Unlock instant, AI-driven research and patent intelligence for your innovation.

An Authorization Method Based on CAN Communication Encryption

A CAN communication and authorization code technology, applied in the field of authorization based on CAN communication encryption, can solve the problems of increased operating load, more bus resources, and increased production costs, so as to improve accuracy and reliability, make it difficult to crack, and improve security. sexual effect

Active Publication Date: 2021-08-13
CANNY ELEVATOR
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The existing elevator communication control includes multiple node devices, each node device obtains the signal input of each part of the system and is responsible for signal output and other functions. If these data are transmitted on the bus in a clear way, they are vulnerable to malicious attacks , causing the system to fail to operate normally, and it is also easy to be monitored and cracked to illegally copy the node device. In order to protect the system security and the intellectual property rights of the manufacturer, it is particularly urgent to use encryption authorization
[0003] At present, the commonly used CAN communication encryption methods mainly include software encryption, hardware encryption, and combination of software and hardware encryption. The method involving hardware encryption will greatly increase the production cost and cannot adapt to the equipment that has been shipped without encryption hardware. At the same time, the production cost Higher, such as application number CN201810089531.0; and pure software encryption does not have the above problems. At present, most of the pure software encryption methods use multiple sets of encryption schemes preset inside the controller (MCU) (such as application number CN201710075183.7), However, this method has the following disadvantages: (1) the number of multiple schemes involved in this method is limited, and it is impossible to truly realize one key for one machine, and the encryption method is relatively fixed; (2) this method refers to the factory A set of encryption schemes is preset at the time, and if the node equipment is replaced later, the node equipment will be encrypted with another scheme, and each equipment needs two schemes to decrypt the received data, and the system overhead is relatively large; (3) This method adopts the The basic algorithm for reordering data frames is encrypted, and the sorting method of data frames needs to be obtained when decrypting. This method is not suitable for large-scale data transmission and takes up more bus resources.
In summary, this method is slightly insufficient in terms of encryption randomness and greatly increases the operating load of the MCU and takes up large storage resources, and the comprehensive income is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Authorization Method Based on CAN Communication Encryption
  • An Authorization Method Based on CAN Communication Encryption
  • An Authorization Method Based on CAN Communication Encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0035] Such as Figure 1 to Figure 4 Shown, the present invention is a kind of authorization method based on CAN communication encryption, comprises the following steps:

[0036] Step A: The master device generates a 16-byte random sequence code and broadcasts it to each node device. At the same time, after the master device is connected and paired with the communication device, it generates an 8-byte first authorized random code according to the 16-byte random sequence code. The master device will The random authorization code and the barcode of the master device are transmitted to the node device, and the node device sends its ID to the master device to complete the information exchange;

[0037] Step B: The main device looks up the codebook according to the first authorized random code as an index, obtains the second authorized random code,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authorization method based on CAN communication encryption, comprising the following steps: a master device generates a random sequence code and broadcasts it to each node device, and at the same time, the master device is paired with a communication device to generate a first authorized random code and complete information exchange; and then The main device obtains the first authorization code according to the first authorized random code, the communication device ID, the main device barcode and the password book; at the same time, the communication device transmits its ID, the main device barcode and the first authorized random code to the cloud platform, and the cloud platform calculates The second authorization code, by comparing whether the two authorization codes are consistent, if they are consistent, encryption is allowed; then the master device authorizes and verifies the node device, and uses the random sequence code and the first authorization code to obtain the downlink encryption key to encrypt the data , the node device reversely decrypts and reads the information; the node device combines the regularly updated 32-bit random data and the basic key to form an uplink encryption key to encrypt the uplink information, and the master device receives and reversely decrypts and reads the information.

Description

technical field [0001] The invention belongs to the technical field of information communication encryption, and in particular relates to an authorization method based on CAN communication encryption. Background technique [0002] The existing elevator communication control includes multiple node devices, each node device obtains the signal input of each part of the system and is responsible for signal output and other functions. If these data are transmitted on the bus in a clear way, they are vulnerable to malicious attacks , causing the system to fail to operate normally, and it is also easy to be monitored and cracked to illegally copy the node device. In order to protect the system security and the intellectual property rights of the manufacturer, it is particularly urgent to use encryption authorization. [0003] At present, the commonly used CAN communication encryption methods mainly include software encryption, hardware encryption, and combination of software and ha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/14H04L12/40
CPCH04L9/0869H04L9/14H04L12/40H04L63/0428H04L63/12H04L2012/40215
Inventor 顾信鹏黄维纲陈羽波许晨
Owner CANNY ELEVATOR