Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A centralized t‑box information security protection system

A technology for information security and protection systems, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as personal privacy risks and non-existent loophole detection

Active Publication Date: 2018-03-23
BEIHANG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The security gateway mainly conducts security authentication and trusted access to the in-vehicle network through the firewall, but there is no vulnerability detection and system protection, including issues such as the credibility of transmitted data and the self-inspection of data mutation.
[0005] None of the existing automotive information security products can systematically and comprehensively realize the effective protection of automotive information security. For vehicles with higher intelligence, the greater the information security loopholes, the greater the danger to the personal privacy of car owners. The original intention of the development of automobile intelligence is just the opposite

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A centralized t‑box information security protection system
  • A centralized t‑box information security protection system
  • A centralized t‑box information security protection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention is further described below in conjunction with embodiment.

[0024] A centralized T-BOX information security protection system first establishes a centralized T-BOX information security protection architecture, such as figure 1 As shown, the architecture mainly includes T-BOX, power controller, chassis controller, body controller and entertainment system controller, among which T-BOX is responsible for the collection and management of all external transmission data of the vehicle, and through the information security protection system. The data of each functional domain is protected in real time. Then extract threat features for different operating scenarios of the vehicle, establish a threat feature library, and then determine the threat information encountered by the vehicle during operation through threat feature matching. Finally, based on the T-BOX centralized information security protection architecture, real-time and effective protection is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a centralized T-BOX information safety protection system. The system comprises a T-BOX, a power controller, a chassis controller, a body controller and an entertainment system controller. The system takes the T-BOX as a vehicle data external communication terminal which is connected with the vehicle power controller, the chassis controller, the body controller and the entertainment system controller and is responsible for data transmission and information interaction of each function area, all the information of each function area perform external interaction through the T-BOX, the data transmission realizes the parallel processing, and the T-BOX performs uniform management of the vehicle real-time external transmission data and performs information safety protection of the method including the authorization, the data encryption and the safety audit functions.

Description

technical field [0001] The invention relates to the technical field of automobile information security, is suitable for vehicle information security protection, and specifically relates to a centralized T-BOX information security protection system. Background technique [0002] With the continuous increase of car ownership, the impact of cars on people's lives is becoming more and more important. However, what follows is a series of problems that cars continue to bring, such as environmental pollution, traffic congestion, travel safety, information security, etc. Among them, automotive information security is a relatively new issue, and it faces more challenges and difficulties, especially after the emergence of smart vehicles and networked vehicles. [0003] Automobile information security is small enough to reveal the privacy of car owners, but big enough to threaten national security. The current automotive information security issues are mainly due to the focus of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/26
CPCH04L43/16H04L63/1408H04L63/1416H04L63/1433H04L63/1441H04L63/20
Inventor 王云鹏冀浩杰张钊王朋成宗孝鹏
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products