request, the OTA platform sends the upgrade request to the vehicle-side gateway, and the vehicle-side gateway prompts the user through the vehicle infotainment system IVI.
  • the OTA platform will maintain the read integration information of the security chip and the version number information corresponding to each vehicle, and compare it to see if there is an upgrade request. If there is an upgrade request, the OTA platform will make the request. It is sent to the vehicle gateway, and prompts are sent to the user through the vehicle infotainment system IVI.
  • the prompts can be voice prompts, central control display pop-up prompts, etc.
  • IVI When IVI receives the user's update instruction, IVI forwards the update request to the OTA platform through the vehicle-side gateway.
  • the in-vehicle infotainment system IVI can receive the user's update instructions through user voice communication, touch feedback, or gesture instructions. In this embodiment, there is no specific limit on the way in which the IVI receives the user's update instructions.
  • S250 and the OTA platform After S250 and the OTA platform receive the update request, they apply to the digital key DK business platform for an authentication key through the SEID.
  • the authentication key is used for mutual authentication between the local TSM component and the security chip before establishing a secure channel to transmit the upgrade software.
  • step S210 to S250 belong to the security chip upgrade preparation stage. On this basis, continue to refer to Figure 2.
  • the vehicle-side firmware upgrade method of the digital key system provided by Embodiment 2 of the present application also includes the following. step:
  • S260 and the vehicle-side gateway download the upgrade software and authentication key from the upgrade platform.
  • the digital key main module receives the upgrade software and authentication key.
  • the local TSM component determines whether the security chip enters the upgrade mode; in response to the determination result that the security chip enters the upgrade mode, establish a secure channel between the local TSM component and the security chip based on the authentication key.
  • S290 Identify whether the space of the security chip meets the upgrade conditions; in response to the identification result that the space of the security chip meets the upgrade conditions, upgrade the software of the security chip through the security channel.
  • the technical solution of this embodiment is to set the security chip upgrade preparation stage in the vehicle-side firmware upgrade method of the digital key system.
  • the OTA platform reads the security element serial number SEID of the security chip through the vehicle-side gateway. and software version number to determine the basic information of the security chip.
  • the local TSM component located in the main module of the digital key will establish communication with the security chip, integrate the basic information of the security chip and feed it back to the vehicle gateway through network transmission. , based on the OTA platform, compare the read integrated information of the security chip and the version number information corresponding to each vehicle to confirm whether there is an upgrade request.
  • the request content will be prompted to the user through the IVI system, and the user will After the update instruction, the update request is forwarded to the OTA platform, and the OTA platform applies for the authentication key to the digital key DK business platform through SEID to ensure the effectiveness of the security chip upgrade. Then the OTA platform obtains the authentication key and downloads it together with the upgrade software to the vehicle-side gateway.
  • the vehicle-side gateway is connected to the digital key main module through the in-car bus.
  • the digital key main module receives the upgrade software and authentication key and acts as a local TSM component.
  • a secure channel between the local TSM component and the security chip is jointly established through the certification of standard instructions and authentication keys, and the application of the security chip is upgraded through the secure channel.
  • the software upgrade of the security chip after the software upgrade of the security chip is completed, it also includes: the digital key main module returns the upgrade result to the vehicle-side gateway, and returns it to the OTA platform through the vehicle-side gateway, and the OTA platform
  • the SEID of the security chip and the software version number are synchronized to the digital key DK business platform.
  • the digital key main module feeds back the upgrade results to the car-side gateway and returns it to the OTA platform through the car-side gateway.
  • Data interconnection and interoperability can be achieved, and the OTA platform will upgrade the security of the vehicle.
  • the security element serial number SEID and software version number corresponding to the chip are synchronized to the digital key DK business platform, so that the security software on the car, terminal and cloud can be updated simultaneously.
  • the vehicle in the user's hand can enjoy the latest security protection in real time, ensuring the digital key business consistency and completeness.
  • the software upgrade of the security chip after the software upgrade of the security chip is completed, it also includes: writing another authentication key into the security chip, and the other authentication key is used for the next software upgrade of the security chip to establish A secure channel is used between the local TSM component and the security chip.
  • FIG 3 is a detailed flow chart of a vehicle-side firmware upgrade method of a digital key system provided by an embodiment of the present application, which is a detailed description of this embodiment.
  • the vehicle-side firmware upgrade process of the digital key system can be divided into the preparation stage, the establishment of a safe channel stage and the application installation stage.
  • the OTA platform when the entire vehicle is powered on, the OTA platform reads the security element serial number SEID and software version number of the security chip through the vehicle-side gateway, and establishes a relationship between the local TSM component in the digital key main module and the security chip. Communication, integrating the SEID of the security chip and the software version number and feeding them back to the vehicle-side gateway.
  • the vehicle-side gateway sends the SEID and software version number of the security chip to the OTA platform through the designated channel, such as through the 4G channel.
  • the OTA platform maintains the SEID and software version number of the security chip and the version number information of each vehicle, and passes the The SEID and software version number of the security chip are compared with the version number information of each vehicle to query whether there is an upgrade request. If there is no upgrade request, the vehicle-side gateway will return no upgrade request; if there is an upgrade request, the upgrade request will be returned to the vehicle. End gateway, and prompt the user to choose to update the application through IVI.
  • the update request is forwarded to the OTA platform through the car-side gateway.
  • the OTA platform After receiving the update software license (update request), the OTA platform applies for the corresponding authentication key to the digital key DK business platform through the SEID of the security chip, and authenticates The key is used to authenticate each other before the local TSM component and the security chip in the main module of the vehicle digital key establish a secure channel to transmit the upgrade software.
  • the OTA platform downloads the authentication key together with the upgrade software to the car-side gateway.
  • the vehicle-side gateway transmits the upgrade software to the digital key main module through the long message strategy.
  • the digital key main module After the digital key main module completes reception, it forwards the upgrade software to the local TSM component for application storage, and provides the vehicle's parking status to the local TSM component.
  • the local The TSM component determines and notifies the security chip to enter upgrade mode based on actual conditions.
  • Phase 2 Establishing a safe channel phase
  • a secure channel can be established between the local TSM component and the security chip through the all-digital service and equipment standard platform (GlobalPlatform, GP) standard instructions. Of course, it can also be established through other standards.
  • the safe channel is not specifically limited in this embodiment.
  • the application installation between the local TSM component and the security chip can be completed through GP specification standard instructions, and the software in the security chip can be upgraded one by one according to the number of upgrade application requirements contained in the downloaded upgrade software.
  • the upgrade process can The local TSM component generates multiple application download instructions and sends the multiple application download instructions to the security chip.
  • the security chip then sends multiple instruction feedbacks to the local TSM component.
  • the local TSM component sends multiple instruction feedbacks to the security chip based on the multiple instruction feedbacks.
  • Loading application file instructions, the security chip loads application files in the security chip based on multiple loading application file instructions, and then the security chip feeds back the loaded application files to the digital key main module. After all applications are upgraded, another authentication key is written into the security chip, which will be used to establish a secure channel between the local TSM component and the security chip during the next security chip upgrade.
  • the digital key main module needs to return the upgrade results to the vehicle-side gateway, and return the upgrade results to the OTA platform through the vehicle-side gateway.
  • the OTA platform needs to synchronize the SEID of the security chip in the upgraded vehicle with the software version number.
  • the vehicle-side firmware upgrade process for the digital key system has been completed.
  • FIG 4 is a schematic structural diagram of a vehicle-side firmware upgrade device of a digital key system provided by an embodiment of the present application.
  • the vehicle-side firmware upgrade device of the digital key system can be applied to terminal equipment based on vehicle-side firmware upgrade of the digital key system. situations, where the device may be implemented by software and/or hardware and is generally integrated on the terminal device.
  • the device includes: a secure channel establishment unit 31, an identification unit 32 and an upgrade unit 33; wherein the secure channel establishment unit 31 is configured to, when the local TSM component determines that the security chip enters the upgrade mode, based on the authentication The key establishes a secure channel between the local TSM component and the security chip; the identification unit 32 is configured to identify whether the space of the security chip meets the upgrade conditions; the upgrade unit 33 is configured to recognize that the space of the security chip meets the upgrade conditions when the identification unit recognizes that the space of the security chip meets the upgrade conditions. , upgrade the security chip software through the secure channel.
  • the technical solution of this embodiment is to establish a safe channel between the local TSM component and the security chip when the local TSM component determines that the security chip enters the upgrade mode, and identifies whether the space of the security chip meets the upgrade conditions. When the space meets the upgrade conditions, it will be updated through the secure channel.
  • the security chip software is upgraded. Through real-time interaction between the local TSM components of the car and the security chip, the TSM components required for the upgrade are downloaded to the local part of the car, reducing the number of interactions between the cloud and the security chip, ensuring the smooth progress of the upgrade process and avoiding digital key masters.
  • the module upgrades the security chip through the cloud TSM, delays may occur and the upgrade cannot be completed, and the entire process of the security chip upgrade can be monitored to ensure that the upgrade of the vehicle-side security chip can be implemented stably.
  • the device further includes: an upgrade preparation unit.
  • the upgrade preparation unit includes: a reading unit, which is set to read the security element serial number SEID and software version number of the security chip through the OTA platform through the vehicle-side gateway when the entire vehicle is powered on; a comparison unit, which is set to read the security element serial number SEID and software version number of the security chip through the vehicle-side gateway; After sending the SEID and software version number of the security chip to the OTA platform, the OTA platform maintains the SEID and software version number of the security chip and the version number information of each vehicle, and compares the software version number of the security chip with each vehicle Compare the version number information of the car to check whether there is an upgrade request; the prompt unit is set so that when it is determined that there is an upgrade request, the OTA platform will send the upgrade request to the car-side gateway, and the car-side gateway prompts through the in-vehicle infotainment system IVI User; the request forwarding unit is configured to forward the update request to the OTA platform through the vehicle-side gateway when the IVI receives the user's update instruction;
  • the device further includes: a synchronization unit configured to, after the software upgrade of the security chip is completed, the digital key main module returns the upgrade result to the vehicle-side gateway, and transmits all the data to the vehicle-side gateway through the vehicle-side gateway.
  • the above upgrade results are returned to the OTA platform, and the OTA platform synchronizes the SEID and software version number of the security chip in the upgraded vehicle to the DK business platform.
  • the device further includes: a writing unit configured to write another authentication key into the security chip after the software upgrade of the security chip is completed, and the other authentication key is During the next software upgrade of the security chip, a secure channel is established between the local TSM component and the security chip.
  • the device further includes: an exit process unit configured to exit the upgrade process when the local TSM component determines that the security chip has not entered the upgrade mode.
  • the device further includes: a feedback unit, configured to exit the upgrade process when the identification unit 32 identifies that the space of the security chip does not meet the upgrade conditions, and provide feedback to the upgrade platform through the vehicle-side gateway. error message.
  • the vehicle-side firmware upgrade device of the digital key system provided by the embodiments of this application can execute the vehicle-side firmware upgrade method of the digital key system provided by any embodiment of this application, and has functional modules and effects corresponding to the execution method.
  • Figure 5 is a schematic diagram of the hardware structure of a device provided in Embodiment 4 of the present application.
  • the terminal device provided in Embodiment 4 of the present application includes: one or more processors 41 and a storage device 42; there can be one or more processors 41 in the terminal device.
  • one processor Taking the processor 41 as an example; the storage device 42 is configured to store one or more programs; the one or more programs are executed by one or more processors 41, so that the one or more processors 41 implement any one of the embodiments of the present application.
  • the car-side firmware upgrade method of the digital key system is configured to store one or more programs; the one or more programs are executed by one or more processors 41, so that the one or more processors 41 implement any one of the embodiments of the present application.
  • the terminal device may also include: an input device 43 and an output device 44.
  • the processor 41, storage device 42, input device 43 and output device 44 in the terminal device can be connected through a bus or other means.
  • connection through a bus is taken as an example.
  • the storage device 42 in the terminal device serves as a computer-readable storage medium and can be used to store one or more programs.
  • the programs can be software programs, computer executable programs and modules, such as the digital key system provided in Embodiment 1 of the present application.
  • Program instructions/modules corresponding to the vehicle-side firmware upgrade method include: a safe channel establishment unit 31, an identification unit 32 and an upgrade unit 33) .
  • the processor 41 executes software programs, instructions and modules stored in the storage device 42 to execute various functional applications and data processing of the terminal device, that is, to implement the vehicle-end firmware upgrade method of the digital key system in the above method embodiment.
  • the storage device 42 may include a stored program area and a stored data area, where the stored program area may store an operating system and an application program required for at least one function; the stored data area may store data created according to the use of the terminal device, etc.
  • the storage device 42 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid-state storage device.
  • the storage device 42 may also include memory located remotely relative to the processor 41, and these remote memories may be connected to the device through a network. Examples of the above-mentioned networks include but are not limited to the Internet, intranets, local area networks, mobile communication networks and combinations thereof.
  • the input device 43 may be configured to receive input numeric or character information, and to generate key signal inputs related to user settings and function control of the terminal device.
  • the output device 44 may include a display device such as a display screen.
  • the program when one or more programs included in the above-mentioned terminal equipment are executed by one or more processors 41, the program performs the following operations: when the local TSM component determines that the security chip enters the upgrade mode, establishes the local TSM component and the security chip. security channel; identify whether the space of the security chip meets the upgrade conditions; when the identification unit identifies that the space of the security chip meets the upgrade conditions, upgrade the software of the security chip through the security channel.
  • Embodiment 5 of the present application also provides a storage medium containing computer-executable instructions.
  • the computer-executable instructions When executed by a computer processor, the computer-executable instructions are used to execute a vehicle-end firmware upgrade method of a digital key system.
  • the method includes: vehicle-end The gateway downloads the upgrade software and authentication key from the upgrade platform; the digital key main module receives the upgrade software and authentication key; the local TSM component determines whether the security chip enters the upgrade mode; in response to the judgment result that the security chip enters the upgrade mode, the authentication key is Establish a secure channel between the local TSM component and the security chip; identify whether the space of the security chip meets the upgrade conditions; respond to the identification result that the space of the security chip meets the upgrade conditions, upgrade the software of the security chip through the security channel.
  • the embodiments of the present application provide a storage medium containing computer-executable instructions.
  • the computer-executable instructions are not limited to the above method operations, and can also execute the vehicle-side firmware of the digital key system provided by any embodiment of the application. Related operations in the upgrade method.
  • the present application can be implemented with the help of software and necessary general hardware, and of course can also be implemented with hardware. Based on this understanding, the technical solution of this application can be embodied in the form of a software product.
  • the computer software product can be stored in a computer-readable storage medium, such as a computer floppy disk, read-only memory (Read-Only Memory, ROM), Random Access Memory (RAM), flash memory (FLASH), hard disk or optical disk, etc.
  • the computer-readable storage medium includes multiple instructions to make a computer device (which can be a personal computer, server, or network device etc.) to perform the methods of multiple embodiments of the present application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

一种数字钥匙系统的车端固件升级方法、装置、设备及介质,车端固件包括车端网关和数字钥匙主模块,数字钥匙主模块包括本地信任管理系统TSM组件和安全芯片;所述方法包括:车端网关从升级平台下载升级软件和认证密钥(S110);数字钥匙主模块接收升级软件和认证密钥(S120);本地TSM组件判断安全芯片是否进入升级模式;响应于所述安全芯片进入升级模式的判断结果,根据安全密钥建立本地TSM组件与安全芯片的安全通道(S130);识别安全芯片的空间是否满足升级条件;响应于所述安全芯片的空间满足升级条件的识别结果,通过安全通道对安全芯片的软件进行升级(S140)。

Description

数字钥匙系统的车端固件升级方法、装置、设备及介质
本申请要求在2022年07月06日提交中国专利局、申请号为202210796889.3的中国专利申请的优先权,以上申请的全部内容通过引用结合在本申请中。
技术领域
本申请实施例涉及数字钥匙技术领域,例如涉及一种数字钥匙系统的车端固件升级方法、装置、设备及介质。
背景技术
近年来,随着物联网、车联网技术的快速发展,数字钥匙的应用场景越来越多。
数字钥匙是基于车端、手机端、云端一体化的安全体系构建的业务功能,在业务功能跟随国内/国际标准逐步演进的过程中,为保证数字钥匙业务可以始终安全有效,安全体系就需要不断更新。车端的安全策略都封装在安全芯片中,以安全应用的形式存在,更新安全体系就意味着车端、手机端、云端的安全软件需要同步更新。相关技术针对车端的安全策略一般采用在线升级安全芯片的方式进行安全应用的更新,以使车端装置的安全策略跟随手机端及云端的版本迭代而完成整体更新,通过这种方法使已经在用户手中的车辆能实时享受最新的安全保护,保证数字钥匙业务的一致性、完整性。
但相关技术中的升级更新方法中,数字钥匙主模块不能保证实时上网,例如在传输信号不佳的地下车库或隧道内,通过云端信任管理系统(Trusted Service Manager,TSM)进行安全芯片升级会产生时延,导致数字钥匙安全升级无法完成的情况。
发明内容
本申请提供一种数字钥匙系统的车端固件升级方法、装置、设备及介质,将升级所需的TSM组件下沉到车端本地中,以实现车端固件中的本地TSM组件与安全芯片进行实时交互,保证车端安全芯片的升级可以稳定实施。
本申请实施例提供了一种数字钥匙系统的车端固件升级方法,所述车端固件包括车端网关和数字钥匙主模块,所述数字钥匙主模块包括本地信任管理系统TSM组件和安全芯片;该方法包括:
所述车端网关从升级平台下载升级软件和认证密钥;
所述数字钥匙主模块接收所述升级软件和所述认证密钥;
所述本地TSM组件判断所述安全芯片是否进入升级模式;
响应于所述安全芯片进入升级模式的判断结果,根据所述认证密钥建立所述本地TSM组件与所述安全芯片的安全通道;
识别所述安全芯片的空间是否满足升级条件;
响应于所述安全芯片的空间满足升级条件的识别结果,通过所述安全通道对所述安全芯片的软件进行升级。
本申请实施例还提供了一种数字钥匙系统的车端固件升级装置,所述车端固件包括车端网关和数字钥匙主模块,所述数字钥匙主模块包括本地信任管理系统TSM组件和安全芯片;所述车端网关设置为从升级平台下载升级软件和认证密钥,所述数字钥匙主模块设置为接收所述升级软件和所述认证密钥,所述本地TSM组件设置为判断所述安全芯片是否进入升级模式;所述数字钥匙系统的车端固件升级装置还包括:
安全通道建立单元,设置为在所述本地TSM组件判定所述安全芯片进入升级模式的情况下,根据所述认证密钥建立所述本地TSM组件与所述安全芯片的安全通道;
识别单元,设置为识别所述安全芯片的空间是否满足升级条件;
升级单元,设置为在所述识别单元识别到所述安全芯片的空间满足升级条件的情况下,通过所述安全通道对所述安全芯片的软件进行升级。
本申请实施例还提供了一种数字钥匙系统的车端固件升级设备,包括:一个或多个处理器;存储器,设置为存储一个或多个程序;当所述一个或多个程序被所述一个或多个处理器执行时,所述一个或多个处理器实现上述实施例所述的数字钥匙系统的车端固件升级方法。
本申请实施例还提供了一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现上述实施例所述的数字钥匙系统的车端固件升级方法。
附图说明
图1为本申请实施例提供的一种数字钥匙系统的车端固件升级方法的流程图;
图2为本申请实施例提供的另一种数字钥匙系统的车端固件升级方法的流程图;
图3为本申请实施例提供的一种数字钥匙系统的车端固件升级方法的详细 流程图;
图4为本申请实施例提供的一种数字钥匙系统的车端固件升级装置的结构框图;
图5为本申请实施例提供的一种设备的硬件结构示意图。
具体实施方式
下面结合附图和实施例对本申请作说明。可以理解的是,此处所描述的具体实施例仅仅用于解释本申请,而非对本申请的限定。为了便于描述,附图中仅示出了与本申请相关的部分而非全部结构。
实施例一
图1为本申请实施例提供的一种数字钥匙系统的车端固件升级方法的流程图,本实施例可适用于对数字钥匙系统的车端安全应用进行更新的情况,该方法可以由数字钥匙系统的车端固件升级装置来执行,该装置可以采用软件和/或硬件的方式来实现。该装置可配置于终端设备/服务器/车载控制器中。
车端固件包括车端网关和数字钥匙主模块,数字钥匙主模块包括本地信任管理系统TSM组件和安全芯片。
如图1所示,本申请实施例一提供的一种数字钥匙系统的车端固件升级方法,包括如下步骤:
S110、车端网关从升级平台下载升级软件和认证密钥。
车端网关为汽车网络系统的核心控制装置,用于负责协调不同结构和特征的总线网络及数据网络之间的协议转换、数据交换和故障诊断等工作。升级平台可以理解为一种业务下载平台,升级平台集成多种安全应用软件及业务应用软件,为车端设备提供安全稳定的系统固件及应用升级服务。示例性的,在对数字钥匙系统的车端固件升级时,通过车端网关从升级平台中下载所要更新的升级软件以及需要对数据进行加密和解密的认证密钥。本申请实施例中的TSM组件包含了位于车端的本地TSM组件以及在数字钥匙平台嵌入的云端TSM组件,而认证密钥是基于数字钥匙平台中嵌入的支持安全芯片的云端信任管理系统(也即云端TSM组件)辅助生成的,但并不影响本申请为了减少云端与安全芯片交互次数的技术目的。
S120、数字钥匙主模块接收升级软件和认证密钥。
数字钥匙主模块装载在车辆上,是实现车辆与终端设备之间无线数据传输的通信单元。示例性的,通过车端固件中的数字钥匙主模块利用无线通信传输 技术,接收来自车端网关下载下来的升级软件以及认证密钥。
数字钥匙主模块中的本地TSM组件接收升级软件和认证密钥。
S130、本地TSM组件判断安全芯片是否进入升级模式;响应于安全芯片进入升级模式的判断结果,根据所述认证密钥建立本地TSM组件与安全芯片的安全通道。
根据认证密钥建立本地TSM组件与安全芯片的安全通道由本地TSM组件执行。
本地TSM组件是一种安装在车端的信任管理系统;而安全芯片相当于一种可信任平台,将车端的安全策略都封装在安全芯片中,安全芯片以安全应用的形式存在,通过将安全芯片内的安全应用根据云端版本进行迭代更新,保证用户手中的车辆能够实时享受最新的安全保护。
本实施例中,当数字钥匙主模块接收到升级软件和认证密钥后,会通过本地TSM组件对安全芯片的状态进行判断,判断安全芯片是否进入了升级模式,当判断安全芯片进入升级模式后,则会根据认证密钥来建立本地TSM组件和安全芯片的安全通道,以使本地TSM组件与安全芯片进行实时交互。
在上述实施例的基础上,在本地TSM组件判断安全芯片是否进入升级模式之后,还包括:响应于安全芯片未进入升级模式的判断结果,退出升级流程。
可以理解为,当数字钥匙主模块接收到升级软件和认证密钥后,会通过本地TSM组件对安全芯片的状态进行判断,判断安全芯片是否进入了升级模式,当本地TSM组件判断出安全芯片没有进入升级模式,则本地TSM组件退出此次升级流程。
S140、识别安全芯片的空间是否满足升级条件;响应于安全芯片的空间满足升级条件的识别结果,通过安全通道对安全芯片的软件进行升级。
本实施例中,在安全通道建立后,本地TSM组件对安全芯片的存储空间进行识别,判断安全芯片的存储空间是否满足升级软件所需的条件,如果满足升级的预设条件则本地TSM组件通过建立的安全通道对安全芯片的软件进行系统升级,保证了车端安全芯片升级可以稳定实施。
在上述实施例的基础上,在识别安全芯片的空间是否满足升级条件之后,还包括:响应于安全芯片的空间不满足升级条件的识别结果,退出升级流程,并通过车端网关向升级平台反馈错误信息。
示例性的,在安全通道建立后,会对安全芯片的存储空间进行识别,判断安全芯片的存储空间是否满足升级软件所需的条件,如果不满足升级所需的预 设存储空间条件,则退出此次升级流程并发出报错信息,通过数字钥匙主模块将报错信息返回给车端网关,通过车端网关反馈错误信息给升级平台,避免由于内存不足问题导致安全芯片的软件升级失败,进一步确保了车端安全芯片升级的可靠性。
本实施例的技术方案,通过车端网关从升级平台下载升级软件和认证密钥,数字钥匙主模块接收升级软件和认证密钥,本地TSM组件判断安全芯片是否进入升级模式,响应于安全芯片进入升级模式的判断结果,根据认证密钥建立本地TSM组件与安全芯片的安全通道,并识别安全芯片的空间是否满足升级条件,响应于安全芯片的空间满足升级条件的识别结果,通过安全通道对安全芯片的软件进行升级。通过将升级所需的TSM组件下沉到车端本地中,使得车端本地TSM组件与安全芯片进行实时交互,减少云端与安全芯片的交互次数,确保了升级过程的顺利进行,避免数字钥匙主模块通过云端TSM进行安全芯片升级时产生时延导致升级无法完成的情况,且可以监控安全芯片升级的全过程,保证车端安全芯片的升级可以稳定实施。
实施例二
图2为本申请实施例提供的一种数字钥匙系统的车端固件升级方法的流程图。本实施例是在上述技术方案的细化,适用于对数字钥匙系统的车端安全应用进行更新的情况,该方法可以由数字钥匙系统的车端固件升级装置来执行。
在上述实施例的基础上,在车端网关从升级平台下载升级软件和认证密钥之前,还包括:安全芯片升级准备阶段。
示例性地,升级平台包括空中下载技术OTA平台和数字钥匙DK业务平台。
如图2所示,本申请实施例二提供的一种数字钥匙系统的车端固件升级方法,包括如下步骤:
S210、在整车上电情况下,OTA平台通过车端网关读取安全芯片的安全元件序列号(Security Element Identity Document,SEID)和软件版本号。
DK可以理解为数字钥匙,整车上电可以理解为整车低压总开关闭合且仪表台无提示故障的一种状态。安全元件序列号SEID相当于标识码,用于对每个安全元件进行身份认证。软件版本号是指软件设置版本号码的方式,软件版本号的命名格式一般为GNU风格的版本号命名格式、Windows风格的版本号命名格式和Net Framework风格的版本号命名格式,本实施例对安全芯片的软件版本号命名格式不作具体限定。
本实施例中,当汽车处于整车上电情况下,空中下载技术OTA平台会通过 汽车网络系统对安全芯片的安全元件序列号和软件版本号进行读取,以确定安全芯片的基本信息,数字钥匙主模块中的本地TSM组件会与安全芯片之间建立通信,将安全芯片的基本信息进行整合后通过网络传输反馈给车端网关,方便对安全芯片的升级做出准确判断。
S220、车端网关将安全芯片的SEID和软件版本号发送给OTA平台,OTA平台中维护安全芯片的SEID和软件版本号及每台车的版本号信息,将安全芯片的软件版本号与每台车的版本号信息进行比对,查询是否有升级请求。
可以理解的,车端网关可以通过4G通道的方式将安全芯片的SEID和软件版本号发送给OTA平台,当然,也可以通过其他方式对信息进行传输,本实施例对具体的传输方式不作具体限定。
S230、响应于有升级请求的查询结果,OTA平台将升级请求发给车端网关,所述车端网关通过车载信息娱乐系统IVI提示用户。
本实施例中,OTA平台会对读取到的安全芯片的整合信息以及每台车对应的版本号信息进行维护,通过对比查看是否有升级请求,如果存在升级请求,则OTA平台会将此请求发送给车端网关,并通过车载信息娱乐系统IVI向用户发出提示,提示方式可以为语音提示、中控显示屏弹窗提示等。
S240、在IVI收到用户的更新指令的情况下,IVI将更新请求通过车端网关转发给OTA平台。
车载信息娱乐系统IVI可以通过用户语音传达、触摸反馈或手势指令等方式接收用户的更新指令,本实施例中,对IVI接收用户更新指令的方式不作具体限定。
S250、OTA平台接收到所述更新请求后,通过SEID向数字钥匙DK业务平台申请认证密钥,认证密钥用于本地TSM组件与安全芯片建立安全通道传输升级软件前互相认证使用。
可以理解的是,上述步骤S210~S250是属于安全芯片升级准备阶段,在此基础上,继续参考图2,本申请实施例二提供的一种数字钥匙系统的车端固件升级方法,还包括以下步骤:
S260、车端网关从升级平台下载升级软件和认证密钥。
S270、数字钥匙主模块接收升级软件和认证密钥。
S280、本地TSM组件判断安全芯片是否进入升级模式;响应于安全芯片进入升级模式的判断结果,根据认证密钥建立本地TSM组件与安全芯片的安全通道。
S290、识别安全芯片的空间是否满足升级条件;响应于安全芯片的空间满足升级条件的识别结果,通过安全通道对安全芯片的软件进行升级。
本实施例的技术方案,通过在数字钥匙系统的车端固件升级方法中设置安全芯片升级准备阶段,在整车上电情况下,OTA平台通过车端网关读取安全芯片的安全元件序列号SEID和软件版本号,以确定安全芯片的基本信息,位于数字钥匙主模块中的本地TSM组件会与安全芯片之间建立通信,并将安全芯片的基本信息进行整合后通过网络传输反馈给车端网关,基于OTA平台对读取到的安全芯片的整合信息以及每台车对应的版本号信息进行对比确认是否有升级请求,在有升级请求的情况下将请求内容通过IVI系统提示用户,收到用户更新指令后将更新请求转发到OTA平台,OTA平台通过SEID向数字钥匙DK业务平台申请认证密钥,使安全芯片升级的有效性得到保障。随后OTA平台获取到认证密钥后连同升级软件一同下载到车端网关中,车端网关通过车内总线与数字钥匙主模块连接,数字钥匙主模块接收升级软件和认证密钥,当本地TSM组件判断安全芯片进入升级模式时,通过规范标准指令以及认证密钥的认证共同建立本地TSM组件与安全芯片的安全通道,通过安全通道对安全芯片的应用进行升级。通过将升级所需的TSM组件下沉到车端本地中,使得车端本地TSM组件与安全芯片进行实时交互,减少云端与安全芯片的交互次数,确保了升级过程的顺利进行,避免数字钥匙主模块通过云端TSM进行安全芯片升级时产生时延导致升级无法完成的情况发生。
在上述实施例的基础上,在安全芯片的软件升级完成之后,还包括:数字钥匙主模块将升级结果返回给车端网关,并通过车端网关返回给OTA平台,OTA平台将升级的车辆中安全芯片的SEID与软件版本号同步给数字钥匙DK业务平台。
本实施例中,由于在安全芯片升级完成后,数字钥匙主模块将升级的结果反馈给车端网关并通过车端网关返回到OTA平台,可以实现数据的互联互通,OTA平台将升级车辆的安全芯片对应的安全元件序列号SEID和软件版本号同步到数字钥匙DK业务平台,使得车端、终端和云端的安全软件得到同步更新,用户手中的车辆能够实时享受最新的安全保护,保证数字钥匙业务的一致性和完整性。
在上述实施例的基础上,在安全芯片的软件升级完成之后,还包括:将另一个认证密钥写入安全芯片中,另一个认证密钥用于下一次对安全芯片的软件升级时,建立本地TSM组件与安全芯片之间的安全通道使用。
本实施例中,通过在安全芯片的软件升级完成后,将另一个认证密钥写入安全芯片中作为下次升级时建立安全通道使用,在下次更新时,无需将更新请 求通过车端网关发送给OTA平台,再通过安全元件的元件序列号SEID向数字钥匙DK业务平台申请认证密钥,可以提高下一次对安全芯片实施更新的效率,为用户节省时间。
图3为本申请实施例提供的一种数字钥匙系统的车端固件升级方法的详细流程图,是对本实施例的细化说明。如图3所示,数字钥匙系统的车端固件升级流程可分为准备阶段、建立安全通道阶段和应用安装阶段。
阶段1、准备阶段
示例性的,在整车上电的情况下,OTA平台通过车端网关读取安全芯片的安全元件序列号SEID和软件版本号,数字钥匙主模块中的的本地TSM组件与安全芯片之间建立通信,将安全芯片的SEID和软件版本号整合后反馈给车端网关。车端网关将安全芯片的SEID和软件版本号通过指定通道发送给OTA平台,例如通过4G通道等,OTA平台中维护安全芯片的SEID和软件版本号及每台车的版本号信息,并通过将安全芯片的SEID和软件版本号与每台车的版本号信息进行对比查询是否有升级请求,如无升级请求,则返馈车端网关无升级请求;如有升级请求则将升级请求返回给车端网关,并通过IVI提示用户选择更新应用。
在用户选择更新应用后,更新请求通过车端网关转发给OTA平台,OTA平台接收到更新软件许可(更新请求)后,通过安全芯片的SEID向数字钥匙DK业务平台申请对应的认证密钥,认证密钥用于车端数字钥匙主模块中的本地TSM组件与安全芯片建立安全通道传输升级软件前互相认证使用。OTA平台获取到认证密钥后将认证密钥连同升级软件一同下载到车端网关中。车端网关通过长报文策略将升级软件传输给数字钥匙主模块,数字钥匙主模块完成接收后将升级软件转发给本地TSM组件进行应用存储,并提供车辆的驻车状态给本地TSM组件,本地TSM组件根据实际条件判断并通知安全芯片进入升级模式。
至此,安全芯片升级准备阶段已全部完成。
阶段2、建立安全通道阶段
示例性的,在认证密钥认证成功的情况下,本地TSM组件与安全芯片间可以通过全数字服务和设备标准平台(GlobalPlatform,GP)规范标准指令建立安全通道,当然也可通过其他规范标准建立安全通道,本实施例对此不作具体限定。在建立安全通道后,识别安全芯片内的空间是否满足升级需求,如满足升级需求则继续应用安装流程;如存储空间不满足升级需求则提示空间不足,并通过数字钥匙主模块将报错信息返回给车端网关,车端网关将报错信息返回给OTA平台。
阶段3、应用安装阶段
示例性的,本地TSM组件与安全芯片之间可以通过GP规范标准指令完成应用安装,并根据下载的升级软件中包含的升级应用的需求数,对安全芯片中的软件逐一进行升级,升级过程可以是本地TSM组件生成多条应用下载指令,将多条应用下载指令下发到安全芯片,安全芯片再向本地TSM组件发送多条指令反馈,本地TSM组件基于多条指令反馈向安全芯片发送多条装载应用文件指令,安全芯片基于多条装载应用文件指令在安全芯片内装载应用文件,随后安全芯片将装载的应用文件反馈至数字钥匙主模块。并在应用全部升级后,将另一个认证密钥写入安全芯片中,用于下一次安全芯片升级时,建立本地TSM组件与安全芯片之间的安全通道使用。
安全芯片升级完成后,需要数字钥匙主模块将升级结果返回给车端网关,并通过车端网关将升级结果返回给OTA平台,OTA平台需将升级的车辆中安全芯片的SEID与软件版本号同步给数字钥匙DK业务平台,保证数字钥匙业务的一致性和完整性,至此,针对数字钥匙系统的车端固件升级过程已全部完成。
本实施例中,通过在数字钥匙系统的车端固件升级流程中设置准备阶段、建立安全通道阶段和应用安装阶段对应的三个阶段,实现车端的本地TSM组件与安全芯片进行实时交互,将升级所需的TSM组件下沉到车端本地中,减少云端与安全芯片的交互次数,确保了升级过程的顺利进行,避免数字钥匙主模块通过云端TSM进行安全芯片升级时产生时延导致升级无法完成的情况发生。
实施例三
图4为本申请实施例提供的一种数字钥匙系统的车端固件升级装置的结构示意图,该数字钥匙系统的车端固件升级装置可适用于终端设备基于对数字钥匙系统的车端固件升级的情况,其中该装置可由软件和/或硬件实现,并一般集成在终端设备上。
如图4所示,该装置包括:安全通道建立单元31、识别单元32和升级单元33;其中,安全通道建立单元31,设置为在本地TSM组件判定安全芯片进入升级模式的情况下,根据认证密钥建立本地TSM组件与安全芯片的安全通道;识别单元32,设置为识别安全芯片的空间是否满足升级条件;升级单元33,设置为在识别单元识别到安全芯片的空间满足升级条件的情况下,通过安全通道对安全芯片的软件进行升级。
本实施例的技术方案,通过在本地TSM组件判定安全芯片进入升级模式时,建立本地TSM组件与安全芯片的安全通道,并识别安全芯片的空间是否满足升级条件,在识别单元识别到安全芯片的空间满足升级条件时,通过安全通道对 安全芯片的软件进行升级。通过将车端的本地TSM组件与安全芯片进行实时交互,将升级所需的TSM组件下沉到车端本地中,减少云端与安全芯片的交互次数,确保了升级过程的顺利进行,避免数字钥匙主模块通过云端TSM进行安全芯片升级时产生时延导致升级无法完成的情况,且可以监控安全芯片升级的全过程,保证车端安全芯片的升级可以稳定实施。
在上述实施例的基础上,所述装置还包括:升级准备单元。
升级准备单元,包括:读取单元,设置为在整车上电情况下,OTA平台通过车端网关读取安全芯片的安全元件序列号SEID和软件版本号;对比单元,设置为在车端网关将安全芯片的SEID和软件版本号发送给OTA平台之后,OTA平台中维护安全芯片的SEID和软件版本号以及每台车的版本号信息,将所述安全芯片的软件版本号与所述每台车的版本号信息进行比对,查询是否有升级请求;提示单元,设置为在确定存在升级请求的情况下,OTA平台将升级请求发给车端网关,车端网关通过车载信息娱乐系统IVI提示用户;请求转发单元,设置为在IVI收到用户的更新指令的情况下,所述IVI将更新请求通过车端网关转发给OTA平台;密钥申请单元,设置为在OTA平台接收到更新请求后,所述OTA平台通过SEID向DK业务平台申请认证密钥,认证密钥用于本地TSM组件与安全芯片建立安全通道传输升级软件前互相认证使用。
在上述实施例的基础上,所述装置还包括:同步单元,设置为在所述安全芯片的软件升级完成之后,数字钥匙主模块将升级结果返回给车端网关,并通过车端网关将所述升级结果返回给OTA平台,OTA平台将升级的车辆中的安全芯片的SEID与软件版本号同步给DK业务平台。
在上述实施例的基础上,所述装置还包括:写入单元,设置为在所述安全芯片的软件升级完成之后将另一个认证密钥写入安全芯片中,所述另一个认证密钥用于下一次对安全芯片的软件升级时,建立所述本地TSM组件与所述安全芯片之间的安全通道使用。
在上述实施例的基础上,所述装置还包括:退出流程单元,设置为在本地TSM组件判定安全芯片没有进入升级模式的情况下,退出升级流程。
在上述实施例的基础上,所述装置还包括:反馈单元,设置为在识别单元32识别到安全芯片的空间不满足升级条件的情况下,退出升级流程,并通过车端网关向升级平台反馈错误信息。
本申请实施例所提供的数字钥匙系统的车端固件升级装置可执行本申请任意实施例所提供的数字钥匙系统的车端固件升级方法,具备执行方法相应的功能模块和效果。
实施例四
图5为本申请实施例四提供的一种设备的硬件结构示意图。如图5所示,本申请实施例四提供的终端设备包括:一个或多个处理器41和存储装置42;该终端设备中的处理器41可以是一个或多个,图5中以一个处理器41为例;存储装置42设置为存储一个或多个程序;一个或多个程序被一个或多个处理器41执行,使得一个或多个处理器41实现如本申请实施例中任一项的数字钥匙系统的车端固件升级方法。
终端设备还可以包括:输入装置43和输出装置44。
终端设备中的处理器41、存储装置42、输入装置43和输出装置44可以通过总线或其他方式连接,图5中以通过总线连接为例。
该终端设备中的存储装置42作为一种计算机可读存储介质,可用于存储一个或多个程序,程序可以是软件程序、计算机可执行程序以及模块,如本申请实施例一所提供数字钥匙系统的车端固件升级方法对应的程序指令/模块(例如,附图3所示的数字钥匙系统的车端固件升级装置中的模块,包括:安全通道建立单元31、识别单元32和升级单元33)。处理器41通过运行存储在存储装置42中的软件程序、指令以及模块,从而执行终端设备的多种功能应用以及数据处理,即实现上述方法实施例中数字钥匙系统的车端固件升级方法。
存储装置42可包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序;存储数据区可存储根据终端设备的使用所创建的数据等。此外,存储装置42可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他非易失性固态存储器件。在一些实例中,存储装置42还可包括相对于处理器41远程设置的存储器,这些远程存储器可以通过网络连接至设备。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
输入装置43可设置为接收输入的数字或字符信息,以及产生与终端设备的用户设置以及功能控制有关的键信号输入。输出装置44可包括显示屏等显示设备。
并且,当上述终端设备所包括一个或者多个程序被一个或者多个处理器41执行时,程序进行如下操作:在本地TSM组件判定安全芯片进入升级模式的情况下,建立本地TSM组件与安全芯片的安全通道;识别安全芯片的空间是否满足升级条件;在识别单元识别到安全芯片的空间满足升级条件的情况下,通过安全通道对安全芯片的软件进行升级。
实施例五
本申请实施例五还提供一种包含计算机可执行指令的存储介质,计算机可执行指令在由计算机处理器执行时用于执行一种数字钥匙系统的车端固件升级方法,该方法包括:车端网关从升级平台下载升级软件和认证密钥;数字钥匙主模块接收升级软件和认证密钥;本地TSM组件判断安全芯片是否进入升级模式;响应于安全芯片进入升级模式的判断结果,根据认证密钥建立本地TSM组件与安全芯片的安全通道;识别安全芯片的空间是否满足升级条件;响应于安全芯片的空间满足升级条件的识别结果,通过安全通道对安全芯片的软件进行升级。
当然,本申请实施例所提供的一种包含计算机可执行指令的存储介质,其计算机可执行指令不限于如上的方法操作,还可以执行本申请任意实施例所提供的数字钥匙系统的车端固件升级方法中的相关操作。
通过以上关于实施方式的描述,所属领域的技术人员可以清楚地了解到,本申请可借助软件及必需的通用硬件来实现,当然也可以通过硬件实现。基于这样的理解,本申请的技术方案可以以软件产品的形式体现出来,该计算机软件产品可以存储在计算机可读存储介质中,如计算机的软盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、闪存(FLASH)、硬盘或光盘等,计算机可读存储介质中包括多个指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请多个实施例的方法。
值得注意的是,上述搜索装置的实施例中,所包括的多个单元和模块只是按照功能逻辑进行划分的,但并不局限于上述的划分,只要能够实现相应的功能即可;另外,每个功能单元的具体名称也只是为了便于相互区分,并不用于限制本申请的保护范围。

Claims (10)

  1. 一种数字钥匙系统的车端固件升级方法,所述车端固件包括车端网关和数字钥匙主模块,所述数字钥匙主模块包括本地信任管理系统TSM组件和安全芯片;所述数字钥匙系统的车端固件升级方法包括:
    所述车端网关从升级平台下载升级软件和认证密钥;
    所述数字钥匙主模块接收所述升级软件和所述认证密钥;
    所述本地TSM组件判断所述安全芯片是否进入升级模式;
    响应于所述安全芯片进入升级模式的判断结果,根据所述认证密钥建立所述本地TSM组件与所述安全芯片的安全通道;
    识别所述安全芯片的空间是否满足升级条件;
    响应于所述安全芯片的空间满足升级条件的识别结果,通过所述安全通道对所述安全芯片的软件进行升级。
  2. 根据权利要求1所述的数字钥匙系统的车端固件升级方法,在所述车端网关从升级平台下载升级软件和认证密钥之前,还包括:
    安全芯片升级准备阶段。
  3. 根据权利要求2所述的数字钥匙系统的车端固件升级方法,其中,所述升级平台包括空中下载技术OTA平台和数字钥匙DK业务平台;所述安全芯片升级准备阶段包括:
    在整车上电情况下,所述OTA平台通过所述车端网关读取所述安全芯片的安全元件序列号SEID和软件版本号;
    所述车端网关将所述安全芯片的SEID和软件版本号发送给所述OTA平台,所述OTA平台中维护所述安全芯片的SEID和软件版本号以及每台车的版本号信息,将所述安全芯片的软件版本号与所述每台车的版本号信息进行比对,查询是否有升级请求;
    响应于有升级请求的查询结果,所述OTA平台将所述升级请求发给所述车端网关,所述车端网关通过车载信息娱乐系统IVI提示用户;
    在所述IVI收到用户的更新指令的情况下,所述IVI将更新请求通过所述车端网关转发给所述OTA平台;
    所述OTA平台接收到所述更新请求后,所述OTA平台通过所述SEID向所述DK业务平台申请认证密钥,所述认证密钥用于所述本地TSM组件与所述安全芯片建立安全通道传输升级软件前互相认证使用。
  4. 根据权利要求3所述的数字钥匙系统的车端固件升级方法,在所述安全 芯片的软件升级完成之后,还包括:
    所述数字钥匙主模块将升级结果返回给所述车端网关,并通过所述车端网关将所述升级结果返回给所述OTA平台,所述OTA平台将升级的车辆中的安全芯片的SEID与软件版本号同步给所述DK业务平台。
  5. 根据权利要求1所述的数字钥匙系统的车端固件升级方法,在所述安全芯片的软件升级完成之后,还包括:
    将另一个认证密钥写入所述安全芯片中,所述另一个认证密钥用于下一次对所述安全芯片的软件升级时,建立所述本地TSM组件与所述安全芯片之间的安全通道使用。
  6. 根据权利要求1所述的数字钥匙系统的车端固件升级方法,在所述本地TSM组件判断所述安全芯片是否进入升级模式之后,还包括:
    响应于所述安全芯片未进入升级模式的判断结果,退出升级流程。
  7. 根据权利要求1所述的数字钥匙系统的车端固件升级方法,在识别所述安全芯片的空间是否满足升级条件之后,还包括:
    响应于所述安全芯片的空间不满足升级条件的识别结果,退出升级流程,并通过所述车端网关向所述升级平台反馈错误信息。
  8. 一种数字钥匙系统的车端固件升级装置,所述车端固件包括车端网关和数字钥匙主模块,所述数字钥匙主模块包括本地信任管理系统TSM组件和安全芯片;所述车端网关设置为从升级平台下载升级软件和认证密钥,所述数字钥匙主模块设置为接收所述升级软件和所述认证密钥,所述本地TSM组件设置为判断所述安全芯片是否进入升级模式;所述数字钥匙系统的车端固件升级装置还包括:
    安全通道建立单元,设置为在所述本地TSM组件判定所述安全芯片进入升级模式的情况下,根据所述认证密钥建立所述本地TSM组件与所述安全芯片的安全通道;
    识别单元,设置为识别所述安全芯片的空间是否满足升级条件;
    升级单元,设置为在所述识别单元识别到所述安全芯片的空间满足升级条件的情况下,通过所述安全通道对所述安全芯片的软件进行升级。
  9. 一种数字钥匙系统的车端固件升级设备,包括:
    至少一个处理器;
    存储器,设置为存储至少一个程序;
    当所述至少一个程序被所述至少一个处理器执行时,所述至少一个处理器实现如权利要求1-7中任一所述的数字钥匙系统的车端固件升级方法。
  10. 一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现如权利要求1-7中任一所述的数字钥匙系统的车端固件升级方法。
PCT/CN2023/104718 2022-07-06 2023-06-30 数字钥匙系统的车端固件升级方法、装置、设备及介质 WO2024007987A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210796889.3A CN115220762A (zh) 2022-07-06 2022-07-06 数字钥匙系统的车端固件升级方法、装置、设备及介质
CN202210796889.3 2022-07-06

Publications (1)

Publication Number Publication Date
WO2024007987A1 true WO2024007987A1 (zh) 2024-01-11

Family

ID=83610074

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/104718 WO2024007987A1 (zh) 2022-07-06 2023-06-30 数字钥匙系统的车端固件升级方法、装置、设备及介质

Country Status (2)

Country Link
CN (1) CN115220762A (zh)
WO (1) WO2024007987A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117793709A (zh) * 2024-02-27 2024-03-29 上海银基信息安全技术股份有限公司 车辆数字钥匙密钥灌装方法、系统及装置、介质

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115220762A (zh) * 2022-07-06 2022-10-21 中国第一汽车股份有限公司 数字钥匙系统的车端固件升级方法、装置、设备及介质
CN116071854B (zh) * 2023-01-18 2024-08-23 重庆长安汽车股份有限公司 一种数字钥匙推荐方法、装置、设备及存储介质
CN117215621A (zh) * 2023-11-02 2023-12-12 北京紫光青藤微系统有限公司 用于更新电子设备固件的方法、装置和系统

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8200988B2 (en) * 2001-08-03 2012-06-12 Intel Corporation Firmware security key upgrade algorithm
CN109166200A (zh) * 2018-07-06 2019-01-08 捷德(中国)信息科技有限公司 授权方法、装置、系统、电子锁、数字钥匙和存储介质
CN112328271A (zh) * 2019-07-31 2021-02-05 株洲中车时代电气股份有限公司 一种车载设备软件升级方法及系统
CN113867748A (zh) * 2020-06-30 2021-12-31 比亚迪股份有限公司 车辆软件升级方法、车载终端和车辆及服务器
CN114416131A (zh) * 2021-12-07 2022-04-29 浙江大华技术股份有限公司 一种应用升级方法、应用升级平台、电子设备及存储介质
CN115220762A (zh) * 2022-07-06 2022-10-21 中国第一汽车股份有限公司 数字钥匙系统的车端固件升级方法、装置、设备及介质

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8200988B2 (en) * 2001-08-03 2012-06-12 Intel Corporation Firmware security key upgrade algorithm
CN109166200A (zh) * 2018-07-06 2019-01-08 捷德(中国)信息科技有限公司 授权方法、装置、系统、电子锁、数字钥匙和存储介质
CN112328271A (zh) * 2019-07-31 2021-02-05 株洲中车时代电气股份有限公司 一种车载设备软件升级方法及系统
CN113867748A (zh) * 2020-06-30 2021-12-31 比亚迪股份有限公司 车辆软件升级方法、车载终端和车辆及服务器
CN114416131A (zh) * 2021-12-07 2022-04-29 浙江大华技术股份有限公司 一种应用升级方法、应用升级平台、电子设备及存储介质
CN115220762A (zh) * 2022-07-06 2022-10-21 中国第一汽车股份有限公司 数字钥匙系统的车端固件升级方法、装置、设备及介质

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117793709A (zh) * 2024-02-27 2024-03-29 上海银基信息安全技术股份有限公司 车辆数字钥匙密钥灌装方法、系统及装置、介质

Also Published As

Publication number Publication date
CN115220762A (zh) 2022-10-21

Similar Documents

Publication Publication Date Title
WO2024007987A1 (zh) 数字钥匙系统的车端固件升级方法、装置、设备及介质
JP7562661B2 (ja) ソフトウェアアップグレード方法、装置、およびシステム
CN112055952B (zh) 一种车载设备升级方法及相关设备
US9436456B2 (en) System and method for management of software updates at a vehicle computing system
WO2017101310A1 (zh) 一种车辆远程控制方法、装置及系统
EP4202645A1 (en) Vehicle upgrading method and apparatus
WO2021136258A1 (zh) 一种软件升级方法和装置
CN111061499A (zh) 一种基于文件系统的ecu更新方法及系统
CN112995403B (zh) 车辆控制方法及相关装置
CN113094062A (zh) 升级方法及装置
CN111634253B (zh) 无钥匙进入方法、装置、系统及车载多媒体系统
WO2022165711A1 (zh) 基于空中下载技术ota的升级方法及装置
WO2022160124A1 (zh) 一种服务授权管理方法及装置
WO2024008104A1 (zh) 远程升级方法及系统
JP2024040359A (ja) 更新データを配信するサーバ、更新データの配信方法及び配信プログラム、ソフトウェア更新システム
CN115904447A (zh) 一种版本更新系统、方法、电子设备及存储介质
US11539704B2 (en) Method and apparatus for secure wireless vehicle bus communication
KR102720909B1 (ko) 소프트웨어 업그레이드 방법, 장치 및 시스템
CN113573261B (zh) Etc车载单元的发行激活方法、装置、系统及设备
US11972248B2 (en) Controlling software update of electronic control units mounted on a vehicle
CN113905061A (zh) 一种信息处理方法、装置、芯片、诊断仪、设备及车辆
CN117681809A (zh) 一种车载屏幕的控制方法、装置、车辆及存储介质
CN118401922A (zh) 一种基于空中下载ota技术的升级方法及通信装置
CN117061513A (zh) 车端与云端服务建立方法、管理方法、装置、设备及介质
CN114475486A (zh) 车辆模式设置方法和装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23834754

Country of ref document: EP

Kind code of ref document: A1