Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A vehicle Ethernet information security protection method

An information security and Ethernet technology, applied in the field of Ethernet information security protection, can solve the problems that vehicle Ethernet information security cannot be guaranteed, system functions are easily affected, and communication messages are easy to leak.

Active Publication Date: 2020-10-20
JILIN UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present invention provides a vehicle-mounted Ethernet information security protection method to solve the problems that the vehicle-mounted Ethernet information security cannot be guaranteed, communication messages are easily leaked, and system functions are easily affected.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A vehicle Ethernet information security protection method
  • A vehicle Ethernet information security protection method
  • A vehicle Ethernet information security protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The technical scheme that the present invention adopts is, comprises the following parts:

[0052] The first part: key distribution, the gateway ECU has a set of digital certificates, which contains the identity, public key and private key of each legal ECU in the network, and at the same time, the gateway ECU has the encryption key EK and authentication key AK required for communication , in the startup phase, the gateway ECU distributes encryption keys and authentication keys to each legal ECU in the network in sequence;

[0053] The second part: secure communication, after the key distribution process in the start-up phase is completed, each legal ECU in the network already has an encryption key and an authentication key, so that the messages during the normal driving of the vehicle can be encrypted, decrypted and authenticated operate;

[0054] In the first part, the gateway ECU distributes keys for the HECU, and the HECU represents any legal ECU in the network, su...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a vehicle-mounted Ethernet information security protection method, and belongs to an Ethernet information security protection method. The method comprises: key allocation, wherein the gateway ECU has a set of digital certificates including an identifier, a public key and a private key of each legal ECU in the network, and meanwhile, the gateway ECU has an encryption key EKand an authentication key AK required by communication, and in the starting stage, the gateway ECU allocates the encryption key and the authentication key to each legal ECU in the network in sequence; and safe communication, wherein after the key distribution process in the starting stage is completed, each legal ECU in the network already has an encryption key and an authentication key, and thenencryption, decryption and authentication operation can be conducted on messages in the normal running process of the vehicle. The method has the advantages that safe and stable protection measures are provided for the vehicle from the starting stage to the communication stage, beneficial conditions are provided for safe communication between ECUs, practicability is achieved, compared with an existing information safety protection method, the method has higher real-time performance, and the requirements of the vehicle-mounted Ethernet for real-time performance and safety can be met at the same time.

Description

technical field [0001] The invention relates to an Ethernet information security protection method, which is used to ensure the security and stability of the key distribution process in the start-up phase and the confidentiality, authenticity and freshness of messages in the communication phase. Background technique [0002] With the continuous development of science and technology, the emergence of smart cars has changed people's understanding of transportation tools and lifestyles. The development of in-vehicle information systems and the improvement of people's demand for vehicle functions make more and more electronic control units (ECUs) need to be used in cars. The required cost is getting higher and higher. At the same time, in-vehicle Ethernet is regarded as the future in-vehicle backbone network due to its advantages of high throughput, high bandwidth, high standardization, and low cost. Compared with traditional buses such as CAN and FlexRay, the data length that...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/32H04L29/08
CPCH04L9/0625H04L9/3263H04L67/12
Inventor 王楚婷秦贵和赵睿成一铭高天宇宋世民纪辰瑾赵俊法董晓慧师雅迪
Owner JILIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products