Unlock instant, AI-driven research and patent intelligence for your innovation.

Security processing method and computer

A security processing and computer technology, applied in the security processing and computer fields, can solve problems such as abnormal control of cars

Active Publication Date: 2021-02-12
PANASONIC INTELLECTUAL PROPERTY CORP OF AMERICA
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] There is a possibility that an abnormal node may be changed by connecting an abnormal (illegal) node to the CAN bus, or attacking an ECU having a communication function with a portable information terminal, a communication device outside a vehicle, etc. The CAN bus sends attack frames to control the car abnormally

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security processing method and computer
  • Security processing method and computer
  • Security processing method and computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0071] Hereinafter, an in-vehicle network management system including a plurality of vehicles and a server (abnormality detection server) equipped with an in-vehicle network (in-vehicle network system) for a plurality of electronic control units (ECUs) to communicate via a CAN bus, and as a vehicle-mounted The security processing method of the security technology used in the network management system is described. The security processing method is the following method: in order to be able to appropriately respond to the case where the frame on the CAN bus used for communication between the ECUs mounted on the vehicle is suspected to be an attack frame, etc., for the in-vehicle network of the vehicle, the frame to estimate the degree of abnormality, etc. The estimation of the degree of abnormality is useful for flexibly taking security countermeasures (warning notification, defense, etc.) for abnormal frames. The attack frame is a frame sent to the CAN bus by an abnormal attac...

Embodiment approach 2

[0172] In Embodiment 1, when the abnormality detection server 80 detects that the frame received by the in-vehicle network of a certain vehicle is abnormal, the content of the transmission information to be transmitted to the vehicle is mainly for the control of displaying a warning notification, driving of the vehicle, etc. Indicated control messages are described. In this embodiment, an example will be described in which the content of the information for transmission is information for error detection for detecting an error related to a frame on the vehicle side. The structure of the vehicle-mounted network management system shown in this embodiment is the same as that of the vehicle-mounted network management system shown in Embodiment 1 (see figure 2 )same.

[0173] [2.1 Abnormality detection server distributing information for abnormality detection]

[0174] The abnormality detection server 80, which is not particularly shown here, has the configuration shown in Embod...

Embodiment approach 3

[0188] In this embodiment, an example will be described in which the anomaly detection server 80 transmits a key to the vehicle in response to detection of an anomaly in a frame specified so as to protect the data by applying an encryption processing technology (encryption or MAC assignment) to transmit the data. An update request (transmission information including control information for instructing an update of the encryption key used when the encryption processing technology is applied to the vehicle). The structure of the vehicle-mounted network management system shown in this embodiment is the same as that of the vehicle-mounted network management system shown in Embodiment 1 (see figure 2 )same.

[0189] [3.1 Anomaly detection server]

[0190] The abnormality detection server 80 has the configuration shown in the first embodiment (refer to Figure 4 ).

[0191] The abnormality detection server 80 estimates the degree of abnormality of a frame received at an in-vehic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present disclosure relates to a security processing method and a computer, the security processing method being for coping with an abnormal frame transmitted in an in-vehicle network of a vehicle,the in-vehicle network being a network inside the vehicle for a plurality of electronic control units mounted on the vehicle to perform frame-related communication. The security processing method includes: an estimation step of estimating an abnormality degree of a frame received in the in-vehicle network of one vehicle based on information about a plurality of frames received in the in-vehicle network of the one or more vehicles; and a determination step for determining, on the basis of the estimated abnormality degree, a vehicle to be warned that has a predetermined relationship with the one vehicle.

Description

[0001] This application is a divisional application of a Chinese patent application with an application date of November 29, 2016, an application number of 201680050843.X, and an invention title of "Security Processing Method and Server". technical field [0002] The present disclosure relates to a security technology for detection, countermeasures, and the like of an attack frame that may be transmitted in an in-vehicle network through which an electronic control unit mounted on a vehicle communicates. Background technique [0003] In recent years, many devices called electronic control units (ECU: Electronic Control Unit) are arranged in systems in automobiles. The network connecting these ECUs is called the in-vehicle network. Various standards exist for in-vehicle networking. As one of the most mainstream in-vehicle networks, there is a CAN (Controller Area Network: Controller Area Network) standard specified by ISO11898-1. [0004] In CAN, the communication path is a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/40H04W4/44
CPCH04L12/40006H04L63/1416H04L63/1425H04L63/1441H04L67/12H04L2012/40215H04L2012/40273H04W4/44H04W4/08H04L12/2836H04L12/40H04W4/40G07C5/0808
Inventor 芳贺智之松岛秀树前田学氏家良浩岸川刚鹤见淳一安斋润
Owner PANASONIC INTELLECTUAL PROPERTY CORP OF AMERICA