Safe access method and system for ECU in vehicle and storage medium

A technology of safe access and number of visits, which is applied in the field of vehicle information security, can solve problems such as hidden security loopholes, and achieve the effect of ensuring integrity, access mechanism security, and solving hidden security loopholes

Active Publication Date: 2021-03-12
WEICHAI POWER CO LTD
View PDF10 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present invention proposes a method, system and storage medium for secure access to an ECU in a vehicle, aiming to solve the problem of potential security loopholes existing in the existing ECU security access strategy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe access method and system for ECU in vehicle and storage medium
  • Safe access method and system for ECU in vehicle and storage medium
  • Safe access method and system for ECU in vehicle and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] figure 1 A schematic diagram of steps of a method for securely accessing an in-vehicle ECU according to an embodiment of the present application is shown in .

[0059] like figure 1 As shown, the secure access method for the ECU in the vehicle according to the embodiment of the present application specifically includes the following steps:

[0060] S101: Receive the Nth request instruction of the key seed sent by the host computer; N is an integer greater than or equal to 1.

[0061] S102: Generate a set of random numbers by a real random number generator, combine the random numbers with the number of visits during visits as a key seed, and send it to the host computer.

[0062] S103: Receive the first message authentication code obtained by the host computer according to the key seed.

[0063] Specifically, the upper computer message authentication code module extracts the corresponding first key in the upper computer key array according to the key seed, and obtains...

Embodiment 2

[0110] This embodiment provides a security access system for in-vehicle ECU. For details not disclosed in the security access system for in-vehicle ECU in this embodiment, please refer to the security access system for in-vehicle ECU in other embodiments. The specific implementation content of the security access method.

[0111] Figure 5 A schematic structural diagram of a secure access system for an ECU in a vehicle according to an embodiment of the present application is shown in .

[0112] like Figure 5 As shown, the secure access system for the ECU in the vehicle according to the embodiment of the present application specifically includes a host computer access instruction module 10, an ECU hardware encryption module 20, a host computer message authentication code module 30, an ECU message authentication code module 40, and an ECU access Judgment module 50 .

[0113] specific,

[0114] Host computer access command module 10: for sending key seed request command.

...

Embodiment 3

[0139]This embodiment provides a security access device for an in-vehicle ECU. For details not disclosed in the security access device for an in-vehicle ECU in this embodiment, please refer to the security access device for an in-vehicle ECU in other embodiments. The specific implementation content of the security access method or system.

[0140] Image 6 A schematic structural diagram of a security access device 400 for an in-vehicle ECU according to an embodiment of the present application is shown in .

[0141] like Image 6 As shown, a security access device 400 for an ECU in a vehicle includes:

[0142] Memory 402: for storing executable instructions; and

[0143] Processor 401: used to connect with memory 402 to execute executable instructions so as to complete the motion vector prediction method.

[0144] Those skilled in the art can understand that the Image 6 It is only an example of the security access device 400 for the ECU in the vehicle, and does not consti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safety access method and system for an in-vehicle ECU and a storage medium. The safety access method comprises the steps of receiving an Nth request instruction, sent by an upper computer, of a key seed; generating a group of random numbers through a real random number generator, taking the random numbers as key seeds in combination with the access times during access, andsending the key seeds to an upper computer; receiving a first message authentication code obtained by the upper computer according to the key seed; obtaining a second message authentication code according to the key seed; and comparing the first message authentication code with the second message authentication code, and if the two message authentication codes are consistent, judging that the access is passed. The upper computer and the ECU are respectively based on the real random number, the number of times of access is combined with the real random number to serve as a key seed, and then authentication comparison is carried out on the obtained two message authentication codes, so that an access mechanism is safer, and the integrity, timeliness and authenticity of a communication accessmechanism of the ECU and other equipment are guaranteed. The problem that potential safety loopholes exist in an existing ECU safety access strategy is solved.

Description

technical field [0001] The present application belongs to the technical field of vehicle information security, and in particular relates to a method, system and storage medium for secure access to an ECU in a vehicle. Background technique [0002] With the rapid development of network technology, more and more network security issues have emerged in the automotive industry, for example, illegal tampering with the electronic control unit ECU (Electronic Control Unit) in the vehicle through the OBD (On Board Diagnostics) interface. The seed-key algorithm used in traditional ECU security access is prone to hidden dangers of brute force collision and cracking. Hackers can crack the security algorithm by monitoring samples and statistical characteristics, and then tamper with and attack the ECU in the car. [0003] At present, the traditional in-vehicle ECU security access algorithm is based on the ISO14229-27 service requirements. Although hackers cannot obtain the seed-key algo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45G06F21/62G06F21/64
CPCG06F21/45G06F21/6209G06F21/64
Inventor 丛聪孙潇史家涛
Owner WEICHAI POWER CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products