Unlock instant, AI-driven research and patent intelligence for your innovation.

Message access method and system

An access method and message technology, applied in the field of communication security, can solve problems such as the lack of security design of the vehicle bus, the inability to meet the requirements of intelligent networked vehicles, and the injection of illegal information, so as to solve the hidden dangers of bus information security, improve security, and eliminate The effect of eavesdropping on information

Active Publication Date: 2021-08-17
NINGBO GEELY AUTOMOBILE RES & DEV CO LTD +1
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the traditional CAN (Controller Area Network, controller area network) bus cannot meet the needs of intelligent networked vehicles due to slow transmission speed and other reasons.
[0003] The above-mentioned CAN bus has security deficiencies. In recent years, news reports about hacking cars have often appeared in the newspapers. The main reason is that the existing vehicle bus lacks security design, so that any user and program can Inject illegal information on the bus, and can sniff information of interest on the bus

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message access method and system
  • Message access method and system
  • Message access method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] Various exemplary embodiments, features, and aspects of the present disclosure will be described in detail below with reference to the accompanying drawings. The same reference numbers in the figures indicate functionally identical or similar elements. While various aspects of the embodiments are shown in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.

[0051] The word "exemplary" is used exclusively herein to mean "serving as an example, embodiment, or illustration." Any embodiment described herein as "exemplary" is not necessarily to be construed as superior or better than other embodiments.

[0052] In addition, in order to better illustrate the present disclosure, numerous specific details are given in the following specific implementation manners. It will be understood by those skilled in the art that the present disclosure may be practiced without some of the specific details. In some instances, methods, means, componen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a message access method and system. The method comprises the following steps: an authentication client sends an authentication request to a bus access authentication server; the bus access authentication server performs identity authentication according to the authentication request; if the authentication is passed, the bus access authentication server sends authentication passing information to the authentication client; the bus access authentication server sends a request message or an identity confirmation message to a message bus system according to the identity information; and the message bus system receives the request message or the identity confirmation message, and performs resource allocation and multicast address allocation for the authentication client, or updates a multicast security policy for the authentication client. The authentication process is triggered when the authentication client needs to publish the theme message or need to receive the multicast message, so that malicious information is prevented from being injected into the bus from the source, information eavesdropping on the bus is avoided, and the security of in-vehicle message transmission is remarkably improved.

Description

technical field [0001] The present disclosure relates to the field of communication security, in particular to a message access method and system. Background technique [0002] The research and development of intelligent connected vehicles is the current focus of the industry. The emergence of intelligent networked vehicles has made the on-board electronic systems increasingly complex. Cars with advanced driver assistance systems (ADAS, Advanced Driver Assistance System), automatic driving, infotainment and other functions are equipped with more and more electronic devices, such as cameras, Millimeter wave radar, lidar, etc. A large amount of data generated by these devices needs to be transmitted to the processing unit in the vehicle in a timely manner, which places high demands on the bus bandwidth. However, the traditional CAN (Controller Area Network, Controller Area Network) bus cannot meet the needs of intelligent networked vehicles due to slow transmission speed and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L63/1466H04L67/12
Inventor 王澄
Owner NINGBO GEELY AUTOMOBILE RES & DEV CO LTD