Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vehicle network security authentication method, system and apparatus, vehicle and medium

A security authentication and vehicle network technology, applied in the field of automotive electronics, can solve the problems of vehicle driving safety, vehicle owner security risk, malware intrusion, vehicle owner information leakage, etc. The effect of network security

Active Publication Date: 2018-04-17
BEIJING QIHOO TECH CO LTD
View PDF12 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, since there is currently no network security protection solution suitable for vehicles, vehicles will inevitably face network security problems after they are connected to the network, such as leakage of vehicle owner information, leakage of communication information, tampering of vehicle software, tampering of vehicle control data, and malicious software. Any intrusion will bring great risks to the driving safety of the vehicle and the safety of the owner.
[0005] It can be seen that there is a large network security problem in the vehicle networking in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vehicle network security authentication method, system and apparatus, vehicle and medium
  • Vehicle network security authentication method, system and apparatus, vehicle and medium
  • Vehicle network security authentication method, system and apparatus, vehicle and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] This embodiment provides a method for performing vehicle network security authentication, please refer to figure 1 , figure 1 This is a flowchart of a method for performing vehicle network security authentication in an embodiment of the present application. The vehicle includes a vehicle-mounted communication box, a gateway, and a dedicated microcomputer controller for the vehicle, and the method includes:

[0057] Step S101: The in-vehicle communication box receives the command sent by the remote service provider, and performs certificate verification on the command according to the certificate issued in advance by the PKI; if the certificate verification of the in-vehicle communication box is successful, the command is sent to The gateway;

[0058] Step S102, the gateway performs certificate verification on the command according to the certificate issued in advance by the PKI; if the gateway certificate verification is successful, the command is sent to the car dedicated mi...

Embodiment 2

[0146] Such as figure 2 As shown, a network security system is provided. The system is applied to a vehicle and includes:

[0147] Authentication subsystem 201, which establishes a trust system between remote service providers, vehicle-mounted communication boxes, gateways, and car-specific microcomputer controllers through public key infrastructure; and establishes an identity authentication system through PKI, and passes the identity The certification system assigns the corresponding unique root certificate to the vehicle manufacturer of the vehicle;

[0148] The upgrade subsystem 202 uses an air download technology to establish an upgrade channel for the vehicle-mounted communication box, the gateway, and the car-specific microcomputer controller.

[0149] In this embodiment of the application, the network security system also includes a security chip SE, a digital certificate assigned to the vehicle by PKI (including the unique root certificate of the vehicle manufacturer and th...

Embodiment 3

[0154] Such as image 3 As shown, a vehicle is provided, the vehicle includes a vehicle body 301, and further includes:

[0155] Authentication subsystem 302, which establishes a trust system between remote service providers, in-vehicle communication boxes, gateways and car-specific microcomputer controllers through public key infrastructure (Public Key Infrastructure, PKI); and establishes identity authentication through PKI System, to allocate a corresponding unique root certificate to the vehicle manufacturer of the vehicle through the identity authentication system;

[0156] An upgrade subsystem 303, which uses over-the-air technology (OTA) to establish an upgrade channel for the vehicle-mounted communication box, the gateway, and the car-specific microcomputer controller.

[0157] In this embodiment of the application, the vehicle also includes a security chip 304, a digital certificate (including the unique root certificate of the vehicle manufacturer and the digital certificat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a vehicle network security authentication method, system and apparatus, a vehicle and a medium. The vehicle comprises a vehicle-mounted communication box, a gateway and a special vehicle microcomputer controller. The method comprises the following steps: the vehicle-mounted communication box receives a command sent by a remote service provider, and performs certificate verification on the command according to a certificate issued by PKI in advance; if the certificate verification of the vehicle-mounted communication box is successful, the command is sent to the gateway;the gateway performs certificate verification on the command according to the certificate issued by PKI in advance; if the certificate verification is successful, the command is sent to the vehicle-mounted communication box; the vehicle-mounted communication box performs certificate verification on the command according to the certificate issued by PKI in advance; if the certificate verificationof the special vehicle microcomputer controller is successful, the command is executed. The method and apparatus provided by the invention are used for solving the network security problem of the Internet of Vehicles in the prior art and achieving the technical effect of ensuring the vehicle network security.

Description

Technical field [0001] The present invention relates to the field of automotive electronics technology, in particular to a vehicle network security authentication method, system, vehicle, device and medium. Background technique [0002] With the expansion of the scale of cities and the increase in per capita income, vehicles have become increasingly popular, and more and more people cannot live without vehicles. [0003] In order to make the driving process more convenient and more comfortable for users, one of the current research and development focuses of automobile manufacturers is automotive electronics, which provide users with functions such as smart driving, voice playback, smart navigation, air purification, and communication. Services, most of the above-mentioned functional services need to be connected to the network to achieve, and vehicle networking is an inevitable trend. [0004] However, since there is currently no network security protection solution suitable for ve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0825H04L9/3263
Inventor 刘健皓宋戈
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products