Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vehicle-mounted network security authentication method, device, storage medium and vehicle

A security certification and vehicle network technology, applied in the field of vehicle network security certification, can solve problems such as unfavorable vehicle network communication security, potential safety hazards, and unrealized controller security certification

Active Publication Date: 2018-12-18
BEIJING AUTOMOTIVE IND CORP +1
View PDF9 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While the vehicle Ethernet brings convenience, it also introduces a lot of potential safety hazards, which need to be protected by corresponding solutions. In the existing technical solutions, only the authentication of the vehicle T-BOX module and the cloud is realized, and the in-vehicle Safety certification of each controller, when vehicle communication devices (such as ADAS (Advanced Driver Assistance Systems, advanced driver assistance system), IVI (In-Vehicle Infotainment, vehicle infotainment system), OBD (On-Board Diagnostic, vehicle diagnostic system) When accessing the in-vehicle network, the vehicle cannot identify whether the in-vehicle communication device is issued or authorized by the car factory, which is not conducive to the communication security of the in-vehicle network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vehicle-mounted network security authentication method, device, storage medium and vehicle
  • Vehicle-mounted network security authentication method, device, storage medium and vehicle
  • Vehicle-mounted network security authentication method, device, storage medium and vehicle

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Specific embodiments of the present disclosure will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present disclosure, and are not intended to limit the present disclosure.

[0023] In order to solve the problems existing in the prior art, the present disclosure provides a vehicle network security authentication method, device, storage medium and vehicle, and the present disclosure can be applied to a vehicle network security certification system.

[0024] Firstly, the vehicle network security authentication system is described, as follows: figure 1 As shown, the system includes a vehicle certification center 101, a first vehicle communication device 102 and a second vehicle communication device 103 respectively connected to the vehicle certification center 101, and the first vehicle communication device 102 is connected to the se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method, a device, a storage medium and a vehicle for securing authentication of a vehicle-mounted network. When a first vehicle-mounted communication device sends a communication request to a second vehicle-mounted communication device, the first authentication information sent by the first vehicle-mounted communication device and the second authentication information sent by the second vehicle-mounted communication device are received. whether the first vehicle-mounted communication device is an authorizing device is authenticated by the preset authentication strategy according to the first authentication information and authenticating whether the second vehicle-mounted communication device is an authorizing device is authenticated by the preset authentication strategy according to the second authentication information; When both the first vehicle-mounted communication device and the second vehicle-mounted communication device are the authorization devices,authentication passing information is sent to the first vehicle-mounted communication device and the second vehicle-mounted communication device, respectively, so that the first vehicle-mounted communication device communicates with the second vehicle-mounted communication device.

Description

technical field [0001] The present disclosure relates to the field of network security, in particular, to a method, device, storage medium and vehicle for vehicle network security authentication. Background technique [0002] With the popularization and application of vehicle-mounted Ethernet in the vehicle's internal bus, there is a tendency to gradually replace other buses. While the vehicle Ethernet brings convenience, it also introduces a lot of potential safety hazards, which need to be protected by corresponding solutions. In the existing technical solutions, only the authentication of the vehicle T-BOX module and the cloud is realized, and the in-vehicle Safety certification of each controller, when vehicle communication devices (such as ADAS (Advanced Driver Assistance Systems, advanced driver assistance system), IVI (In-Vehicle Infotainment, vehicle infotainment system), OBD (On-Board Diagnostic, vehicle diagnostic system) When accessing the in-vehicle network, the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
CPCH04L63/0823H04L67/12
Inventor 郭丽丽陈新
Owner BEIJING AUTOMOTIVE IND CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products