Vehicle-mounted terminal information security threat analysis and risk assessment system and method

A vehicle-mounted terminal and risk assessment technology, applied in the field of vehicle-mounted information, can solve problems such as complex data flow diagrams, repeatability, and poor consistency

Pending Publication Date: 2020-11-24
HUIZHOU DESAY SV INTELLIGENT TRANSPORTATION TECH INST CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Compared with EVITA, HEAVENS is more complete, more mature, and more applicable. It is a security model widely used in the industry. However, in the threat analysis link, the STRIDE method is usually used to analyze threats. When the system is more complex or there are many scenarios, It will cause the d

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vehicle-mounted terminal information security threat analysis and risk assessment system and method
  • Vehicle-mounted terminal information security threat analysis and risk assessment system and method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0023] A vehicle-mounted terminal information security threat analysis and risk assessment system and method of the present invention will be further described in detail below in conjunction with specific embodiments and accompanying drawings.

[0024] like figure 1 As shown, it is a vehicle-mounted terminal information security threat analysis and risk assessment system provided by the present invention, which specifically includes an information input module, a data processing center and a security requirement module; wherein,

[0025] The information input module is used to obtain vehicle terminal information, including an information input interface, or an information call interface; preferably, the information input interface is used to directly input vehicle terminal information, or import vehicle terminal information by creating a list.

[0026] The data processing center includes a threat analysis and risk assessment module, a threat library, a demand library, a report...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a vehicle-mounted terminal information security threat analysis and risk assessment system and method. Information is input through the information input module; an assessment report of vehicle-mounted terminal information security threat analysis and risk assessment completed by the system can be directly obtained; the safety, effectiveness and reliability of the vehicle-mounted terminal information are greatly improved; furthermore, a database is arranged; the method is used for determining the type of a vehicle-mounted terminal according to the new vehicle-mounted terminal type in the vehicle-mounted industry. The vehicle-mounted terminal is provided with an internal assembly and an external interface, and assets needing to be protected by the vehicle-mounted terminal and conventional threats of the assets, the database is updated in real time, a corresponding threat library and a demand library are constructed based on the real-time data, automatic executionof threat analysis and risk assessment of the system is realized, accuracy and consistency of results are effectively improved, and meanwhile, a data flow diagram used in STRIDE is changed into analysis based on internal components and external interfaces of the system, so that drawing of tedious data flow diagrams is effectively avoided, and human resource investment is reduced.

Description

technical field [0001] The invention relates to the technical field of vehicle information, in particular to a system and method for threat analysis and risk assessment of vehicle terminal information security. Background technique [0002] With the rapid development of intelligent networked vehicles, automotive information security incidents are emerging one after another, and the information security of intelligent networked vehicles has attracted more and more attention from the industry. To achieve information security for a vehicle, it needs to be realized through the vehicle-mounted terminal, which is a component of the vehicle. For the vehicle-mounted terminal to achieve information security, threat analysis and risk assessment of the vehicle-mounted terminal system is a very important link. Threat analysis and risk assessment is an analytical technique applied at the concept stage to help identify potential information security threats in a system and assess the risk...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q10/06G06F16/2455G06F16/248
CPCG06Q10/0635G06Q10/0639G06F16/2455G06F16/248
Inventor 张裁会陈志鑫
Owner HUIZHOU DESAY SV INTELLIGENT TRANSPORTATION TECH INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products