Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety control method, device and computer equipment

A technology of safety control and safety verification, which is applied in the field of vehicle safety communication, can solve the problems of ECU communication safety cannot be guaranteed, identity safety verification is not performed, etc., to achieve legality verification, safety assurance, and transmission process safety Effect

Active Publication Date: 2019-01-22
APOLLO INTELLIGENT CONNECTIVITY (BEIJING) TECH CO LTD
View PDF12 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] For this reason, the first purpose of the present invention is to propose a security control method. During each verification, the gateway generates verification information, and uses different verification information for each ECU to perform safety verification, avoiding the use of a single verification At the same time, when the verification information is transmitted, it is encrypted with different keys, making the transmission process more secure, realizing the legality verification of the ECU, ensuring the security of in-vehicle communication, and solving related problems. In the technology, the security verification of the identity is not performed when the ECU communicates, which leads to the technical problem that the communication security between the ECUs cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety control method, device and computer equipment
  • Safety control method, device and computer equipment
  • Safety control method, device and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.

[0048] The following describes the security control method, device and computer equipment of the embodiments of the present invention with reference to the accompanying drawings.

[0049] Before explaining the security control method of this embodiment, a brief introduction is made to the network topology of the vehicle.

[0050] figure 1 A schematic structural diagram of a vehicle network topology provided by an embodiment of the present invention, as shown in figure 1As shown, the topology includes a gateway 10, a diagnostic ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides asafety control method, a device and a computer equipment, wherein the method comprises: obtaining a key generated according to ECU identity information of a vehicle control unit ECU to be authenticated and gateway identity information of a vehicle gateway, and generating check information corresponding to the ECU identity information;a key is used to encrypt the verification information to generate the first authentication information;receiving second authentication information generated based on the first authentication information transmitted by the ECU;the second authentication information is decrypted by using a key to obtain the carried check information and the ECU identity information;by judging whether the decrypted check information and the ECU identity information have a corresponding relationship, the ECU is verified securely. The gateway verifies each ECU securely with different verifying information and encrypts with different keys when transmittingthe verifying information, which makes the transmission process more secure, realizes the ECU security verification and ensures the communication security.

Description

technical field [0001] The invention relates to the technical field of vehicle safety communication, in particular to a safety control method, device and computer equipment. Background technique [0002] With the improvement of people's living standards, more and more vehicles are used by people. Various functions in the vehicle are realized by the electronic control unit ECU. If the ECU in the car is not legal or is controlled by hackers, then The life safety of passengers will be endangered, so the communication safety among the various ECUs in the car is particularly important. [0003] In related technologies, when communicating between ECUs, there is no identity authentication process, or a fixed software encryption algorithm with a relatively simple algorithm is used for authentication. Since the authentication algorithm is relatively simple, it is easy to be cracked, and the ECU is easily replaced by an illegal ECU. , leading to the communication security between ECU...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L12/40
CPCH04L12/40013H04L63/083H04L63/12H04L67/12H04L2012/40273H04L2012/40215H04L63/0428
Inventor 乔旭
Owner APOLLO INTELLIGENT CONNECTIVITY (BEIJING) TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products