Vehicle-mounted network security protection system and application method thereof
A vehicle-mounted network and protection system technology, which is applied in the field of vehicle-mounted network information security protection systems of intelligent networked vehicles, can solve the problems of low adaptability, counterfeit communication nodes, and failure of vehicle-mounted network information security protection to form a systematic and comprehensive network information security problems such as methods and systems to achieve the effect of reducing the difficulty of implementation and realizing unified management
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0037] This embodiment aims to provide a system for network information security protection on an embedded system, the system has a security engine module, an application program interface module, an authentication module, a secure communication module, a data encryption module, an attack protection module, Intrusion detection module, log system module.
[0038] The security engine module is the dispatching center of the vehicle-mounted network information security protection system. By taking over the vehicle-mounted network communication protocol stack, the processing flow and management rule set of the vehicle-mounted network message are established; the vehicle-mounted network communication protocol stack includes the vehicle-mounted Ethernet communication protocol stack and a vehicle-mounted CAN bus communication protocol stack; the processing flow and management rule set include a packet filtering mechanism, a redirection mechanism, a hook mechanism, and a callback mechan...
Embodiment 2
[0041] On the basis of the first embodiment, this embodiment provides a method for using the network information security protection system.
[0042] Step 1: Extract common technical features for the automotive embedded system environment and communication services, and identify security risks;
[0043] Step 2: Establish a lightweight security engine architecture adapted to the heterogeneous network of automotive embedded systems;
[0044] Step 3: Provide security services such as data encryption and decryption, certificate and secret key management for automotive communication services;
[0045] Step 4: Establish a security audit coordination mechanism;
[0046] Step 5: Establish and update the log system and security policy library.
[0047] In this embodiment, step 1 and step 2 are the steps of establishing a security engine module to identify and process abnormal behaviors to protect the safety of the vehicle network, and steps 3 to 5 are steps to establish a security po...
Embodiment 3
[0049] This embodiment is made on the basis of the second embodiment, wherein the further preferred subdivision of step 2 is:
[0050] Step 1: Extract common technical features for the automotive embedded system environment and communication services, and identify security risks;
[0051] Step 2: Establish a lightweight security engine architecture adapted to the heterogeneous network of automotive embedded systems;
[0052] Step 211: Take over the vehicle Ethernet communication protocol stack;
[0053] Step 212: Real-time mapping and redundant backup of network messages;
[0054] Step 213: Transmission encryption of the vehicle network transport layer communication protocol;
[0055] Step 214: Identify abnormal traffic and abnormal behavior based on protocol standards and security rule sets;
[0056] Step 215: Match and take effect the attack protection strategy;
[0057] Step 3: Provide security services such as data encryption and decryption, certificate and secret key ma...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com