Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for preventing configuration document from being tampered and monitoring upper computer

A configuration file and tampered technology, which is applied in the direction of program control design, program control device, computer security device, etc., can solve the problems of unfavorable protection of important files and important information, prone to failure, wasteful search for faults, etc., to achieve protection from being Effects of tampering and improving security

Inactive Publication Date: 2017-06-20
HUIZHOU BNET TECH CO LTD
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, when the subsequent devices read the configuration file in the BMS, there will be a fault message, and the device will not work normally.
[0004] Since the parameters of the configuration file can be modified at will, it is not only prone to failure, but also wastes manpower and material resources to find the cause of the failure; at the same time, it is not conducive to the protection of important files and important information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for preventing configuration document from being tampered and monitoring upper computer
  • Method and system for preventing configuration document from being tampered and monitoring upper computer
  • Method and system for preventing configuration document from being tampered and monitoring upper computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] see figure 1 , figure 1 It is a flowchart of a method 20 for preventing configuration files from being tampered with according to the first embodiment of the present invention, including:

[0054] S1, read the parameters of the original configuration file;

[0055] S2. Calculate the first check code according to the parameters of the original configuration file;

[0056] S3, reading the parameters of the configuration file to be injected into the BMS;

[0057] S4. Calculate a second check code according to the parameters of the configuration file to be injected into the BMS;

[0058] S5, judging whether the first check code is equal to the second check code, if they are equal, the check is passed; otherwise, the check is not passed.

[0059] specifically,

[0060]In the step S5, it is judged whether the first check code is equal to the second check code, and if they are equal, after the check is passed, the method further includes: injecting the configuration file ...

Embodiment 2

[0064] see figure 2 , figure 2 A functional block diagram of a system 10 for preventing configuration files from being tampered with provided by the second embodiment of the present invention, including:

[0065] The first reading module 100 is used to read the parameters of the original configuration file; the first calculation unit 200 is used to calculate the first check code according to the parameters of the original configuration file. The second reading module 300 is used to read the parameters of the configuration file to be injected into the BMS; the second calculation unit 400 is used to calculate the second check code according to the parameters of the configuration file to be injected into the BMS. The first reading module 100 is connected with the first computing unit 200 . The second reading module 300 is connected with the second computing unit 400 .

[0066] The judging control module 500 is used to judge whether the first check code is equal to the second...

Embodiment 3

[0076] The present invention also provides a monitoring host computer, which is connected to the battery management system through a CAN line, including the system for preventing configuration files from being tampered with in the second embodiment above, and the specific structure of the system for preventing configuration files from being tampered with And the working principle is basically the same as the description of the above-mentioned embodiment 2. For details, please refer to the above-mentioned embodiment 2, which will not be repeated here.

[0077] In this embodiment, the configuration file is prevented from being tampered with. If the verification in the host computer fails, the configuration file cannot be injected into the BMS, thereby improving the security of system information and protecting the normal operation of the device.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for preventing a configuration document from being tampered and a monitoring upper computer. The method comprises the following steps: S1) reading parameters of an original configuration document; S2) calculating a first check code according to the parameters of the original configuration document; S3) reading the parameters of the configuration document to be injected with BMS; S4) calculating a second check code according to the parameters of the configuration document to be injected with BMS; S5) judging if the first check code is equal to the second check code, if so, passing the verification, and if not, failing to pass the verification. In order to solve the problem that the parameters can be randomly updated onsite, the invention provides the method and the system for preventing the configuration document from being tampered, so that the configuration document can be protected from being tampered and the onsite technician can be prevented from randomly altering the parameters of the configuration document and injecting the fault parameters of the configuration document into BMS. The parameters of the configuration document can be prevented from being tampered, the onsite debugging support staff can be prevented from altering the parameters to result in incorrect system configuration and disordered parameters and the system safety can be promoted.

Description

technical field [0001] The invention relates to the field of file security of a battery management system, in particular to a method and system for preventing configuration files from being tampered with, and a monitoring host computer. Background technique [0002] A configuration file is defined as a collection of settings and files for the system to load the required environment. At present, the configuration of configuration files is usually completed by a software system, which includes the import and export of configuration files. However, many text editing software can also directly read the parameters of the configuration file, and even modify and update the parameters of the configuration file through the text editing software. [0003] In the prior art, since the parameters of the configuration file can be modified arbitrarily, when debugging the BMS, the commissioning personnel on site may modify the parameters of the configuration file. If the modified configur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F9/445G06F21/62G06F21/64
CPCG06F21/602G06F9/4451G06F21/6209G06F21/64
Inventor 黄一峰
Owner HUIZHOU BNET TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products