Unlock instant, AI-driven research and patent intelligence for your innovation.

Programming method, battery with an arrangement for carrying out the programming method and a motor vehicle comprising said type of battery

An authentication method and battery technology, applied in the fields of digital data authentication, electrical components, digital transmission systems, etc., can solve the problem of unprotected programming, and achieve the effect of reducing the amount of data and flashing memory

Active Publication Date: 2014-12-10
ROBERT BOSCH GMBH +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However in the method according to EP 1 055 983 B1 the programming is not protected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Programming method, battery with an arrangement for carrying out the programming method and a motor vehicle comprising said type of battery
  • Programming method, battery with an arrangement for carrying out the programming method and a motor vehicle comprising said type of battery
  • Programming method, battery with an arrangement for carrying out the programming method and a motor vehicle comprising said type of battery

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Similar to the seed-key method (seed & key method) in an exemplary embodiment of the present invention

[0040] - transfer the seed - in this case the public key, and

[0041] - computing and transmitting a key which in an exemplary embodiment comprises at least a checksum of the data used for programming encrypted with the seed.

[0042] The invention is not limited to this specific example here. Conversely, other authentication methods, such as in particular asymmetric encryption, can also be used in the present invention. Furthermore, the invention was explained by way of example of a battery management system with a central control unit and a plurality of sensor control units. However, the invention also includes the secure programming of each data processing device in parallel, provided that the programming authentication method fulfills all the features of each of the dependent claims.

[0043] Firstly, the method for programming the control unit should be expl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a programming method, a battery combined with an arrangement for carrying out the programming method and a motor vehicle comprising such a battery, which can be used, in particular, for secure parallel programming of control devices. For this purpose, a programming method in which at least two second data processing means are programmed by a first data processing means, is provided. A first authentication information message is sent by the at least two second data processing means to the first data processing means in the programming method, a second authentication information message being generated from the first authentication information messages and is transmitted to the at least two second data processing means. The at least two second data processing means are programmed after verifying the second authentication information messages by each of the at least two second data processing means. According to the invention, the at least two second authentication information messages are transmitted together by sending once by the first data processing means to the at least two second data processing means.

Description

technical field [0001] The invention relates to a programming authentication method, an accumulator connected to a structure for carrying out the programming authentication method, and a motor vehicle with such an accumulator, which method can be used in particular for parallel protected parallel control devices programming. Background technique [0002] A so-called request-response method (challenge-response method) is usually used for security when programming the flash memory of the control unit, in order to prevent unauthorized persons from gaining write access on the flash memory of the control unit, where possible Introduce your own code: [0003] - a data processing device, such as a so-called tester, the control device to be programmed requests a so-called seed x, such as a random number of n bytes, [0004] - the control device to be programmed sends the seed x to the tester, [0005] - the tester calculates a so-called secret key (password) from this seed x by m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64H04L9/08
CPCH04L9/3236H04L2209/805G06F21/64G06F21/30H04L9/3226H04L67/12
Inventor A·伯姆C·布罗夏奥斯
Owner ROBERT BOSCH GMBH