ECU (Electric Control Unit) security access processing method

A processing method and security access technology, applied in the field of ECU security access processing, can solve the problems of easy leakage and low confidentiality, and achieve the effects of improving security, avoiding tedious calculations, and shortening operation time.

Active Publication Date: 2012-03-28
GUANGZHOU AUTOMOBILE GROUP CO LTD
View PDF6 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since multiple manufacturers know these security algorithms, it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • ECU (Electric Control Unit) security access processing method
  • ECU (Electric Control Unit) security access processing method
  • ECU (Electric Control Unit) security access processing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention.

[0021] see figure 2 , is a schematic flow chart of the ECU security access processing method provided by the first implementation of the present invention.

[0022] The embodiment of the present invention divides the ECU sample into a factory mode and a non-factory mode: the ECU is set to the factory mode when it is on the production line, and the ECU is set to the non-factory mode when it leaves the factory. The ECU in the factory mode can accept the access operation of the external device without security verification; the ECU in the non-factory mode must pass the security verification before accepting the access operation of the external device.

[0023] It should be noted that "the ECU is on the production line" includes not only the situation where a single ECU componen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an ECU (Electric Control Unit) security access processing method. An ECU is set into a factory mode in a production line, and is set into a non-factory mode when leaving the factory; when external equipment transmits an access request to the ECU, the ECU reads a value of a mode mark position, and the state of the ECU is judged; if the ECU is in the factory model, the ECU is automatically unlocked to accept the access operation of the external equipment; if the ECU is in the non-factory mode, the ECU carries out security verification operation to the external equipment, when the external equipment passes the security verification, the ECU is unlocked to accept the access operation of the external equipment; and otherwise, the ECU refuses the access operation of the external equipment. According to the embodiment of the invention, the detection steps on the production line of automobiles can be reduced, the production efficiency is improved, and the safety of the ECU can be ensured.

Description

technical field [0001] The invention relates to the technical field of automotive electronics, in particular to an ECU security access processing method. Background technique [0002] With the development of the automobile industry, the application of automotive diagnostic communication systems is becoming more and more extensive: safety verification is a typical example of the application of diagnostic communication systems. In conventional on-board diagnostic applications, the writing and reading of important safety-related information and the realization of some other special functions must be unlocked by the safety verification service before they can be operated. [0003] Such as figure 1 As shown, the existing security verification process is as follows: the external device requests to send a seed to the vehicle ECU (Electric Control Unit, electronic control unit); the ECU returns a random seed to the external device; The verification algorithm calculates a key and s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/70
Inventor 黄丽芳黄少堂李济泰张斌
Owner GUANGZHOU AUTOMOBILE GROUP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products