Safety control method, device and computer equipment

A technology of safety control and safety verification, which is applied in the field of vehicle safety communication, can solve the problems of ECU communication safety cannot be guaranteed, identity safety verification is not performed, etc., to achieve legality verification, ensure safety, and secure transmission process Effect

Active Publication Date: 2021-09-03
APOLLO INTELLIGENT CONNECTIVITY (BEIJING) TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] For this reason, the first purpose of the present invention is to propose a security control method. During each verification, the gateway generates verification information, and uses different verification information for each ECU to perform safety verification, avoiding the use of a single verification At the same time, when the verification information is transmitted, it is encrypted with different keys, making the transmission process more secure, realizing the legality verification of the ECU, ensuring the security of in-vehicle communication, and solving related problems. In the technology, the security verification of the identity is not performed when the ECU communicates, which leads to the technical problem that the communication security between the ECUs cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety control method, device and computer equipment
  • Safety control method, device and computer equipment
  • Safety control method, device and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.

[0048] The following describes the security control method, device and computer equipment of the embodiments of the present invention with reference to the accompanying drawings.

[0049] Before explaining the security control method of this embodiment, a brief introduction is made to the network topology of the vehicle.

[0050] figure 1 A schematic structural diagram of a vehicle network topology provided by an embodiment of the present invention, as shown in figure 1As shown, the topology includes a gateway 10, a diagnostic ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention proposes a security control method, device and computer equipment, wherein the method includes: acquiring a key generated according to the ECU identity information of the vehicle control unit ECU to be authenticated and the gateway identity information of the vehicle gateway, and generating the corresponding ECU identity information The verification information is encrypted with the key to generate the first verification information, and the second verification information generated based on the first verification information sent by the ECU is received, and the second verification information is decrypted with the key to obtain the carried verification information. The verification information and ECU identity information, by judging whether the verification information obtained by decryption has a corresponding relationship with the ECU identity information, the security verification of the ECU is performed. In each verification, the gateway uses different verification information for each ECU to perform security verification. At the same time, when the verification information is transmitted, it is encrypted with different keys, which makes the transmission process more secure, realizes the security verification of the ECU, and ensures the communication security.

Description

technical field [0001] The invention relates to the technical field of vehicle safety communication, in particular to a safety control method, device and computer equipment. Background technique [0002] With the improvement of people's living standards, more and more vehicles are used by people. Various functions in the vehicle are realized by the electronic control unit ECU. If the ECU in the car is not legal or is controlled by hackers, then The life safety of passengers will be endangered, so the communication safety among the various ECUs in the car is particularly important. [0003] In related technologies, when communicating between ECUs, there is no identity authentication process, or a fixed software encryption algorithm with a relatively simple algorithm is used for authentication. Since the authentication algorithm is relatively simple, it is easy to be cracked, and the ECU is easily replaced by an illegal ECU. , leading to the communication security between ECU...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/40
CPCH04L12/40013H04L63/083H04L63/12H04L67/12H04L2012/40273H04L2012/40215H04L63/0428
Inventor 乔旭
Owner APOLLO INTELLIGENT CONNECTIVITY (BEIJING) TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products