CN114928465A - Message checking method and device, vehicle and storage medium - Google Patents

Message checking method and device, vehicle and storage medium Download PDF

Info

Publication number
CN114928465A
CN114928465A CN202210287605.8A CN202210287605A CN114928465A CN 114928465 A CN114928465 A CN 114928465A CN 202210287605 A CN202210287605 A CN 202210287605A CN 114928465 A CN114928465 A CN 114928465A
Authority
CN
China
Prior art keywords
message
information
check code
code
receiving end
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210287605.8A
Other languages
Chinese (zh)
Other versions
CN114928465B (en
Inventor
黄光健
张雁英
程艳阶
何烈炎
孙小雨
周颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Automobile Group Co Ltd
Original Assignee
Guangzhou Automobile Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Automobile Group Co Ltd filed Critical Guangzhou Automobile Group Co Ltd
Priority to CN202210287605.8A priority Critical patent/CN114928465B/en
Publication of CN114928465A publication Critical patent/CN114928465A/en
Application granted granted Critical
Publication of CN114928465B publication Critical patent/CN114928465B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0061Error detection codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Small-Scale Networks (AREA)

Abstract

The embodiment of the application discloses a message checking method, which is applied to an information receiving end of a vehicle and comprises the following steps: acquiring a message sent by an information sending end; the message comprises interaction information, identity information and a first check code; the identity information comprises at least two of the code number of the application platform, the number of the sub-network, the code number of the information sending end and the message number; calculating to obtain a second check code according to a preset algorithm based on the identity information and the interaction information; and determining the authenticity of the message according to the relationship between the first check code and the second check code. In the message checking method, the authenticity of the message is determined by comparing the relation between the checking code calculated by the information sending end and the checking code calculated by the information receiving end, and the network security level of the vehicle can be improved to a certain extent through the identity information under the condition of not additionally increasing a network security strategy, so that the development cost is reduced.

Description

Message checking method and device, vehicle and storage medium
Technical Field
The present application relates to the field of data transmission technologies, and in particular, to a method and an apparatus for message verification, a vehicle, and a storage medium.
Background
With the improvement of living standard, people have stronger and stronger requirements on vehicles such as automobiles and the like, and the requirements on the safety performance of automobiles are higher and higher.
In the related art, most of the adopted communication protection mechanisms are based on exclusive-or operation, and the information is single, so that the safety level of the vehicle is low.
Disclosure of Invention
The application provides a message checking method, a message checking device, a vehicle and a storage medium.
In a first aspect, the present application provides a message checking method, which is applied to an information receiving end of a vehicle, and the method includes: acquiring a message sent by an information sending end; the message comprises interaction information, identity information and a first check code; the identity information comprises at least two of the code number of the application platform, the number of the sub-network, the code number of the information sending end and the message number; calculating to obtain a second check code according to a preset algorithm based on the identity information and the interaction information; and determining the authenticity of the message according to the relationship between the first check code and the second check code.
In a second aspect, the present application provides a message checking method, which is applied to an electronic control system of a vehicle, where the electronic control system includes at least one information sending terminal and an information receiving terminal. The method comprises the following steps: the information sending end sends a message to the information receiving end; the message comprises interaction information, identity information and a first check code; the identity information comprises at least two of an application platform code number, a sub-network number, an information sending end code number and a message number; the information receiving end calculates a second check code according to a preset algorithm based on the identity information and the interaction information; and the information receiving end determines the authenticity of the message according to the relationship between the first check code and the second check code.
In a third aspect, the present application provides a packet checking apparatus, including: the acquisition module is used for acquiring the message sent by the information sending end; the message comprises interaction information, identity information and a first check code; the identity information comprises at least two of the code number of the application platform, the number of the sub-network, the code number of the information sending end and the message number; the calculation module is used for calculating to obtain a second check code according to a preset algorithm based on the identity information and the interaction information; and the authenticity determining module is used for determining the authenticity of the message according to the relationship between the first check code and the second check code.
In a fourth aspect, the present application provides a vehicle comprising one or more processors and memory; one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to perform the methods described above.
In a fifth aspect, the present application provides a computer readable storage medium storing program code executable by a processor, the computer readable storage medium comprising stored program code, wherein the method described above is performed when the program code runs.
The embodiment of the application provides a message checking method, a message checking device, a vehicle and a storage medium. In the method, an information receiving end obtains a message sent by an information sending end, the information receiving end calculates a second check code based on the interactive information and the identity information in the message, compares the second check code with a first check code in the message, and judges the authenticity of the message according to a comparison result. In the message verification method, the authenticity of the message is determined by comparing the relationship between the verification code calculated by the information sending end according to the interactive information and the identity information and the verification code calculated by the information receiving end according to the interactive information and the identity information, so that the network security level of the vehicle can be improved to a certain extent through the identity information without additionally increasing a network security policy, and the development cost is reduced. Furthermore, the identity information in the message is composed of different numbers, so that the uniqueness of the identity information corresponding to the message can be ensured from different dimensions, and the cracking difficulty of the message is also improved to a certain extent.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 shows an application environment schematic diagram of a message verification method provided in the present application.
Fig. 2 shows a flowchart of a message verification method according to a first embodiment of the present application.
Fig. 3 shows a conceptual diagram of distribution of message identity information areas according to an embodiment of the present application.
Fig. 4 shows a flowchart of a message verification method according to a second embodiment of the present application.
Fig. 5 shows a flowchart of a message verification method according to a third embodiment of the present application.
Fig. 6 shows a flowchart of a message verification method according to a fourth embodiment of the present application.
Fig. 7 shows a flowchart of a message checking method according to a fifth embodiment of the present application.
Fig. 8 shows a functional module block diagram of a message checking apparatus provided in the present application.
Fig. 9 shows a functional block diagram of a vehicle according to an embodiment of the present application.
Fig. 10 shows a functional block diagram of a computer-readable storage medium proposed by an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described clearly and completely with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only some embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
With the improvement of living standard, people have stronger and stronger requirements on vehicles such as automobiles and the like, and the requirements on the safety performance of the automobiles are higher and higher.
In the related art, most of the adopted communication protection mechanisms are based on exclusive-or operation, and the information is single, so that the safety level of the vehicle is low.
The application provides a message checking method, a message checking device, a vehicle and a storage medium. In the method, an information receiving end obtains a message sent by an information sending end, the information receiving end calculates a second check code based on the interactive information and the identity information in the message, compares the second check code with a first check code in the message, and judges the authenticity of the message according to a comparison result. In the message verification method, the authenticity of the message is determined by comparing the relationship between the verification code calculated by the information sending end according to the interactive information and the identity information and the verification code calculated by the information receiving end according to the interactive information and the identity information, so that the network security level of the vehicle can be improved to a certain extent through the identity information without additionally increasing a network security policy, and the development cost is reduced.
For convenience of describing the scheme of the present application in detail, an application environment of the message verification method provided in the embodiments of the present application is described below with reference to the accompanying drawings.
Referring to fig. 1, fig. 1 is a schematic diagram of an application environment of a message verification method according to the present application. As shown in fig. 1, the message verification method provided in the present application may be applied to a vehicle 10 configured with an electronic control system 100, and further, the vehicle 10 may be a land vehicle, such as an automobile, an electric vehicle, a rail car, or the like, an air vehicle, such as an airplane, or an unmanned platform, such as an unmanned vehicle, an unmanned aerial vehicle, an automatic mobile platform (such as a mobile cart, or the like), and the present application does not limit this. In the present embodiment, the vehicle 10 is illustrated as an automobile, and the vehicle 10 may include the electronic control system 100.
The electronic control system 100 includes an information receiving end 110 and an information sending end 120, where the information receiving end 110 and the information sending end 120 are electronic control units of function modules on the vehicle 10, where the function modules may include a center console, a sound box, an air conditioner, a network module, and other electronic control units for controlling the corresponding function modules to implement related functions. The electronic control unit may include a Microcontroller (MCU), memory (ROM, RAM), input/output interface (I/O), analog-to-digital converter (a/D), and integrated circuits for shaping, driving, etc. The information sending end and the information receiving end are not strictly distinguished, but named according to the object during information transmission, for example, when the first functional module sends a message to the second functional module, the first functional module is the sending end, and the second functional module is the receiving end, otherwise, when the second functional module sends a message to the first functional module, the second functional module is the sending end, and the first functional module is the receiving end. When the functional module of the vehicle needs signal transmission, the information sending end sends a message to the information receiving end, for example, after the console receives an instruction of turning on the air conditioner of a user, the console serves as the information sending end to send the message carrying the instruction of turning on the air conditioner to the air conditioner, and the air conditioner serves as the information receiving end to be turned on after receiving the message. The information receiving end 110 obtains the message sent by the information sending end 120, and the information receiving end 110 calculates a second check code based on the interaction information and the identity information in the message, compares the second check code with the first check code in the message, and judges the authenticity of the message according to the comparison result.
Embodiments of the present application will be described in detail below with reference to the accompanying drawings.
Referring to fig. 2, fig. 2 schematically illustrates a message verification method according to a first embodiment of the present application. In this embodiment, the information receiving end determines the authenticity of the message by comparing the relationship between the check code calculated by the information sending end according to the interactive information and the identity information and the check code calculated by the information receiving end according to the interactive information and the identity information in the message, and the network security level of the vehicle can be improved to a certain extent by the identity information without additionally increasing a network security policy, so that the development cost is reduced. The method may include the following steps S210 to S250.
Step S210, a message sent by the information sending end is obtained.
The message refers to a data unit exchanged and transmitted in the network, that is, a data block to be sent by the station at one time. The message contains complete data information to be sent, and the message is very inconsistent in length, unlimited in length and variable. In this embodiment, the message includes the interaction information, the identity information, and the first check code.
The interactive information refers to information carrying an operation instruction, and the information receiving end can respond to the operation instruction in the interactive information after acquiring the interactive information. For example, the interactive information contains an operation instruction of turning on the air conditioner, and the information receiving end can control the air conditioner to start after acquiring the operation instruction of turning on the air conditioner.
The identity information refers to a code capable of proving message uniqueness, the length of the identity information is not limited, and in the embodiment of the application, the identity information is a 16-bit information quantity. Further, the identity information includes at least two of the application platform code number, the sub-network number, the information sending terminal code number and the message number. Referring to fig. 3, in the embodiment of the present application, the identity information is divided into four areas, i.e., an application platform code, a subnet number, an information sending end code, and a message number, which are respectively an application platform code, a subnet number, an information sending end code, and a message number. Furthermore, the lengths of the application platform code, the sub-network number, the information sending terminal code and the message number are not limited, in the embodiment of the application, the I area is the application platform code, the application platform code is a 2-bit length information quantity, the range is 0-3, and the application platform code represents an A-level vehicle type platform, a B-level vehicle type platform, a C-level vehicle type platform and a new energy vehicle type platform respectively, so that the information sending terminal can be distinguished from which vehicle type platform the information sending terminal belongs to quickly, and the information sending terminal is prevented from being used in a cross-platform mode. For example, the application platform has a code number of "00" to represent that the information sending terminal belongs to the class a vehicle model platform, and the application platform has a code number of "10" to represent that the information sending terminal belongs to the class C vehicle model platform.
In this embodiment, the II area is the subnet number, and the subnet number is a 4-bit length of information, ranging from 0 to 15. Due to the attenuation and anti-interference capability of the bus level and the difference of network technologies used by the information sending end and the information receiving end, the information sending end and the information receiving end in the whole vehicle network are not arranged in the same network but are dispersedly arranged in different sub-networks, so that the uniqueness of the sub-networks in the whole vehicle network is ensured by the sub-network numbers.
In this embodiment, the III area is the code of the information sender, the code of the information sender is an information amount with a length of 5 bits, and the range is 0-31.
In this embodiment, the IV area is a message number, the message number is an information amount with a length of 5 bits, and the range is 0 to 31, and since the same information sending end may send multiple messages, the message number ensures the uniqueness of the message sent by the same information sending end.
The first check code is a code calculated by the information sending end according to a preset algorithm based on the interactive information and the identity information of the message. In the embodiment of the application, the message includes a plurality of bytes of content, and the information sending end calculates the first check code according to a preset algorithm based on the plurality of bytes of content in the identity information and the plurality of bytes of content in the interactive information. Wherein the predetermined algorithm may be a cyclic redundancy check algorithm. The cyclic redundancy check algorithm is an algorithm with data transmission error detection function, which performs polynomial calculation on data, attaches the obtained result to a message, and executes a similar algorithm at an information receiving end to ensure the correctness and integrity of data transmission. As an example, the information sending end determines a divisor, then adds 0 of-1 bit of this digit to the message to be sent, then divides the divisor by modulo-2 division with the newly generated message, and the remainder obtained is the cyclic redundancy check value of the message, and the information sending end uses the cyclic redundancy check value as the first check code. And finally, the sending end appends the calculated first check code to the back of the original message to construct a new message and sends the new message to the information receiving end.
And step S220, calculating to obtain a second check code according to a preset algorithm based on the identity information and the interaction information.
In the embodiment of the application, the message includes a plurality of bytes of content, and the information receiving end calculates the second check code according to a preset algorithm based on the plurality of bytes of content in the identity information and the plurality of bytes of content in the interaction information. Wherein the preset algorithm may be a cyclic redundancy check algorithm. Specifically, the information receiving end determines a divisor identical to that of the information sending end, then adds 0 with the digit of-1 bit on the received message, then divides the divisor by a newly generated message in a mode of modulo-2 division, and obtains a remainder which is a cyclic redundancy check value of the message, and the information receiving end takes the cyclic redundancy check value as a second check code.
Step S230, determining the authenticity of the message according to the relationship between the first check code and the second check code.
In this embodiment, since the first check code and the second check code have the same calculation method, the first check code and the second check code obtained according to the preset calculation method should be the same when the message is not changed during transmission. Therefore, the information receiving end compares the calculated second check code with the acquired first check code sent by the information sending end to obtain a comparison result. If the first check code is the same as the second check code, the message receiving end determines that the message is true, and if the first check code is different from the second check code, the message receiving end determines that the message is false. Further, if the message receiving end determines that the message is false, the representation message is changed in the transmission process. As a mode, the information receiving end may determine subsequent operations according to the number of times that the message is false, for example, if the number of times that the message is false is small, and it represents that an accidental error occurs in the message during transmission, the information receiving end ignores an instruction of the message, and if the number of times that the message is false is large, it represents that the information sending end may be invaded illegally, the information receiving end does not execute the instruction of the message, and sends a prompt message to the user to prompt the vehicle that the vehicle is abnormal.
The embodiment of the application provides a message checking method. In the method, an information receiving end obtains a message sent by an information sending end, the information receiving end calculates a second check code based on the interactive information and the identity information in the message, compares the second check code with a first check code in the message, and judges the authenticity of the message according to a comparison result. In the message verification method, the authenticity of the message is determined by comparing the relationship between the verification code calculated by the information sending end according to the interactive information and the identity information and the verification code calculated by the information receiving end according to the interactive information and the identity information, so that the network security level of the vehicle can be improved to a certain extent through the identity information without additionally increasing a network security policy, and the development cost is reduced.
Referring to fig. 4, fig. 4 schematically illustrates a message verification method according to a second embodiment of the present application. In this embodiment, the information receiving end is provided with a counter, and the counter is used to record the number of times that the information receiving end determines that the message is false when performing message verification. The message receiving end executes a message alarm strategy corresponding to the counter value according to the counter value, and the influence caused by the contingency in the message transmission process is reduced. The method may include the following steps S410 to S460.
Step S410, a message sent by the information sending end is obtained.
And step S420, calculating a second check code according to a preset algorithm based on the identity information and the interaction information.
In this embodiment, the detailed description of steps S410 to S420 may refer to the detailed description of steps S210 to S220, which is not repeated herein.
Step S430, detecting whether the first check code is the same as the second check code, and obtaining a detection result.
And the information receiving end detects whether the calculated second check code is the same as the acquired first check code sent by the information sending end, and a detection result is obtained. If the first check code is the same as the second check code, the message receiving end determines that the message is true, and if the first check code is different from the second check code, the message receiving end determines that the enclosure is false. Therefore, the detection result is a true message and a false message.
In step S440, if the message is true, the timer value accumulates a first value, and the first value is a negative value.
In the embodiment of the present application, the first value may be set by default of the timer or by user-defined setting, and in general, the first value may be-2, -3, -5, -7, and the like, and for example, the first value may be-3. For example, the original value of the timer is 10, and if the information receiving end determines that the detection result indicates that the message is true, the value of the timer is incremented by-3, that is, the value of the timer is 7.
Step S450, if the message is false, the timer value accumulates a second value, and the second value is a positive value.
And if the detection result represents that the message is true, accumulating a second value by the timer value, wherein the first value is a positive value. In the embodiment of the present application, the second value may be set by default of a timer, or may be set by a user, and in general, the second value may be 2, 3, 5, 7, and the like, and for example, the second value may be 5. For example, the original value of the timer is 10, and if the information receiving end determines that the detection result indicates that the message is true, the timer value is accumulated by 5, that is, the timer value is 15.
Step S460, obtaining the counter value, and executing the message alarm policy corresponding to the counter value.
And the information receiving end acquires the numerical value of the timer and executes a corresponding message alarm strategy according to the threshold interval corresponding to the counter. The threshold interval may be defined by a first threshold value and a second threshold value together, wherein the first threshold value is greater than the second threshold value. The first threshold may be set by the information receiving end by default or by user-defined setting, generally, the first threshold may be 100, 120, 150, and the like, and exemplarily, the first threshold may be 128. The second threshold may be set by the information receiving end as a default, or may be set by the user as a self-defined setting, generally, the second threshold may be 20, 30, 40, and so on, and exemplarily, the second threshold may be 30.
As a mode, if the information receiving end determines that the timer value is greater than or equal to the first threshold, the information receiving end determines that the detection result is that the message is abnormal. In this embodiment, if the information receiving end determines that the timer value is greater than or equal to the first threshold, the information receiving end sends an alarm signal to the associated device, where the associated device includes at least one of the following devices: remote control unit, automobile body control unit, instrument desk controller. In some embodiments, the association device includes a remote control unit, and if the information receiving end determines that the timer value is greater than or equal to the first threshold, the information receiving end sends an alarm signal to the remote control unit, and the remote control unit receives the alarm signal and then notifies the vehicle network platform to send a prompt message to the smart mobile device, such as a smart phone, and displays the prompt message to remind a user that the information sending end fails or that the information sending end is maliciously counterfeited when the smart mobile device receives the prompt message.
In other embodiments, the association device includes a vehicle body control unit, and if the information receiving end determines that the timer value is greater than or equal to the first threshold, the information receiving end sends an alarm signal to the vehicle body control unit, and the vehicle body control unit controls the dual flashing light module of the vehicle to turn on after receiving the alarm signal, so as to remind a user that the information sending end fails or the information sending end is maliciously counterfeited.
In still other embodiments, the association device includes an instrument desk controller, and if the information receiving end determines that the timer value is greater than or equal to the first threshold, the information receiving end sends an alarm signal to the instrument desk controller, the instrument desk controller receives the alarm signal and then notifies the vehicle network platform to send a prompt message to a display screen inside the vehicle, for example, an instrument panel, and when the display screen receives the prompt message, the prompt message is displayed in a pop-up window manner to remind a user that the information sending end has a fault or the information sending end is maliciously counterfeited. For example, if the first threshold is 128 and the timer value is 130, the information receiving end determines that the timer value is greater than or equal to the first threshold, and then the information receiving end sends an alarm signal to the associated device.
In some embodiments, the information receiving end and the associated device may not be in the same sub-network due to attenuation of the bus level of the vehicle, interference rejection capability, and network technology differences used by the respective devices of the vehicle, so that the information receiving end needs to determine whether the sub-network of the information receiving end is the same as the sub-network of the associated device before sending the alarm signal to the associated device. In this embodiment, the information receiving end may be provided with a sub-network information base, the sub-network information base may store a sub-network number of the associated device, the information receiving end determines that the timer value is greater than or equal to the first threshold, acquires the sub-network number of the information receiving end, and compares the sub-network number with the sub-network number of the associated device, if the information receiving end determines that the sub-network of the information receiving end is the same as the sub-network of the associated device, the information receiving end directly transmits the alarm signal to the associated device, and if the information receiving end determines that the sub-network of the information receiving end is different from the sub-network of the associated device, the information receiving end forwards the alarm signal to the associated device via the gateway.
In some embodiments, since the vehicle is not used for a long time or is operated by a user, the vehicle is in a flameout state, the network of the vehicle is in a disconnected state at this time, and the information receiving end cannot send the alarm signal to the associated device, after the information receiving end determines that the timer value is greater than or equal to the first threshold, it is further required to send a wake-on-network request to the communication bus of the vehicle, where the wake-on-network request is used to instruct the communication bus to keep the network of the vehicle in a wake-up state for a predetermined time period, so that the information receiving end can send the alarm signal to the associated device, and the associated device has enough time for subsequent operations. In the embodiment of the present application, the predetermined time period may be set by the information receiving end as a default, or may be set by a user through self-definition, generally, the predetermined time period may be 1 minute, 2 minutes, 5 minutes, 10 minutes, and the like, and for example, the predetermined time period may be 1 minute. For example, after the information receiving end determines that the timer value is greater than or equal to the first threshold, the information receiving end sends a network wakeup request to the communication bus of the vehicle, and instructs the communication bus to keep the network of the vehicle in a wakeup state within 1 minute, so that the information receiving end can send an alarm signal to the associated device and enable the associated device to have enough time for subsequent operations.
As a mode, if the information receiving end determines that the timer value is smaller than the first threshold and the timer value is greater than or equal to the second threshold, the information receiving end generates and stores the message fault code according to the interaction information and the identity information of the message. The message fault code refers to a code capable of indicating the type of error occurring in the message. In this embodiment, the message fault code is a 5-bit standard fault code having a length of 16 bits.
Referring to table 1, the first bit of the fault code is a letter, which occupies 2 bits of length, and indicates the system to which the fault belongs, and there are four cases as follows.
TABLE 1
Fault inner code Standard fault code expression character Belonging system
00 P Powertrain: power system failure
01 C Chassis: chassis failure
10 B Body: vehicle body fault
11 U A Network: network failure
Referring to table 2, the second bit of the fault code is a number, which occupies a length of 2 bits and represents the type of the fault, and there are four cases as follows.
TABLE 2
Fault inner code Standard fault code expression character Type of failure
00 0 Fault code defined by ISO/SAE standard
01 1 Manufacturer-customized trouble codes
10 2 ISO/SAE reservation
11 3 ISO/SAE reservations
Referring to table 3, the third bit of the fault code is a number, and occupies a length of 4 bits, which indicates the subsystem to which the fault belongs, and there are the following nine cases.
TABLE 3
Figure BDA0003558868020000091
Figure BDA0003558868020000101
The fourth and fifth bits of the fault code are also numbers that identify the specific fault object and type.
For example, if the first threshold is 128, the second threshold is 30, and the timer value is 50, the information receiving end determines that the timer value is smaller than the first threshold and greater than or equal to the second threshold, and the information receiving end generates and stores the corresponding fault code according to the message.
As one way, if the receiving end determines that the timer value is smaller than the second threshold, the receiving end does not perform any operation. For example, if the second threshold is 30 and the timer value is 15, the information receiving end determines that the timer value is smaller than the second threshold, and the information receiving end does not perform any operation.
The embodiment of the application provides a message checking method. In the method, an information receiving end obtains a message sent by an information sending end, the information receiving end calculates a second check code based on interactive information and identity information in the message, the second check code is compared with a first check code in the message, a counter accumulates corresponding numerical values according to comparison results, and the information receiving end executes a message alarm strategy corresponding to the numerical values of the counter according to the numerical values of the counter. In the message checking method, the authenticity of the message is determined by comparing the relation between the checking code calculated by the information sending end according to the interactive information and the identity information and the checking code calculated by the information receiving end according to the interactive information and the identity information, and the message alarm strategy corresponding to the counter value is executed according to the counter value under the condition that the network security strategy is not additionally added, the network security level of the transportation tool can be improved to a certain extent through the identity information, the development cost is reduced, and furthermore, the influence caused by the contingency in the message transmission process can be reduced.
Referring to FIG. 5, FIG. 5 schematically illustrates the first embodiment of the present applicationIIIThe embodiment provides a message checking method. In this embodiment, the information receiving end determines the authenticity of the message by comparing the relationship between the check code calculated by the information sending end according to the interactive information and the identity information and the check code calculated by the information receiving end according to the interactive information and the identity information, and judges whether to respond to the instruction in the interactive information according to the authenticity of the message, so that the network security level of the transportation means can be improved to a certain extent through the identity information without additionally increasing a network security policy, and the development cost is reduced. In the present embodiment. The method may include the following steps S510 to S550.
Step S510, a message sent by the information sending end is obtained.
Step S520, calculating a second check code according to a preset algorithm based on the identity information and the interaction information.
Step S530, determining the authenticity of the message according to the relationship between the first check code and the second check code.
In this embodiment, the detailed description of steps S510 to S530 may refer to the detailed description of steps S210 to S230 or steps S410 to S430, which are not repeated herein.
And step S540, responding to the instruction corresponding to the interactive information under the condition that the message is true.
In the embodiment of the application, if the information receiving end determines that the message is true, the information receiving end responds to the corresponding instruction according to the interactive information in the message. For example, if the interactive information carries an operation instruction of turning on an air conditioner, the information receiving end controls the air conditioner to start under the condition that the message is determined to be true.
And step S550, under the condition that the message is false, not responding to the instruction corresponding to the interactive information.
In the embodiment of the application, if the information receiving end determines that the message is false, the information receiving end does not respond to the instruction corresponding to the interactive information. In some embodiments, if the message receiving end determines that the message is false, an alarm signal is sent to the user to remind the user that the security system of the vehicle is invaded.
The embodiment of the application provides a message checking method. In the method, an information receiving end obtains a message sent by an information sending end, the information receiving end calculates a second check code based on interactive information and identity information in the message, compares the second check code with a first check code in the message, judges the authenticity of the message according to a comparison result, and judges whether to respond to an instruction in the interactive information according to the authenticity of the message. In the message verification method, the authenticity of the message is determined by comparing the relationship between the verification code calculated by the information sending end according to the interactive information and the identity information and the verification code calculated by the information receiving end according to the interactive information and the identity information, and whether the instruction in the interactive information needs to be responded is judged according to the authenticity of the message, so that the network security level of the transportation means can be improved to a certain extent through the identity information without additionally increasing a network security policy, and the development cost is reduced.
Referring to fig. 6, fig. 6 schematically illustrates a message verification method according to a fourth embodiment of the present application, where the message verification method can be applied to a vehicle equipped with an electronic control system. The vehicle comprises an information receiving end and at least one information sending end. In this embodiment, the information receiving end determines the authenticity of the message by comparing the relationship between the check code calculated by the information sending end according to the interaction information and the identity information and the check code calculated by the information receiving end according to the interaction information and the identity information in the message, and the network security level of the transportation means can be improved to a certain extent through the identity information without additionally increasing a network security policy, so that the development cost is reduced. The method may include the following steps S610 to S630.
Step S610, the information sending end sends the message to the information receiving end.
In this embodiment, the message includes the interaction information, the identity information, and the first check code. The information sending end calculates a first check code according to a preset algorithm based on the content of the bytes in the identity information and the content of the bytes in the interactive information. Wherein the preset algorithm may be a cyclic redundancy check algorithm. In this embodiment, reference may be made to the detailed description of step S210 for a specific implementation of step S610, which is not described in detail herein.
Step S620, the information receiving end calculates a second check code according to a preset algorithm based on the identity information and the interaction information.
And the information receiving end calculates a second check code according to a preset algorithm based on the content of the bytes in the identity information and the content of the bytes in the interactive information. Wherein the predetermined algorithm may be a cyclic redundancy check algorithm. In this embodiment, the detailed description of step S620 may refer to the detailed description of step S220, which is not repeated herein.
Step S630, the information receiving end determines the authenticity of the message according to the relation between the first check code and the second check code.
And the information receiving end compares the calculated second check code with the acquired first check code sent by the information sending end to obtain a comparison result. If the first check code is the same as the second check code, the message receiving end determines that the message is true, and if the first check code is different from the second check code, the message receiving end determines that the message is false. In this embodiment, reference may be made to the detailed description of step S230 for a specific implementation of step S630, and details are not repeated herein.
The embodiment of the application provides a message checking method. In the method, an information sending end sends a message to an information receiving end, the information receiving end calculates a second check code based on the interactive information and the identity information in the message, compares the second check code with a first check code in the message, and judges the authenticity of the message according to the comparison result. In the message verification method, the information receiving end determines the authenticity of the message by comparing the verification code calculated by the information sending end according to the interactive information and the identity information with the verification code calculated by the information receiving end according to the interactive information and the identity information, and under the condition of not additionally increasing a network security strategy, the network security level of a vehicle can be improved to a certain extent through the identity information, and the development cost is reduced.
Fig. 7 shows a flowchart of a message verification method according to a fifth embodiment of the present application. The judgment process of the message checking method comprises the following steps:
step S701, obtaining a message sent by an information sending end.
Step S702, judging whether the network is connected.
If yes, step S705 is executed, and if no, step S703 is executed.
In step S703, it is determined whether the counter value is smaller than the second threshold.
If so, go to step S706, otherwise go to step S704.
In step S704, it is determined whether the counter value is less than the first threshold and greater than or equal to the second threshold.
If so, step S707 is executed, and if not, step S708 is executed.
In step S705, it is determined whether the counter value is greater than or equal to the first threshold.
If so, step S708 is executed, and if not, step S707 is executed.
In step S706, no operation is performed.
In step S707, the fault code is recorded and saved.
In step S708, it is determined whether the information receiving end and the associated device are in the same sub-network.
If yes, step S709 is executed, otherwise, step S710 is executed.
Step S709, sends an alarm signal to the associated device.
Step S710, forwarding the alarm signal to the associated device via the gateway.
It should be understood that, in the message verification method provided in this embodiment, detailed descriptions of steps S210 to S230, or steps S410 to S460, or steps S510 to S550 may be referred to for implementation of specific steps thereof, and are not described herein again.
Referring to fig. 8, a block diagram of a structure of a message checking apparatus 800 according to the present application is provided, where the message checking apparatus 800 includes: an obtaining module 810, a calculating module 820, and a determining authenticity module 830.
The obtaining module 810 is configured to obtain a message sent by an information sending end; the message comprises interaction information, identity information and a first check code; the identity information comprises at least two of an application platform code number, a sub-network number, an information sending end code number and a message number; the calculation module 820 is configured to calculate a second check code according to a preset algorithm based on the identity information and the interaction information; the authenticity determining module 830 is configured to determine authenticity of the message according to a relationship between the first check code and the second check code.
The embodiment of the application provides a message checking device. In the device, an information receiving end obtains a message sent by an information sending end, the information receiving end calculates a second check code based on the interactive information and the identity information in the message, compares the second check code with a first check code in the message, and judges the authenticity of the message according to a comparison result. In the message verification device, the authenticity of the message is determined by comparing the relationship between the verification code calculated by the information sending end according to the interactive information and the identity information and the verification code calculated by the information receiving end according to the interactive information and the identity information, so that the network security level of the vehicle can be improved to a certain extent through the identity information without additionally increasing a network security policy, and the development cost is reduced. Furthermore, the identity information in the message is composed of different numbers, so that the uniqueness of the identity information corresponding to the message can be ensured from different dimensions, and the cracking difficulty of the message is also improved to a certain extent.
In some embodiments, the first check code is calculated according to a preset algorithm according to the identity information and the interaction information. The authenticity determining module 830 is further configured to detect whether the first check code is the same as the second check code, so as to obtain a detection result; the detection result comprises the following steps: if the first check code is the same as the second check code, determining that the message is true; and if the first check code is different from the second check code, determining that the message is false.
In some embodiments, the predetermined algorithm comprises a cyclic redundancy check algorithm and the message comprises a plurality of bytes of content. The calculating module 820 is further configured to calculate, according to a cyclic redundancy check algorithm, based on the content of the plurality of bytes in the identity information and the content of the plurality of bytes in the interaction information, to obtain a cyclic redundancy check value; and taking the cyclic redundancy check value as a second check code.
As an embodiment, the information receiving end includes a counter. The message checking device 800 further comprises an execution alarm policy module, where the execution alarm policy module is configured to accumulate a first value by using the timer value if the message is true, and the first value is a negative value; if the message is false, accumulating a second value by the timer value, wherein the second value is a positive value; and acquiring a timer value, and executing a message alarm strategy corresponding to the counter value, wherein the message alarm strategy represents that the message is abnormal.
In some embodiments, the execution alarm policy module is further configured to determine that the detection result is that the message is abnormal if the timer value is greater than or equal to the first threshold value; sending an alarm signal to an associated device, the associated device including at least one of: a remote control unit, a body control unit, and an instrument desk controller of the vehicle.
In some embodiments, the enforcement alarm policy module is further configured to send a wake-on-lan request to the communication bus of the vehicle if the timer value is greater than or equal to the first threshold, the wake-on-lan request being configured to instruct the communication bus to maintain the network of the vehicle in a wake-up state for a predetermined period of time.
As an implementation manner, the message verification apparatus 800 further includes a response instruction module, where the response instruction module is configured to respond to an instruction corresponding to the interaction information when the message is true; and under the condition that the message is false, not responding to the instruction corresponding to the interactive information.
It should be noted that, in the apparatus embodiment of the present application, the method embodiment corresponds to the foregoing method embodiment, the specific implementation principle of each unit in the apparatus embodiment is similar to that in the foregoing method embodiment, and specific contents in the apparatus embodiment may refer to the method embodiment, which is not described in detail in the apparatus embodiment.
Referring to fig. 9, a block diagram of a vehicle according to the present application is shown.
Based on the message verification method and the message verification device, another vehicle 900 capable of executing the message verification method is further provided in the embodiment of the present application. The vehicle 900 includes one or more processors 910 (only one shown) and a memory 920 coupled to each other. The memory 920 stores programs that can execute the contents of the foregoing embodiments, and the processor 910 can execute the programs stored in the memory 920.
Processor 910 may include one or more cores for processing data, among other things. The processor 910 interfaces with various components throughout the vehicle 900 using various interfaces and circuitry to perform various functions of the intelligent switch 900 and process data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 920 and invoking data stored in the memory 920. Alternatively, the processor 910 may be implemented in hardware using at least one of Digital Signal Processing (DSP), Field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA). The processor 910 may integrate one or more of a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a modem, and the like. Wherein, the CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for rendering and drawing display content; the modem is used to handle wireless communications. It is understood that the modem may not be integrated into the processor 910, but may be implemented by a communication chip.
The Memory 920 may include a Random Access Memory (RAM) or a Read-Only Memory (Read-Only Memory). The memory 920 may be used to store instructions, programs, code sets, or instruction sets. The memory 920 may include a stored program area and a stored data area, wherein the stored program area may store instructions for implementing an operating system, instructions for implementing at least one function (such as a touch function, a sound playing function, an image playing function, etc.), instructions for implementing various method embodiments described below, and the like.
Referring to fig. 10, a computer-readable storage medium is provided. The computer readable medium 1000 has stored therein a program code which can be called by a processor to execute the method described in the above method embodiments.
The computer-readable storage medium 1000 may be an electronic memory such as a flash memory, an EEPROM (electrically erasable programmable read only memory), an EPROM, a hard disk, or a ROM. Alternatively, the computer-readable storage medium 1000 includes a non-volatile computer-readable medium. The computer readable storage medium 1000 has storage space for program code 1010 for performing any of the method steps of the method described above. The program code can be read from or written to one or more computer program products. The program code 1010 may be compressed, for example, in a suitable form.
In summary, embodiments of the present application provide a message checking method, an apparatus, a vehicle, and a storage medium. In the method, an information receiving end obtains a message sent by an information sending end, the information receiving end calculates a second check code based on interactive information and identity information in the message, compares the second check code with a first check code in the message, and judges the authenticity of the message according to a comparison result. In the message checking method, the authenticity of the message is determined by comparing the relation between the checking code calculated by the information sending end according to the interactive information and the identity information and the checking code calculated by the information receiving end according to the interactive information and the identity information in the message, and under the condition of not additionally increasing a network security strategy, the network security grade of a vehicle can be improved to a certain extent through the identity information, and the development cost is reduced. Furthermore, the identity information in the message is composed of different numbers, so that the uniqueness of the identity information corresponding to the message can be ensured from different dimensions, and the cracking difficulty of the message is also improved to a certain extent.
In the description of the present specification, reference to the description of "one embodiment," "some embodiments," "an example," "a specific example," or "some examples" or the like means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present application. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Moreover, various embodiments or examples and features of various embodiments or examples described in this specification can be combined and combined by one skilled in the art without being mutually inconsistent.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one of the feature. In the description of the present application, "plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and the scope of the preferred embodiments of the present application includes other implementations in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
The logic and/or steps represented in the flowcharts or otherwise described herein, e.g., an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, various steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following technologies, which are well known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical feature diagrams may be equivalently replaced; such modifications and substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (11)

1. A message checking method is characterized by being applied to an information receiving end of a vehicle, and the method comprises the following steps:
acquiring a message sent by an information sending end; the message comprises interaction information, identity information and a first check code; the identity information comprises at least two of an application platform code number, a sub-network number, an information sending end code number and a message number;
calculating a second check code according to a preset algorithm based on the identity information and the interaction information;
and determining the authenticity of the message according to the relationship between the first check code and the second check code.
2. The method of claim 1, wherein the first check code is calculated according to the preset algorithm based on the identity information and the interaction information; the determining the authenticity of the message according to the relationship between the first check code and the second check code includes:
detecting whether the first check code is the same as the second check code to obtain a detection result;
the detection result comprises:
if the first check code is the same as the second check code, determining that the message is true;
and if the first check code is different from the second check code, determining that the message is false.
3. The method of claim 2, wherein the predetermined algorithm comprises a cyclic redundancy check algorithm, the message comprises a plurality of bytes of content, and the calculating a second check code according to the predetermined algorithm based on the identity information and the interaction information comprises:
calculating according to a cyclic redundancy check algorithm based on the content of the bytes in the identity information and the content of the bytes in the interaction information to obtain a cyclic redundancy check value;
using the cyclic redundancy check value as the second check code.
4. The method of claim 2, wherein the information receiving end comprises a counter; after detecting whether the first check code is the same as the second check code and obtaining a detection result, the method further includes:
if the message is true, accumulating a first value by the timer value, wherein the first value is a negative value;
if the message is false, accumulating a second value by the timer value, wherein the second value is a positive value;
and acquiring a timer value, and executing a message alarm strategy corresponding to the counter value, wherein the message alarm strategy represents that a message is abnormal.
5. The method of claim 4, wherein obtaining a timer value and implementing a message alert policy corresponding to the counter value comprises:
if the timer value is greater than or equal to a first threshold value, determining that the detection result is that the message is abnormal;
sending an alarm signal to associated equipment, wherein the associated equipment comprises at least one of the following equipment: the remote control unit, the vehicle body control unit and the instrument desk controller of the vehicle.
6. The method of claim 4, wherein obtaining a timer value and implementing a message alert policy corresponding to the counter value comprises:
and if the value of the timer is greater than or equal to a first threshold value, sending a network wakeup request to a communication bus of the vehicle, wherein the network wakeup request is used for indicating the communication bus to keep the network of the vehicle in a wakeup state within a preset time period.
7. The method of claim 2, wherein the method further comprises:
under the condition that the message is true, responding to an instruction corresponding to the interactive information;
and under the condition that the message is false, not responding to the instruction corresponding to the interactive information.
8. A message checking method is characterized in that the message checking method is applied to an electronic control system of a vehicle, wherein the electronic control system comprises an information receiving end and at least one information sending end; the method comprises the following steps:
the information sending end sends a message to the information receiving end; the message comprises interaction information, identity information and a first check code; the identity information comprises at least two of an application platform code number, a sub-network number, an information sending end code number and a message number;
the information receiving end calculates a second check code according to a preset algorithm based on the identity information and the interaction information;
and the information receiving end determines the authenticity of the message according to the relationship between the first check code and the second check code.
9. A message checking device is characterized in that the device is applied to an information receiving end of a vehicle; the device comprises:
the acquisition module is used for acquiring the message sent by the information sending end; the message comprises interaction information, identity information and a first check code; the identity information comprises at least two of an application platform code number, a sub-network number, an information sending end code number and a message number;
the computing module is used for computing a second check code according to a preset algorithm based on the identity information and the interaction information;
and the authenticity determining module is used for determining the authenticity of the message according to the relationship between the first check code and the second check code.
10. A vehicle comprising one or more processors and memory;
one or more programs stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to perform the method of any of claims 1-8.
11. A computer-readable storage medium storing program code executable by a processor, wherein the method of any one of claims 1-8 is performed when the program code is executed.
CN202210287605.8A 2022-03-22 2022-03-22 Message verification method, device, vehicle and storage medium Active CN114928465B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210287605.8A CN114928465B (en) 2022-03-22 2022-03-22 Message verification method, device, vehicle and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210287605.8A CN114928465B (en) 2022-03-22 2022-03-22 Message verification method, device, vehicle and storage medium

Publications (2)

Publication Number Publication Date
CN114928465A true CN114928465A (en) 2022-08-19
CN114928465B CN114928465B (en) 2023-08-29

Family

ID=82805075

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210287605.8A Active CN114928465B (en) 2022-03-22 2022-03-22 Message verification method, device, vehicle and storage medium

Country Status (1)

Country Link
CN (1) CN114928465B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103856288A (en) * 2012-12-04 2014-06-11 北汽福田汽车股份有限公司 CAN communication signal verification and transmission method and system for automobile
CN105527564A (en) * 2015-12-25 2016-04-27 中国南方电网有限责任公司电网技术研究中心 Self-diagnosis method and system for internal functions of FPGA (Field Programmable Gate Array)
CN106230875A (en) * 2016-05-23 2016-12-14 成都亿闻科技有限公司 Remote vehicle control method based on Internet of Things and device
US20160381066A1 (en) * 2015-06-29 2016-12-29 Argus Cyber Security Ltd. System and method for content based anomaly detection in an in-vehicle communication network
CN108011708A (en) * 2016-10-28 2018-05-08 长城汽车股份有限公司 The controller and vehicle of message encryption method, vehicle based on automobile bus
CN110213018A (en) * 2019-05-09 2019-09-06 北京汽车股份有限公司 Data communications method, device and the vehicle of vehicle bus

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103856288A (en) * 2012-12-04 2014-06-11 北汽福田汽车股份有限公司 CAN communication signal verification and transmission method and system for automobile
US20160381066A1 (en) * 2015-06-29 2016-12-29 Argus Cyber Security Ltd. System and method for content based anomaly detection in an in-vehicle communication network
CN105527564A (en) * 2015-12-25 2016-04-27 中国南方电网有限责任公司电网技术研究中心 Self-diagnosis method and system for internal functions of FPGA (Field Programmable Gate Array)
CN106230875A (en) * 2016-05-23 2016-12-14 成都亿闻科技有限公司 Remote vehicle control method based on Internet of Things and device
CN108011708A (en) * 2016-10-28 2018-05-08 长城汽车股份有限公司 The controller and vehicle of message encryption method, vehicle based on automobile bus
CN110213018A (en) * 2019-05-09 2019-09-06 北京汽车股份有限公司 Data communications method, device and the vehicle of vehicle bus

Also Published As

Publication number Publication date
CN114928465B (en) 2023-08-29

Similar Documents

Publication Publication Date Title
CN108833122B (en) Wake-up method and device for vehicle-mounted communication controller and storage medium
US10902109B2 (en) Misuse detection method, misuse detection electronic control unit, and misuse detection system
CN112491671B (en) Method and system for monitoring whole vehicle feed problem and vehicle CAN network gateway
JP6486484B2 (en) In-vehicle control device and information update system for in-vehicle control device
CN105872123B (en) Address coding method, battery monitoring unit, battery management unit and system
CN110545220B (en) Automobile diagnosis protocol detection method and related product
CN114257986A (en) Vehicle CAN network attack identification method and device
CN210839611U (en) Sleep and awakening device of in-vehicle hybrid network comprising vehicle-mounted Ethernet
CN105978971A (en) Message pushing method and device, and message pushing server
CN115348291A (en) Autosar network management flexible design method, system and medium
CN115995625A (en) Battery thermal runaway early warning method, device and storage medium
CN114928465A (en) Message checking method and device, vehicle and storage medium
CN104615065A (en) Data processing method and device for train network control system
CN112835735A (en) Method and system for solving abnormal sleeping and abnormal awakening of vehicle and vehicle
CN111540360A (en) Equipment awakening method and equipment awakening system
CN205186046U (en) Electric automobile and controller and control system thereof
CN114666869B (en) Equipment network distribution method and device, computer equipment and storage medium
CN107548019B (en) Method and device for processing network beacon in wireless sensor network
CN109922453A (en) Safety precaution analysis alarm system and method based on artificial intelligence
CN110177032B (en) Message routing quality monitoring method and gateway controller
EP4361798A1 (en) Method for updating electronic control unit (ecu), ecu, and terminal
CN113923695A (en) Awakening fault detection method and device and message sending method and device
CN111993953B (en) Battery control method, power automobile and readable storage medium
CN116600262B (en) Method and device for determining sleep wakeup abnormality, electronic equipment and storage medium
CN118590520A (en) Local network management method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant