Vehicle program file encryption method and system

A technology of program files and encryption methods, which is applied in the direction of transmission systems, digital transmission systems, encryption devices with shift registers/memory, etc., can solve the problem of increasing the failure of electronic control units, remote servers or electronic control units being hacked, program files Easy to be tampered with, increase data loss and leakage, etc., to reduce the risk of encryption being cracked, reduce the possibility of being tampered with, and reduce the effect of data loss and leakage

Active Publication Date: 2021-02-19
CONTEMPORARY AMPEREX RUNZHI SOFTWARE TECH LTD NINGDE CITY
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the seedkey algorithm is easy to leak and be cracked, resulting in easy tampering of program files, increasing the risk of data loss and leakage in program files, and also increasing the risk of electronic control unit failure and remote servers or electronic control units being hacked
However, after the electronic control unit downloads the program file, it is impossible to judge whether the program file has been tampered with.
If the electronic control unit downloads the tampered program file, it will cause hidden dangers to the safety of the car and reduce the safety of car control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vehicle program file encryption method and system
  • Vehicle program file encryption method and system
  • Vehicle program file encryption method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Features and exemplary embodiments of various aspects of the invention will be described in detail below. In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without some of these specific details. The following description of the embodiments is only to provide a better understanding of the present invention by showing examples of the present invention. The present invention is by no means limited to any specific configurations and algorithms presented below, but covers any modification, substitution and improvement of elements, components and algorithms without departing from the spirit of the invention. In the drawings and the following description, well-known structures and techniques have not been shown in order to avoid unnecessarily obscuring the present invention.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a vehicle-mounted program file encryption method and system, which relate to the technical field of electronics and electrics. The vehicle program file encryption method includes: the remote server obtains the vehicle unique identification code of the vehicle to be downloaded; divides the data in the vehicle program file into more than one data segment; uses the vehicle unique identification code and more than one data segment to generate more than one target data segments, and calculate the respective message authentication codes of more than one target data segment, at least one target data segment includes a vehicle unique identification code; use a key and Advanced Encryption Standard AES to encrypt more than one target data segment; Based on the encrypted one or more target data segments and the message authentication codes of the one or more target data segments, one or more encrypted sub-files are generated. Utilizing the technical scheme of the invention can improve the safety of automobile control.

Description

technical field [0001] The invention relates to the field of electronics and electricity, in particular to a method and system for encrypting vehicle-mounted program files. Background technique [0002] Electronic Control Unit (ECU) is widely used in automobiles. The electronic control unit can perform calculations according to the collected parameter information in combination with the program stored in the electronic control unit. The result of the calculation is converted into a control signal, so as to realize the overall control of the vehicle by the electronic control unit. [0003] In order to meet the various needs of users for vehicle control functions, the electronic control unit needs to download or update various programs. At this stage, the seedkey algorithm is often used to perform security authentication on the electronic control unit used for downloading. However, the seedkey algorithm is easy to leak and be cracked, resulting in easy tampering of program ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/06G06F21/62H04L9/08
CPCG06F21/6218H04L9/0631H04L9/0863H04L63/0428
Inventor 吴健陈其锋
Owner CONTEMPORARY AMPEREX RUNZHI SOFTWARE TECH LTD NINGDE CITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products