Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Prevention of masquerade by using identification sequences

A technology of identification sequence and identification, which is applied in the direction of data exchange, digital transmission system, bus network, etc. through path configuration, which can solve the problems of misinterpretation of information, distortion of message analysis and processing of message identification, etc.

Active Publication Date: 2015-03-11
AUDI AG +2
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Random bit errors on the bus can lead to misinterpretation of information in the available data, which is caused, for example, by distortion of message recognition in CAN and by distortion of message analysis processing chosen by the receiver

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Prevention of masquerade by using identification sequences

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to transmit messages on the bus, an applicator provides usable data from dense signals for cyclic transmission. For security measures against transmission errors, a message counter (BSZ) and CRC-8 checksum are added to the available data. Then the S-PDU generated in this way is transmitted from the applicator to the standard software and is transmitted to the communication controller (CC) for transmission.

[0033] In the described method for anti-counterfeiting security measures, both in the transmitter and the receiver, in order to calculate the CRC checksum according to the available data to be secured, a static one is calculated and is related to the transmitter / receiver section. The message ID. However, the message identification is not sent over the bus and is therefore not a part of the secured message. For each receiver, the message identification is known a priori for all messages to be received. The correct assignment of the message identifier to the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method transmits a message between a transmitter and a receiver on a bus using an identifier associated with the transmitter / receiver path for the purpose of authentication and a message counter. The identifier is dynamically selected from an identification sequence depending on the message counter value and is integrated into the message check sum but not transmitted via the bus. A control device and a vehicle are adapted to carry out the method for transmitting a message.

Description

Technical field [0001] The present invention relates to a method for transmitting messages between a sender and a receiver on a bus having an identification and a message counter configured for the sender / receiver segment for verification. In addition, the present invention also relates to a control device and a vehicle, which are configured to implement the message transmission method. Background technique [0002] In order to ensure data communication, the safety standard IEC 61508 requires proof that the unrecognized failure of the communication process is evaluated taking into account assumed / imposed error scenarios. [0003] The measures are transferred to the level of the application (logic calculation / application) and evaluate the data from the security-oriented data source to the data sink / data sink / data receiver (so-called end-to-end security measures). When investigating errors, it is necessary to evaluate the "camouflage" of the misidentified scene: What is the probabil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L1/00
CPCH04L63/12H04L12/40H04L2012/40273H04L1/0061
Inventor S·沙赫特纳B·克斯托藤鲍尔T·比森博格
Owner AUDI AG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products