T-BOX information security detection and protection method based on vehicle anomaly data monitoring

A technology of abnormal data and information security, applied in the field of automobile information security, can solve the problems of economic loss, lack of information security protection ability, user privacy exposure, etc., to achieve the effect of online upgrade

Active Publication Date: 2017-05-10
BEIHANG UNIV
View PDF17 Cites 70 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] At present, most T-BOX products on the market only have simple network conversion and data transmission functions, but do not have information security detection and protection capabilities. Functionally, they are only network protocol converters, and information security detection and protection are mainly through the cloud. The server implements
However, the entire information security protection system of intelligent networked vehicles relies entirely on the cloud, and there will be many problems. For example, the vehicle itself does not have information security protection capabilities, and it is threatened or attacked in the cloud (such as the firewall is breached, the server is invaded), and the vehicle is physically attacked. In this case, the vehicle will lose its ability to protect information
In addition, the information security protection mode based on the cloud is vulnerable to interception of communication information by attackers, resulting in the loss and theft of vehicle information, resulting in user privacy exposure and economic losses, and even serious consequences of vehicle crashes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • T-BOX information security detection and protection method based on vehicle anomaly data monitoring
  • T-BOX information security detection and protection method based on vehicle anomaly data monitoring
  • T-BOX information security detection and protection method based on vehicle anomaly data monitoring

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be further described below in conjunction with the drawings and specific embodiments.

[0026] The present invention proposes a T-BOX information security detection and protection method based on vehicle abnormal data monitoring, for which a general vehicle fault tree model is established, such as figure 1 As shown, the model includes information about possible failures of traditional vehicles, smart vehicles and connected vehicles, and extracts fault features for data storage. Then, based on the abnormal vehicle data monitored by T-BOX, data fusion and big data analysis are performed in TSP, such as figure 2 As shown, according to the analysis results and the fault tree model, the real-time detection of the fault information of the vehicle is determined, and it is determined that it is caused by the function of the vehicle. It is necessary to send a reminder or warning to the user and the vehicle. For the cause of the vehicle information safety, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A T-BOX information security detection and protection method based on vehicle anomaly data monitoring comprises: classifying and summarizing vehicle faults, providing a universal vehicle fault tree model, collecting and comparing vehicle real-time data through T-BOX, monitoring vehicle anomaly data in real time, transmitting to a telematics service platform (TSP) constantly, determining change trends of operation parameters and states of each vehicle part and system through data fusion and through big data analysis based on vehicle driving historical information collected by a cloud terminal and vehicle main parts related information restored by a main engine plant, comparing vehicle real-time information transmitted by T-BOX, judging whether a vehicle has anomaly data or not at present, and determining whether the vehicle is under information security attack or not based on the established vehicle fault tree model; finally, notifications or warnings on fault problems due to vehicle functional security need to be made for users and vehicles by the TSP.

Description

Technical field [0001] The invention relates to the technical field of automobile information security, and is suitable for vehicle information security protection, in particular to a T-BOX information security detection and protection method based on vehicle abnormal data monitoring. Background technique [0002] With the vigorous development of automobile intelligence, networking, and informatization, the market share of intelligent networked vehicles is increasing. At the same time, information security issues brought about by complex in-vehicle networks, on-vehicle sensors, wireless communication networks, and remote information service systems have gradually attracted people’s attention. The relevant state departments, industries and industries are even more concerned about the information security of connected vehicles. The problem is placed first in the industry's key technology research. [0003] Existing automotive information security products mainly include on-board gat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G05B23/02
CPCG05B23/0248
Inventor 王云鹏冀浩杰秦洪懋张钊黄磊
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products