Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information security risk assessment method for full life cycle of intelligent networked automobile

A technology with full life cycle and information security, which is applied in the field of information security risk assessment for the full life cycle of intelligent networked vehicles, and can solve problems such as security risk assessment not proposed.

Pending Publication Date: 2020-02-21
BEIHANG UNIV +1
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the field of automotive information security has not yet proposed a specific implementation method for information security risk assessment of the entire life cycle of intelligent networked vehicles.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security risk assessment method for full life cycle of intelligent networked automobile
  • Information security risk assessment method for full life cycle of intelligent networked automobile
  • Information security risk assessment method for full life cycle of intelligent networked automobile

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention will be described in further detail below in conjunction with the embodiments given in the accompanying drawings.

[0044] refer to figure 1 As shown, a general information security risk assessment method in this embodiment includes: asset identification, threat analysis, impact assessment, vulnerability analysis, attack analysis, attack feasibility assessment, and risk determination.

[0045] specific,

[0046] Asset identification: identify assets, security attributes and damage scenarios;

[0047] Threat Analysis: Identify threat scenarios that could compromise the information security characteristics of an asset;

[0048] Impact assessment: Assess the degree of damage caused by the compromise of the information security attributes of the analyzed assets;

[0049] Vulnerability analysis: identify and analyze information security vulnerabilities;

[0050] Attack Analysis: Identify and / or update attack paths to achieve threat scenarios;

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information security risk assessment method for the full life cycle of an intelligent networked automobile, and the method comprises the following steps: 1, dividing the intelligent networked automobile into five life cycles: a concept stage, a development stage, a production stage, an operation and maintenance stage and a scrapping stage; and 2, for the five life cyclesdivided in the step 1, carrying out risk assessment on the automobile in each life cycle, and not carrying out risk assessment on the automobile in the production stage and the scrap stage. Accordingto the information security risk assessment method for the full life cycle of the intelligent networked automobile, through the arrangement of the step 1 and the step 2, the life cycle of the automobile can be effectively divided, and then staged assessment is carried out on the automobile according to the divided life cycle.

Description

technical field [0001] The present invention relates to an assessment method, more specifically to an information security risk assessment method for the entire life cycle of an intelligent networked vehicle. Background technique [0002] With the continuous improvement of the intelligentization, networking and electrification of automobiles, the problem of information security of intelligent and connected vehicles is becoming more and more serious. Methods such as information tampering and virus intrusion have been successfully used by hackers in automobile attacks. However, at the beginning of the design of the vehicle system, the function realization is considered, and the reliability and real-time performance are often only concerned. Information security has been ignored for a long time, and technical means such as intrusion detection and firewalls on traditional information systems are difficult not to change due to compatibility issues. Deployment in the vehicle netwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q10/06
CPCG06Q10/0635
Inventor 冀浩杰王颖会秦洪懋王建徐迟
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products