Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A vehicle network security authentication method, system, vehicle, device and medium

A security authentication and vehicle network technology, applied in the field of automotive electronics, can solve the problems of vehicle driving safety, vehicle owner safety risk, malware intrusion, vehicle owner information leakage, etc., to avoid delaying the repair of security vulnerabilities, avoiding the intrusion of malicious commands, and improving The Effects of Network Security

Active Publication Date: 2021-02-26
BEIJING QIHOO TECH CO LTD
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, since there is currently no network security protection solution suitable for vehicles, vehicles will inevitably face network security problems after they are connected to the network, such as leakage of vehicle owner information, leakage of communication information, tampering of vehicle software, tampering of vehicle control data, and malicious software. Any intrusion will bring great risks to the driving safety of the vehicle and the safety of the owner.
[0005] It can be seen that there is a large network security problem in the vehicle networking in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A vehicle network security authentication method, system, vehicle, device and medium
  • A vehicle network security authentication method, system, vehicle, device and medium
  • A vehicle network security authentication method, system, vehicle, device and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] This embodiment provides a method for vehicle network security authentication, please refer to figure 1 , figure 1 It is a flowchart of a method for vehicle network security authentication in an embodiment of the present application, the vehicle includes a vehicle communication box, a gateway and a vehicle-specific microcomputer controller, and the method includes:

[0057] Step S101, the vehicle communication box receives the command sent by the remote service provider, and performs certificate verification on the command according to the certificate issued by PKI in advance; if the vehicle communication box certificate verification is successful, then sends the command to said gateway;

[0058] Step S102, the gateway performs certificate verification on the command according to the certificate issued in advance by the PKI; if the gateway certificate verification is successful, then send the command to the automobile-specific microcomputer controller;

[0059] Step S...

Embodiment 2

[0146] Such as figure 2 As shown, a network security system is provided, the system is applied to a vehicle, including:

[0147] Authentication subsystem 201, said authentication subsystem establishes the trust system among remote service provider, vehicle-mounted communication box, gateway and automobile special-purpose microcomputer controller through public key infrastructure; and establishes identity authentication system through PKI, through described identity The certification system assigns a corresponding unique root certificate to the vehicle manufacturer of the vehicle in question;

[0148]The upgrade subsystem 202, the upgrade subsystem adopts the over-the-air technology to establish upgrade channels for the vehicle communication box, the gateway and the vehicle-specific microcomputer controller.

[0149] In the embodiment of the present application, the network security system also includes a security chip SE, a digital certificate assigned to the vehicle by PKI ...

Embodiment 3

[0154] Such as image 3 As shown, a vehicle is provided, the vehicle includes a vehicle body 301, and further includes:

[0155] Authentication subsystem 302, said authentication subsystem establishes trust system between remote service provider, vehicle communication box, gateway and automobile special-purpose microcomputer controller by public key infrastructure (Public KeyInfrastructure, PKI); And establish identity authentication by PKI system, assigning a corresponding unique root certificate to the vehicle manufacturer of the vehicle through the identity authentication system;

[0156] An upgrade subsystem 303, the upgrade subsystem adopts Over-the-Air Technology (OTA) to establish an upgrade channel for the vehicle communication box, the gateway and the vehicle-specific microcomputer controller.

[0157] In the embodiment of the present application, the vehicle also includes a security chip 304, a digital certificate assigned to the vehicle by PKI (including the unique...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security authentication method, system, vehicle, device and medium. The vehicle includes a vehicle-mounted communication box, a gateway, and a dedicated microcomputer controller for the vehicle. The issued certificate performs certificate verification on the command; if the vehicle communication box certificate verification is successful, then sends the command to the gateway; the gateway performs certificate verification on the command according to the certificate issued by PKI in advance; if the If the verification of the relevant certificate is successful, the command is sent to the automobile-specific microcomputer controller; the automobile-specific microcomputer controller performs certificate verification on the said command according to the certificate issued by PKI in advance; if the certificate verification of the automobile-specific microcomputer controller is successful, then execute the command. The method and device provided in the present application are used to solve the network security problem existing in the vehicle networking in the prior art, and realize the technical effect of ensuring the vehicle network security.

Description

technical field [0001] The invention relates to the technical field of automotive electronics, in particular to a vehicle network security authentication method, system, vehicle, device and medium. Background technique [0002] With the expansion of city scale and the increase of per capita income, vehicles have become increasingly popular, and more and more people cannot live without vehicles. [0003] In order to make the driving process more convenient and comfortable for users, one of the current research and development focuses of automobile manufacturers is automotive electronics, which provide users with functions such as intelligent driving, voice playback, intelligent navigation, air purification and communication. Most of the above-mentioned functional services need to be connected to the network to realize, and vehicle networking is an inevitable trend. [0004] However, since there is currently no network security protection solution suitable for vehicles, vehic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0825H04L9/3263
Inventor 刘健皓宋戈
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products