CN114840236A - Charging device, vehicle-mounted device system, data packet processing method, vehicle, and storage medium - Google Patents

Charging device, vehicle-mounted device system, data packet processing method, vehicle, and storage medium Download PDF

Info

Publication number
CN114840236A
CN114840236A CN202210520206.1A CN202210520206A CN114840236A CN 114840236 A CN114840236 A CN 114840236A CN 202210520206 A CN202210520206 A CN 202210520206A CN 114840236 A CN114840236 A CN 114840236A
Authority
CN
China
Prior art keywords
vehicle
data packet
charging device
decompressed data
decompressed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210520206.1A
Other languages
Chinese (zh)
Inventor
赵豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Weilai Automobile Technology Anhui Co Ltd
Original Assignee
Weilai Automobile Technology Anhui Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Weilai Automobile Technology Anhui Co Ltd filed Critical Weilai Automobile Technology Anhui Co Ltd
Priority to CN202210520206.1A priority Critical patent/CN114840236A/en
Publication of CN114840236A publication Critical patent/CN114840236A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T90/00Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02T90/10Technologies relating to charging of electric vehicles
    • Y02T90/12Electric charging stations

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Stored Programmes (AREA)

Abstract

The application relates to a charging device, a vehicle machine system, a data packet processing method, a vehicle and a storage medium, wherein the charging device comprises: a first communication module configured to receive a data packet, wherein the data packet is for a vehicle upgrade; a first processing module configured to perform security check on the data packet and decompress the data packet after passing the security check to generate a decompressed data packet; a storage module configured to store the decompressed data packets; and a second communication module configured to send the decompressed data packets to a vehicle.

Description

Charging device, vehicle-mounted device system, data packet processing method, vehicle, and storage medium
Technical Field
The present disclosure relates to the field of vehicle safety, and more particularly, to a charging device, a vehicle-mounted device system, a data packet processing method, a vehicle, and a storage medium.
Background
With the development of intelligent networked automobiles, FOTA (online firmware upgrade) becomes a very important function. The FOTA can enable the vehicle system and the software to be updated to the latest version all the time, thereby providing the latest experience for the user. However, there are many problems in FOTA, and the most concerned of them is safety and the problem of time and flow consumption of FOTA itself.
In view of the above, there is a need for an improved upgrade method for a vehicle.
Disclosure of Invention
The embodiment of the application provides a charging device, a vehicle-mounted machine system, a data packet processing method, a vehicle and a storage medium, and the charging device, the vehicle-mounted machine system, the vehicle and the storage medium are used for providing a data packet for upgrading to the vehicle through a charging device such as a charging pile.
According to an aspect of the present application, there is provided a charging device. The device comprises: a first communication module configured to receive a data packet, wherein the data packet is for a vehicle upgrade; a first processing module configured to perform security check on the data packet and decompress the data packet after passing the security check to generate a decompressed data packet; a storage module configured to store the decompressed data packets; and a second communication module configured to send the decompressed data packets to a vehicle.
In some embodiments of the present application, optionally, the data package as a whole is hash-signed, or each file in the data package is hash-signed; and the security check includes a check of the hash signature.
In some embodiments of the application, optionally, the first processing module is further configured to establish a secure channel between the charging device and the vehicle, and the second communication module transmits the decompressed data packet over the secure channel.
According to another aspect of the present application, a vehicle machine system is provided. The car machine system includes: a third communication module configured to receive the decompressed data packet; a second processing module configured to perform security checks on the decompressed data packets; and the upgrading module is configured to upgrade the vehicle according to the decompressed data packets subjected to the safety verification.
In some embodiments of the present application, optionally, the security check is a hash comparison.
According to another aspect of the present application, a data packet processing method is provided. The method comprises the following steps performed by the charging device: receiving a data packet, wherein the data packet is used for vehicle upgrade; performing security check on the data packet, and decompressing the data packet after passing the security check to generate a decompressed data packet; storing the decompressed data packets; and transmitting the decompressed data packet to a vehicle.
In some embodiments of the present application, optionally, the data package as a whole is hash-signed, or each file in the data package is hash-signed; and the security check includes a check of the hash signature.
In some embodiments of the present application, optionally, the method further comprises the following steps performed by the charging device: establishing a secure channel between the charging device and the vehicle, and transmitting the decompressed data packets to the vehicle comprises: and transmitting the decompressed data packet to a vehicle through the safety channel.
In some embodiments of the present application, optionally, the method further includes the following steps performed by the in-vehicle machine system: receiving a decompressed data packet; performing security check on the decompressed data packet; and upgrading the vehicle according to the decompressed data packet subjected to the safety verification.
In some embodiments of the present application, optionally, the security check is a hash comparison.
According to another aspect of the present application, there is provided a vehicle, characterized in that the vehicle comprises any one of the vehicle machine systems described above.
According to another aspect of the present application, a computer-readable storage medium is provided. The computer readable storage medium has stored therein instructions that, when executed by a processor, cause the processor to perform any of the packet processing methods as described above.
According to the charging device, the vehicle-mounted device system, the data packet processing method, the vehicle and the storage medium provided by some embodiments of the application, the data packet for vehicle upgrading can be temporarily cached through the charging device such as the charging pile. Because the computing power of charging piles is more abundant, therefore can realize the safer check-up mechanism to the data package. Fill electric pile and can provide the data package for the vehicle afterwards, the vehicle end can only realize the verification to the data package through simple and easy safety check-up mechanism to can practice thrift the resource expense of vehicle end.
Drawings
The above and other objects and advantages of the present application will become more apparent from the following detailed description when taken in conjunction with the accompanying drawings, in which like or similar elements are designated by like reference numerals.
Fig. 1 illustrates a system of a charging device, a server, and a vehicle-mounted machine system according to an embodiment of the present application;
fig. 2 illustrates a packet processing method according to an embodiment of the present application.
Detailed Description
For the purposes of brevity and explanation, the principles of the present application are described herein with reference primarily to exemplary embodiments thereof. However, those skilled in the art will readily recognize that the same principles are equally applicable to all types of charging devices, in-vehicle systems, packet processing methods, vehicles, and storage media, and that these same or similar principles may be implemented therein, with any such variations not departing from the true spirit and scope of the present application.
According to an aspect of the present application, there is provided a charging device. A system 10 consisting of a server 110, a charging device 120, and a vehicle machine system 130 is shown in fig. 1. It should be understood that the various components comprising the system 10 are independently operable and that the various components need not consider the operating conditions of other components in separate processes. The arrowed line segments shown represent the flow of information between the various unit modules or products, and it should be noted that the flow of information shown is merely an example and that other variations are possible without departing from the spirit of the present application.
As shown in fig. 1, the charging device 120 includes a first communication module 121 for communicating with the server 110, a first processing module 122, a storage module 123, and a second communication module 124 for communicating with the in-vehicle machine system 130. The first communication module 121 and the second communication module 124 are only intended to distinguish communication objects of the charging device 120, and in some examples, the first communication module 121 and the second communication module 124 may share part or even all of software and hardware resources.
One common form of the charging device 120 is a charging post. As will be appreciated, the charging device 120 may supplement the vehicle with electrical energy, and may be an ac charging post, a dc charging post, or a dc-dc charging post depending on the design. The charging device 120 may be a home charging pile, or a commercial charging pile serving a specific vehicle model or conforming to general specifications.
The first communication module 121 of the charging device 120 may receive a data packet for vehicle upgrade. As an example of the generation process of the data, server 110 may sign original upgrade file 111 with private key 112 provided by server 110 to obtain signed data package 113. Subsequently, the first communication module 121 of the charging device 120 may establish a communication connection with the download interface 114 of the server 110 in order to receive the signed data package 113 from the server 110. In some embodiments of the present application, the data packet 113 as a whole is hash signed. In other embodiments, each file in the data package 113 may be hash signed. The hash signature of the entire data packet 113 is performed by first calculating a hash value of the entire data packet 113 and then signing the hash value. This way of signing the entire data packet may improve the efficiency of signature verification while making some compromise to security. The way each file in the data package 113 is hashed is somewhat inefficient, but the security is better. In addition, since the security check of the data packet 113 is performed in the charging device 120, the computing power of the charging device 120 can be designed redundantly and the processing procedure does not affect the vehicle-mounted computer system 130, so that the whole process is less sensitive to the computing amount. It can be seen that the advantage of hashing each is also more pronounced in this case.
The first processing module 122 of the charging device 120 may perform security check on the data packet (specifically, perform hash signature check on the data packet), and decompress the data packet after passing the security check to generate a decompressed data packet, and discard the data packet that does not pass the security check. According to different hash signature manners of the data packet 113 performed by the server 110, the first processing module 122 may perform hash signature verification on the entire data packet 113, or may perform hash signature verification on each file in the data packet 113. The first processing module 122 may be a central processing unit of the charging device 120, and may be implemented using a general-purpose or a dedicated processing chip. For example, it can be a general chip of ARM architecture, X86 architecture, or can be implemented by FPGA. The data packet 113 is decompressed upon verification by the first processing module 122. The processing pressure of the vehicle-mounted device 130 can be reduced by decompressing and performing complex verification on the data packet 113 in advance by using the first processing module 122 of the charging device 120, so that long-time occupation of processing resources of the vehicle-mounted device 130 in the upgrading process is avoided.
The storage module 123 of the charging device 120 may store the decompressed data packets. The decompressed data packets will be stored in charging device 120 and subsequent vehicles will be able to simultaneously establish a communication connection with charging device 120 to receive the decompressed data packets during charging by charging device 120.
The second communication module 124 of the charging device 120 may send the decompressed data packets to the vehicle. In some examples, the first processing module 122 of the charging device 120 may negotiate with the second processing module 132 of the in-vehicle machine system 130 to determine how to establish the communication connection, and the content of negotiation may include selection of communication parameters and protocols, and the like. Once the vehicle establishes a communication connection with the charging device 120 through the second communication module 124, the charging device 120 may send the decompressed data packets to the vehicle through the second communication module 124. The vehicle can realize the upgrading of specific functions, systems and the like according to the decompressed data packets.
In some embodiments of the present application, the first processing module 122 is further configured to establish a secure channel between the charging device 120 and the vehicle, and the second communication module 124 transmits the decompressed data packets over the secure channel. Although the connection between the charging device 120 and the vehicle may not be through the internet and thus may be more secure, in order to achieve a more reliable connection between the charging device 120 and the vehicle (specifically, the in-vehicle system 130), a secure channel may be established between the charging device 120 and the vehicle through the first processing module 122, and the subsequent transmission of the decompressed data packets may be performed through the channel.
According to another aspect of the present application, a vehicle machine system is provided. With continued reference to fig. 1, the in-vehicle machine system 130 includes a third communication module 131, a second processing module 132, and an upgrade module 133. It should be noted that the "third" communication module and the "second" processing module are only intended to distinguish the communication module and the processing module in the charging device 120, and do not necessarily represent that they are different in software and hardware.
The third communication module 131 of the in-vehicle system 130 may receive the decompressed data packet. As described above, once the charging device 120 and the vehicle-mounted machine system 130 establish communication connection through the second communication module 124 and the third communication module 131, respectively, the charging device 120 may transmit the decompressed data packet to the vehicle through the link formed between the second communication module 124 and the third communication module 131. In some examples, the physical link between the second communication module 124, the third communication module 131 and the charging line may coexist in one cable. That is, the charging gun cable includes a communication line for establishing a physical link between the charging device 120 and the in-vehicle machine system 130, and the second communication module 124 and the third communication module 131 may be disposed at both ends of the communication line.
The second processing module 132 of the in-vehicle system 130 may perform security check on the decompressed data packet. In some embodiments of the present application, the security check is a hash comparison. As described above, the processing pressure of the in-vehicle system 130 can be reduced by using the first processing module 122 of the charging device 120 to decompress the data packet 113 and perform complicated verification in advance, so that the second processing module 132 only needs to perform simple hash comparison. Since the link between the charging device 120 and the in-vehicle system 130 may not pass through the internet, the chance that the decompressed data packet sent from the charging device 120 is tampered is also significantly reduced, and the purpose of security verification can be achieved through simple hash comparison.
Finally, the upgrade module 133 of the in-vehicle system 130 may upgrade the vehicle according to the decompressed data packet subjected to the security check. Thus, the task of vehicle upgrading can be achieved. To achieve this, the data packets are received and decompressed by the charging device 120 in the above embodiment. The decompressed data packets may be stored in the charging device 120 for recall by various vehicles accessing it. This approach will significantly reduce the hardware overhead in the vehicle upgrade process.
According to another aspect of the present application, a data packet processing method is provided. As shown in fig. 2, the packet processing method 20 (hereinafter referred to as the method 20) includes the following steps performed by, for example, the charging device described above: receiving a data packet for vehicle upgrade in step S202; performing security check on the data packet in step S204, and decompressing the data packet after passing the security check to generate a decompressed data packet; storing the decompressed data packet in step S206; and transmitting the decompressed data packet to the vehicle in step S208.
The method 20 receives a data packet for a vehicle upgrade in step S202. As an example of the generation process of the data, the server may sign the original upgrade file with a private key provided by the server to obtain a signed data package. Subsequently, the charging device may establish a communication connection with the server to receive the signed data packet from the server. In some embodiments of the present application, the data package as a whole is hash signed, or each file in the data package is hash signed. The whole data packet is subjected to Hash signature, a Hash value is calculated for the whole data packet, and then the Hash value is signed. This way of signing the entire data packet may improve the efficiency of signature verification while making some compromise to security. The way to hash each file in the data package is somewhat inefficient, but the security is better. In addition, because the safety verification of the data packet is carried out in the charging device, the calculation capacity of the charging device can be designed in a redundant mode, and the processing process cannot influence the vehicle-mounted machine system, so that the safety verification is not sensitive to the calculation amount. It can be seen that the advantage of hashing each is also more pronounced in this case.
The method 20 performs a security check on the data packet received in step S202 (specifically, performs a hash signature check on the data packet) in step S204, decompresses the data packet after passing the security check to generate a decompressed data packet, and discards the data packet that does not pass the security check. According to different hash signature modes of the server for the data packet, in step S204, hash signature verification may be performed on the entire data packet, and hash signature verification may also be performed on each file in the data packet. Step S204 may be performed by a processing module of the charging device. The data packet is decompressed after the data packet passes the verification. The charging device is used for decompressing the data packet in advance and executing complex verification, so that the processing pressure of the vehicle machine system can be reduced, and the long-time occupation of processing resources of the vehicle machine system in the upgrading process is avoided.
The method 20 stores the decompressed data packet in step S206. The decompressed data packets will be stored in the charging device in step S204, and the subsequent vehicle will be able to establish a communication connection with the charging device to receive the decompressed data packets during charging by the charging device.
The method 20 sends the decompressed data packets to the vehicle in step S208. In some embodiments of the present application, the method 20 further comprises the following steps (not shown in fig. 2) performed by the charging device: a secure channel is established between the charging device and the vehicle. Further, the decompressed data packet may be transmitted to the vehicle through the secure channel in step S208. In some examples, the charging device may negotiate with the in-vehicle system to determine how to establish the communication connection, and the content of the negotiation may include selection of communication parameters and protocols, and the like. Once the vehicle establishes a communication connection with the charging device, the charging device may send the decompressed data packets to the vehicle. The vehicle can realize the upgrading of specific functions, systems and the like according to the decompressed data packets. Although the connection between the charging device and the vehicle may not be via the internet and thus may be more secure, in order to achieve a more reliable connection between the charging device and the vehicle (in particular the vehicle system), a secure channel may be established between the charging device and the vehicle and subsequent transmission of decompressed data packets may be performed via this channel.
In some embodiments of the present application, the method 20 further comprises the following steps performed by, for example, the in-vehicle machine system described above: receiving the decompressed data packet in step S302; performing security check on the decompressed data packet in step S304; and upgrading the vehicle according to the decompressed data packet subjected to the safety verification in step S306.
The method 20 receives the decompressed data packet in step S302. As described above, once the charging device establishes a communication connection with the in-vehicle system, the charging device may send the decompressed data packets to the vehicle. In some examples, the physical communication link between the charging device and the vehicle machine system and the charging line may coexist in one cable. That is, the charging gun cable includes a communication line for establishing a physical link between the charging device and the vehicle system.
The method 20 performs a security check on the decompressed data packet in step S304. In some embodiments of the present application, the security check is a hash comparison. As described above, decompressing the data packet and performing a complicated check in advance by the charging device can reduce the processing pressure of the vehicle system, so that only a simple hash comparison needs to be performed in step S304. Because the link between the charging device and the vehicle-mounted computer system can not pass through the internet, the chance that the decompressed data packet sent from the charging device is tampered is also obviously reduced, and the purpose of safety verification can be realized through simple hash comparison.
Finally, the method 20 upgrades the vehicle based on the safety-checked decompressed data packets in step S306. Thus, the task of vehicle upgrading can be achieved. To achieve this, the charging device in the above embodiment receives and decompresses the data packet first. The decompressed data packets may be stored in the charging device for recall by each vehicle accessing it. This approach will significantly reduce the hardware overhead in the vehicle upgrade process.
According to another aspect of the application, a vehicle is provided, wherein the vehicle comprises a vehicle machine system as any one of the above. Vehicles equipped with a vehicle machine system may not cause unintended interruptions of other services during the upgrade process as compared to vehicles equipped with conventional vehicle machine systems. The present application does not limit the form and driving force of the vehicle. For example, the vehicle may be a family car, SUV, truck, or the like. The power for the vehicle may be provided by conventional fossil fuels, by compressed hydrogen, or directly by electricity.
According to another aspect of the present application, there is provided a computer-readable storage medium having stored therein instructions, which when executed by a processor, cause the processor to perform any one of the packet processing methods as described above. Computer-readable media, as referred to in this application, includes all types of computer storage media, which can be any available media that can be accessed by a general purpose or special purpose computer. By way of example, computer-readable media may include RAM, ROM, EPROM, E 2 PROM, registers, hard disk, removable disk, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other temporary or non-temporary medium that can be used to carry or store desired program code means in the form of instructions or data structures and that can be accessed by a general purpose or special purpose computer, or a general purpose or special purpose processor. A disk, as used herein, typically reproduces data magnetically, while a disk reproduces data optically with a laser. Combinations of the above should also be included within the scope of computer-readable media. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC. The ASIC may reside in a user terminal. In the alternative, the processor and the storage medium may reside as discrete components in a user terminal.
The above are merely specific embodiments of the present application, but the scope of the present application is not limited thereto. Other possible variations or substitutions may occur to those skilled in the art based on the teachings herein, and are intended to be covered by the present disclosure. In the present invention, the embodiments and features of the embodiments may be combined with each other without conflict. The scope of protection of the present application is subject to the description of the claims.

Claims (12)

1. A charging device, the device comprising:
a first communication module configured to receive a data packet, wherein the data packet is for a vehicle upgrade;
a first processing module configured to perform security check on the data packet and decompress the data packet after passing the security check to generate a decompressed data packet;
a storage module configured to store the decompressed data packets; and
a second communication module configured to send the decompressed data packets to a vehicle.
2. The apparatus of claim 1, wherein the data package as a whole is hash signed, or each file in the data package is hash signed; and the security check includes a check of the hash signature.
3. The device of claim 1, wherein the first processing module is further configured to establish a secure channel between the charging device and the vehicle, and the second communication module transmits the decompressed data packets over the secure channel.
4. The utility model provides a car machine system, its characterized in that, car machine system includes:
a third communication module configured to receive a decompressed data packet;
a second processing module configured to perform security checks on the decompressed data packets; and
an upgrade module configured to upgrade a vehicle according to the decompressed data packet subjected to security verification.
5. The in-vehicle machine system according to claim 4, wherein the security check is a hash comparison.
6. A method for processing a data packet, the method comprising the steps performed by a charging device of:
receiving a data packet, wherein the data packet is used for vehicle upgrade;
performing security check on the data packet, and decompressing the data packet after passing the security check to generate a decompressed data packet;
storing the decompressed data packets; and
and sending the decompressed data packet to a vehicle.
7. The method of claim 6, wherein the data package as a whole is hash signed or each file in the data package is hash signed; and the security check includes a check of the hash signature.
8. The method of claim 6, further comprising: establishing a secure channel between the charging device and the vehicle, and transmitting the decompressed data packets to the vehicle comprises: and transmitting the decompressed data packet to a vehicle through the safety channel.
9. The method of claim 6, further comprising the following steps performed by the in-vehicle system:
receiving a decompressed data packet;
performing security check on the decompressed data packet; and
and upgrading the vehicle according to the decompressed data packet subjected to the safety verification.
10. The method of claim 9, wherein the security check is a hash comparison.
11. A vehicle, characterized in that the vehicle comprises the vehicle machine system of claim 4 or 5.
12. A computer-readable storage medium having instructions stored therein, which when executed by a processor, cause the processor to perform the method of any one of claims 6-10.
CN202210520206.1A 2022-05-13 2022-05-13 Charging device, vehicle-mounted device system, data packet processing method, vehicle, and storage medium Pending CN114840236A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210520206.1A CN114840236A (en) 2022-05-13 2022-05-13 Charging device, vehicle-mounted device system, data packet processing method, vehicle, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210520206.1A CN114840236A (en) 2022-05-13 2022-05-13 Charging device, vehicle-mounted device system, data packet processing method, vehicle, and storage medium

Publications (1)

Publication Number Publication Date
CN114840236A true CN114840236A (en) 2022-08-02

Family

ID=82569627

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210520206.1A Pending CN114840236A (en) 2022-05-13 2022-05-13 Charging device, vehicle-mounted device system, data packet processing method, vehicle, and storage medium

Country Status (1)

Country Link
CN (1) CN114840236A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115102775A (en) * 2022-07-04 2022-09-23 蔚来汽车科技(安徽)有限公司 Charging pile risk detection method, device and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115102775A (en) * 2022-07-04 2022-09-23 蔚来汽车科技(安徽)有限公司 Charging pile risk detection method, device and system

Similar Documents

Publication Publication Date Title
US11985238B2 (en) Vehicle-mounted device upgrade method and related device
US11662991B2 (en) Vehicle-mounted device upgrade method and related device
CN112543927B (en) Equipment upgrading method and related equipment
US20220276855A1 (en) Method and apparatus for processing upgrade package of vehicle
CN110460573B (en) ECU security upgrade management system and method applied to automobile
CN113094062A (en) Upgrading method and device
CN114840236A (en) Charging device, vehicle-mounted device system, data packet processing method, vehicle, and storage medium
US20240211242A1 (en) Apparatus and method for optimally updating vehicle controller
CN113672478A (en) Log obtaining method, device, terminal, server and storage medium
CN111404695A (en) Token request verification method and device
CN101018207B (en) A device, system and method for loading the value-added business in the IPTV system
CN110727455A (en) Software remote upgrading method and related equipment
CN112803950A (en) Data compression method, device and equipment and computer storage medium
CN115955669A (en) Vehicle data upgrading method and device based on OTA and vehicle-mounted terminal
CN114978726B (en) Safety communication method of backbone network based on vehicle-mounted Ethernet
CN114500237B (en) Communication method and system
CN114928602A (en) Encryption method, decryption method and OTA (over the air) upgrading system
CN109358875B (en) Ubuntu system-based hardware wallet offline upgrading device and method
CN115333937A (en) Data downloading method and device and electronic equipment
CN113015132A (en) Communication method and communication system
CN118283031A (en) Upgrading method, device, equipment and medium of vehicle-mounted controller
CN115952513A (en) Communication method and system based on T-BOX data security storage assembly
CN117858089A (en) Data processing method, device, storage medium and equipment
CN118041961A (en) Data transmission method and system of vehicle-mounted domain controller
CN118264410A (en) Vehicle-mounted wireless terminal awakening method and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination