Method for carrying out intelligent configuration and reading analysis based on diagnosis protocol
A technology of intelligent configuration and diagnostic protocols, applied in computer security devices, software deployment, version control, etc., can solve problems such as low efficiency, complicated operation steps, and high error rate of manual judgment
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
specific Embodiment approach 1
[0052] Specific implementation mode one: the following combination figure 1 Describe this embodiment, the method for intelligent configuration reading analysis based on the diagnostic protocol described in this embodiment, it includes:
[0053] S1, load the database file, connect to the search engine of the database, enter the password, and perform safe unlocking;
[0054] S2. Perform safety verification on the instrument;
[0055] S3. Directly perform intelligent configuration on the instrument through CAN communication, the intelligent configuration includes: information writing, information reading and information verification.
[0056] In this embodiment, the database file described in S1 is DB271.mdb; the search engine connected to the database is Microsoft.Jet.OLEDB.4.0, and Microsoft.Jet.OLEDB.4.0 is a search engine of an ACCESS database, which is used for the ADO of VB The data control is connected with the ACCESS database code. Select the data project when creating...
specific Embodiment approach 2
[0057] Specific implementation mode two: this implementation mode further explains implementation mode one, and the method for safety verification of the instrument described in S2 includes:
[0058] S2-1. The instrument sends 10 03 to the database to start the extended session;
[0059] S2-2. The instrument receives the response data from the database. If the response data is 50 03, it will respond positively. If the response data is 7F 03, it will respond negatively. When negatively responding, it will prompt a request error;
[0060] S2-3. The instrument sends 27 01 to the database, that is, sends a security access request seed to the database;
[0061] S2-4. The database receives 67 01, that is, the database receives a security access response;
[0062] S2-5. The instrument sends 27 02 to the database, that is, sends the secret key for safe access to the database;
[0063] S2-6. The database receives 67 02, that is, the database receives the security access response key....
specific Embodiment approach 3
[0064] Specific implementation mode three: this implementation mode further explains implementation mode one. The method for directly writing information to the instrument through CAN communication described in S3 includes: writing the hardware version number, writing the hardware batch number, and writing the software version number;
[0065] The configuration information is:
[0066] Send: 10 13 2E 01 00 x[0]x[1]x[2]
[0067] Receive: 0 00 0A 00 00 00 00 00
[0068] Send: 21×[3]×[4]×[5]×[6]×[7]×[8]×[9]
[0069] Send: 22×[10]×[11]×[12]×[13]×[14]×[15]00
[0070] Receive: 03 6E 01 00 00 00 00 00.
[0071] Further, the method for writing the hardware version number includes:
[0072] Send 2E 18 01 xx xx xx to write data;
[0073] Receive 6E 18 01 to get write response;
[0074] The database writes the required hardware version number into the meter through the session with the meter.
[0075] Still further, the method for writing the hardware batch number includes:
[007...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com

