Authorization encryption method of upper computer program of BMS (Battery Management System)

A confidentiality method and program technology, which is applied in the direction of program/content distribution protection, digital data authentication, etc., can solve problems such as the inability to realize authorization code identification, and achieve the effects of reducing the risk of software being copied, protecting copyright, and preventing malicious cracking

Active Publication Date: 2013-04-17
HUIZHOU EPOWER ELECTRONICS
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if it is offline, the identification of the authorization code cannot be realized, so often only the basic functions are opened to restrict the use of users and protect software copyrights

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to facilitate those skilled in the art to understand, the present invention will be described in further detail below in conjunction with embodiment:

[0019] A BMS host computer program authorization confidentiality method, the method comprises the following steps:

[0020] (1). The user PC installs the upper computer program and obtains authorization through the authorization code;

[0021] (2). The host computer program reads the PC hardware information, generates a hardware identification code, puts the hardware identification code in the authorization code, and then stores the new authorization code in the host computer program together;

[0022] (3). The PC connects to the BMS for the first time, and the BMS compares the authorization code information interactively through the host computer program to confirm whether the PC is legally authorized. If it is legally authorized, the BMS stores the hardware identification code stored in the host computer p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authorization encryption method of an upper computer program of a BMS (Battery Management System). The authorization encryption method comprises the following steps that: a user PC (Personal Computer) is installed with the upper computer program and obtains authorization through an authorization code; the upper computer program reads hardware information of the PC, generates a hardware identification code, puts the hardware identification code in the authorization code and stores a new authorization code in the upper computer program; the PC is connected to the BMS for the first time, the BMS interactively contrasts the authorization code information through the upper computer program and confirms if the PC is legally authorized; and when the BMS is needed to be connected to be written and read, the PC is connected to the BMS to start up the upper computer program, and the BMS checks if the upper computer program is legally authorized. The authorization encryption method of the upper computer program of the BMS can protect the upper computer program technology and use right thereof efficiently, prevent an authorization code file from being decrypted maliciously and reduce a risk of software imitation.

Description

technical field [0001] The invention relates to the improvement of BMS security technology. Background technique [0002] At present, the battery management system and its upper computer used in electric vehicles have no security measures. Anyone who can copy the upper computer to his own PC can communicate with the battery management system and read the voltage, capacity, and temperature of the corresponding battery. And parameters such as temperature rise, which will cause leakage of battery management system technology and battery technical indicators, causing losses to battery management system manufacturers and battery manufacturers. [0003] Currently, the frequently used authorization technologies in software include: hardware lock technology and authorization code technology. [0004] Hardware locking technology: It is often used to prevent software from being copied. At present, most hardware such as the MAC address of the network card of the user's PC, the serial ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/30G06F21/10
Inventor 刘飞文锋阮旭松邓军
Owner HUIZHOU EPOWER ELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products