Method and system for safely accessing after-loading equipment into vehicle electronic system

A technology for secure access and electronic systems, applied in the field of information security of vehicle electronic systems, can solve problems such as poor security, failure to consider other third-party after-installation equipment usage scenarios, security threats, etc., to improve security and stability , Protect timeliness and safety, and avoid potential safety hazards

Pending Publication Date: 2022-07-29
GUANGZHOU AUTOMOBILE GROUP CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] First of all, the existing technical solutions are almost all used for diagnostic equipment, without considering the use scenarios of other third-party after-installation equipment
[0006] In addition, the first scheme is less secure because the password may be leaked. Once the password is obtained, anyone can develop a device that can be connected to the vehicle.
The second scheme does not use domestic cryptographic algorithms, and the core module is less autonomous and controllable
The third scheme cannot classify the access device's authority level, and cannot limit the access device's authority
In the third solution, since the decryption method used for the identity authentication module is built into the external device, and any external device shares the same set of decryption algorithms, once it is deciphered, it will cause a great security threat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for safely accessing after-loading equipment into vehicle electronic system
  • Method and system for safely accessing after-loading equipment into vehicle electronic system
  • Method and system for safely accessing after-loading equipment into vehicle electronic system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings.

[0051] like figure 1 As shown, a schematic diagram of the main flow of an embodiment of a method for securely connecting an aftermarket device to a vehicle electronic system provided by the present invention is shown. In this embodiment, the method for safely connecting the after-installed equipment to the vehicle electronic system includes the following steps:

[0052] Step S10, after the post-installed device is connected to the OBD interface, the encrypted information including the device ID and its pre-stored security certificate is sent to the vehicle-mounted gateway via the OBD interface, wherein the encryption adopts a domestic cryptographic algorithm, and the OBD interface is connected to the vehicle-mounted gateway. The in-vehicle gateway establishes ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for safely accessing an after-loading device to a vehicle electronic system, which comprises the following steps: step S10, after the after-loading device is accessed to an OBD (On-Board Diagnostic) interface, sending encrypted information containing a device ID (Identity) and a pre-stored security certificate of the device to a vehicle-mounted gateway; step S11, the vehicle-mounted gateway initiates an authentication request to a cloud certificate management system according to the received encrypted content; step S12, after receiving the authentication request, the cloud certificate management system decrypts the equipment ID and the security certificate carried in the authentication request; step S13, the cloud certificate management system performs validity and validity verification processing on the device ID and the security certificate, and responds to the vehicle-mounted gateway; and step S14, the vehicle-mounted gateway carries out corresponding processing on the access request of the after-loading equipment according to the response result. The invention further discloses a corresponding system. According to the invention, the security of communication between the after-loading equipment and the vehicle electronic system can be improved.

Description

technical field [0001] The present invention relates to the technical field of information security of vehicle electronic systems, in particular to a method and system for safely accessing a vehicle electronic system by rear-mounted equipment. Background technique [0002] Automotive after-installation equipment is usually developed and sold by third-party product development companies, and is connected to the electronic system of the car through the standard interface provided by the car. On the one hand, it can provide users with customized functions beyond the design of the car manufacturer; Collect vehicle operation data to achieve their own application purposes. Although these after-installed devices provide convenience for users, etc., the quality of after-installed devices is uneven, which is difficult to monitor and supervise. Instead, it is easy to cause car failures or leakage of key data of cars and users. [0003] In particular, identity verification is required...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G05B23/02
CPCG05B23/0213G05B2219/24065
Inventor 石笑生张雄张金池顾吉杰黎国荣
Owner GUANGZHOU AUTOMOBILE GROUP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products