Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for identifying and processing malicious behaviors of OBD (On-Board Diagnostics) equipment

A behavior and equipment technology, applied in the direction of electrical digital data processing, computer security devices, instruments, etc., can solve problems such as hidden dangers of car owners, and achieve the effect of preventing paralysis and ensuring safety.

Active Publication Date: 2016-06-01
DALIAN ROILAND SCI & TECH CO LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, while the vehicle OBD interface brings convenience to car owners, it also brings hidden dangers to car owners, because the functions that car owners want to use may also become "accomplices" of third parties. For example, car owners want to use OBD equipment to automatically turn off / on Car window function, others can also operate the car window by monitoring the data interaction process in this process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for identifying and processing malicious behaviors of OBD (On-Board Diagnostics) equipment
  • Method and device for identifying and processing malicious behaviors of OBD (On-Board Diagnostics) equipment
  • Method and device for identifying and processing malicious behaviors of OBD (On-Board Diagnostics) equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0022] Embodiment 1: a kind of method of identifying malicious behavior of OBD equipment and processing, a kind of method of identifying malicious behavior of OBD equipment and processing, comprising:

[0023] S1. Monitor the OBD data of the reaction action behavior in the OBD device diagnosis protocol;

[0024] S2. When the OBD data is obtained, store the OBD data, and notify the user that the action is about to be executed;

[0025] S3. The user judges whether the action can be executed. If it is judged to be executable, the stored OBD data is sent to the vehicle for execution; if it is judged to be unexecutable, the stored OBD data is cleared.

[0026] Wherein: the OBD data is at least one of the OBD data of the diagnostic protocol of the CAN application layer (ISO14229) and the diagnostic protocol of the K application layer (ISO14230): electronic control unit reset (0x11), safe entry (0x27), pass Identifier write data (0x2E); write memory by address (0x3D), clear diagnost...

Embodiment 2

[0027] Embodiment 2: have the technical scheme identical with embodiment 1, more specifically, as figure 1 and figure 2 As shown, the OBD device is monitored by a system that monitors the behavior of the OBD device in real time. The system includes: a vehicle-mounted OBD device connected to the vehicle-mounted OBD interface, and an adapter line is added to the OBD interface, which is connected to the behavior data acquisition hardware of the vehicle-mounted OBD device. The vehicle-mounted OBD behavior The data acquisition hardware collects the interactive data between the vehicle-mounted OBD device and the CAN bus, sends the data to the data analysis terminal for analysis, and displays the behavior information obtained from the analysis.

[0028] The vehicle-mounted OBD device behavior data acquisition hardware includes a CAN bus circuit, a K bus circuit, and a wireless transmission module. The vehicle-mounted OBD device behavior data acquisition hardware monitors the vehicle...

Embodiment 3

[0030] Embodiment 3: This embodiment has the same technical solution as Embodiment 2, and the method that the analysis terminal analyzes the received data into the behavior information of the vehicle-mounted OBD device is: as attached image 3 , the analysis is actually to analyze the instruction when the on-board OBD sends the instruction, and correspond the instruction to the behavior. The analysis of the instruction is carried out according to the international standard 14229 and 15031, of which 15031 specifies the meaning of some values, and Some of them are self-defined instructions for car manufacturers, but they all conform to international standards.

[0031] attached image 3 The analysis process of the OBD device's behavior "obtaining the vehicle engine speed" is given. The vehicle-mounted OBD device sends an instruction code, for example: 07DF, 02010C, and the data is monitored by the vehicle-mounted OBD device's behavior data acquisition hardware through the CAN bu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for identifying and handling malicious behaviors of OBD (On-Board Diagnostics) equipment, belongs to the field of equipment data monitoring, and aims to inform a vehicle owner of malicious behaviors of the OBD equipment in a vehicle and judge whether operation is practical or not. The method is characterized by comprising the following steps: S1, monitoring OBD data of a response action behavior in an OBD equipment diagnostic protocol; S2, when the OBD data are acquired, storing the OBD data, and informing a user that the action behavior is to be executed; S3, judging whether the action behavior is executable or not by the user, transmitting the stored OBD data to the vehicle to be executed when the action behavior is judged to be executable, and clearing the stored OBD data when the action behavior is judged to be un-executable. The method and the device have the effect that an interface for the user to operate in the case of actual OBD malicious behaviors is provided, so that malicious modification of the vehicle of the user is prevented.

Description

technical field [0001] The invention belongs to the field of equipment data monitoring, and in particular relates to a method for identifying malicious behavior of OBD equipment and a processing method thereof. Background technique [0002] The vehicle-mounted OBD interface can not only provide 12V power supply, but also obtain vehicle data, so there are many products based on the vehicle-mounted OBD interface, some can calculate fuel consumption, some can accumulate mileage, some can detect vehicle fault information, and some can also control Some electrical appliances of the vehicle, such as windows, locks and so on. However, while the vehicle OBD interface brings convenience to car owners, it also brings hidden dangers to car owners, because the functions that car owners want to use may also become "accomplices" of third parties. For example, car owners want to use OBD equipment to automatically turn off / on The car window function, others can also operate the car windows...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/55
CPCG06F21/554G06F2221/031
Inventor 田雨农秦东旭苍柏
Owner DALIAN ROILAND SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products