Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Countable software authorization method for vehicle-mounted system

A technology of software authorization and vehicle-mounted system, which is applied in the vehicle-mounted field, can solve the problems of inconvenient statistics and abnormal use of machines, and achieve the effects of ensuring safety, simple authorization, and avoiding cumbersomeness

Pending Publication Date: 2021-10-22
SHANGHAI HEQIAN ELECTRONICS TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The traditional authorization method needs to know the unique machine identification code of this device. After copying the unique machine identification code, the information will be fed back to the supplier, and the cockpit software supplier will generate the authorization code from the information in plain text and provide it to the manufacturer. The manufacturer After getting the authorization code, you must find out which machine corresponds to which authorization code. If the correspondence is wrong, the authorization will fail. Therefore, you must accurately enter the authorization code into the corresponding smart cockpit platform software to complete the authorization. This authorization It is also inconvenient to count the currently authorized quantity
After the machine is restored to the factory, it is necessary to manually enter the authorization code again to complete the authorization, otherwise the machine cannot be used normally.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Countable software authorization method for vehicle-mounted system
  • Countable software authorization method for vehicle-mounted system
  • Countable software authorization method for vehicle-mounted system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to have a clearer understanding of the technical features, purposes and effects of this document, the specific implementation manners of the present invention will now be described with reference to the accompanying drawings, and the same symbols in each figure represent the same parts. In order to make the drawings concise, the schematic diagrams in the drawings show the relevant parts of the present invention, but do not represent the actual structure of the product. In addition, in order to make the drawings concise and easy to understand, in some drawings, only one of the components having the same structure or function is schematically shown, or only one of them is marked.

[0039] As for the control system, functional modules and application programs (APP) are well known to those skilled in the art, they can take any appropriate form, either hardware or software, multiple functional modules discretely set, or It is multiple functional units integrated int...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a countable software authorization method for a vehicle-mounted system, and the method comprises the steps of obtaining hardware fingerprint information, enabling an authorization code generation tool to generate an authorization file according to the hardware fingerprint information, wherein the authorization file comprises a single first authorization code or a batch of first authorization codes; when the software version is integrated, deploying the authorization file to a specific position of a file system and writing the authorization file into the vehicle-mounted equipment; when the vehicle-mounted equipment is started, enabling the application service to judge the authorization state of the vehicle-mounted equipment by loading the authorization authentication library and calling the authorization authentication library interface, and executing preset operation according to the authorization state. In the technical scheme provided by the invention, the first authorization codes required by the equipment are deployed to the specific path of the file system in batches during software integration in advance, so that software authorization is simple and quick, and tedious steps are avoided.

Description

technical field [0001] The invention relates to the vehicle field, in particular to a countable software authorization method for a vehicle system. Background technique [0002] In actual product applications, different software functions and use time limits need to be opened for different application scenarios, so different encryption authorization parameters are required to control the use of software. The traditional authorization method needs to know the unique machine identification code of this device. After copying the unique machine identification code, the information will be fed back to the supplier, and the cockpit software supplier will generate the authorization code from the information in plain text and provide it to the manufacturer. The manufacturer After getting the authorization code, you must find out which machine corresponds to which authorization code. If the correspondence is wrong, the authorization will fail. Therefore, you must accurately enter the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12
CPCG06F21/12G06F21/1011
Inventor 肖文平林刚高传明
Owner SHANGHAI HEQIAN ELECTRONICS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products