Search

CN-122027227-A - Authentication method based on Ethernet end-to-end communication, storage medium and electronic equipment

CN122027227ACN 122027227 ACN122027227 ACN 122027227ACN-122027227-A

Abstract

The application discloses a verification method based on Ethernet end-to-end communication, a storage medium and an electronic device, which are characterized in that firstly, an initialization configuration operation is executed, a communication connection between a test end and the tested device is established, then a verification request message is sent to the tested device, and a test report is generated based on a response message returned by the tested device, so that systematic verification of the end-to-end communication is realized, an actual operation scene can be simulated in a complex network environment with high load, high concurrency and multiple service flow parallelism, communication abnormality, counter logic error, boundary value and CRC check error are automatically detected and recorded, and a test report is generated, the degree of automation and efficiency of the test are improved, the dependence on manual experience is reduced, and the stability and reliability of an end-to-end communication mechanism under extreme working conditions can be quantified.

Inventors

  • LI FANGYUAN
  • TIAN FEIXIONG
  • HUANG JIANFENG
  • ZHANG SHENGFENG

Assignees

  • 奇瑞汽车股份有限公司

Dates

Publication Date
20260512
Application Date
20260115

Claims (10)

  1. 1. An authentication method based on ethernet end-to-end communication, comprising: executing initialization configuration operation, and establishing communication connection between a test end and tested equipment; sending a verification request message to the tested equipment; And receiving a response message returned by the tested equipment, and generating a test report based on the response message.
  2. 2. The method for verifying an ethernet end-to-end communication according to claim 1, wherein said generating a test report based on said response message comprises: determining counter information according to the response message; judging whether a counter meets preset counter conditions according to the counter information to obtain a judging result; Generating a test report according to the judging result; and when the judging result is that the preset counter condition is not met, recording abnormal information corresponding to the condition that the preset counter condition is not met, wherein the test report comprises the abnormal information.
  3. 3. An ethernet end-to-end communication based authentication method according to claim 2, wherein said counter information comprises a counter initial value, a counter logical order, a counter boundary value; The preset counter conditions comprise initial value conditions, sequence conditions and boundary conditions; Judging whether the counter meets the preset counter condition according to the counter information to obtain a judging result, wherein the judging result specifically comprises the following steps: judging whether the initial value of the counter meets an initial value condition or not; Judging whether the logic sequence of the counter meets a sequence condition or not; judging whether the counter boundary value meets a boundary condition or not; And when any judging result is not satisfied, the judging result is not satisfied, and corresponding abnormal information is recorded, wherein the abnormal information comprises an abnormal type and counter information corresponding to the abnormal type.
  4. 4. A method for verifying an ethernet end-to-end communication according to claim 2 or 3, wherein said determining whether the counter satisfies a preset counter condition according to the counter information, after obtaining the determination result, further comprises: determining a cyclic redundancy check code according to the response message; Determining a preset check code of the response message according to a preset check algorithm; Comparing the cyclic redundancy check code with a preset check code; When the cyclic redundancy check code is inconsistent with the preset check code, judging that the check is not passed, and recording corresponding abnormal information; the anomaly information comprises message identification information of the check anomaly type and corresponding to the check anomaly type.
  5. 5. A method of authentication based on ethernet end-to-end communication according to claim 2 or 3, further comprising, prior to generating a test report based on the response message: Judging whether the response message is received within a preset time; if the response message is not received, judging that the controller responds to the abnormality, and recording corresponding abnormality information, wherein the abnormality information comprises abnormality time information corresponding to a response timeout error type.
  6. 6. The method for verifying an ethernet end-to-end communication according to claim 1, wherein said performing an initialization configuration operation establishes a communication connection between the test end and the device under test, and specifically comprises: Configuring end-to-end communication parameters; Setting the bandwidth load of the test network; Starting a testing environment; And establishing communication connection between the test end and the tested equipment based on the end-to-end communication parameters.
  7. 7. An ethernet end-to-end communication based authentication system, comprising a test unit for performing the ethernet end-to-end communication based authentication method according to any of claims 1-6, a device under test communicatively connected to the test unit, a traffic generating unit for injecting a preset bandwidth load, and a power supply unit for supplying power to the device under test and the test unit; Wherein the flow generating unit is in communication connection with the tested device.
  8. 8. A storage medium storing computer instructions which, when executed by a computer, are adapted to carry out an ethernet end-to-end communication based authentication method according to any of claims 1-6.
  9. 9. An electronic device comprising at least one processor, and A memory communicatively coupled to the at least one processor, wherein, The memory stores instructions executable by the at least one processor to enable the at least one processor to perform an ethernet end-to-end communication based authentication method according to any one of claims 1-6.
  10. 10. A computer program product comprising computer program/instructions which, when executed by a processor, implements an ethernet end-to-end communication based authentication method as claimed in any one of claims 1 to 6.

Description

Authentication method based on Ethernet end-to-end communication, storage medium and electronic equipment Technical Field The present application relates to the field of automotive communications technologies, and in particular, to an ethernet end-to-end communication-based authentication method, a storage medium, and an electronic device. Background With the development of the vehicle-mounted ethernet technology, an end-to-end (E2E) communication mechanism is widely applied to a vehicle-mounted network, so as to ensure the integrity and the time sequence reliability of key data in the transmission process. In the prior art, testing of an E2E communication protection protocol is mainly focused on functional compliance verification, namely, under a static or low-load network environment, communication connection is established, a test message is sent, fields such as a counter, cyclic Redundancy Check (CRC) and the like in a response message are checked item by item to judge whether the test message accords with standard specifications, and the test method can find basic problems such as coding errors, inconsistent configuration and the like in protocol implementation, so that the correctness of the E2E protocol function is ensured to a certain extent. However, the test scenario in the prior art is generally an ideal scenario, and lacks comprehensive simulation and evaluation on the real running environment of the vehicle-mounted network, in an actual vehicle, the vehicle-mounted ethernet is often in a complex dynamic environment with high load, high concurrency and multiple key traffic parallel competition, and the existing test method generally adopts only a simple packing mode, so that the real network load characteristic is difficult to simulate, and the potential risks under extreme working conditions such as network congestion, message disorder or time sequence abnormality cannot be effectively exposed. Meanwhile, the evaluation dimension of the prior art is single, comprehensive analysis on communication performance indexes and the running state of the controller is lacked, the test result depends on manual experience judgment to a great extent, and the stability boundary and the reliability level of the E2E communication protection mechanism under the high-voltage working condition are difficult to quantify, so that the further improvement of the functional safety of the vehicle-mounted Ethernet system is restricted. Disclosure of Invention An object of the present application is to overcome the above problems, and to provide an authentication method, a storage medium, and an electronic device based on ethernet end-to-end communication. The technical scheme of the application provides an authentication method based on Ethernet end-to-end communication, which comprises the following steps: executing initialization configuration operation, and establishing communication connection between a test end and tested equipment; sending a verification request message to the tested equipment; And receiving a response message returned by the tested equipment, and generating a test report based on the response message. Further, the generating a test report based on the response message specifically includes: determining counter information according to the response message; judging whether a counter meets preset counter conditions according to the counter information to obtain a judging result; Generating a test report according to the judging result; and when the judging result is that the preset counter condition is not met, recording abnormal information corresponding to the condition that the preset counter condition is not met, wherein the test report comprises the abnormal information. Further, the counter information comprises a counter initial value, a counter logic sequence and a counter boundary value; The preset counter conditions comprise initial value conditions, sequence conditions and boundary conditions; Judging whether the counter meets the preset counter condition according to the counter information to obtain a judging result, wherein the judging result specifically comprises the following steps: judging whether the initial value of the counter meets an initial value condition or not; Judging whether the logic sequence of the counter meets a sequence condition or not; judging whether the counter boundary value meets a boundary condition or not; And when any judging result is not satisfied, the judging result is not satisfied, and corresponding abnormal information is recorded, wherein the abnormal information comprises an abnormal type and counter information corresponding to the abnormal type. Further, the step of judging whether the counter meets a preset counter condition according to the counter information, and after obtaining a judgment result, further includes: determining a cyclic redundancy check code according to the response message; Determining a preset check code of the response mes