Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for intercepting OBD equipment malicious behaviors and device thereof

A technology of equipment and behavior, applied in the field of vehicle information security, can solve problems such as hidden dangers of vehicles, and achieve the effect of ensuring safety

Active Publication Date: 2016-07-06
DALIAN ROILAND SCI & TECH CO LTD
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to solve the problem of hidden dangers brought to the vehicle when the OBD interface acquires vehicle data and controls the vehicle, the present invention provides a method for intercepting the malicious behavior of the OBD device, which can realize the interception of the malicious behavior of the OBD device. Methods include:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for intercepting OBD equipment malicious behaviors and device thereof
  • Method for intercepting OBD equipment malicious behaviors and device thereof
  • Method for intercepting OBD equipment malicious behaviors and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] Embodiment 1: a kind of method of intercepting OBD equipment malicious behavior, comprising:

[0028] S1. Monitor the OBD data in the OBD device diagnostic protocol that reflects the action behavior of the OBD device;

[0029] S2. When the OBD data is acquired, execute step S3;

[0030] S3. Reply the error code (0x7F) corresponding to the OBD data of the OBD device. For example, the command to remotely control the car window rise is 0x310xB90x02, and the hardware that intercepts the malicious behavior of the OBD device will reply 0x7F0x310x11 immediately. The action behavior of the OBD device reflected by the OBD data is invalid, and the operation of the vehicle is stopped. And upload the interception record to APP or cloud platform.

Embodiment 2

[0031] Embodiment 2: have the technical scheme identical with embodiment 1, more specifically: wherein: described OBD data is in the OBD data of the diagnosis agreement of CAN application layer (ISO14229) and the diagnosis agreement of K application layer (ISO14230) At least one of: electronic control unit reset (0x11), security entry (0x27), write data by identifier (0x2E); write memory by address (0x3D), clear diagnostic information (0x14), remote control (0x31).

Embodiment 3

[0032] Embodiment 3: have the technical scheme identical with embodiment 1 or 2, more specifically: when obtaining this OBD data, first perform the following steps,

[0033] Store the OBD data and notify the user that the action is about to be executed;

[0034] The user judges whether the action can be executed, and if it is judged to be executable, the stored OBD data is sent to the vehicle for execution; if it is judged to be unexecutable, step S3 is executed. This step makes it possible to provide the user with an operation interface when the real OBD acts maliciously, to prevent malicious modification of the user's vehicle; to ensure the safety of the vehicle bus, and to prevent the "paralysis" of the vehicle ECU due to incorrect operation.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for intercepting OBD equipment malicious behaviors and a device thereof, belongs to the field of vehicle information security, and is used for solving the problem of bringing hidden trouble to a vehicle when an OBD interface acquires vehicle data and controls the vehicle. The technical key points are that the method comprises the steps that S1. OBD data reflecting OBD equipment operation behaviors in an OBD equipment diagnosis protocol are monitored; S2. when the OBD data are acquired, step S3 is performed; and S3. a corresponding error code (0x7F) of the OBD data is replied to the OBD equipment, and the OBD equipment receives the error code and affirms that the OBD equipment operation behaviors reflected by the OBD data are ineffective and stops operation of the vehicle. The effects are that vehicle bus security can be guaranteed and all the external instruction for controlling or writing in ECU data can be prevented.

Description

technical field [0001] The invention belongs to the field of vehicle information security, and relates to a method and a device for intercepting malicious behaviors of OBD equipment. Background technique [0002] The vehicle-mounted OBD interface can not only provide 12V power supply, but also obtain vehicle data, so there are many products based on the vehicle-mounted OBD interface, some can calculate fuel consumption, some can accumulate mileage, some can detect vehicle fault information, and some can also control Some electrical appliances of the vehicle, such as windows, locks and so on. While bringing convenience to the car owner, it also brings hidden dangers to the car owner, because the functions that the car owner wants to use may also become the "accomplice" of the third party. For example, the car owner wants to use the OBD device to automatically close / open the car window. Monitor the data interaction process in this process, and also operate the car windows. B...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G05B23/02H04L29/06
CPCG05B23/0213G05B2219/24048H04L63/1466
Inventor 田雨农秦东旭苍柏
Owner DALIAN ROILAND SCI & TECH CO LTD