CN104134047B - Realize ECU safety access method, ECU and host computer - Google Patents

Realize ECU safety access method, ECU and host computer Download PDF

Info

Publication number
CN104134047B
CN104134047B CN201410309182.0A CN201410309182A CN104134047B CN 104134047 B CN104134047 B CN 104134047B CN 201410309182 A CN201410309182 A CN 201410309182A CN 104134047 B CN104134047 B CN 104134047B
Authority
CN
China
Prior art keywords
values
ecu
host computer
random number
link variable
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410309182.0A
Other languages
Chinese (zh)
Other versions
CN104134047A (en
Inventor
王欣伟
王冰
张坤明
艾聪
张国梁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Weichai Power Co Ltd
Original Assignee
Weichai Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Weichai Power Co Ltd filed Critical Weichai Power Co Ltd
Priority to CN201410309182.0A priority Critical patent/CN104134047B/en
Publication of CN104134047A publication Critical patent/CN104134047A/en
Application granted granted Critical
Publication of CN104134047B publication Critical patent/CN104134047B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems

Abstract

This application provides the safety access method, ECU and host computer for realizing ECU, a kind of method is applied on ECU, and this method includes:Security access request in response to receiving host computer, generate random number and be sent to the host computer;The first MD5 values are calculated according to the shift parameters of the random number and the link variable pre-set, and by the first MD5 values compared with the 2nd MD5 values that the host computer returns;Safe access control is carried out according to comparative result.In this application, introduce shift parameters, the link variable in MD5 algorithms is shifted using the shift parameters, so that MD5 algorithms are more flexible, simultaneously, had secure access to because being realized using improved MD5 algorithms, also make it that access of the host computer to ECU is safer, and improve flexibility and the controllability of ECU secure access.

Description

Realize ECU safety access method, ECU and host computer
Technical field
The application is related to network data processing field, more particularly to realizes ECU safety access method, ECU and host computer.
Background technology
ECU (electronic control unit, Electronic Contol Unit), also known as " car running computer ", " vehicle-mounted computer " etc.. ECU as common computer, by microprocessor (CPU), memory (ROM, RAM), input output interface (I/O), modulus turn The large scale integrated circuit such as parallel operation (A/D) and shaping, driving forms.Also the secure access therefore for ECU just seems to pass It is important, and prior art and a kind of scheme that can effectively control the secure access to ECU is not present.
The content of the invention
Technical problems to be solved in this application are to provide a kind of safety access method for realizing ECU, existing to solve The technical problem being had secure access to ECU can not be realized in technology, so as to improve the security of ECU access.
Present invention also provides a kind of ECU and host computer, to ensure the realization and application of the above method in practice.
In order to solve the above problems, this application discloses a kind of safety access method for realizing ECU, this method is applied to On ECU, including:
Security access request in response to receiving host computer, generate random number and be sent to the host computer;
The first MD5 values are calculated according to the shift parameters of the random number and the link variable pre-set, and by described in First MD5 values are compared with the 2nd MD5 values that the host computer returns;
Safe access control is carried out according to comparative result.
Optionally, it is described that safe access control is carried out according to comparative result, including:
Judge whether the first MD5 values and the 2nd MD5 values are equal, if it is, the peace by the host computer Full access request, if it is not, then refusing the security access request of the host computer.
Optionally, it is described to calculate the first MD5 according to the random number and the shift parameters of link variable pre-set Value, including:
The random number is defined as to the input parameter of MD5 algorithms;
The shift parameters are rounded to 32, with the digit shifted;
By bit described in the link variable ring shift left in the MD5 algorithms;
The first MD5 values are calculated using the link variable after the input parameter and displacement.
This application discloses a kind of ECU, including:
Generation unit, for the security access request in response to receiving host computer, generate random number and be sent on described Position machine;
First computing unit, for calculating the according to the random number and the shift parameters of link variable pre-set One MD5 values;
Comparing unit, for by the first MD5 values compared with the 2nd MD5 values that the host computer returns;
Safe access control unit, for carrying out safe access control according to comparative result.
Optionally, the safe access control unit includes:
Judge module, for judging whether the first MD5 values and the 2nd MD5 values are equal;
First control module, in the case of being in the result of the judge module, pass through the peace of the host computer Full access request;
Second control module, in the case of being no in the result of the judge module, refuse the peace of the host computer Full access request.
Optionally, first computing unit includes:
First determining module, for the random number to be defined as to the input parameter of MD5 algorithms;
First floor module, for the shift parameters to be rounded to 32, with the digit shifted;
First shift module, for by bit described in the link variable ring shift left in the MD5 algorithms;
First computing module, for calculating the first MD5 using the link variable after the input parameter and displacement Value.
Disclosed herein as well is the safety access method that another kind realizes ECU, this method is applied in host computer, including:
Security access request is sent to ECU;
Receive the random number that the ECU returns in response to security access request;
The 2nd MD5 values are calculated according to the shift parameters of the random number and the link variable pre-set, and by described in 2nd MD5 values are sent to the ECU, so that the ECU is carried out according to the comparative result of the first MD5 values and the 2nd MD5 values Safe access control.
Optionally, it is described to calculate the 2nd MD5 according to the random number and the shift parameters of link variable pre-set Value, including:
The random number is defined as to the input parameter of MD5 algorithms;
The shift parameters are rounded to 32, with the digit shifted;
By bit described in the link variable ring shift left in the MD5 algorithms;
The 2nd MD5 values are calculated using the link variable after the input parameter and displacement.
Disclosed herein as well is a kind of host computer, including:
Request unit is sent, for sending security access request to ECU;
Receiving unit, the random number returned for receiving the ECU in response to security access request;
Second computing unit, for calculating the according to the random number and the shift parameters of link variable pre-set Two MD5 values;
MD5 value cells are sent, for the 2nd MD5 values to be sent into the ECU, so that the ECU is according to described the The comparative result of one MD5 values and the 2nd MD5 values carries out safe access control.
Optionally, second computing unit includes:
Second determining module, for the random number to be defined as to the input parameter of MD5 algorithms;
Second floor module, for the shift parameters to be rounded to 32, with the digit shifted;
Second shift module, for by bit described in the link variable ring shift left in the MD5 algorithms;
Second computing module, for calculating the 2nd MD5 using the link variable after the input parameter and displacement Value.
Compared with prior art, the application includes advantages below:
In this application, shift parameters are introduced, using the shift parameters pre-set to the link variable in MD5 algorithms Being shifted so that MD5 algorithms are more flexible, meanwhile, have secure access to because being realized using improved MD5 algorithms, also cause Access of the host computer to ECU is safer, and improves flexibility and the controllability of ECU secure access.
Brief description of the drawings
In order to illustrate more clearly of the technical scheme in the embodiment of the present application, make required in being described below to embodiment Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present application, for For those of ordinary skill in the art, without having to pay creative labor, it can also be obtained according to these accompanying drawings His accompanying drawing.
Fig. 1 is a kind of flow chart of safety access method embodiment 1 for realizing ECU of the application;
Fig. 2 is a kind of flow chart of safety access method embodiment 2 for realizing ECU of the application;
Fig. 3 is a kind of structured flowchart of ECU embodiments of the application;
Fig. 4 is a kind of structured flowchart of the embodiment of host computer of the application.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present application, the technical scheme in the embodiment of the present application is carried out clear, complete Site preparation describes, it is clear that described embodiment is only some embodiments of the present application, rather than whole embodiments.It is based on Embodiment in the application, those of ordinary skill in the art are obtained every other under the premise of creative work is not made Embodiment, belong to the scope of the application protection.
The application can be used in numerous general or special purpose computing device environment or configuration.Such as:Personal computer, service Device computer, handheld device or portable set, laptop device, multi-processor device including any of the above device or equipment DCE etc..
The application can be described in the general context of computer executable instructions, such as program Module.Usually, program module includes performing particular task or realizes routine, program, object, the group of particular abstract data type Part, data structure etc..The application can also be put into practice in a distributed computing environment, in these DCEs, by Task is performed and connected remote processing devices by communication network.In a distributed computing environment, program module can be with In the local and remote computer-readable storage medium including storage device.
With reference to figure 1, a kind of flow chart for the safety access method embodiment 1 for realizing ECU of the application is shown, can be included Following steps:
Step 101:ECU generates random number and is simultaneously sent to described upper in response to the security access request of reception host computer Machine.
In actual English, if user triggers the security access request to ECU, host computer will be responsive to user's transmission Security access request, then security access request is sent to ECU, ECU after the security access request to oneself is received, A random number can be generated, and in order to ensure that host computer also can calculate MD5 values according to the random number, random number can be also sent to Host computer.
Wherein, MD5 (Message Digest Algorithm5) algorithm is used primarily to ensure that information transfer is completely consistent, It is one of widely used hash algorithm of computer.And it by data (such as Chinese character) computing is another that the basic principle of hash algorithm, which is, One fixed-length value.
Step 102:ECU calculates the first MD5 according to the shift parameters of the random number and the link variable pre-set Value.
ECU after generating the random number, using the random number as the input parameter in MD5 algorithms, and will be pre-set The digit that shift parameters args is determined shifts to link variable, comes according still further to the link variable after input parameter and displacement The first MD5 values are calculated using MD5 algorithms.
In specific implementation, step 102 can specifically include in actual applications:
Step A1:The random number is defined as the input parameter of MD5 algorithms by ECU.
Step A2:ECU rounds the shift parameters to 32, with the digit shifted;
Because in MD5 algorithms, there are four 32 integers for being referred to as link variable (Chaining Variable) to join Number, they are respectively:A=0x01234567, B=0x89abcdef, C=0xfedcba98, D=0x76543210.Such as Shift parameters args is known, for hexadecimal, then carry digit is exactly that args value rounds to 16, i.e. int s= Args%32.Which numerical value is carried out to round the operation multiple determined with computer.
Step A3:ECU is by bit described in the link variable ring shift left in the MD5 algorithms;
After the digit that link variable needs shift is obtained, i.e., by bit described in four link variable ring shift lefts. For above example, the link variable after displacement is respectively:A=0x67452301 (A=A<<s|A>>(32-s)), B= 0xefcdab89 (B=B<<s|B>>(32-s)), C=0x98badcfe (C=C<<s|C>>(32-s)), D=0x10325476 (D=D<<s|D>>(32-s)).
Step A4:ECU calculates the first MD5 values using the link variable after the input parameter and displacement.
ECU recycles the link variable after input parameter and displacement to calculate the first MD5 values.
Specifically when realizing, UInt32 [] bits the args%4 value can be converted into a length in programming For 4 byte [] array, as return value.If computer is hexadecimal, when args is 0 or 16 multiple, use The result of calculation of the present embodiment will overlap with the result for the MD5 algorithms for not carrying out shifting function, therefore, those skilled in the art Can by first in MD5 four-wheel major cycle circulation the FF first steps " ring shift left s11 " " moves to left with final step S14 " is exchanged, and after exchange, the FF first steps are ring shift left s14 positions in first circulation, and final step is then left circulation s11 Position.
Step 103:ECU is by the first MD5 values compared with the 2nd MD5 values that the host computer returns.
ECU is calculating the first MD5 value sums, the first MD5 values that oneself is calculated and the second of host computer return MD5 values are compared, wherein, the mode that host computer calculates the 2nd MD5 values is identical with introducing in step 102.
Step 104:ECU carries out safe access control according to comparative result.
In various embodiments, step 104 can specifically include in actual applications:
Step B1:Judge whether the first MD5 values and the 2nd MD5 values are equal, if it is, into step B2, If it is not, then into step B3.
ECU judges whether the first MD5 values and the 2nd MD5 values equal, if equal, illustrate this access be it is safe, then Pass through the security access request of host computer.If illustrating that this access may not be safe, now then refuse upper The security access request of machine.
Step B2:Pass through the security access request of the host computer.
Step B3:Refuse the security access request of the host computer.
Using the embodiment of the present invention, by the shift parameters pre-set, the link variable in MD5 algorithms can be carried out Displacement so that MD5 algorithms are more flexible, meanwhile, have secure access to, also cause upper because being realized using improved MD5 algorithms Access of the machine to ECU is safer, and improves flexibility and the controllability of ECU secure access.
With reference to figure 2, a kind of flow chart of ECU of the application safety access method embodiment 2 is shown, can be included following Step:
Step 201:Host computer sends security access request to ECU.
Security access request is sent to ECU by host computer when receiving the access to ECU of user's triggering.
Step 202:Host computer receives the random number that the ECU returns in response to security access request.
Host computer receives the random number of ECU returns.
Step 203:Host computer calculates the 2nd MD5 values according to the shift parameters of the random number and link variable.
Host computer is using the random number as the input parameter in MD5 algorithms, and according to input parameter and link variable Shift parameters calculate the 2nd MD5 values.Specific calculation may be referred to the introduction of step 102, will not be repeated here.
Wherein, in various embodiments, the step 203 can specifically include:
Step C1:The random number is defined as to the input parameter of MD5 algorithms;
Step C2:The shift parameters are rounded to 32, with the digit shifted.
Step C3:By bit described in the link variable ring shift left in the MD5 algorithms.
Step C4:The 2nd MD5 values are calculated using the link variable after the input parameter and displacement.
Step 204:The 2nd MD5 values are sent to the ECU by host computer, so that the ECU is according to the first MD5 The comparative result of value and the 2nd MD5 values carries out safe access control.
2nd MD5 values are sent to the ECU, ratios of the ECU according to the first MD5 values and the 2nd MD5 values by host computer again Relatively result carries out safe access control, and specific safe access control process may be referred to the introduction in step 104, herein no longer Repeat.
It should be noted that the present embodiment and previous embodiment the difference is that only executive agent, therefore, not to the greatest extent Part may be referred to the related introduction of previous embodiment.
Using the embodiment of the present invention, using the shift parameters pre-set, the link variable in MD5 algorithms is moved Position so that MD5 algorithms are more flexible, meanwhile, had secure access to because being realized using improved MD5 algorithms, also cause host computer pair ECU access is safer, and improves flexibility and the controllability of ECU secure access.
For foregoing each method embodiment, in order to be briefly described, therefore it is all expressed as to a series of combination of actions, but It is that those skilled in the art should know, the application is not limited by described sequence of movement, because according to the application, certain A little steps can use other orders or carry out simultaneously.Secondly, those skilled in the art should also know, be retouched in specification The embodiment stated belongs to preferred embodiment, necessary to involved action and module not necessarily the application.
It is corresponding with the method that a kind of safety access method embodiment 1 for realizing ECU of above-mentioned the application is provided, referring to figure 3, present invention also provides a kind of ECU embodiments, in the present embodiment, can include:
Generation unit 301, for the security access request in response to receiving host computer, generate random number and be sent to described Host computer.
First computing unit 302, based on coming according to the shift parameters of the random number and the link variable pre-set Calculate the first MD5 values.
In various embodiments, first computing unit 302 can specifically include:
First determining module, for the random number to be defined as to the input parameter of MD5 algorithms;First floor module, use Rounded in by the shift parameters to 32, with the digit shifted;First shift module, for by the MD5 algorithms In link variable ring shift left described in bit;And first computing module, after using the input parameter and displacement Link variable calculate the first MD5 values.
Comparing unit 303, for by the first MD5 values compared with the 2nd MD5 values that the host computer returns.
Safe access control unit 304, for carrying out safe access control according to comparative result.
In various embodiments, the safe access control unit 304 can specifically include:
Judge module, for judging whether the first MD5 values and the 2nd MD5 values are equal;First control module, use In the case of in the result of the judge module to be, pass through the security access request of the host computer;And second control Module, in the case of being no in the result of the judge module, refuse the security access request of the host computer.
ECU in the present embodiment is shifted to the link variable in MD5 algorithms so that MD5 algorithms are more flexible, together When, had secure access to because being realized using improved MD5 algorithms, also make it that access of the host computer to ECU is safer, and improve The flexibility of ECU secure access and controllability.
It is corresponding with the method that a kind of safety access method embodiment 2 for realizing ECU of above-mentioned the application is provided, referring to figure 4, present invention also provides a kind of host computer embodiment, in the present embodiment, can include:
Request unit 401 is sent, for sending security access request to ECU.
Receiving unit 402, the random number returned for receiving the ECU in response to security access request.
Second computing unit 403, based on coming according to the shift parameters of the random number and the link variable pre-set Calculate the 2nd MD5 values.
In various embodiments, second computing unit 403 can specifically include:
Second determining module, for the random number to be defined as to the input parameter of MD5 algorithms;Second floor module, use Rounded in by the shift parameters to 32, with the digit shifted;Second shift module, for by the MD5 algorithms In link variable ring shift left described in bit;And second computing module, after using the input parameter and displacement Link variable calculate the 2nd MD5 values.
MD5 value cells 404 are sent, for the 2nd MD5 values to be sent into the ECU, so that the ECU is according to described in The comparative result of first MD5 values and the 2nd MD5 values carries out safe access control.
Host computer in the present embodiment is shifted to the link variable in MD5 algorithms so that MD5 algorithms are cleverer It is living, meanwhile, had secure access to because being realized using improved MD5 algorithms, also make it that access of the host computer to ECU is safer, and And improve flexibility and the controllability of ECU secure access.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight Point explanation is all difference with other embodiment, between each embodiment identical similar part mutually referring to. For device class embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is joined See the part explanation of embodiment of the method.
Finally, it is to be noted that, herein, such as first and second or the like relational terms be used merely to by One entity or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or operation Between any this actual relation or order be present.Moreover, term " comprising ", "comprising" or its any other variant meaning Covering including for nonexcludability, so that process, method, article or equipment including a series of elements not only include that A little key elements, but also the other element including being not expressly set out, or also include for this process, method, article or The intrinsic key element of equipment.In the absence of more restrictions, the key element limited by sentence "including a ...", is not arranged Except other identical element in the process including the key element, method, article or equipment being also present.
A kind of ECU provided herein safety access method, ECU and host computer are described in detail above, Specific case used herein is set forth to the principle and embodiment of the application, and the explanation of above example is simply used Understand the present processes and its core concept in help;Meanwhile for those of ordinary skill in the art, according to the application's Thought, there will be changes in specific embodiments and applications, in summary, this specification content should not be construed as Limitation to the application.

Claims (6)

  1. A kind of 1. safety access method for realizing ECU, it is characterised in that this method is applied on ECU, including:
    Security access request in response to receiving host computer, generate random number and be sent to the host computer;
    The first MD5 values are calculated according to the random number and the shift parameters of link variable pre-set, and by described first MD5 values are compared with the 2nd MD5 values that the host computer returns;It is described to become according to the random number and the link pre-set The shift parameters of amount calculate the first MD5 values, including:The random number is defined as to the input parameter of MD5 algorithms;By the shifting Position parameter rounds to 32, with the digit shifted;By digit described in the link variable ring shift left in the MD5 algorithms Position, link variable A, B, C and D after being shifted are respectively:A=0x67452301, B=0xefcdab89, C= 0x98badcfe, D=0x10325476;And calculate described the using the link variable after the input parameter and displacement One MD5 values;
    Safe access control is carried out according to comparative result.
  2. 2. according to the method for claim 1, it is characterised in that described that safe access control, bag are carried out according to comparative result Include:
    Judge whether the first MD5 values and the 2nd MD5 values are equal, if it is, being visited by the safety of the host computer Request is asked, if it is not, then refusing the security access request of the host computer.
  3. A kind of 3. safety access method for realizing ECU, it is characterised in that this method is applied in host computer, including:
    Security access request is sent to ECU;
    Receive the random number that the ECU returns in response to security access request;
    The 2nd MD5 values are calculated according to the random number and the shift parameters of link variable pre-set, and by described second MD5 values are sent to the ECU, so that the ECU is had secure access to according to the comparative result of the first MD5 values and the 2nd MD5 values Control;
    Wherein, it is described to calculate the 2nd MD5 values according to the random number and the shift parameters of link variable pre-set, bag Include:The random number is defined as to the input parameter of MD5 algorithms;The shift parameters are rounded to 32, to be shifted Digit;By bit described in the link variable ring shift left in the MD5 algorithms, link variable A, B, C after being shifted It is respectively with D:A=0x67452301, B=0xefcdab89, C=0x98badcfe, D=0x10325476;And utilize institute The link variable after input parameter and displacement is stated to calculate the 2nd MD5 values.
  4. 4. a kind of ECU, it is characterised in that the ECU includes:
    Generation unit, for the security access request in response to receiving host computer, generate random number and be sent to the host computer;
    First computing unit, for calculating first according to the shift parameters of the random number and the link variable pre-set MD5 values;First computing unit includes:First determining module, the input for the random number to be defined as to MD5 algorithms are joined Number;First floor module, for the shift parameters to be rounded to 32, with the digit shifted;First shift module, For by bit described in the link variable ring shift left in the MD5 algorithms, link variable A, B, C and D after being shifted Respectively:A=0x67452301, B=0xefcdab89, C=0x98badcfe, D=0x10325476;And first calculate Module, for calculating the first MD5 values using the link variable after the input parameter and displacement;
    Comparing unit, for by the first MD5 values compared with the 2nd MD5 values that the host computer returns;
    Safe access control unit, for carrying out safe access control according to comparative result.
  5. 5. ECU according to claim 4, it is characterised in that the safe access control unit includes:
    Judge module, for judging whether the first MD5 values and the 2nd MD5 values are equal;
    First control module, in the case of being in the result of the judge module, visited by the safety of the host computer Ask request;
    Second control module, in the case of being no in the result of the judge module, refuse the safety visit of the host computer Ask request.
  6. A kind of 6. host computer, it is characterised in that including:
    Request unit is sent, for sending security access request to ECU;
    Receiving unit, the random number returned for receiving the ECU in response to security access request;
    Second computing unit, for calculating second according to the shift parameters of the random number and the link variable pre-set MD5 values;Second computing unit includes:Second determining module, the input for the random number to be defined as to MD5 algorithms are joined Number;Second floor module, for the shift parameters to be rounded to 32, with the digit shifted;Second shift module, For by bit described in the link variable ring shift left in the MD5 algorithms, link variable A, B, C and D after being shifted Respectively:A=0x67452301, B=0xefcdab89, C=0x98badcfe, D=0x10325476;And second calculate mould Block, for calculating the 2nd MD5 values using the link variable after the input parameter and displacement;
    Send MD5 value cells, for the 2nd MD5 values to be sent into the ECU, so as to the ECU according to the first MD5 values with The comparative result of 2nd MD5 values carries out safe access control.
CN201410309182.0A 2014-07-01 2014-07-01 Realize ECU safety access method, ECU and host computer Active CN104134047B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410309182.0A CN104134047B (en) 2014-07-01 2014-07-01 Realize ECU safety access method, ECU and host computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410309182.0A CN104134047B (en) 2014-07-01 2014-07-01 Realize ECU safety access method, ECU and host computer

Publications (2)

Publication Number Publication Date
CN104134047A CN104134047A (en) 2014-11-05
CN104134047B true CN104134047B (en) 2018-01-02

Family

ID=51806722

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410309182.0A Active CN104134047B (en) 2014-07-01 2014-07-01 Realize ECU safety access method, ECU and host computer

Country Status (1)

Country Link
CN (1) CN104134047B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106101111B (en) * 2016-06-24 2019-10-25 郑州信大捷安信息技术股份有限公司 Vehicle electronics safe communication system and communication means
CN113094691A (en) * 2021-03-24 2021-07-09 东风电驱动系统有限公司 Whole vehicle ECU device safety access method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101166087A (en) * 2007-09-30 2008-04-23 奇瑞汽车有限公司 A secure validation method for car diagnosis communication
CN102393888A (en) * 2011-07-21 2012-03-28 广州汽车集团股份有限公司 ECU (Electric Control Unit) security access processing method
CN103685214A (en) * 2011-10-28 2014-03-26 通用汽车环球科技运作有限责任公司 Security access method for automotive electronic control units

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7937593B2 (en) * 2004-08-06 2011-05-03 Broadcom Corporation Storage device content authentication
US20080209226A1 (en) * 2007-02-28 2008-08-28 Microsoft Corporation User Authentication Via Biometric Hashing

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101166087A (en) * 2007-09-30 2008-04-23 奇瑞汽车有限公司 A secure validation method for car diagnosis communication
CN102393888A (en) * 2011-07-21 2012-03-28 广州汽车集团股份有限公司 ECU (Electric Control Unit) security access processing method
CN103685214A (en) * 2011-10-28 2014-03-26 通用汽车环球科技运作有限责任公司 Security access method for automotive electronic control units

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"实验三 MD5算法";小新bgg;《百度文库》;20140122;文献第1、3页 *

Also Published As

Publication number Publication date
CN104134047A (en) 2014-11-05

Similar Documents

Publication Publication Date Title
CN102412971B (en) SM2 key exchange protocol based key agreement method and device
CN104378374B (en) A kind of method and system that communication is set up based on SSL
CN105184566B (en) A kind of working method of intelligent cipher key equipment
JP2010539519A (en) Method for exchanging encrypted data and communication system
CN103905469A (en) Safety control system and method applied to smart power grid wireless sensor network and cloud computing
CN103475473B (en) Crypto-operation method and server in digital signature method and equipment, digital signature
CN106549925A (en) Prevent method, the apparatus and system of cross-site request forgery
CN102833259A (en) Tamper-proof detection method for intersystem data, as well as method and apparatus for generating check code
Kim et al. Device authentication protocol for smart grid systems using homomorphic hash
CN114661318A (en) Efficient post-quantum security software updates customized for resource constrained devices
CN104780052B (en) Network equipment group authentication method in a kind of software defined network
CN104134047B (en) Realize ECU safety access method, ECU and host computer
CN104363593A (en) Two-tier sensor network oriented verifiable Top-k query processing method
CN106453393A (en) Verifiable privacy-preserving data type matching in participatory sensing
CN111431841B (en) Internet of things security sensing system and Internet of things data security transmission method
CN101394412B (en) Method for preventing the first message of security protocol from being forged
CN107094073A (en) A kind of group&#39;s RFID tag ownership transfer method based on Chinese remainder theorem
CN102542070B (en) Method for structuring one-way Hash function based on random function
CN104298897B (en) embedded copyright authentication method based on chaos technology and special processor
CN114221753B (en) Key data processing method and electronic equipment
CN107294705A (en) A kind of method, equipment and the system of key generation and checking
CN112311667B (en) Message transmission method, device, equipment and storage medium
CN106354581B (en) A kind of cyclic redundancy check method and multi-core processor
CN105160279B (en) RFID system needs the multiple-owner label ownership conversion method of trusted third party
CN110945832B (en) Symmetric group authentication method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant