EP2540053A1 - Système et procédé d'empêchement d'une attaque sur un véhicule connecté à un réseau - Google Patents

Système et procédé d'empêchement d'une attaque sur un véhicule connecté à un réseau

Info

Publication number
EP2540053A1
EP2540053A1 EP11703708A EP11703708A EP2540053A1 EP 2540053 A1 EP2540053 A1 EP 2540053A1 EP 11703708 A EP11703708 A EP 11703708A EP 11703708 A EP11703708 A EP 11703708A EP 2540053 A1 EP2540053 A1 EP 2540053A1
Authority
EP
European Patent Office
Prior art keywords
vehicle
security status
network
network access
evaluation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP11703708A
Other languages
German (de)
English (en)
Inventor
Roland Dietz
Rainer Falk
Hans-Joachim Hof
Franz Stadler
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Continental Automotive GmbH
Original Assignee
Continental Automotive GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Continental Automotive GmbH filed Critical Continental Automotive GmbH
Publication of EP2540053A1 publication Critical patent/EP2540053A1/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/088Access security using filters or firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/44Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]

Definitions

  • the invention relates to a system for preventing an attack on a networked vehicle via a wireless communication device of a vehicle according to the preamble of patent claim 1 and a corresponding method.
  • 15 wireless connections can load from one or more data networks.
  • a communication interface (Communication Box, ComBox) can be installed in vehicles
  • radio standards eg GSM / GPRS
  • EDGE UMTS
  • HSDPA High Speed Downlink Packet Access
  • LTE Long Term Evolution
  • WLAN Wireless Local Area Network
  • WiMAX WiMAX
  • Radio beacons Road Side Units
  • the object of the present invention is therefore to provide a system and a method which is suitable for preventing an attack on a networked vehicle via a wireless communication device and thereby solving one or more disadvantages of the prior art.
  • a system for preventing an attack on a networked vehicle via a wireless communication device of a vehicle comprises a wireless traffic network, a security status determination device for regulating access to the wireless traffic network in dependence on a determined security status, the security status being based on an evaluation of a current configuration of the vehicle and / or log data of the vehicle and / or. or based on an elapsed time since an update of a related software.
  • the system has a communication device suitable for connection to the wireless traffic network and an access control device for regulating network access to the wireless traffic network, which is connectable to the security status determination device on.
  • the invention also relates to a method for a system for preventing an attack on a networked vehicle via a wireless communication device of a vehicle, wherein a safety status is determined based on an evaluation of a current configuration of the vehicle and / or log data of the vehicle and / or based on an elapsed time since an update of any relevant software. Furthermore, the method has the determination of a network access rule set for access to the data traffic network on the basis of the determined security status, which is subsequently activated.
  • FIG. 1 is a schematic representation of an embodiment of a system according to the invention
  • 5 shows a further exemplary method according to the invention according to a third embodiment
  • 6 shows a further exemplary method according to the invention according to a fourth embodiment
  • Fig. 8 is a schematic representation of another imple mentation of a system according to the invention.
  • FIG. 1 shows a vehicle having an on-board unit (OBU), which is connected via a communication device using different mobile radio systems, eg. UMTS, LTE, GPRS, WiMAX, WLan, can communicate with infrastructure servers in an exemplary data network.
  • OBU on-board unit
  • An exemplary infrastructure server may e.g. B. a download server (DL), the downloads z. B. for music offers.
  • Another InfrastructureServer can, for.
  • a vehicle management server (VM) that configures and monitors the vehicle, e.g. For example, to diagnose or import software updates.
  • Yet another Infrastructure Server may be a Vehicle Online Services Server (VOS) that provides online services, e.g. B. current weather and traffic information provides.
  • VOS Vehicle Online Services Server
  • VSSES Vehicle Security Status Evaluation Server
  • the vehicle or the OBU can communicate with other vehicles or OBUs via car-2-car communication (C2C) or with a permanently installed road side unit (RSU).
  • Figure 2 shows a section of a possible arrangement of components according to the invention with respect to an in-vehicle bus system.
  • Transceiver units are connected to an exemplary communication device (ComBox) in order to be able to use different radio systems (UMTS, HSDPA, WLAN, broadcast, WAVE (C2C)).
  • UMTS UMTS, HSDPA, WLAN, broadcast, WAVE (C2C)
  • UMTS exemplary communication device
  • HSDPA High Speed Downlink Packet Access
  • WLAN Wireless Fidelity
  • WAVE WAVE
  • an exemplary Ethernet vehicle bus an infotainment system with an exemplary head unit, as well as by way of example with two units for the rear seats, so-called rear seat entertainment (RSE1, RSE2), is connected.
  • RSE1, RSE2 rear seat entertainment
  • Ethernet could also z.
  • a gateway Via a gateway (GW) two ECUs ECU1, ECU2 are connected via another protocol, eg.
  • the CAN protocol can communicate.
  • NAEE Network Access Enforcement Engine
  • This network access policy set (AOAP) is selected or defined by a Network Access Policy Selection (NAPS) selection function, which may be dependent on the result of the security self-evaluation (SSE).
  • SSE security self-evaluation
  • the network access rule set can also depend on further parameters.
  • the ComBox may include a Network Access Control Policy Enforcement Unit that restricts network traffic from / to "outside," ie, to the transceiver units, and may perform an evaluation of security status determine a security rule set that you activate and enforce can put. Furthermore, it can optionally also change the configuration of network communication filters (firewall functions) of other components of the vehicle via a control command. In particular, it can change a network communication filter of the gateway (GW), a unit of the infotainment system (HU, RSE1, RSE2) or a radio module accordingly.
  • GW network communication filter of the gateway
  • HU infotainment system
  • RSE1 infotainment system
  • RSE2 infotainment system
  • FIG. 3 shows an exemplary method according to the invention according to a first embodiment.
  • the method is started in step 100.
  • the process can be started by numerous events. So z. B. be provided that when you turn on the ignition, when you start the vehicle engine, when you turn on / activate the infotainment system when connecting (activation of the ComBox), or even after a configuration change / software update or even regularly, for. B. Scheduled (eg every hour) the process is started.
  • step 300 the current vehicle security status is determined in a step 300.
  • a network access rule set is determined in step 400, which is activated in step 900.
  • step 1000 the method terminates in step 1000.
  • all steps can proceed autonomously in the vehicle and be arranged in a corresponding manner in the ComBox or the OBU.
  • a network access rule set "NULL” / "CLOSED” / "DENY ALL” can be explicitly activated immediately after the start in step 100 in a step 200, not illustrated here, in order to eliminate any OTA Prevent communication prior to activation of the determined network access rule set in step 300.
  • FIG. 4 shows an exemplary method according to the invention according to a second embodiment. In this case, the method is started in step 100.
  • step 500 an initial network access rule set is activated. Thereafter, the current configuration of the vehicle and / or log data of the vehicle and / or the elapsed time since an update of a respective software to an evaluation server (VSSES) for determining the security status are transmitted in a step 600.
  • the result of the determination of the security status is received in step 700, whereupon in a step 800 a suitable network access rule set is determined.
  • the particular network access policy set is then activated in step 900. Subsequently, the method terminates in step 1000.
  • an evaluation takes place on an external server.
  • the method may be referred to as server-assisted evaluation.
  • FIG. 5 shows yet another exemplary method according to the invention according to a third embodiment.
  • the method is started in step 100.
  • a network access rule set "NULL” / "CLOSED” / "DENY ALL” can be explicitly activated in step 200 in order to prevent any OTA communication for the time being before the activated network access rule set is activated
  • Current vehicle security status determined in a step 300.
  • step 500 an initial network access rule set is activated.
  • step 600 Thereafter, current configuration of the vehicle and / or log data of the vehicle and / or an elapsed time since an update of a respective software is transmitted to an evaluation server (VSSES) for determining the safety status in a step 600.
  • VSSES evaluation server
  • the result of the determination of the security status is received in step 700, whereupon in a step 800 a suitable network access rule set is determined.
  • the particular network access rule set is then activated in step 900. Subsequently, the method terminates in step 1000.
  • This embodiment can be referred to as a multi-level query of the security status, wherein both evaluation can run autonomously in the vehicle and can be arranged in the ComBox or the OBU in the same way as well as an evaluation can take place on an external server.
  • FIG. 6 also shows an exemplary method according to the invention according to a fourth embodiment. In this case, the method is started in step 100.
  • a network access rule set "NULL” / "CLOSED” / "DENY ALL” can be explicitly activated in step 200 in order to prevent any OTA communication for the time being before the activation of the determined network access rule set. Subsequently, the current vehicle security status is determined in a step 300.
  • step 400 On the basis of the determined vehicle security status, it is determined in step 400 whether safety requirements have been met. If the requirements are met, in a step 900a a network access rule set is activated which activates the OTA communication. Subsequently, the method terminates in step 1000.
  • a server-assisted evaluation is initiated. This starts by activating an initial network access rule set in step 500. Thereafter, the current configuration of the vehicle and / or log data of the vehicle and / or the elapsed time since an update of a relevant software to an evaluation server (VSSES) to determine the security status in transmitted to a step 600. The result of the determination of the security status is received in step 700.
  • VSSES evaluation server
  • step 800 it is checked whether the received evaluation result is sufficient, ie it is determined which network access rule set is activated. If the result of the evaluation is sufficient to designate the system as safe, then in step 900a a network access rule set is activated which activates the OTA communication. Thereafter, the method terminates in step 1000. If the evaluation result is not sufficient to designate the system as secure, a network access rule set "NULL” / "CLOSED” / "DENY ALL" is explicitly activated in step 900b in order to eliminate any OTA To prevent communication from activating the determined network access rule set for the time being, the method then terminates in step 1000. That is, the server is requested only if the vehicle itself is "not secure,” if it is in a secure security status.
  • Figure 7 illustrates a message flow according to the invention, in accordance with an embodiment of the invention.
  • a vehicle configuration is determined in a first step 2100.
  • the communication interface is activated in the vehicle in a further step 2200.
  • This communication may include a plurality of messages exchanged between the communication interface and the security status determination device 14.
  • the determination may be made a security status can be activated by an appropriate e request is sent to the SEE.
  • This requirement can already include as parameters a current configuration of the vehicle and / or log data of the vehicle and / or an elapsed time since an update of the relevant software.
  • the SEE evaluates a configuration based on the obtained parameters, i. H. a security status, and provides this in a further step 26000 the vehicle.
  • the vehicle can now by a suitable device, for.
  • an access control device can activate a corresponding network access rule set for access to the data traffic network.
  • the vehicle configuration information can already be present in the Vehicle Security Status Evaluation Server (VSSES) or can be queried by a vehicle manager.
  • VSSES Vehicle Security Status Evaluation Server
  • FIG. 8 shows a schematic representation of a further embodiment of a system according to the invention. It is assumed that a vehicle has an on-board unit OBU which communicates with infrastructure servers via a communication device using different mobile radio systems.
  • OBU on-board unit
  • the Vehicle Manager VM is connected to or has a vehicle database VDB.
  • This database stores configuration information for vehicles managed by Vehicle Manager.
  • the communication or parts of the communication can take place via a Trusted Vehicle Online Communication Proxy (TVOCP).
  • TVOCP Trusted Vehicle Online Communication Proxy
  • VOS vehicle online service
  • This communication can be tunnelled between the vehicle and the TVOCP by, for. B. a VPN from the vehicle to the TVOCP is established.
  • the HTTPOCP can be implemented as an HTTP proxy for HTTP. Then no tunneling must be done, but HTTP requests can also be sent directly from the vehicle to the TVOCP, which - if necessary modified - to a destination server, eg. B. one VOS, forwards. The response to such a request can be transmitted from the target server VOS to the TVOCP, which can forward it - possibly modified again - to the vehicle.
  • the vehicle can authenticate itself to the TVOCP.
  • the TVOCP can then query the current configuration of the vehicle from the vehicle database VDB. This configuration is analyzed to determine whether B. current security patches are recorded. Depending on this, a network access rule set or several network access rule sets will be enforced for this vehicle.
  • This TVOCP is based on the evaluation, eg. Depending on the type of vehicle and the configuration of the vehicle, defined network access policy, d. That is, only the communication that is allowed by the defined network access rules is enabled. Other communication is blocked.
  • the vehicle can already transmit further information about itself (manufacturer, series, chassis number / VIN, configuration information).
  • the information about the vehicle can be requested by the TVOCP from a database;
  • information may be requested from a vehicle manager (VM) or from the database (VDB) used by the VM to store configuration information of a vehicle.
  • VM vehicle manager
  • VDB database
  • information about the software status of a particular vehicle is available here. In particular, it can be considered whether current software updates (critical security updates) have been recorded. If necessary, the VM can be triggered by the TVOCP to query the current configuration from the vehicle.
  • a TVOCP can also actively scan a vehicle to obtain information about the vehicle.
  • a network access rule can be determined by the TVOCP, which is enforced in the following communication of the vehicle.
  • a communication can optionally be redirected to another server, or the TVOCP responds proxy.
  • an HTTP request from the vehicle may be intercepted by the TVOCP and an HTTP REDIRECT message transmitted to the vehicle redirecting the vehicle client to another HTTP server. There can then z.
  • a web page may be displayed in HTML that informs the driver that the access has been blocked and why.
  • information can be transmitted to the vehicle by the TVOCP that the vehicle should contact the VM server. This can be done, for example, by inserting a special HTTP header into an HTTP response that is transmitted to the vehicle. This allows the VM server z. For example, transfer available software updates to the vehicle.
  • the TVOCP can transmit information to the VM server that the vehicle is currently online. For pending updates, the VM server can initiate a management session with the vehicle. By sending a trigger SMS message.
  • each application or protocol used may be re-and separate, with different network access policy sets for different applications and different approaches to security status detection coexisting.
  • the evaluation function can load the current configuration of the vehicle and / or the log data and / or the information about how long ago the last update was or when the last update was checked or if pending updates are also loaded and have been installed, check.
  • Updates can for example be played by a workshop. This can be z. B. via a workshop tester, which is connected via a diagnostic interface with the vehicle.
  • updates can also be made by the user himself, for. B. by means of update medium, z. CD / DVD, USB stick, memory card, etc., or by updating from one Update server via the radio communication interfaces are loaded (OTA Seif Update).
  • the vehicle communicates with a Vehicle Management Server (VM) to receive information about deployed updates and, if necessary, to load and install them.
  • VM Vehicle Management Server
  • network access rules can then be determined and activated for enforcement.
  • two network access rule sets can be defined (UNRESTRICTED, RESTRICTED). If the result of the evaluation is that the vehicle is in a safe configuration status (eg pending safety-critical updates have been checked and installed within the last 7 days), then the network access rule set UNRESTRICTED is activated (enables, for example, free , direct internet access). Otherwise, the network access rule set RESTRICTED is activated, in which only trusted web services offered directly by the vehicle manufacturer can be accessed.
  • the vehicle may transmit parameters to a Vehicle Security Status Evaluation Server (VSSES) or, more generally, a Security Status Investigation Facility (SEE) and in return receive an evaluation result ,
  • VSSES Vehicle Security Status Evaluation Server
  • SEE Security Status Investigation Facility
  • the transmitted parameters may include:
  • Identification of the vehicle eg VIN, VIN
  • Vehicle type information (manufacturer, model, year of manufacture, installed accessories), - configuration information (built-in components, software version),
  • VDB a database
  • OMA Open Mobile Al- liance
  • the evaluation result may include:
  • the Vehicle Security Status Evaluation Server is, for example, a server of the vehicle manufacturer or of a communications provider. Authentication takes place between server and vehicle.
  • the communication can z. B. be protected by IPSec, SSL or TLS protocol.
  • the information can z. Via HTTP, SOAP, OMA DM, SyncML, SNMP.
  • the VSSES is described as a self-contained unit, it may be included in other units. So the VSSES z. For example, it could be part of a VM server that might provide updates.
  • Some network access rule sets may be predefined, e.g. B .:
  • INFRASTRUCTRE allow any communication with infrastructure services (also direct), but not vehicle-to-vehicle communication;
  • - MANAGED INFRASTRUCTURE allow any (even direct) communication with infrastructure services, but only use mobile networks operated by a known infrastructure operator (eg only GPRS, UMTS / HSDPA via Vodafone, T-Mobile or Orange, but not WLAN);
  • a known infrastructure operator eg only GPRS, UMTS / HSDPA via Vodafone, T-Mobile or Orange, but not WLAN;
  • - TUNNEL Communication tunnels to Trusted Gateway (traffic is tunneled and sent to VPN servers where it can be parsed and filtered before being forwarded to, for example, an Internet server; Server is coming, will be further processed);
  • a network access rule set can also be provided by the Vehicle Security Status Evaluation Server (VSSES) or another server. It can also be fine granular network access rule sets are defined: It can, for. For example, content filtering can be performed to filter dangerous content for the car. For example, game, Flash content or JavaScripts on web pages are only allowed to pass if a particular vehicle has loaded the current security patches for the corresponding display programs.
  • VSSES Vehicle Security Status Evaluation Server
  • content filtering can be performed to filter dangerous content for the car.
  • game, Flash content or JavaScripts on web pages are only allowed to pass if a particular vehicle has loaded the current security patches for the corresponding display programs.
  • the content of a network access rule set may, for. For example, you may require the use of a firewall and a VPN.
  • a network access rule set consists of rules. These describe what type of network traffic is to be handled and how it is handled
  • - tunneling is (tunnel; encapsulate), d. H. is to be transmitted via a VPN tunnel;
  • restrictions may be imposed on permitted traffic, in particular restrictions on the maximum data rate, e.g. B. to prevent the overload of target components.
  • Possible filter criteria include:
  • Vehicle Manufacturer Vehicle Manufacturer, Model, Version / Year,
  • Target component in the vehicle ie to which control unit the data are forwarded or from which control unit they originate
  • - OTA interface GPRS, UMTS, WLAN, ...
  • - current OTA network operators eg T-Mobile, Vodafone, unknown
  • country Germany, France, ...
  • Protocol e.g., TCP, UDP
  • DoS denial of service
  • network access rules can also refer to content, the so-called content (web pages, multimedia files, program code):
  • Code Access Security is known, eg. For example, the Microsoft Common Language Runtime or the Java Runtime Environment.
  • Program code is granted access rights depending on its origin (ie depending on who signed it or from where it was loaded).
  • New Now, depending on the security evaluation, the entitlements granted to a particular code are set; or it is defined depending on the evaluation result whether a specific code can be executed at all. For example, in this way the execution of Untrusted Code / Downloaded 3rd Party Code can be prevented if the patch status of the vehicle component is not up-to-date.
  • the selected network access rule set is preferably enforced by the communication unit of the vehicle. Alternatively, this can also be done by a separate, upstream Si cherheitskommunikationsaku.
  • vehicle internal i board network by access control device (vehicle bus gate ways, control devices) filtering the communication.
  • the communication unit or the security communication unit can transmit information to this access control device via the vehicle security status (indicator, filter rules), thereby adapting its network access rules accordingly.
  • the respective component can also individually perform the described method.
  • the user should preferably receive an indication to install security patches in time or as soon as possible in order to be able to continue to use all services.
  • Vehicle components receive full access to the outside only at the current security update status of the software, since they can then fend off the attacks that occur from the network. This ensures reliable vehicle operation.

Abstract

L'invention concerne un système d'empêchement d'une attaque sur un véhicule connecté à un réseau au moyen d'un dispositif de communication sans fil d'un véhicule. Le système comporte un réseau de trafic de données sans fil et un dispositif de calcul d'état de sécurité, pour réguler en fonction d'un état de sécurité calculé l'accès au réseau de trafic de données sans fil, l'état de sécurité se basant sur une évaluation d'une configuration actuelle du véhicule et/ou des données de journal du véhicule et/ou d'un temps écoulé depuis une actualisation d'un logiciel associé. Le système comporte en outre un dispositif de communication adapté à la connexion au réseau de trafic de données sans fil et un dispositif de contrôle d'accès pour le réglage de l'accès au réseau de trafic de données sans fil, qui peut être connecté au dispositif de calcul de l'état de sécurité. L'invention concerne en outre un procédé pour un système d'empêchement d'attaque sur un véhicule connecté à un réseau au moyen d'un dispositif de communication sans fil d'un véhicule, un état de sécurité étant calculé, l'état de sécurité se basant sur une évaluation d'une configuration actuelle du véhicule et/ou des données de journal du véhicule et/ou d'un temps écoulé depuis une actualisation d'un logiciel associé. Le procédé comporte en outre la détermination du réajustement régulier de l'accès au réseau pour l'accès au réseau de trafic de données sur la base de l'état de sécurité calculé qui est ensuite activé.
EP11703708A 2010-02-22 2011-02-17 Système et procédé d'empêchement d'une attaque sur un véhicule connecté à un réseau Withdrawn EP2540053A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE102010008816A DE102010008816A1 (de) 2010-02-22 2010-02-22 Verfahren zur Online-Kommunikation
PCT/EP2011/052362 WO2011101414A1 (fr) 2010-02-22 2011-02-17 Système et procédé d'empêchement d'une attaque sur un véhicule connecté à un réseau

Publications (1)

Publication Number Publication Date
EP2540053A1 true EP2540053A1 (fr) 2013-01-02

Family

ID=43904033

Family Applications (1)

Application Number Title Priority Date Filing Date
EP11703708A Withdrawn EP2540053A1 (fr) 2010-02-22 2011-02-17 Système et procédé d'empêchement d'une attaque sur un véhicule connecté à un réseau

Country Status (5)

Country Link
US (1) US9843926B2 (fr)
EP (1) EP2540053A1 (fr)
CN (1) CN102893574B (fr)
DE (1) DE102010008816A1 (fr)
WO (1) WO2011101414A1 (fr)

Families Citing this family (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103124654A (zh) * 2010-09-27 2013-05-29 日本电气株式会社 信息处理系统、用于检查车辆的方法和用于检查车辆的程序
DE102012208205A1 (de) * 2012-05-16 2013-11-21 Bayerische Motoren Werke Aktiengesellschaft Datenlogging bzw. Stimulation in Automotiven Ethernet Netzwerken unter Verwendung der Fahrzeug-Infrastruktur
DE102013202064A1 (de) 2013-02-08 2014-08-14 Bayerische Motoren Werke Aktiengesellschaft Verfahren und Vorrichtung zum Verbinden eines Diagnosegeräts mit einem Steuergerät in einem Kraftfahrzeug
DE102013003040B4 (de) 2013-02-22 2015-11-12 Audi Ag Kraftfahrzeug mit nachträglich per Anwendungsprogramm veränderbarem Fahrverhalten sowie Verfahren hierzu
US20140380296A1 (en) * 2013-06-20 2014-12-25 General Motors Llc Re-programming vehicle modules
EP3014853B1 (fr) * 2013-06-25 2019-09-11 Fedex Corporation Gestion de communication de transport
US10885010B2 (en) 2013-12-18 2021-01-05 Federal Express Corporation Methods and systems for data structure optimization
US10140109B2 (en) * 2014-02-25 2018-11-27 Ford Global Technologies, Llc Silent in-vehicle software updates
CN110610092B (zh) * 2014-04-17 2023-06-06 松下电器(美国)知识产权公司 车载网络系统、网关装置以及不正常检测方法
CN105704102B (zh) * 2014-11-26 2019-06-07 广州汽车集团股份有限公司 车辆网络访问控制方法及装置
DE102014226831A1 (de) * 2014-12-22 2016-06-23 Continental Automotive Gmbh Vorrichtung zur Steuerung der drahtlosen Kommunikation eines Kraftfahrzeugs
WO2017024078A1 (fr) 2015-08-03 2017-02-09 Icon Labs Procédé permettant de détecter, bloquer et rapporter des cyber-attaques contre des unités de commande électronique pour automobile
US10200371B2 (en) * 2015-11-09 2019-02-05 Silvercar, Inc. Vehicle access systems and methods
DE102016201307A1 (de) * 2016-01-28 2017-08-03 Robert Bosch Gmbh Verfahren zum Melden eines Defekts eines Kraftfahrzeugs
DE102016204999A1 (de) * 2016-03-24 2017-09-28 Volkswagen Aktiengesellschaft Verfahren zur Überwachung der Sicherheit von Kommunikationsverbindungen eines Fahrzeugs
DE102016205002A1 (de) * 2016-03-24 2017-09-28 Volkswagen Aktiengesellschaft Verfahren zum Verwalten von gesammelten Fahrzeugdaten
DE102016205132A1 (de) * 2016-03-29 2017-10-05 Robert Bosch Gmbh Vorrichtung und Verfahren zur Filterung eines Datentransfers, sowie ein Gateway-Steuergerät
JP6485429B2 (ja) * 2016-11-04 2019-03-20 トヨタ自動車株式会社 車載ネットワークシステム
EP3382976A1 (fr) * 2017-03-30 2018-10-03 Siemens Aktiengesellschaft Dispositif de protection, procédé et appareil comprenant un dispositif de protection destiné à protéger un réseau de communication connecté à l'appareil
DE102017208712A1 (de) * 2017-05-23 2018-11-29 Siemens Aktiengesellschaft Kommunikationsanordnung sowie Verfahren zu deren Betrieb
JP6465258B1 (ja) * 2017-08-10 2019-02-06 住友電気工業株式会社 制御装置、制御方法、およびコンピュータプログラム
US10679493B2 (en) * 2017-09-18 2020-06-09 International Business Machines Corporation Cognitive-based incident response
US10802483B2 (en) * 2017-10-19 2020-10-13 International Business Machines Corporation Emergency public deactivation of autonomous vehicles
DE102017219770B4 (de) 2017-11-07 2019-06-19 Continental Automotive Gmbh Verfahren zum Betreiben einer Ethernet-Kommunikationseinrichtung und Ethernet-Kommunikationseinrichtung
JP6552674B1 (ja) * 2018-04-27 2019-07-31 三菱電機株式会社 検査システム
DE102018130588B4 (de) * 2018-11-30 2020-12-03 DE-CIX Management GmbH Computerimplementiertes Verfahren zur Abwehr oder Abmilderung von DDoS-Angriffen auf IT-Infrastrukturen
CN110290496A (zh) * 2019-06-17 2019-09-27 高新兴物联科技有限公司 一种v2x升级系统及升级方法
DE102019120331A1 (de) * 2019-07-26 2021-01-28 itemis France SAS Datenübertragung zu einem IOT-Gerät
FR3101745A1 (fr) * 2019-10-08 2021-04-09 Psa Automobiles Sa Procédé d’accès à un service connecté depuis un véhicule automobile
US11704106B2 (en) * 2019-11-08 2023-07-18 Toyota Jidosha Kabushiki Kaisha Program update system and vehicle management server
DE102020216065A1 (de) 2019-12-20 2021-06-24 Robert Bosch Gesellschaft mit beschränkter Haftung Vorrichtung mit einer Schnittstelle und Verfahren zum Betreiben einer Vorrichtung mit einer Schnittstelle
DE102019220450A1 (de) * 2019-12-20 2021-06-24 Robert Bosch Gmbh Vorrichtung mit einer Schnittstelle und Verfahren zum Betreiben einer Vorrichtung mit einer Schnittstelle
EP3869471A1 (fr) * 2020-02-24 2021-08-25 Continental Automotive GmbH Procédé de communication comprenant un serveur et une pluralité d'unités embarquées et unité embarquée
GB202303224D0 (en) * 2020-12-23 2023-04-19 Motional Ad Llc Security gateway
CN114973700B (zh) * 2022-05-18 2024-03-26 浙江嘉兴数字城市实验室有限公司 一种基于车路协同应用的信号机网联安全装置及工作方法

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1956794A2 (fr) * 2007-02-07 2008-08-13 Hitachi, Ltd. Dispositif de passerelle sur véhicule

Family Cites Families (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6144859A (en) * 1993-08-27 2000-11-07 Aeris Communications, Inc. Wireless cellular communicator system and apparatus
US6052646A (en) * 1998-04-15 2000-04-18 Magellan Dis, Inc. Vehicle navigation system with improved powerup performance
US6647270B1 (en) * 1999-09-10 2003-11-11 Richard B. Himmelstein Vehicletalk
WO2001026329A2 (fr) * 1999-10-06 2001-04-12 Sensoria Corporation Procede de collecte de donnees utilisant des detecteurs en reseaux integres sans fil (wins) compacts interconnectes en reseau
US6389337B1 (en) * 2000-04-24 2002-05-14 H. Brock Kolls Transacting e-commerce and conducting e-business related to identifying and procuring automotive service and vehicle replacement parts
JP2002127873A (ja) * 2000-10-27 2002-05-09 Auto Network Gijutsu Kenkyusho:Kk 自動車盗難防止用照合システム
US7987510B2 (en) * 2001-03-28 2011-07-26 Rovi Solutions Corporation Self-protecting digital content
US7061367B2 (en) * 2002-04-30 2006-06-13 General Electric Company Managing access to physical assets
US6832141B2 (en) * 2002-10-25 2004-12-14 Davis Instruments Module for monitoring vehicle operation through onboard diagnostic port
US20040263316A1 (en) * 2003-06-24 2004-12-30 Case, Llc Reprogrammable vehicle access control system
US7355299B2 (en) * 2003-07-29 2008-04-08 Lear Corporation Non-ignition switch vehicle ignition enabling system
US7716726B2 (en) 2004-02-13 2010-05-11 Microsoft Corporation System and method for protecting a computing device from computer exploits delivered over a networked environment in a secured communication
JP4270031B2 (ja) * 2004-06-09 2009-05-27 株式会社デンソー 車載用情報登録・開示システム、車載装置および携帯機器
FR2880225A1 (fr) 2004-12-23 2006-06-30 Toplica Petkovic Dispositif d'aide a la prevention des accidents de la circulation lies a l'utilisation du telephone portable
US7418317B2 (en) * 2005-03-10 2008-08-26 Aai Corporation System and method for controlling and communicating with a vehicle
US20060224305A1 (en) * 2005-04-01 2006-10-05 Siemens Vdo Automotive Corporation Vehicle unit for controlling communications between a vehicle and a wireless device
WO2006114878A1 (fr) * 2005-04-21 2006-11-02 Mitsubishi Electric Corporation Ordinateur, procede de controle d’acces aux ressources informatiques et programme de controle d’acces
DE102005028663A1 (de) * 2005-06-15 2006-12-21 Volkswagen Ag Verfahren und Vorrichtung zum sicheren Kommunizieren einer Komponente eines Fahrzeugs über eine drahtlose Kommunikationsverbindung mit einem externen Kommunikationspartner
JP5162103B2 (ja) * 2006-05-15 2013-03-13 トヨタ自動車株式会社 支援制御装置
US20080027602A1 (en) * 2006-05-30 2008-01-31 Yeap Tet H System and method for deterring theft of vehicles and other products having integral computer means
DE102006042974B4 (de) * 2006-09-13 2009-07-23 Continental Automotive Gmbh Verfahren zur Zugangssteuerung zu einem Fahrzeug
WO2008086507A1 (fr) * 2007-01-10 2008-07-17 Decision Sciences Corporation Collecte d'informations et prise de décision grâce à des systèmes de réseaux d'information par paliers
US8319605B2 (en) * 2007-06-19 2012-11-27 Magna Electronics, Inc. Remote vehicle control system utilizing multiple antennas
US7970381B2 (en) 2007-08-13 2011-06-28 General Motors Llc Method of authenticating a short message service (sms) message
DE102007044398B4 (de) * 2007-09-18 2012-10-04 Continental Automotive Gmbh Diebstahlschutzsystem für ein Fahrzeug und Verfahren zum Betreiben eines Diebstahlschutzsystems
JP2009163430A (ja) * 2007-12-28 2009-07-23 Sony Corp セキュリティ機能搭載車載機器及び車載機器のセキュリティ機能制御方法
CN101262333B (zh) 2008-04-21 2010-06-02 上海大学 一种车辆网络中节点间的安全通信方法
US20090300365A1 (en) * 2008-05-30 2009-12-03 Robert Karmes Vehicle Diagnostic System Security with Memory Card
US8370644B2 (en) * 2008-05-30 2013-02-05 Spansion Llc Instant hardware erase for content reset and pseudo-random number generation
US20100087981A1 (en) * 2008-10-02 2010-04-08 Daniel Guadalupe Orozco-Perez Versatile vehicular care assistant system and method

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1956794A2 (fr) * 2007-02-07 2008-08-13 Hitachi, Ltd. Dispositif de passerelle sur véhicule

Also Published As

Publication number Publication date
WO2011101414A1 (fr) 2011-08-25
CN102893574B (zh) 2018-05-18
DE102010008816A1 (de) 2011-08-25
US20130104186A1 (en) 2013-04-25
CN102893574A (zh) 2013-01-23
US9843926B2 (en) 2017-12-12

Similar Documents

Publication Publication Date Title
WO2011101414A1 (fr) Système et procédé d'empêchement d'une attaque sur un véhicule connecté à un réseau
DE102016101327B4 (de) Verfahren zum Reagieren auf einen nicht autorisierten elektronischen Zugriff auf ein Fahrzeug
WO2006133774A1 (fr) Procede et dispositif permettant a un composant d'un vehicule de communiquer de maniere fiable avec un partenaire de communication externe par l'intermediaire d'une liaison de communication sans fil
DE112019000485T5 (de) System und verfahren zum bereitstellen der sicherheit für einfahrzeuginternes netzwerk
WO2014044348A1 (fr) Module d'identité d'abonné permettant d'authentifier un abonné d'un réseau de communication
DE102017119373A1 (de) Aktualisierung der servers der netzwerkadresse der mobilvorrichtung
WO2011091887A1 (fr) Procédé de téléchargement sécurisé de sources de téléchargement réparties
WO2017162395A1 (fr) Procédé de surveillance de la sécurité de liaisons de communication d'un véhicule
DE102016222741A1 (de) Verfahren für ein Kommunikationsnetzwerk und elektronische Kontrolleinheit
DE102014206545A1 (de) Verfahren, Kommunikationssystem und Daten-Zugangsknoten zur Übermittlung von Daten
WO2017167490A1 (fr) Réduction de la capacité d'attaque d'un point faible d'un appareil par le biais d'un point d'accès à un réseau
DE102016008957B4 (de) Direkter Zugriff auf Bussignale in einem Kraftfahrzeug
EP3895406B1 (fr) Procédé d'exploitation d'un réseau de données d'un véhicule automobile et véhicule automobile ayant un réseau de données exploitable correspondant
DE102020119153A1 (de) Fahrzeugcomputersystem
DE10319365A1 (de) Computersystem für ein Fahrzeug und Verfahren zum Kontrollieren des Datenverkehrs in ein solches Computersystem
DE102019201133B4 (de) Kraftfahrzeug
DE102019220157A1 (de) Verfahren zur Sicherheitsüberprüfung, Sicherheitsüberprüfungsvorrichtung, Informationssystem für ein Kraftfahrzeug, Kraftfahrzeug
DE102021207870A1 (de) Verfahren und Recheneinheit zum Verwalten von Diagnoseanfragen in einem Netzwerk
DE102019220164A1 (de) Verfahren zur Sicherheitsüberprüfung, Sicherheitsüberprüfungsvorrichtung, Informationssystem, Kraftfahrzeug
WO2015124240A1 (fr) Système et procédé d'échange de données entre au moins un véhicule et au moins un terminal mobile
DE102023106929A1 (de) Fahrzeugvariantenbewusste dienste
EP4250146A1 (fr) Interaction des entités physiques
DE102022113106A1 (de) Datenschutzkonfiguration in einem Datensystem für Fahrzeuge
WO2021197822A1 (fr) Procédé pour traiter une anomalie de données, en particulier dans un véhicule automobile
DE102018220008A1 (de) Verfahren zum Betreiben eines Steuergeräts eines Fahrzeugs

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20120924

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

RIN1 Information on inventor provided before grant (corrected)

Inventor name: DIETZ, ROLAND

Inventor name: STADLER, FRANZ

Inventor name: FALK, RAINER

Inventor name: HOF, HANS-JOACHIM

DAX Request for extension of the european patent (deleted)
17Q First examination report despatched

Effective date: 20140815

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20161117