Networked vehicle remote upgrading system and method with anti-attack bidirectional authentication

A remote upgrade and two-way authentication technology, applied in the transmission system, digital transmission system, vehicle parts, etc., can solve the problems of property loss of car owners, poor network security, threats to the personal safety of car owners, etc., to prevent illegal theft and tampering, and prevent identity Counterfeiting, the effect of achieving reliability

Active Publication Date: 2020-03-17
CHENGDU UNIV OF INFORMATION TECH
View PDF11 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At the same time, since the Internet of Vehicles service platform communicates with vehicle-mounted terminal equipment in a public network environment, it is responsible for business operations such as vehicle control, sensitive information transmission, and vehicle remote upgrade systems. If there is no strong identification and access control technology to ensure information security, Attackers can easily realize remote control of vehicles, causing huge property losses to car owners, threatening the personal safety of car owners and even involving national security
[0004] To sum up, the existing problems in the prior art are: (1) In the prior art, there is no digital certificate system for TSP and connected vehicles to issue certificates, and identity proof cannot be given
[0005] (2) The two-way identity authentication between the connected car T-BOX and the car remote service provider TSP (Telematics Service Provider) cannot be realized, resulting in the inability to prevent identity forgery
[0006] (3) In the prior art, the network security of data transmission between T-BOX and TSP is poor, which cannot prevent the car upgrade software from being illegally stolen and tampered with during transmission
[0007] (4) In the prior art, TSP cannot prevent hackers from gaining access and changing the upgrade code
If the network security of connected vehicles cannot be guaranteed, it will definitely cause security concerns for connected vehicle users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Networked vehicle remote upgrading system and method with anti-attack bidirectional authentication
  • Networked vehicle remote upgrading system and method with anti-attack bidirectional authentication
  • Networked vehicle remote upgrading system and method with anti-attack bidirectional authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0071] In the prior art, it is impossible to realize the reliable authentication of the two-way identity between the connected car T-BOX and the car remote service provider TSP (Telematics Service Provider), resulting in the inability to prevent identity forgery. In the prior art, the reliability of data transmission between T-BOX and TSP is poor, and it cannot prevent the car upgrade software from being illegally stolen and tampered with during transmission.

[0072] Aiming at the problems existing in the prior art, the present invention provides a remote upgrade system and method for networked vehicles with two-way authen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of systematic safety of Internet of Vehicles, and discloses a networked vehicle remote upgrading system and method with anti-attack bidirectional authentication, a CA certificate system is used for performing identity authentication on a vehicle through a digital certificate in an Internet of Vehicles network, and supporting bidirectional authenticationbetween a TSP and a networked vehicle. A TSP system is used for supporting remote upgrading of vehicles. A T-BOX system is used for detecting the IP of the TSP during upgrading; wherein the IP is notthe IP of the TSP, and the data packet of the IP is discarded; and in a non-upgrading state, external communication is compared according to rules in the security rule base of the firewall, and rulesof the rule base are updated through TSP real-time operation. According to the invention, the reliability authentication of the bidirectional identity between the networked vehicle T-BOX and the vehicle remote service provider TSP is realized, and the identity counterfeiting is prevented; reliability of data transmission between the T-BOX and the TSP is achieved, and illegal stealing and tampering of automobile upgrading software in the transmission process are prevented.

Description

technical field [0001] The invention belongs to the technical field of systematic security of the Internet of Vehicles, and in particular relates to a remote upgrade system and method for Internet-connected vehicles with anti-attack bidirectional authentication. Background technique [0002] At present, the closest existing technology: At present, there are more than 100 kinds of control systems or ECUs (Electronic Control Units) in automobiles, and the total software codes of high-end models of automobiles have exceeded 100 million lines. At the same time as it is becoming more and more important, the information security issues caused by it have also begun to attract more and more people's attention. At the same time, more and more functions of the car need to be realized by software, and the probability of software loopholes will also increase. Performing software upgrades in a trusted remote upgrade method will hopefully simplify the upgrade process and avoid time-consu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/44H04W12/00H04W12/04H04W12/06H04L9/06G06F8/65H04W12/069H04W12/088H04W12/122
CPCH04W4/44H04W12/009H04L9/0643G06F8/65H04W12/03H04W12/0433H04W12/041H04W12/069
Inventor 李飞吴春旺章嘉彦李如翔李亚林宋佳琦
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products