EP2540053A1 - System and method for preventing an attack on a networked vehicle - Google Patents
System and method for preventing an attack on a networked vehicleInfo
- Publication number
- EP2540053A1 EP2540053A1 EP11703708A EP11703708A EP2540053A1 EP 2540053 A1 EP2540053 A1 EP 2540053A1 EP 11703708 A EP11703708 A EP 11703708A EP 11703708 A EP11703708 A EP 11703708A EP 2540053 A1 EP2540053 A1 EP 2540053A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- vehicle
- security status
- network
- network access
- evaluation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/088—Access security using filters or firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/126—Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
- H04W4/44—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
Definitions
- the invention relates to a system for preventing an attack on a networked vehicle via a wireless communication device of a vehicle according to the preamble of patent claim 1 and a corresponding method.
- 15 wireless connections can load from one or more data networks.
- a communication interface (Communication Box, ComBox) can be installed in vehicles
- radio standards eg GSM / GPRS
- EDGE UMTS
- HSDPA High Speed Downlink Packet Access
- LTE Long Term Evolution
- WLAN Wireless Local Area Network
- WiMAX WiMAX
- Radio beacons Road Side Units
- the object of the present invention is therefore to provide a system and a method which is suitable for preventing an attack on a networked vehicle via a wireless communication device and thereby solving one or more disadvantages of the prior art.
- a system for preventing an attack on a networked vehicle via a wireless communication device of a vehicle comprises a wireless traffic network, a security status determination device for regulating access to the wireless traffic network in dependence on a determined security status, the security status being based on an evaluation of a current configuration of the vehicle and / or log data of the vehicle and / or. or based on an elapsed time since an update of a related software.
- the system has a communication device suitable for connection to the wireless traffic network and an access control device for regulating network access to the wireless traffic network, which is connectable to the security status determination device on.
- the invention also relates to a method for a system for preventing an attack on a networked vehicle via a wireless communication device of a vehicle, wherein a safety status is determined based on an evaluation of a current configuration of the vehicle and / or log data of the vehicle and / or based on an elapsed time since an update of any relevant software. Furthermore, the method has the determination of a network access rule set for access to the data traffic network on the basis of the determined security status, which is subsequently activated.
- FIG. 1 is a schematic representation of an embodiment of a system according to the invention
- 5 shows a further exemplary method according to the invention according to a third embodiment
- 6 shows a further exemplary method according to the invention according to a fourth embodiment
- Fig. 8 is a schematic representation of another imple mentation of a system according to the invention.
- FIG. 1 shows a vehicle having an on-board unit (OBU), which is connected via a communication device using different mobile radio systems, eg. UMTS, LTE, GPRS, WiMAX, WLan, can communicate with infrastructure servers in an exemplary data network.
- OBU on-board unit
- An exemplary infrastructure server may e.g. B. a download server (DL), the downloads z. B. for music offers.
- Another InfrastructureServer can, for.
- a vehicle management server (VM) that configures and monitors the vehicle, e.g. For example, to diagnose or import software updates.
- Yet another Infrastructure Server may be a Vehicle Online Services Server (VOS) that provides online services, e.g. B. current weather and traffic information provides.
- VOS Vehicle Online Services Server
- VSSES Vehicle Security Status Evaluation Server
- the vehicle or the OBU can communicate with other vehicles or OBUs via car-2-car communication (C2C) or with a permanently installed road side unit (RSU).
- Figure 2 shows a section of a possible arrangement of components according to the invention with respect to an in-vehicle bus system.
- Transceiver units are connected to an exemplary communication device (ComBox) in order to be able to use different radio systems (UMTS, HSDPA, WLAN, broadcast, WAVE (C2C)).
- UMTS UMTS, HSDPA, WLAN, broadcast, WAVE (C2C)
- UMTS exemplary communication device
- HSDPA High Speed Downlink Packet Access
- WLAN Wireless Fidelity
- WAVE WAVE
- an exemplary Ethernet vehicle bus an infotainment system with an exemplary head unit, as well as by way of example with two units for the rear seats, so-called rear seat entertainment (RSE1, RSE2), is connected.
- RSE1, RSE2 rear seat entertainment
- Ethernet could also z.
- a gateway Via a gateway (GW) two ECUs ECU1, ECU2 are connected via another protocol, eg.
- the CAN protocol can communicate.
- NAEE Network Access Enforcement Engine
- This network access policy set (AOAP) is selected or defined by a Network Access Policy Selection (NAPS) selection function, which may be dependent on the result of the security self-evaluation (SSE).
- SSE security self-evaluation
- the network access rule set can also depend on further parameters.
- the ComBox may include a Network Access Control Policy Enforcement Unit that restricts network traffic from / to "outside," ie, to the transceiver units, and may perform an evaluation of security status determine a security rule set that you activate and enforce can put. Furthermore, it can optionally also change the configuration of network communication filters (firewall functions) of other components of the vehicle via a control command. In particular, it can change a network communication filter of the gateway (GW), a unit of the infotainment system (HU, RSE1, RSE2) or a radio module accordingly.
- GW network communication filter of the gateway
- HU infotainment system
- RSE1 infotainment system
- RSE2 infotainment system
- FIG. 3 shows an exemplary method according to the invention according to a first embodiment.
- the method is started in step 100.
- the process can be started by numerous events. So z. B. be provided that when you turn on the ignition, when you start the vehicle engine, when you turn on / activate the infotainment system when connecting (activation of the ComBox), or even after a configuration change / software update or even regularly, for. B. Scheduled (eg every hour) the process is started.
- step 300 the current vehicle security status is determined in a step 300.
- a network access rule set is determined in step 400, which is activated in step 900.
- step 1000 the method terminates in step 1000.
- all steps can proceed autonomously in the vehicle and be arranged in a corresponding manner in the ComBox or the OBU.
- a network access rule set "NULL” / "CLOSED” / "DENY ALL” can be explicitly activated immediately after the start in step 100 in a step 200, not illustrated here, in order to eliminate any OTA Prevent communication prior to activation of the determined network access rule set in step 300.
- FIG. 4 shows an exemplary method according to the invention according to a second embodiment. In this case, the method is started in step 100.
- step 500 an initial network access rule set is activated. Thereafter, the current configuration of the vehicle and / or log data of the vehicle and / or the elapsed time since an update of a respective software to an evaluation server (VSSES) for determining the security status are transmitted in a step 600.
- the result of the determination of the security status is received in step 700, whereupon in a step 800 a suitable network access rule set is determined.
- the particular network access policy set is then activated in step 900. Subsequently, the method terminates in step 1000.
- an evaluation takes place on an external server.
- the method may be referred to as server-assisted evaluation.
- FIG. 5 shows yet another exemplary method according to the invention according to a third embodiment.
- the method is started in step 100.
- a network access rule set "NULL” / "CLOSED” / "DENY ALL” can be explicitly activated in step 200 in order to prevent any OTA communication for the time being before the activated network access rule set is activated
- Current vehicle security status determined in a step 300.
- step 500 an initial network access rule set is activated.
- step 600 Thereafter, current configuration of the vehicle and / or log data of the vehicle and / or an elapsed time since an update of a respective software is transmitted to an evaluation server (VSSES) for determining the safety status in a step 600.
- VSSES evaluation server
- the result of the determination of the security status is received in step 700, whereupon in a step 800 a suitable network access rule set is determined.
- the particular network access rule set is then activated in step 900. Subsequently, the method terminates in step 1000.
- This embodiment can be referred to as a multi-level query of the security status, wherein both evaluation can run autonomously in the vehicle and can be arranged in the ComBox or the OBU in the same way as well as an evaluation can take place on an external server.
- FIG. 6 also shows an exemplary method according to the invention according to a fourth embodiment. In this case, the method is started in step 100.
- a network access rule set "NULL” / "CLOSED” / "DENY ALL” can be explicitly activated in step 200 in order to prevent any OTA communication for the time being before the activation of the determined network access rule set. Subsequently, the current vehicle security status is determined in a step 300.
- step 400 On the basis of the determined vehicle security status, it is determined in step 400 whether safety requirements have been met. If the requirements are met, in a step 900a a network access rule set is activated which activates the OTA communication. Subsequently, the method terminates in step 1000.
- a server-assisted evaluation is initiated. This starts by activating an initial network access rule set in step 500. Thereafter, the current configuration of the vehicle and / or log data of the vehicle and / or the elapsed time since an update of a relevant software to an evaluation server (VSSES) to determine the security status in transmitted to a step 600. The result of the determination of the security status is received in step 700.
- VSSES evaluation server
- step 800 it is checked whether the received evaluation result is sufficient, ie it is determined which network access rule set is activated. If the result of the evaluation is sufficient to designate the system as safe, then in step 900a a network access rule set is activated which activates the OTA communication. Thereafter, the method terminates in step 1000. If the evaluation result is not sufficient to designate the system as secure, a network access rule set "NULL” / "CLOSED” / "DENY ALL" is explicitly activated in step 900b in order to eliminate any OTA To prevent communication from activating the determined network access rule set for the time being, the method then terminates in step 1000. That is, the server is requested only if the vehicle itself is "not secure,” if it is in a secure security status.
- Figure 7 illustrates a message flow according to the invention, in accordance with an embodiment of the invention.
- a vehicle configuration is determined in a first step 2100.
- the communication interface is activated in the vehicle in a further step 2200.
- This communication may include a plurality of messages exchanged between the communication interface and the security status determination device 14.
- the determination may be made a security status can be activated by an appropriate e request is sent to the SEE.
- This requirement can already include as parameters a current configuration of the vehicle and / or log data of the vehicle and / or an elapsed time since an update of the relevant software.
- the SEE evaluates a configuration based on the obtained parameters, i. H. a security status, and provides this in a further step 26000 the vehicle.
- the vehicle can now by a suitable device, for.
- an access control device can activate a corresponding network access rule set for access to the data traffic network.
- the vehicle configuration information can already be present in the Vehicle Security Status Evaluation Server (VSSES) or can be queried by a vehicle manager.
- VSSES Vehicle Security Status Evaluation Server
- FIG. 8 shows a schematic representation of a further embodiment of a system according to the invention. It is assumed that a vehicle has an on-board unit OBU which communicates with infrastructure servers via a communication device using different mobile radio systems.
- OBU on-board unit
- the Vehicle Manager VM is connected to or has a vehicle database VDB.
- This database stores configuration information for vehicles managed by Vehicle Manager.
- the communication or parts of the communication can take place via a Trusted Vehicle Online Communication Proxy (TVOCP).
- TVOCP Trusted Vehicle Online Communication Proxy
- VOS vehicle online service
- This communication can be tunnelled between the vehicle and the TVOCP by, for. B. a VPN from the vehicle to the TVOCP is established.
- the HTTPOCP can be implemented as an HTTP proxy for HTTP. Then no tunneling must be done, but HTTP requests can also be sent directly from the vehicle to the TVOCP, which - if necessary modified - to a destination server, eg. B. one VOS, forwards. The response to such a request can be transmitted from the target server VOS to the TVOCP, which can forward it - possibly modified again - to the vehicle.
- the vehicle can authenticate itself to the TVOCP.
- the TVOCP can then query the current configuration of the vehicle from the vehicle database VDB. This configuration is analyzed to determine whether B. current security patches are recorded. Depending on this, a network access rule set or several network access rule sets will be enforced for this vehicle.
- This TVOCP is based on the evaluation, eg. Depending on the type of vehicle and the configuration of the vehicle, defined network access policy, d. That is, only the communication that is allowed by the defined network access rules is enabled. Other communication is blocked.
- the vehicle can already transmit further information about itself (manufacturer, series, chassis number / VIN, configuration information).
- the information about the vehicle can be requested by the TVOCP from a database;
- information may be requested from a vehicle manager (VM) or from the database (VDB) used by the VM to store configuration information of a vehicle.
- VM vehicle manager
- VDB database
- information about the software status of a particular vehicle is available here. In particular, it can be considered whether current software updates (critical security updates) have been recorded. If necessary, the VM can be triggered by the TVOCP to query the current configuration from the vehicle.
- a TVOCP can also actively scan a vehicle to obtain information about the vehicle.
- a network access rule can be determined by the TVOCP, which is enforced in the following communication of the vehicle.
- a communication can optionally be redirected to another server, or the TVOCP responds proxy.
- an HTTP request from the vehicle may be intercepted by the TVOCP and an HTTP REDIRECT message transmitted to the vehicle redirecting the vehicle client to another HTTP server. There can then z.
- a web page may be displayed in HTML that informs the driver that the access has been blocked and why.
- information can be transmitted to the vehicle by the TVOCP that the vehicle should contact the VM server. This can be done, for example, by inserting a special HTTP header into an HTTP response that is transmitted to the vehicle. This allows the VM server z. For example, transfer available software updates to the vehicle.
- the TVOCP can transmit information to the VM server that the vehicle is currently online. For pending updates, the VM server can initiate a management session with the vehicle. By sending a trigger SMS message.
- each application or protocol used may be re-and separate, with different network access policy sets for different applications and different approaches to security status detection coexisting.
- the evaluation function can load the current configuration of the vehicle and / or the log data and / or the information about how long ago the last update was or when the last update was checked or if pending updates are also loaded and have been installed, check.
- Updates can for example be played by a workshop. This can be z. B. via a workshop tester, which is connected via a diagnostic interface with the vehicle.
- updates can also be made by the user himself, for. B. by means of update medium, z. CD / DVD, USB stick, memory card, etc., or by updating from one Update server via the radio communication interfaces are loaded (OTA Seif Update).
- the vehicle communicates with a Vehicle Management Server (VM) to receive information about deployed updates and, if necessary, to load and install them.
- VM Vehicle Management Server
- network access rules can then be determined and activated for enforcement.
- two network access rule sets can be defined (UNRESTRICTED, RESTRICTED). If the result of the evaluation is that the vehicle is in a safe configuration status (eg pending safety-critical updates have been checked and installed within the last 7 days), then the network access rule set UNRESTRICTED is activated (enables, for example, free , direct internet access). Otherwise, the network access rule set RESTRICTED is activated, in which only trusted web services offered directly by the vehicle manufacturer can be accessed.
- the vehicle may transmit parameters to a Vehicle Security Status Evaluation Server (VSSES) or, more generally, a Security Status Investigation Facility (SEE) and in return receive an evaluation result ,
- VSSES Vehicle Security Status Evaluation Server
- SEE Security Status Investigation Facility
- the transmitted parameters may include:
- Identification of the vehicle eg VIN, VIN
- Vehicle type information (manufacturer, model, year of manufacture, installed accessories), - configuration information (built-in components, software version),
- VDB a database
- OMA Open Mobile Al- liance
- the evaluation result may include:
- the Vehicle Security Status Evaluation Server is, for example, a server of the vehicle manufacturer or of a communications provider. Authentication takes place between server and vehicle.
- the communication can z. B. be protected by IPSec, SSL or TLS protocol.
- the information can z. Via HTTP, SOAP, OMA DM, SyncML, SNMP.
- the VSSES is described as a self-contained unit, it may be included in other units. So the VSSES z. For example, it could be part of a VM server that might provide updates.
- Some network access rule sets may be predefined, e.g. B .:
- INFRASTRUCTRE allow any communication with infrastructure services (also direct), but not vehicle-to-vehicle communication;
- - MANAGED INFRASTRUCTURE allow any (even direct) communication with infrastructure services, but only use mobile networks operated by a known infrastructure operator (eg only GPRS, UMTS / HSDPA via Vodafone, T-Mobile or Orange, but not WLAN);
- a known infrastructure operator eg only GPRS, UMTS / HSDPA via Vodafone, T-Mobile or Orange, but not WLAN;
- - TUNNEL Communication tunnels to Trusted Gateway (traffic is tunneled and sent to VPN servers where it can be parsed and filtered before being forwarded to, for example, an Internet server; Server is coming, will be further processed);
- a network access rule set can also be provided by the Vehicle Security Status Evaluation Server (VSSES) or another server. It can also be fine granular network access rule sets are defined: It can, for. For example, content filtering can be performed to filter dangerous content for the car. For example, game, Flash content or JavaScripts on web pages are only allowed to pass if a particular vehicle has loaded the current security patches for the corresponding display programs.
- VSSES Vehicle Security Status Evaluation Server
- content filtering can be performed to filter dangerous content for the car.
- game, Flash content or JavaScripts on web pages are only allowed to pass if a particular vehicle has loaded the current security patches for the corresponding display programs.
- the content of a network access rule set may, for. For example, you may require the use of a firewall and a VPN.
- a network access rule set consists of rules. These describe what type of network traffic is to be handled and how it is handled
- - tunneling is (tunnel; encapsulate), d. H. is to be transmitted via a VPN tunnel;
- restrictions may be imposed on permitted traffic, in particular restrictions on the maximum data rate, e.g. B. to prevent the overload of target components.
- Possible filter criteria include:
- Vehicle Manufacturer Vehicle Manufacturer, Model, Version / Year,
- Target component in the vehicle ie to which control unit the data are forwarded or from which control unit they originate
- - OTA interface GPRS, UMTS, WLAN, ...
- - current OTA network operators eg T-Mobile, Vodafone, unknown
- country Germany, France, ...
- Protocol e.g., TCP, UDP
- DoS denial of service
- network access rules can also refer to content, the so-called content (web pages, multimedia files, program code):
- Code Access Security is known, eg. For example, the Microsoft Common Language Runtime or the Java Runtime Environment.
- Program code is granted access rights depending on its origin (ie depending on who signed it or from where it was loaded).
- New Now, depending on the security evaluation, the entitlements granted to a particular code are set; or it is defined depending on the evaluation result whether a specific code can be executed at all. For example, in this way the execution of Untrusted Code / Downloaded 3rd Party Code can be prevented if the patch status of the vehicle component is not up-to-date.
- the selected network access rule set is preferably enforced by the communication unit of the vehicle. Alternatively, this can also be done by a separate, upstream Si cherheitskommunikationsaku.
- vehicle internal i board network by access control device (vehicle bus gate ways, control devices) filtering the communication.
- the communication unit or the security communication unit can transmit information to this access control device via the vehicle security status (indicator, filter rules), thereby adapting its network access rules accordingly.
- the respective component can also individually perform the described method.
- the user should preferably receive an indication to install security patches in time or as soon as possible in order to be able to continue to use all services.
- Vehicle components receive full access to the outside only at the current security update status of the software, since they can then fend off the attacks that occur from the network. This ensures reliable vehicle operation.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102010008816A DE102010008816A1 (en) | 2010-02-22 | 2010-02-22 | Method for online communication |
PCT/EP2011/052362 WO2011101414A1 (en) | 2010-02-22 | 2011-02-17 | System and method for preventing an attack on a networked vehicle |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2540053A1 true EP2540053A1 (en) | 2013-01-02 |
Family
ID=43904033
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP11703708A Withdrawn EP2540053A1 (en) | 2010-02-22 | 2011-02-17 | System and method for preventing an attack on a networked vehicle |
Country Status (5)
Country | Link |
---|---|
US (1) | US9843926B2 (en) |
EP (1) | EP2540053A1 (en) |
CN (1) | CN102893574B (en) |
DE (1) | DE102010008816A1 (en) |
WO (1) | WO2011101414A1 (en) |
Families Citing this family (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8874280B2 (en) * | 2010-09-27 | 2014-10-28 | Nec Corporation | Information processing system, method for checking vehicle, and program for checking vehicle |
DE102012208205A1 (en) * | 2012-05-16 | 2013-11-21 | Bayerische Motoren Werke Aktiengesellschaft | Data logging or stimulation in automotive Ethernet networks using the vehicle infrastructure |
DE102013202064A1 (en) | 2013-02-08 | 2014-08-14 | Bayerische Motoren Werke Aktiengesellschaft | Method and device for connecting a diagnostic device to a control device in a motor vehicle |
DE102013003040B4 (en) | 2013-02-22 | 2015-11-12 | Audi Ag | Motor vehicle with later by application program changeable driving behavior and method for this purpose |
US20140380296A1 (en) * | 2013-06-20 | 2014-12-25 | General Motors Llc | Re-programming vehicle modules |
WO2014210215A1 (en) * | 2013-06-25 | 2014-12-31 | Fedex Corporation | Transport communication management |
WO2015095575A1 (en) | 2013-12-18 | 2015-06-25 | Fedex Corporation | Methods and systems for data structure optimization |
US10140109B2 (en) * | 2014-02-25 | 2018-11-27 | Ford Global Technologies, Llc | Silent in-vehicle software updates |
CN110610092B (en) | 2014-04-17 | 2023-06-06 | 松下电器(美国)知识产权公司 | In-vehicle network system, gateway device, and abnormality detection method |
CN105704102B (en) * | 2014-11-26 | 2019-06-07 | 广州汽车集团股份有限公司 | Vehicle network access control method and device |
DE102014226831A1 (en) * | 2014-12-22 | 2016-06-23 | Continental Automotive Gmbh | Device for controlling the wireless communication of a motor vehicle |
WO2017024078A1 (en) | 2015-08-03 | 2017-02-09 | Icon Labs | A method for detecting, blocking and reporting cyber-attacks against automotive electronic control units |
US10277597B2 (en) | 2015-11-09 | 2019-04-30 | Silvercar, Inc. | Vehicle access systems and methods |
DE102016201307A1 (en) * | 2016-01-28 | 2017-08-03 | Robert Bosch Gmbh | A method of reporting a defect of a motor vehicle |
DE102016205002A1 (en) * | 2016-03-24 | 2017-09-28 | Volkswagen Aktiengesellschaft | Method for managing collected vehicle data |
DE102016204999A1 (en) * | 2016-03-24 | 2017-09-28 | Volkswagen Aktiengesellschaft | Method for monitoring the security of communication links of a vehicle |
DE102016205132A1 (en) * | 2016-03-29 | 2017-10-05 | Robert Bosch Gmbh | Device and method for filtering a data transfer, and a gateway control unit |
JP6485429B2 (en) * | 2016-11-04 | 2019-03-20 | トヨタ自動車株式会社 | In-vehicle network system |
EP3382976A1 (en) * | 2017-03-30 | 2018-10-03 | Siemens Aktiengesellschaft | Protective device, method and apparatus comprising a protection device for protecting a communication network associated with the device |
DE102017208712A1 (en) * | 2017-05-23 | 2018-11-29 | Siemens Aktiengesellschaft | Communication arrangement and method for its operation |
CN111032438B (en) * | 2017-08-10 | 2023-05-02 | 住友电气工业株式会社 | Control apparatus, control method, and computer program |
US10679493B2 (en) * | 2017-09-18 | 2020-06-09 | International Business Machines Corporation | Cognitive-based incident response |
US10802483B2 (en) * | 2017-10-19 | 2020-10-13 | International Business Machines Corporation | Emergency public deactivation of autonomous vehicles |
DE102017219770B4 (en) | 2017-11-07 | 2019-06-19 | Continental Automotive Gmbh | Method for operating an Ethernet communication device and Ethernet communication device |
JP6552674B1 (en) * | 2018-04-27 | 2019-07-31 | 三菱電機株式会社 | Inspection system |
DE102018130588B4 (en) * | 2018-11-30 | 2020-12-03 | DE-CIX Management GmbH | Computer-implemented procedure to defend against or mitigate DDoS attacks on IT infrastructures |
CN110290496A (en) * | 2019-06-17 | 2019-09-27 | 高新兴物联科技有限公司 | A kind of V2X upgrade-system and upgrade method |
DE102019120331A1 (en) * | 2019-07-26 | 2021-01-28 | itemis France SAS | Data transfer to an IoT device |
FR3101745A1 (en) * | 2019-10-08 | 2021-04-09 | Psa Automobiles Sa | Method of accessing a connected service from a motor vehicle |
US11704106B2 (en) * | 2019-11-08 | 2023-07-18 | Toyota Jidosha Kabushiki Kaisha | Program update system and vehicle management server |
DE102019220450A1 (en) * | 2019-12-20 | 2021-06-24 | Robert Bosch Gmbh | Device with an interface and method for operating a device with an interface |
DE102020216065A1 (en) | 2019-12-20 | 2021-06-24 | Robert Bosch Gesellschaft mit beschränkter Haftung | Device with an interface and method for operating a device with an interface |
EP3869471A1 (en) * | 2020-02-24 | 2021-08-25 | Continental Automotive GmbH | Communication method comprising a server and a plurality of on-board units and on-board unit |
GB202303224D0 (en) * | 2020-12-23 | 2023-04-19 | Motional Ad Llc | Security gateway |
CN114973700B (en) * | 2022-05-18 | 2024-03-26 | 浙江嘉兴数字城市实验室有限公司 | Traffic signal network security device based on vehicle-road cooperative application and working method |
WO2024127532A1 (en) * | 2022-12-13 | 2024-06-20 | パナソニックIpマネジメント株式会社 | Access permission device and access permission method |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1956794A2 (en) * | 2007-02-07 | 2008-08-13 | Hitachi, Ltd. | On-vehicle gateway device |
Family Cites Families (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6144859A (en) * | 1993-08-27 | 2000-11-07 | Aeris Communications, Inc. | Wireless cellular communicator system and apparatus |
US6052646A (en) * | 1998-04-15 | 2000-04-18 | Magellan Dis, Inc. | Vehicle navigation system with improved powerup performance |
US6647270B1 (en) * | 1999-09-10 | 2003-11-11 | Richard B. Himmelstein | Vehicletalk |
AU7861700A (en) * | 1999-10-06 | 2001-05-10 | Sensoria Corporation | Method for collecting data using compact internetworked wireless integrated network sensors (wins) |
US6389337B1 (en) * | 2000-04-24 | 2002-05-14 | H. Brock Kolls | Transacting e-commerce and conducting e-business related to identifying and procuring automotive service and vehicle replacement parts |
JP2002127873A (en) * | 2000-10-27 | 2002-05-09 | Auto Network Gijutsu Kenkyusho:Kk | Checking system for automobile burglary prevention |
US7987510B2 (en) * | 2001-03-28 | 2011-07-26 | Rovi Solutions Corporation | Self-protecting digital content |
US7061367B2 (en) * | 2002-04-30 | 2006-06-13 | General Electric Company | Managing access to physical assets |
US6832141B2 (en) * | 2002-10-25 | 2004-12-14 | Davis Instruments | Module for monitoring vehicle operation through onboard diagnostic port |
US20040263316A1 (en) * | 2003-06-24 | 2004-12-30 | Case, Llc | Reprogrammable vehicle access control system |
US7355299B2 (en) * | 2003-07-29 | 2008-04-08 | Lear Corporation | Non-ignition switch vehicle ignition enabling system |
US7716726B2 (en) | 2004-02-13 | 2010-05-11 | Microsoft Corporation | System and method for protecting a computing device from computer exploits delivered over a networked environment in a secured communication |
JP4270031B2 (en) * | 2004-06-09 | 2009-05-27 | 株式会社デンソー | In-vehicle information registration / disclosure system, in-vehicle device and portable device |
FR2880225A1 (en) | 2004-12-23 | 2006-06-30 | Toplica Petkovic | Traffic accident prevention assisting device for use in e.g. motor vehicle, has control units for parametering device, to activate and deactivate entire device or communication disturbing unit only |
US7418317B2 (en) * | 2005-03-10 | 2008-08-26 | Aai Corporation | System and method for controlling and communicating with a vehicle |
US20060224305A1 (en) * | 2005-04-01 | 2006-10-05 | Siemens Vdo Automotive Corporation | Vehicle unit for controlling communications between a vehicle and a wireless device |
JP4755181B2 (en) * | 2005-04-21 | 2011-08-24 | 三菱電機株式会社 | Computer and computer resource access control method and access control program |
DE102005028663B4 (en) | 2005-06-15 | 2024-10-24 | Volkswagen Ag | Method and device for securely communicating a component of a vehicle via a wireless communication connection with an external communication partner |
JP5162103B2 (en) * | 2006-05-15 | 2013-03-13 | トヨタ自動車株式会社 | Support control device |
US20080027602A1 (en) * | 2006-05-30 | 2008-01-31 | Yeap Tet H | System and method for deterring theft of vehicles and other products having integral computer means |
DE102006042974B4 (en) * | 2006-09-13 | 2009-07-23 | Continental Automotive Gmbh | Method for access control to a vehicle |
WO2008086507A1 (en) * | 2007-01-10 | 2008-07-17 | Decision Sciences Corporation | Information collecting and decision making via tiered information network systems |
US8319605B2 (en) * | 2007-06-19 | 2012-11-27 | Magna Electronics, Inc. | Remote vehicle control system utilizing multiple antennas |
US7970381B2 (en) | 2007-08-13 | 2011-06-28 | General Motors Llc | Method of authenticating a short message service (sms) message |
DE102007044398B4 (en) * | 2007-09-18 | 2012-10-04 | Continental Automotive Gmbh | Anti-theft system for a vehicle and method of operating an anti-theft system |
JP2009163430A (en) * | 2007-12-28 | 2009-07-23 | Sony Corp | Security-feature-equipped on-vehicle device and security feature control method of on-vehicle device |
CN101262333B (en) | 2008-04-21 | 2010-06-02 | 上海大学 | A secure communication method between nodes in vehicular network |
US8370644B2 (en) * | 2008-05-30 | 2013-02-05 | Spansion Llc | Instant hardware erase for content reset and pseudo-random number generation |
US20090300365A1 (en) * | 2008-05-30 | 2009-12-03 | Robert Karmes | Vehicle Diagnostic System Security with Memory Card |
US20100087981A1 (en) * | 2008-10-02 | 2010-04-08 | Daniel Guadalupe Orozco-Perez | Versatile vehicular care assistant system and method |
-
2010
- 2010-02-22 DE DE102010008816A patent/DE102010008816A1/en not_active Ceased
-
2011
- 2011-02-17 CN CN201180010608.7A patent/CN102893574B/en active Active
- 2011-02-17 WO PCT/EP2011/052362 patent/WO2011101414A1/en active Application Filing
- 2011-02-17 EP EP11703708A patent/EP2540053A1/en not_active Withdrawn
- 2011-02-17 US US13/580,658 patent/US9843926B2/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1956794A2 (en) * | 2007-02-07 | 2008-08-13 | Hitachi, Ltd. | On-vehicle gateway device |
Also Published As
Publication number | Publication date |
---|---|
CN102893574B (en) | 2018-05-18 |
DE102010008816A1 (en) | 2011-08-25 |
US9843926B2 (en) | 2017-12-12 |
WO2011101414A1 (en) | 2011-08-25 |
CN102893574A (en) | 2013-01-23 |
US20130104186A1 (en) | 2013-04-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2011101414A1 (en) | System and method for preventing an attack on a networked vehicle | |
DE102005028663B4 (en) | Method and device for securely communicating a component of a vehicle via a wireless communication connection with an external communication partner | |
DE112019000485T5 (en) | SYSTEM AND PROCEDURE FOR PROVIDING SECURITY FOR IN-VEHICLE NETWORK | |
WO2003105434A1 (en) | Method and device for emitting and/or receiving information relating to a vehicle | |
DE102017119373A1 (en) | UPDATING THE SERVERS OF THE NETWORK ADDRESS OF THE MOBILE DEVICE | |
DE102018131480B4 (en) | Access system for directing a networked device to a landing page stored in the vehicle based on an available credit or a data balance | |
EP2529529A1 (en) | Method for securely downloading from distributed download sources | |
DE102016222741A1 (en) | Method for a communication network and electronic control unit | |
DE102020119153A1 (en) | Vehicle computer system | |
WO2017162395A1 (en) | Method for monitoring the security of communication connections of a vehicle | |
DE102014206545A1 (en) | Method, communication system and data access node for transmitting data | |
EP3417589A1 (en) | Reducing a possible attack on a weak point of a device via a network access point | |
DE102016008957B4 (en) | Direct access to bus signals in a motor vehicle | |
EP3895406B1 (en) | Method for operating a data network of a motor vehicle and motor vehicle comprising a data network which can be correspondingly operated | |
DE102021118667A1 (en) | Method and system for controlling functions of a vehicle with a mobile terminal | |
WO2021197822A1 (en) | Method for handling an anomaly in data, in particular in a motor vehicle | |
EP1473614A2 (en) | Computer system for a vehicle and method controlling the data traffic in the computer system | |
DE102019201133B4 (en) | Motor vehicle | |
DE102017216833A1 (en) | Method for providing data packets from a CAN bus; Control unit and system with a CAN bus | |
DE102019220157A1 (en) | Security check method, security check device, information system for a motor vehicle, motor vehicle | |
DE102021207870A1 (en) | Method and processing unit for managing diagnostic requests in a network | |
DE102019220164A1 (en) | Security check method, security check device, information system, motor vehicle | |
DE102023106929A1 (en) | VEHICLE VARIANT AWARENESS SERVICES | |
EP4250146A1 (en) | Interaction of physical entities | |
DE102022113106A1 (en) | Data protection configuration in a data system for vehicles |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20120924 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: DIETZ, ROLAND Inventor name: STADLER, FRANZ Inventor name: FALK, RAINER Inventor name: HOF, HANS-JOACHIM |
|
DAX | Request for extension of the european patent (deleted) | ||
17Q | First examination report despatched |
Effective date: 20140815 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20161117 |