Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Vehicle information security threat assessment method and device, medium and electronic equipment

A technology for vehicle information and information security, applied in the field of intelligent networked vehicle information security, can solve problems such as the inability to consider vehicle information security and functional security threats as a whole, and the inability to avoid boundary problems, and achieve the effect of improving accuracy.

Active Publication Date: 2021-07-02
CHINA FIRST AUTOMOBILE
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The STRIDE method is used to establish a vehicle security threat assessment model, which only considers functional safety issues, cannot avoid boundary issues, and cannot consider vehicle information security and functional security threats as a whole

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vehicle information security threat assessment method and device, medium and electronic equipment
  • Vehicle information security threat assessment method and device, medium and electronic equipment
  • Vehicle information security threat assessment method and device, medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] figure 1 It is a flow chart of the vehicle information security threat assessment method provided in Embodiment 1 of this application. This embodiment is applicable to the situation of evaluating vehicle information security threats. This method can be implemented by the vehicle information security threat assessment device provided by this application embodiment. Execution, the device can be implemented by software and / or hardware, and can be integrated into devices such as smart terminals used for security threat assessment.

[0024] Such as figure 1 As shown, the vehicle information security threat assessment method includes:

[0025] S110. Determine functional safety goals and information security goals according to vehicle related item definitions and application scenarios; wherein, the related item definitions are composed of at least one system in the vehicle, which can realize or partially realize the functions of the entire vehicle.

[0026] Among them, in th...

Embodiment 2

[0077] figure 2 It is a schematic structural diagram of the vehicle information security threat assessment device provided in Embodiment 2 of the present application, as shown in figure 2 As shown, the vehicle information security threat assessment device includes:

[0078] Target determination module 210, configured to determine functional safety targets and information security targets according to vehicle related item definitions and application scenarios; wherein, the related item definition is composed of at least one system in the vehicle, which can realize or partially realize the whole vehicle function;

[0079] An attack tree model determination module 220, configured to determine an attack tree model by using the functional safety target and the information security target;

[0080] The vehicle information security threat obtaining module 230 is used to attack the attack tree model through an attack method to obtain the vehicle information security threat.

[00...

Embodiment 3

[0100] The embodiment of the present application also provides a medium containing computer-executable instructions, the computer-executable instructions are used to execute a vehicle information security threat assessment method when executed by a computer processor, the method comprising:

[0101] Determine functional safety goals and information security goals according to the definition of related items and application scenarios of the vehicle; wherein, the definition of related items is composed of at least one system in the vehicle, which can realize or partially realize the functions of the entire vehicle;

[0102] determining an attack tree model using the functional safety goals and information security goals;

[0103] The attack tree model is attacked by an attack method to obtain vehicle information security threats.

[0104] medium - any of various types of memory or storage devices. The term "media" is intended to include: installation media, such as CD-ROM, flop...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a vehicle information security threat assessment method and device, a medium and electronic equipment. The method comprises the following steps: determining a function safety target and an information safety target according to related item definitions and application scenes of a vehicle, wherein the definition of the related items is composed of at least one system in the vehicle, and the functions of the whole vehicle can be achieved or partially achieved; determining an attack tree model by using the function security target and the information security target; and attacking the attack tree model through an attack method to obtain a vehicle information security threat. According to the technical scheme, the information security technology and the function security technology can be fused, the vehicle risk is assessed based on the multi-dimensional attack method, and the accuracy of vehicle security threat assessment is improved.

Description

technical field [0001] The embodiments of the present application relate to the technical field of intelligent networked vehicle information security, and in particular to a vehicle information security threat assessment method, device, medium, and electronic equipment. Background technique [0002] With the rapid development of the market economy, people's living standards are constantly improving. At the same time, the number of vehicles is also increasing year by year. However, due to frequent traffic accidents, it has caused great casualties and economic losses. Therefore, the safe operation of vehicles is very important. [0003] In the development of intelligent networked vehicle information security, in order to determine the risk level of the whole vehicle, the vehicle security threat assessment model is established by combining the STRIDE method to evaluate the vehicle security threat. [0004] The STRIDE method is used to establish a vehicle security threat asses...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F30/15G06F30/20
CPCG06F30/15G06F30/20Y02T10/40
Inventor 刘毅李木犀宁矣许传斌吴淼陈明高铭霞
Owner CHINA FIRST AUTOMOBILE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products