[ Pobierz całość w formacie PDF ]

Note: Cancellation of the activation code is only possible before the start of
the download. Therefore, a check should be made before the download
of whether the vehicle identification number of the customer's vehicle is
correct. The activation code is invoiced when the download starts even
though it has not been installed in the customer's vehicle.
Cancellation after the download is therefore no longer possible.
37
F01 System Functions
Input of the Activation Code into the BMW Programming System
The medium containing the three unzipped files is inserted into the ISSS so that the
BMW programming system can access these FSC data.
After the import button has been pressed, follow the on screen instructions to complete
the import process.
ISSS
Import of the activation code into the
BMW programming system
Planned Expansion Stages
In the expansion stage of the BMW programming system planned for the future, the data
import of the activation code is to happen automatically.
This would mean that after the request by the parts technician, the activation code, would
be directly available to the BMW programming system after a short waiting time.
This process, called "SWT-Online", plays an important role particularly for repairs.
Because after replacement of a Car Information Computer, for instance, work can be car-
ried out on a repair without an activation code having to be ordered. It is made directly
available to the BMW programming system by "SWT-Online".
However, it is still necessary to place an order over the parts technician and the Dealer
Management System for software that has to be paid for, such as the voice input system.
"SWT-Online" or the ASAP portal can be selected afterwards as the delivery channel.
Cancellation of the activation code is however only possible over the ASAP portal.
The channel over the ASAP portal, with download onto the workshop PC and subse-
quent import into the BMW programming system, should therefore continue to be used
as the backup-solution.
Should problems occur during the download or data import into the vehicle, technical
support of the respective market should be contacted or a PuMA instance created.
38
F01 System Functions
Vehicle Security
History and Fundamentals
Vehicle security protects the vehicle electrical and bus systems against unauthorized
manipulative external access.
The topic of vehicle security experienced its beginnings with the introduction of the E28.
On this 5 Series, an instrument panel with encoding connector (coding plug) was
installed from 1980.
When a new instrument panel was installed, the encoding connector of the old one had
to be used. If this was not done a manipulation dot lit up to indicate that the kilometer
reading had been manipulated.
The kilometer reading was only reset to the correct reading with the old encoding con-
nector. The manipulation dot was no longer displayed.
A new era in manipulation protection begins with introduction of the master security
module (MSM) as a module in the central gateway module in the F01/F02 and the client
security module (CSM) in some selected control units.
The basis for the requirement for the vehicle security system is formed by the growing
amount of electronics and the interlinked networking installed in the vehicle.
Mention must also be made of the increase in driver-based services.
Threat Potential
As electronics increase in vehicles, the possibilities
also increase of disrupting and infiltrating this sensi-
tive system through manipulation, imitation of hard-
ware and software, and tuning measures (blackbox
tuning).
Data storage in the vehicle (e.g. Contacts menu)
also means that adequate data protection must
be provided.
39
F01 System Functions
Vehicle Security Measures
The measures below are carried out to be able to ensure
vehicle security in the F01/F02:
" Periodic check of software signatures (signature = digital,
electronic signature used for checking the complete-
ness, genuineness and intactness of data)
" Individual stamping of control units on the vehicle in
which they have been installed
" Cryptographic protection of the teleservice access
" Encryption of personal data [ Pobierz całość w formacie PDF ]

  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • lastella.htw.pl
  •