Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for secure access to vehicle-mounted controller

A vehicle-mounted controller and security access technology, which is applied in the security access method and system field of the vehicle-mounted controller, can solve problems affecting driving safety, intruding into the vehicle-mounted controller, threatening the security performance of the vehicle-mounted controller, etc., and achieve the goal of maintaining normal performance Effect

Active Publication Date: 2021-03-19
BAIC MOTOR CORP LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The invention provides a method and system for safely accessing a vehicle-mounted controller, which are used to solve the problem that external malicious data invades the vehicle-mounted controller through a bus, threatens the safety performance of the vehicle-mounted controller, and further affects driving safety.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for secure access to vehicle-mounted controller
  • Method and system for secure access to vehicle-mounted controller
  • Method and system for secure access to vehicle-mounted controller

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] figure 1 It is a schematic flowchart of a method for securely accessing a vehicle-mounted controller provided by Embodiment 1 of the present invention. Such as figure 1 As shown, the method includes the following steps:

[0057] Step 11, the vehicle-mounted controller receives the access request of the vehicle-mounted terminal, and the access request includes the communication message identification of the vehicle-mounted terminal;

[0058] When the vehicle leaves the factory, the built-in terminal of the vehicle must be assigned a communication message identification of the vehicle terminal, for example, the communication message identification of the engine controller is 0x10, and the communication message identification of the window controller is 0x20. When the vehicle-mounted terminal sending the access request is a built-in terminal in the vehicle, the access request will include the communication message identification of the vehicle terminal.

[0059] Step 12...

Embodiment 2

[0067] figure 2 It is a schematic flowchart of a method for securely accessing a vehicle-mounted controller provided by Embodiment 2 of the present invention. Such as figure 2 Shown, after 12, described method comprises the steps:

[0068] Step 21, the vehicle-mounted controller receives the access request of the vehicle-mounted terminal, and the access request includes the communication message identification of the vehicle-mounted terminal;

[0069] When the vehicle leaves the factory, the built-in terminal of the vehicle must be assigned a communication message identification of the vehicle terminal, for example, the communication message identification of the engine controller is 0x10, and the communication message identification of the window controller is 0x20. When the vehicle-mounted terminal sending the access request is a built-in terminal in the vehicle, the access request will include the communication message identification of the vehicle terminal.

[0070] S...

Embodiment 3

[0087] image 3 It is a schematic flowchart of a secure access method for an on-board controller provided by Embodiment 3 of the present invention. Such as image 3 As shown, the method also includes:

[0088] 31. Count the number of access requests sent by the vehicle-mounted terminal. If the vehicle-mounted terminal fails to pass the authentication within the preset number of times, the vehicle-mounted controller refuses to receive the access request from the vehicle-mounted terminal within one ignition cycle of the vehicle.

[0089]The on-board controller counts the number of access requests while verifying the legitimacy of the access request. In order to avoid misjudgment in the identification of the vehicle access code by the on-board controller, the preset number of requests depends on the allowable range. If within the preset number of times, the vehicle access codes contained in the multiple access requests sent by the vehicle-mounted terminal fail to pass the authe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a secure access method and system for a vehicle-mounted controller. The method includes the following steps: enabling the vehicle-mounted controller to receive an access requestof a vehicle-mounted terminal, wherein the access request includes a communication message identifier of the vehicle-mounted terminal; judging whether the vehicle-mounted terminal is a terminal builtin a local vehicle according to the communication message identifier of the vehicle-mounted terminal; if the judgment result is yes, parsing the access request to obtain a vehicle access code, wherein the vehicle access code is a unique identification code of the vehicle-mounted controller; and authenticating the vehicle access code, if the authentication is successful, allowing the vehicle-mounted terminal to access the vehicle-mounted controller. According to the scheme of the invention, the security of the access request can be verified when the vehicle-mounted terminal accesses the vehicle-mounted controller, external malicious data can be prevented from invading the vehicle-mounted controller through a bus, and thus the normal performance of the vehicle-mounted controller and the information security inside the vehicle can be maintained.

Description

technical field [0001] The invention relates to vehicle bus communication technology, in particular to a method and system for safely accessing a vehicle-mounted controller. Background technique [0002] With the continuous development of automotive electronics and computer control technology, the number of existing internal or external vehicle-mounted terminals continues to increase, and the complexity of data accessed between vehicle-mounted terminals and vehicle-mounted controllers increases accordingly. Frequent data access can easily lead to external malicious data. Invasion of the vehicle controller through the bus threatens the safety performance of the vehicle controller, thereby affecting driving safety. Contents of the invention [0003] The invention provides a method and system for safely accessing a vehicle-mounted controller, which are used to solve the problem that external malicious data invades the vehicle-mounted controller through a bus, threatens the sa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/40
CPCH04L12/40H04L63/08H04L63/083H04L67/12H04L2012/40273
Inventor 谭矛徐小娟付金勇
Owner BAIC MOTOR CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products