KR101675223B1 - Watchdog, security system and method for watchdog - Google Patents
Watchdog, security system and method for watchdog Download PDFInfo
- Publication number
- KR101675223B1 KR101675223B1 KR1020150044746A KR20150044746A KR101675223B1 KR 101675223 B1 KR101675223 B1 KR 101675223B1 KR 1020150044746 A KR1020150044746 A KR 1020150044746A KR 20150044746 A KR20150044746 A KR 20150044746A KR 101675223 B1 KR101675223 B1 KR 101675223B1
- Authority
- KR
- South Korea
- Prior art keywords
- time password
- encryption
- security
- vehicle
- watchdog
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0751—Error or fault detection not based on redundancy
- G06F11/0754—Error or fault detection not based on redundancy by exceeding limits
- G06F11/0757—Error or fault detection not based on redundancy by exceeding limits by exceeding a time limit, i.e. time-out, e.g. watchdogs
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R16/00—Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for
- B60R16/02—Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric constitutive elements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- B60R2016/02—
Abstract
The present invention relates to a watchdog device, a watchdog security system, and a security method thereof, the watchdog device comprising: a vehicle-side one-time password generator for generating a one-time password; A vehicle-side encryption unit that randomly selects one of a plurality of encryption methods to encrypt authorization request data including a one-time password; A vehicle-side decoding unit that decrypts data received from an external device in accordance with a one-time password, the data being encrypted by a randomly selected encryption method among a plurality of encryption methods; And a security control unit for transmitting authentication request data encrypted by the vehicle side encryption unit to an external device to request connection to an external device and controlling authentication of connection with an external device using data received from the external device. Accordingly, when the watchdog device accesses an external device for updating or modifying software, it is possible to prevent access to an unauthorized external device through use of a one-time password, a multi-stage encryption process, and a multi- Therefore, it is possible to prevent damage to human life and property caused by failure of the watchdog device to be hacked to control the ECU.
Description
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a watchdog device, a watchdog security system, and a security method thereof, and more particularly, to a watchdog device and a security method thereof, in which when a watchdog device accesses an external device for updating or correcting software, , A watchdog device, a watchdog security system, and a security method for preventing access to an unauthenticated external device through a multi-step authentication process.
An ECU (Electronic Control Unit) is a control device having a function of controlling and managing a main assembly of a vehicle. In the vehicle, a plurality of ECUs are installed according to an assembly to control each assembly.
The multi-core ECU in the ECU includes an ECU core that performs functions of controlling and managing the assembly, a PCP (Peripheral Control Processor) core for monitoring and evaluating the functional defects of the ECU core, It may include a poison device.
Generally, a watchdog device is present inside a vehicle and a safety hierarchical monitoring system of a watchdog device developed based on the ISO26262 development methodology is disclosed. Since the safety hierarchical monitoring system is disclosed, it is possible to hack source code level in the ECU by using deodorization, reverse engineering, and eavesdropping. Hacking of the software of the watchdog device as well as the application of the ECU core or PCP core is also possible.
However, when the software of the watchdog device is hacked in this manner, the integrity of the ECU application source code can not be guaranteed because the watchdog device can not properly control the source code of the ECU. That is, since a problem occurs in the watchdog device itself, the ECU can not perform the function of controlling the ECU, so that it is impossible to control the defects of the ECU, thereby causing damage to persons and property due to malfunction of the ECU.
The present invention can prevent access to an unauthorized external device through the use of a one-time password, a multi-step encryption process, and a multi-step authentication process when the watchdog device accesses an external device for updating or modifying software , A watchdog device, a watchdog security system, and a security method for preventing hacking of the watchdog device from various angles.
The above object is achieved by an electronic control unit (ECU), which is connected to an external device to update or modify software; A vehicle-side one-time password generator for generating a one-time password; A vehicle-side encryption unit that randomly selects one of a plurality of encryption methods to encrypt authorization request data including the one-time password; A vehicle-side decoding unit, which is encrypted by a randomly selected encryption method among the plurality of encryption methods and decrypts data received from the external device corresponding to the one-time password; And requesting a connection to the external apparatus by transmitting the approval request data encrypted by the vehicle-side encryption unit to the external apparatus, and performing connection authentication with the external apparatus using the approval confirmation data received from the external apparatus And a security control unit for controlling the watchdog unit.
The above object is achieved by a watchdog security system comprising a watchdog device for controlling an electronic control unit (ECU) and an external device for providing a service for updating or modifying the software of the watchdog device, A vehicle-side one-time password generator for generating a one-time password; a vehicle-side encryption unit for randomly selecting one of a plurality of encryption methods to encrypt approval request data including the vehicle-side one-time password; To the external device to request a connection and to control connection authentication with the external device using data received from the external device; A server side encryption unit for encrypting a response time password generated by a request from the watchdog unit by randomly selecting one of a plurality of encryption methods; A server side decryption unit for decrypting the data encrypted in the watchdog device, a device side control unit for comparing the data provided from the watchdog device with the data stored in the device, The security system of the present invention can be achieved by a watchdog security system.
The above object is achieved by a security method for accessing an external device for updating or modifying a software of a watchdog device controlling an electronic control unit (ECU), the security method comprising: a generation step of generating a first one-time password in the watchdog device; Encrypting authorization request data including the first one-time password by randomly selecting one of a plurality of encryption methods; A request step of transmitting the encrypted approval request data to the external device to request a connection; And an authentication step of controlling connection authentication with the external device by comparing the approval confirmation data with data held by the external device in the external device. .
In this watchdog security system, when the watchdog device is connected to an external device, the authenticity of the external device is determined using the match of the one-time password between the watchdog device and the external device, and a plurality of encryption computation functions and a plurality of encryption algorithms By randomly selecting and encrypting the data, hacking can be prevented in multiple steps. In addition, when the external device continuously transmits an incompatible one-time password to the watchdog device, the software-update input / output function related code is deleted when the number of discrepancies reaches a certain number of times, By deleting the code related to the input / output function, it is possible to prevent hacking at the source. Accordingly, it is possible to prevent damage to persons and property that may occur when the watchdog device is hacked and the ECU can not be controlled.
1 is a configuration diagram of a watchdog security system according to the present invention;
FIG. 2 is a block diagram of the configuration of the watchdog apparatus of FIG. 1,
Fig. 3 is a block diagram of the vehicle-side encryption unit of Fig. 2,
FIG. 4 is a block diagram of the external device of FIG. 1,
Fig. 5 is a block diagram of the configuration of the wireless communication terminal of Fig. 1,
6A and 6B are flowcharts illustrating a process of securely connecting a watchdog device to an external device in the watchdog security system according to the present invention;
7 is a flowchart illustrating a method for preventing access to an unauthorized external device in a watchdog security system according to the present invention.
Hereinafter, some embodiments of the present invention will be described in detail with reference to exemplary drawings. It should be noted that, in adding reference numerals to the constituent elements of the drawings, the same constituent elements are denoted by the same reference symbols as possible even if they are shown in different drawings. In the following description of the present invention, a detailed description of known functions and configurations incorporated herein will be omitted when it may make the subject matter of the present invention rather unclear.
In describing the components of the present invention, terms such as first, second, A, B, (a), and (b) may be used. These terms are intended to distinguish the constituent elements from other constituent elements, and the terms do not limit the nature, order or order of the constituent elements. When a component is described as being "connected", "coupled", or "connected" to another component, the component may be directly connected to or connected to the other component, It should be understood that an element may be "connected," "coupled," or "connected."
1 is a configuration diagram of a watchdog security system according to the present invention.
The watchdog security system according to the present invention authenticates the
The watchdog security system includes an
As shown in FIG. 2, the
The
For the ECU core integrity check, the
For diagnostic testing of the ECU subsystem, the
The task monitoring of the ECU core is a task for verifying whether execution time and task flow scheduling are appropriate for the tasks performed by the ECU core. The
The
The
The vehicle-side one-
At this time, in order to generate the same one-time password as that of the
The vehicle-side one-
The vehicle
The vehicle-
The encryption code included in the encryption operation function is previously tabulated and stored in the vehicle
The length of the encryption code can be changed according to the designer, and can be formed to have a length corresponding to the length of the one-time password. However, the length of the encryption code need not be the same as the one-time password or the password length of the
On the other hand, commonly used operators include logical operators such as XOR, OR, NOR, AND, NAND, and NOT, and arithmetic operators such as +, -, × and ÷. have.
The vehicle
For example, when the vehicle
If the one-time password is 584263 and converted into a binary number, the following operation result can be calculated according to the encryption operation function.
Encryption code 0110 0101 0100 0011 0010 0001
One-time password 0101 1000 0100 0010 0110 0011
----------------------------------------------
XOR operation result 0011 1101 0000 0001 0100 0010
Accordingly, when the operation result is changed to hexadecimal, 3D0142 is obtained.
The vehicle
In this embodiment, the use of the asymmetric key algorithm in the vehicle-
When the asymmetric key algorithm is used, the
The vehicle
On the other hand, the vehicle-side one-
Accordingly, when requesting authentication to the
On the other hand, in the above-described embodiment, in the vehicle-
When the ID and password of the
If the second one-time password is encrypted using the encryption operation function used in the
The vehicle-
That is, when the first one-time password is provided from the
First one-time password 0101 1000 0100 0010 0110 0011
Encryption code XXXX XXXX XXXX XXXX XXXX XXXX
___________________________________________________________
Encrypted first one-time password 0011 1101 0000 0001 0100 0010
When the operator decides to select XOR as the operator in the vehicle
The
When the
If the
Then, the
Meanwhile, the
That is, when the response first one-time password provided from the
The
If the
When the
The
The
The server-side one-
The server-side one-
When the
In addition, the server-side one-
The server-
The server-
As the encryption code included in the encryption operation function, the same encryption code as that of the vehicle
Operators can use logical operators such as XOR, OR, NOR, AND, NAND, NOT, and arithmetic operators such as +, -, ×, ÷.
The server-
The server
If the encrypted information is encrypted only through the second encryption process, that is, if only the encryption algorithm is used for encryption, the information is decrypted using a decryption algorithm corresponding to the encryption algorithm.
When the
For example, when the asymmetric key algorithm is used, the vehicle
If the encrypted information is passed through both the primary encryption process and the secondary encryption process, the server-
The server
The
The software of the
The device-
When the
If both are the same, the device-
The device-
If both are the same, the device-
When the software update and modification of the
The
The
One end of the
The
The
Although the above embodiment has been described by way of example in which the
A process of securely connecting the
The
Upon receiving the ID and password of the
Upon completion of the decryption, the device-
If both are not the same, the device-
The
If both are not the same, the
If they are the same, the
The device-
7 is a flowchart illustrating a method for preventing access to an unauthorized
The present
The
As described above, in this watchdog security system, when the
The standard content or standard documents referred to in the above-mentioned embodiments constitute a part of this specification, for the sake of simplicity of description of the specification. Therefore, it is to be understood that the content of the above standard content and portions of the standard documents are added to or contained in the scope of the present invention.
The foregoing description is merely illustrative of the technical idea of the present invention, and various changes and modifications may be made by those skilled in the art without departing from the essential characteristics of the present invention. Therefore, the embodiments disclosed in the present invention are intended to illustrate rather than limit the scope of the present invention, and the scope of the technical idea of the present invention is not limited by these embodiments. The scope of protection of the present invention should be construed according to the following claims, and all technical ideas within the scope of equivalents should be construed as falling within the scope of the present invention.
10: Watchdog device 20: Supervisor module
30: Security module 35: Vehicle side one-time password generator
40: vehicle side encryption unit 45: vehicle side decoding unit
50: security control unit 100: external device
110: security server 111: server side one-time password generator
113: server-side encryption unit 115: server-side decryption unit
120: vehicle database 125: software database
130: apparatus-side control unit 135: wireless communication unit
200: wireless communication terminal 205:
210: terminal control unit 215: wireless communication module
Claims (28)
And a security module for performing security authentication for updating or modifying the supervisor module software,
The security module includes:
A vehicle-side one-time password generator for generating a one-time password,
A vehicle side encryption unit for encrypting approval request data including the one-time password,
A vehicle-side decryption unit for decrypting authorization confirmation data including a response signal for the one-time password,
A security control unit for transmitting the approval request data encrypted in the vehicle side encryption unit to the security server and controlling the security authentication for the updater or modification of the supervisor module software using the approval confirmation data received from the security server, Wherein the watchdog device comprises:
The vehicle side encryption unit performs a primary encryption process of encrypting data by selecting one of a plurality of encryption algorithm functions and a secondary encryption process of encrypting data by selecting one of a plurality of encryption algorithms; And performs encryption by applying at least one of the primary encryption process and the secondary encryption process according to the data.
Wherein the encryption computation function includes a plurality of predetermined encryption codes and an operator; Wherein the vehicle-side encryption unit computes data with one of the plurality of encryption codes.
Wherein the plurality of cryptographic computation functions are comprised of mutually different cryptographic codes and operators.
Wherein the operator uses one of a logical operator of XOR, OR, NOR, AND NAND and one of arithmetic operators of +, -, x, ÷, and so on.
Wherein the encryption algorithm comprises a plurality of asymmetric key algorithms for encrypting data using a public key of the security server.
Wherein the vehicle side decoding unit includes a plurality of decryption functions for decrypting data encrypted by the plurality of encryption computation functions and a plurality of decryption algorithms for decrypting the data encrypted by the plurality of encryption algorithms Watchdog device.
The security control unit includes:
Transmitting the approval request data including the first one-time password encrypted in the vehicle-side encryption unit to the security server using a randomly selected encryption algorithm among the plurality of encryption algorithms, Decrypting the response first one-time password by operating the vehicle-side decoding unit when the corresponding response first one-time password is encrypted, and determining whether the response first one-time password matches the first one-time password A featured watchdog device.
The security control unit includes:
If the first one-time password is equal to the response first one-time password, the second one-time password is generated so that the vehicle-side encryption unit encrypts the second one-time password and transmits the second one-time password to the security server Device.
Wherein the vehicle-side encryption unit first encrypts the second one-time password using the encryption operation function used for encrypting the response first one-time password in the security server, and selects one of the plurality of encryption algorithms, Wherein the one-time password is secondarily encrypted.
Wherein the vehicle-side decoding unit attempts to decrypt the response first one-time password by applying the plurality of encryption calculation functions one by one.
The security control unit regenerates the first one-time password by a predetermined number of times and repeatedly transmits the first one-time password to the security server when the response first one-time password is different from the first one-time password, And deletes the input / output-related source code for supporting the update of the software when the number of times that the generated response first one-time password is inconsistent exceeds the predetermined number of times.
Further comprising: a wireless communication terminal for wireless connection with an external device;
Wherein the security control unit transmits a connection confirmation request signal for checking the connection status to the wireless communication terminal through the high speed communication bus line and if the connection confirmation signal for responding to the connection confirmation request signal is not received within a predetermined time, And deletes the input / output-related source code supporting the update of the software.
The security module of the watchdog device comprises:
A vehicle-side one-time password generator for generating a one-time password; a vehicle-side encryption unit for randomly selecting one of a plurality of encryption methods to encrypt approval request data including the vehicle-side one-time password; And a security controller for requesting a connection to the security server to request a connection and controlling security authentication for updating or modifying the supervisor module software using authorization confirmation data received from the security server;
The security server includes:
A server side encrypting unit for encrypting a response one-time password generated in response to a request from the watchdog unit by randomly selecting one of a plurality of encryption methods; And a device-side control unit for deciding security authentication of the watchdog device by comparing data stored in the data provided from the watchdog device with data stored in the device, Watchdog security system.
The server side one-time password generator is synchronized in time with the same secret key as the vehicle-side one-time password generator under the control of the device-side control unit, and when the first one-time password is received from the watch dog device, Generates a one-time password, and generates a response second one-time password when a second one-time password is received from the watchdog device.
Wherein the server side encryption unit encrypts the response one-time password using one of a plurality of encryption codes set in advance and a plurality of encryption operation functions including an operator.
Wherein the server side decoding unit includes a plurality of decryption functions for decrypting the data encrypted by the plurality of encryption operation functions and a plurality of decryption algorithms for decrypting data encrypted by a randomly selected encryption algorithm among the plurality of encryption algorithms Wherein the watchdog security system comprises:
Wherein the server side decryption unit decrypts the approval request data including the first one-time password provided from the watchdog device by using one of the plurality of decryption algorithms.
Wherein the server-side encryption unit encrypts the content using one of a plurality of predetermined encryption codes and a plurality of encryption operation functions including an operator.
Side control unit compares the first one-time password with the response first one-time password to determine whether or not they are the same and rejects connection of the watchdog device when the two are different. .
Side control unit compares the second one-time password with the response second one-time password to determine whether or not they are the same, and when both are different, refuses connection of the watchdog device .
A generating step of generating a first one-time password in the security module;
Encrypting authorization request data including the first one-time password by randomly selecting one of a plurality of encryption methods;
A request step of transmitting the encrypted approval request data to a security server to request authentication; And
And an authentication step of controlling security authentication for an updater or modification of the supervisor module software using approval confirmation data received from the security server.
Wherein the encrypting step is a step of encrypting the approval request data including the first one-time password using a randomly selected public key among a plurality of public keys of the security server.
Wherein the authentication step comprises:
Receiving at the security server a response first one-time password generated and encrypted corresponding to the first one-time password;
Decrypting the response first one-time password;
Determining whether the response first one-time password matches the first one-time password;
And disconnecting the connection with the security server if the response first one-time password and the first one-time password do not match.
Wherein the authentication step comprises:
Generating a second one-time password if the response first one-time password matches the first one-time password;
Encrypting the second one-time password using one of a plurality of predetermined encryption codes and a plurality of encryption operation functions including an operator;
Encrypting the second one-time password using a randomly selected public key among a plurality of public keys of the security server;
And transmitting the second one-time password encrypted to the security server.
If the response first one-time password is different from the first one-time password, regenerating the first one-time password a predetermined number of times and repeatedly transmitting the first one-time password to the security server; And
When the number of times that the first one-time password generated for the regenerated first one-time password is inconsistent exceeds the predetermined number, deleting the input-output-related source code for supporting the update of the software A method of securing a watchdog device.
Transmitting a connection confirmation request signal for checking a connection status to a wireless communication terminal for wireless connection with an external device; And
And deleting the input / output-related source code supporting the update of the software if a connection confirmation signal responding to the connection confirmation request signal is not received within a predetermined time.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150044746A KR101675223B1 (en) | 2015-03-31 | 2015-03-31 | Watchdog, security system and method for watchdog |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150044746A KR101675223B1 (en) | 2015-03-31 | 2015-03-31 | Watchdog, security system and method for watchdog |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20160117731A KR20160117731A (en) | 2016-10-11 |
KR101675223B1 true KR101675223B1 (en) | 2016-11-11 |
Family
ID=57161943
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150044746A KR101675223B1 (en) | 2015-03-31 | 2015-03-31 | Watchdog, security system and method for watchdog |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101675223B1 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20180045901A (en) * | 2016-10-25 | 2018-05-08 | 주식회사 미래테크놀로지 | V2X communication system |
KR20180045900A (en) * | 2016-10-25 | 2018-05-08 | 주식회사 미래테크놀로지 | Security communication device |
KR102002517B1 (en) * | 2017-06-30 | 2019-07-22 | 주식회사 페스카로 | Method and system for configuration of ecu security |
KR102479036B1 (en) * | 2022-07-29 | 2022-12-16 | 강원식 | Method and System for Providing OTP to Integrated Emergency Broadcasting System |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2013026964A (en) | 2011-07-25 | 2013-02-04 | Denso Corp | Information update device for vehicle and information update method for vehicle |
KR101350715B1 (en) | 2012-07-09 | 2014-01-15 | 에스케이플래닛 주식회사 | One time code authentication system using multiple networks and method thereof |
JP2014514203A (en) | 2011-03-29 | 2014-06-19 | ボルボ ラストバグナー アーベー | Safe repair data package |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101367621B1 (en) * | 2012-06-28 | 2014-02-28 | 삼성에스디에스 주식회사 | System and method for authentication based on one-time password |
-
2015
- 2015-03-31 KR KR1020150044746A patent/KR101675223B1/en active IP Right Grant
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2014514203A (en) | 2011-03-29 | 2014-06-19 | ボルボ ラストバグナー アーベー | Safe repair data package |
JP2013026964A (en) | 2011-07-25 | 2013-02-04 | Denso Corp | Information update device for vehicle and information update method for vehicle |
KR101350715B1 (en) | 2012-07-09 | 2014-01-15 | 에스케이플래닛 주식회사 | One time code authentication system using multiple networks and method thereof |
Also Published As
Publication number | Publication date |
---|---|
KR20160117731A (en) | 2016-10-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106658493B (en) | Key management method, device and system | |
CN103685214B (en) | Safety access method for vehicle electronic control unit | |
CN109257374B (en) | Security control method and device and computer equipment | |
CN111131313B (en) | Safety guarantee method and system for replacing ECU (electronic control Unit) of intelligent networked automobile | |
KR20190083336A (en) | Security provisioning and management of devices | |
JP6731887B2 (en) | Maintenance system and maintenance method | |
CN108616504B (en) | Sensor node identity authentication system and method based on Internet of things | |
KR101675223B1 (en) | Watchdog, security system and method for watchdog | |
CN106034123A (en) | Authentication method, application system server and client | |
CN109714171B (en) | Safety protection method, device, equipment and medium | |
CN108482308B (en) | Electric vehicle safety control method and device, storage medium and electric vehicle | |
US20230237193A1 (en) | Security processor configured to authenticate user and authorize user for user data and computing system including the same | |
US7213267B2 (en) | Method of protecting a microcomputer system against manipulation of data stored in a storage assembly of the microcomputer system | |
CN112153646A (en) | Authentication method, equipment and system | |
CN111901303A (en) | Device authentication method and apparatus, storage medium, and electronic apparatus | |
CN113055340B (en) | Authentication method and equipment | |
CN113766450A (en) | Vehicle virtual key sharing method, mobile terminal, server and vehicle | |
CN112446982A (en) | Method, device, computer readable medium and equipment for controlling intelligent lock | |
GB2582180A (en) | Distributed authentication | |
JP2023102696A (en) | Communication device, vehicle, communication method and program | |
JP2023084378A (en) | Authentication system, server, on-vehicle device, authentication method, and authentication program | |
CN112702304A (en) | Vehicle information verification method and device and automobile | |
CN110972141B (en) | Information verification method and device, electronic equipment and readable storage medium | |
CN117251836B (en) | Method, device, equipment and storage medium for logging in baseboard management controller | |
KR102411797B1 (en) | Hardware-based vehicle cyber security system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E902 | Notification of reason for refusal | ||
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant | ||
FPAY | Annual fee payment |
Payment date: 20191002 Year of fee payment: 4 |