Security processing method and computer
A security processing and computer technology, applied in the security processing and computer fields, can solve problems such as abnormal control of cars
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach 1
[0071] Hereinafter, an in-vehicle network management system including a plurality of vehicles and a server (abnormality detection server) equipped with an in-vehicle network (in-vehicle network system) for a plurality of electronic control units (ECUs) to communicate via a CAN bus, and as a vehicle-mounted The security processing method of the security technology used in the network management system is described. The security processing method is the following method: in order to be able to appropriately respond to the case where the frame on the CAN bus used for communication between the ECUs mounted on the vehicle is suspected to be an attack frame, etc., for the in-vehicle network of the vehicle, the frame to estimate the degree of abnormality, etc. The estimation of the degree of abnormality is useful for flexibly taking security countermeasures (warning notification, defense, etc.) for abnormal frames. The attack frame is a frame sent to the CAN bus by an abnormal attac...
Embodiment approach 2
[0172] In Embodiment 1, when the abnormality detection server 80 detects that the frame received by the in-vehicle network of a certain vehicle is abnormal, the content of the transmission information to be transmitted to the vehicle is mainly for the control of displaying a warning notification, driving of the vehicle, etc. Indicated control messages are described. In this embodiment, an example will be described in which the content of the information for transmission is information for error detection for detecting an error related to a frame on the vehicle side. The structure of the vehicle-mounted network management system shown in this embodiment is the same as that of the vehicle-mounted network management system shown in Embodiment 1 (see figure 2 )same.
[0173] [2.1 Abnormality detection server distributing information for abnormality detection]
[0174] The abnormality detection server 80, which is not particularly shown here, has the configuration shown in Embod...
Embodiment approach 3
[0188] In this embodiment, an example will be described in which the anomaly detection server 80 transmits a key to the vehicle in response to detection of an anomaly in a frame specified so as to protect the data by applying an encryption processing technology (encryption or MAC assignment) to transmit the data. An update request (transmission information including control information for instructing an update of the encryption key used when the encryption processing technology is applied to the vehicle). The structure of the vehicle-mounted network management system shown in this embodiment is the same as that of the vehicle-mounted network management system shown in Embodiment 1 (see figure 2 )same.
[0189] [3.1 Anomaly detection server]
[0190] The abnormality detection server 80 has the configuration shown in the first embodiment (refer to Figure 4 ).
[0191] The abnormality detection server 80 estimates the degree of abnormality of a frame received at an in-vehic...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


