WO2015133207A1 - 車載用通信システム及び車載用通信方法 - Google Patents
車載用通信システム及び車載用通信方法 Download PDFInfo
- Publication number
- WO2015133207A1 WO2015133207A1 PCT/JP2015/052458 JP2015052458W WO2015133207A1 WO 2015133207 A1 WO2015133207 A1 WO 2015133207A1 JP 2015052458 W JP2015052458 W JP 2015052458W WO 2015133207 A1 WO2015133207 A1 WO 2015133207A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- communication system
- vehicle
- controller
- security certificate
- information
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/068—Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/84—Vehicles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
Definitions
- the present invention generally relates to in-vehicle communication systems and methods. More specifically, the present invention relates to an in-vehicle communication system and method for determining the timing and method for performing a security certificate supplement process in a vehicle based on the driving environment of the vehicle.
- Vehicles have come to be equipped with more sophisticated communication equipment, and as a result, they are increasingly connected to the surrounding communication infrastructure and other vehicles.
- the types of communication access points used by vehicles to communicate with infrastructure and other vehicles include, for example, IEEE 802.11 family of wireless communication standards such as cellular communication, direct satellite communication, WiFi and dedicated narrow area communication (DSRC).
- IEEE 802.11 family of wireless communication standards such as cellular communication, direct satellite communication, WiFi and dedicated narrow area communication (DSRC).
- DSRC dedicated narrow area communication
- an in-vehicle communication system and method using a storage device, a communication device, and a controller are provided.
- the storage device is configured to store a plurality of security certificates.
- the communication device is configured to receive external information outside a host vehicle on which the in-vehicle communication system is mounted.
- the controller receives an additional security certificate from at least one source external to the host vehicle when the amount of security certificate stored in the storage device is less than a first predetermined threshold. Therefore, it is configured to determine whether to start a security certificate supplement process based on the received external information.
- FIG. 1 is a block diagram illustrating an example of a host vehicle equipped with an in-vehicle communication system according to an embodiment disclosed in the present specification in association with components of a remote vehicle and a wireless communication network.
- FIG. 2 is a block diagram illustrating a configuration example of the host vehicle equipped with the in-vehicle communication system according to the embodiment disclosed in the present specification.
- FIG. 3 is a block diagram illustrating a configuration example of a communication unit of the in-vehicle communication system according to the embodiment disclosed in the present specification.
- FIG. 4 is a block diagram illustrating a configuration example of the determination unit of the in-vehicle communication system according to the embodiment disclosed in this specification.
- FIG. 5 is a block diagram illustrating a configuration example of the data storage unit of the in-vehicle communication system according to the embodiment disclosed in the present specification.
- FIG. 6 is a flowchart illustrating an example of an operation performed by the in-vehicle communication system according to the embodiment disclosed in the present specification.
- FIG. 7 is a flowchart showing an example of the procedure of the security certificate supplement process in step S15 of FIG.
- FIG. 1 shows a host vehicle (HV) 10 equipped with a vehicle-mounted communication system 12 according to a disclosed embodiment capable of performing vehicle-to-vehicle communication, vehicle-infrastructure communication, or both.
- the host vehicle 10 can also be referred to as a target vehicle (SV).
- the in-vehicle communication system 12 communicates with at least one remote vehicle (RV) 14.
- the remote vehicle (RV) 14 can also include an in-vehicle communication system 12.
- the remote vehicle 14 can communicate at least information about the position and speed of the remote vehicle 14 itself as is understood in the art, eg other types such as an adaptive cruise control system.
- the two-way communication system can be provided.
- the remote vehicle 14 can also be called a target vehicle (TV) or a threat vehicle (TV).
- TV target vehicle
- TV threat vehicle
- a two-way wireless communication network includes one or more global positioning satellites 16 (only one shown) and one or more roadside (ground) units 18 (two shown). And a ground unit such as a base station or an external server 20.
- the global positioning satellite 16 and the roadside unit 18 transmit and receive signals to and from the in-vehicle communication system 12 of the host vehicle 10 and the remote vehicle 14.
- Base station 20 transmits and receives signals to and from in-vehicle communication system 12 of host vehicle 10 and remote vehicle 14 via a network of roadside units 18 or any other suitable two-way wireless communication network.
- the in-vehicle communication system 12 includes an application controller 22 that can be simply referred to as a controller 22.
- the controller 22 preferably includes a microcomputer provided with a control program for controlling the components of the in-vehicle communication system 12.
- the controller 22 includes other conventional components such as an input interface circuit, an output interface circuit, and a storage device such as a ROM (Read Only Memory) device and a RAM (Random Access Memory) device.
- the microcomputer of the controller 22 is programmed to control the in-vehicle communication system 12 according to at least flowcharts shown in FIGS.
- controller 22 can be any combination of hardware and software that implements the functions of the embodiments of the present invention.
- controller 22 may be configured as described in the art, for example, via a controller area network (CAN) bus or in any other suitable manner. It can communicate with 12 other components.
- CAN controller area network
- the host vehicle 10 in which the in-vehicle communication system 12 is arranged further includes, for example, a signal detection unit 24, a communication unit 26, a determination unit 28, and a data storage unit 30.
- the host vehicle 10 further includes a human machine interface (HMI) 32 that is integrated with the in-vehicle communication system 12 or is mounted on the host vehicle 10 alone.
- a user (for example, a driver and / or a passenger) can exchange information with the in-vehicle communication system 12 via the HMI 32.
- the user uses the HMI 32 to register a mobile phone number, an Internet host name, or an IP address in a priority list that can be stored in the data storage unit 30. It can be performed.
- the user can also use the HMI 32 to enter other information, such as a specific IP address or telephone number priority level, as described herein. This information can be stored in the data storage unit 30 together with other information such as vehicle travel data and vehicle position data.
- the data storage unit 30 can also store a security certificate used for communication as understood in the technical field.
- the in-vehicle communication system 12 exists outside the host vehicle 10 via a communication access point 40 (for example, several different types of communication media) and is understood in the technical field.
- communication is performed with one or a plurality of certificate authorities 42 that create a security certificate.
- Communication access point 40 is supported by a two-way wireless communication network and includes a WiFi connection, dedicated short range communication (DSRC) connection, cellular connection, and other wireless media as understood in the art. Can do.
- DSRC dedicated short range communication
- the in-vehicle communication system 12 can also use a communication channel defined for charging electric vehicles, fuel cell vehicles, or hybrid vehicles (BEV / FCV / HEV) and for smart grid communication.
- BEV / FCV / HEV hybrid vehicles
- smart grid communication In response to a request for a security certificate by the in-vehicle communication system 12 via one or more communication access points 40 selected by the in-vehicle communication system 12 as described herein, the certificate authority 42 A security certificate is provided via the selected communication access point 40.
- the communication unit 26 may, for example, via a DSRC connection, a WiFi connection, a cellular connection, and other wireless media of the communication access point 40 as understood in the art.
- a DSRC unit 50 capable of performing communication, a cellular unit 52, a WiFi unit 54, and another wireless medium unit 56 are provided.
- the controller 22 can control the signal detection unit 24 to search the wireless communication network for an available communication access point 40.
- the signal detector 24 may employ any suitable signal selection protocol to select the appropriate one or more available communication access points 40.
- the signal detection unit 24 can determine the timing for switching from one communication access point 40 to another communication access point 40.
- the signal detection unit 24 can monitor the interior of the host vehicle 10 for a mobile phone signal. If a mobile phone signal is detected, the signal detector 24 may use information about the mobile phone (eg, phone number, etc.) for reference and use as described herein, eg, a decision unit 28. And can be supplied to the data storage unit 30.
- information about the mobile phone eg, phone number, etc.
- the controller 22, for example, the signal detection unit 24, can set the communication unit 26 to perform communication via the selected communication access point 40.
- the communication unit 26 receives information from the available communication access point 40, and receives this information from the determination unit 28, the data storage unit 30, the HMI 32, the application unit 34, and other arbitrary components on the host vehicle 10.
- the communication unit 26 uses an available communication access point 40 and, as shown in FIG. 1, communicates with the remote vehicle 14, the certificate authority 42, and any other remote destination via the two-way wireless communication network. Also send information.
- the communication unit 26 can use several communication access points 40 of different types when making / receiving calls.
- FIGS. 6 and 7 An example of the operation performed by the in-vehicle communication system 12 will be described in detail with respect to further aspects of the determination unit 28 and the data storage unit 30 illustrated in FIGS. 4 and 5 and the flowcharts illustrated in FIGS. 6 and 7.
- the processes shown in FIGS. 6 and 7 can be performed by, for example, the determination unit 28 of the controller 22 or any other appropriate component.
- the controller 22 prepares to make a call. can do.
- the in-vehicle communication system 12 uses security certificates to externally communicate with the remote vehicle 12, the ground or roadside unit 18 and other destinations within the two-way wireless communication network. It is possible to sign a message sent to the delivery destination.
- the in-vehicle communication system 12 can check the stock of unused security certificates stored in the data storage unit 30 in step S12. For example, the security certificate usage section 62 of the determination unit 28 can check the stock of unused security certificates stored in the security certificate storage area 74.
- step S13 when the process determines that the number of unused security certificates is greater than a threshold value (for example, the first threshold value), the controller 22 determines that there are unused security certificates that can be used for outgoing calls. Judge that there is enough. Therefore, the processing is completed, and the in-vehicle communication system 12 can make a call. On the other hand, if the process determines in step S13 that the number of unused security certificates is equal to or less than the threshold, the process proceeds to step S14, and the controller 22 determines whether the security certificate supplement process is permitted. Judge based on risk level.
- a threshold value for example, the first threshold value
- the current risk level calculation section 60 is used to evaluate information received by the communication unit 26 from the surrounding remote vehicle 14, the roadside unit 18, and any other device in the two-way wireless communication network, and the host vehicle 10 is placed.
- the current risk level can be calculated and stored for the driving environment.
- the current risk level calculation section 60 can determine that the host vehicle 10 is traveling in a very crowded driving environment. In this case, the current risk level calculation section 60 efficiently receives information from the remote vehicle 14 and other devices in the driving environment so that the controller 22 can access the information and perform, for example, a contact avoidance operation. It can be determined that it is necessary to continue. Therefore, the current risk level calculation section 60 can set the current risk level high. If it is determined that the current risk level is high, the controller 22 can then stop requesting a security certificate at that time, or can suppress the arrival of specific calls or messages, as will be described later.
- the current risk level calculation section 60 may determine that the host vehicle 10 is traveling in a driving environment with little congestion. it can. Therefore, the current risk level calculation section 60 can set the current risk level to a low level or at least a level lower than the high risk level described above. If it is determined that the current risk level is low, the controller 22 can determine that it is now a good time for the in-vehicle communication system 12 to attempt to restock the security certificate, as will be described later. The controller 22 can also allow incoming calls or messages to be received, as described below.
- the controller 22 obtains a risk factor based on the received external information, and determines whether or not the security certificate supplement process should be started based on the risk factor.
- the controller 22 compares the risk factor with the risk threshold to determine if the security certificate replenishment process should be initiated. If it is determined that the risk factor is lower than the risk threshold, the controller 22 performs a security certificate supplement process in step S15.
- the security certificate replenishment process in step S15 can be shown, for example, in the flowchart of FIG.
- the controller 22 is at least one outside the host vehicle 10.
- a determination is made based on the received external information whether a security certificate replenishment process should be initiated to receive additional security certificates from one security authority.
- the decision unit 28 controls the HMI 32 to notify or warn that the amount of security certificate is low and is about to replenish the security certificate (eg, visual, audio and (Or tactile warning).
- the in-vehicle communication system 12 can specify an external source (for example, the communication access point 40) from which a security certificate can be downloaded.
- the term “source” can be used herein to represent a communication access point 40 having the configurations and functions described herein, and thus a communication medium such as communication access point 40. It is also possible to mean a connection between the in-vehicle communication system 12 and the certificate authority 42 via the.
- the controller 22 determines whether there is such a source available in step S22. If there is an available source (eg, communication access point 40), the process proceeds to step S23, where the controller 22 automatically generates a security certificate via the communication access point 40 that can be selected as described above. Can be downloaded. That is, the communication unit 26 can transmit a request to an available certificate authority 42 via the selected communication access point 40. In this way, the communication access point 40 receives the security certificate from the certificate authority via the selected communication access point 40.
- the controller 22 (for example, the determination unit 28) can store the security certificate in the storage stages 74A to 74C of the security certificate storage area 74.
- the determination unit 28 controls the HMI 32 to, for example, a desired method of the desired certificate authority 42 or communication access point 40 (for example, DSRC, WiFi, cellular method).
- a notification eg, visual, audible and / or tactile
- the user may select a desired communication access point 40 based on characteristics of the communication access point 40 such as a security level of the communication access point 40 (for example, secure DSRC, secure WiFi, etc.).
- the determination unit 28 can automatically connect to the communication access point 40 to be used based on predetermined characteristics (for example, DSRC, WiFi, cellular system, connection security, etc.).
- the predetermined characteristic can include information regarding a communication scheme having a higher communication security level than other communication schemes.
- a plurality of communication access points 40 such as 5.9 GHz DSRC, WiFi, cellular network, satellite communication, etc. can be automatically used without any action by the user. can get.
- the controller 22 can store the security certificate in the storage stages 74A to 74C by a specific method, and can extract the security certificate from the storage stages 74A to 74C by a specific method. For example, when the security certificate usage section 62 retrieves a security certificate from the security certificate storage area 74, the security certificate usage section 62 can first retrieve the security certificate from the storage stage 74A. Once the security certificate is retrieved from the storage stage 74A, the storage stage 74B can transfer and add the stored security certificate to the storage stage 74A. Similarly, when these security certificates are transferred from storage stage 74B to storage stage 74A, storage stage 74C can transfer the stored security certificate to storage stage 74B for addition.
- the threshold value (first threshold value) used in step S13 can be set to any appropriate level.
- the first threshold value can indicate when the security certificate of the storage stage 74C has been used up.
- the controller 22 may, for example, use up the security certificate in the storage stage 74B and eventually run out of the security certificate in the storage stage 74A (ie, the security certificate is completely
- An additional threshold can be set to indicate that it does not remain. If all stored security certificates are used up, the in-vehicle communication system 12 can use a single “spare” security certificate that does not change from one communication to another.
- the security certificate usage section 62 can begin storing the security certificate in the storage stage 74A.
- storage stage 74A can then begin transferring the security certificate to storage stage 74B.
- storage stage 74B can begin transferring the security certificate to storage stage 74C and can transfer until storage stage 74C is full.
- the security certificate usage section 62 can store and retrieve security certificates in any suitable manner for the storage stages 74A-74C, and the security certificate storage area 74 can be There can be a number of storage stages (eg, from one storage stage to any practical number of storage stages).
- step S24 the determination unit 28 Can control the HMI 32 to provide notifications or warnings to the user (eg, visual, audible and / or tactile warnings).
- the notification can inform the user that the security certificate has been exhausted and should be replenished as soon as possible.
- the notification can provide information for the user to find the source if no source is currently available.
- the determination unit 28 controls the HMI 32 to indicate the position of the host vehicle 10 and the position of the communication access point 40 to the certificate authority 42, information stored in the GPS storage area of the data storage unit 30, or GPS A map can be provided based on information received from unit 36, or both.
- the map can also indicate connection methods (eg, DSRC, WiFi, cellular method, etc.) that can be used by each communication access point 40. Therefore, the user can drive the host vehicle 10 to a location where the desired communication access point 40 is located or a location close thereto, and download the security certificate.
- the user can use the HMI 32 to select a desired connection method to be used at the communication access point 40, for example.
- the system can automatically switch to a connection method suitable for the communication access point 40.
- the in-vehicle communication system 12 can also manage incoming messages using the risk level calculated by the current risk level calculation section 60 as described above.
- the data storage unit 30 can store identification information such as an IP address and a telephone number in a priority list storage area 70.
- the data storage unit 30 can also store priority level information associated with each of the identification information in the priority level storage area 72. For example, a very high priority level can be given to a specific known IP address or telephone number, and a very low priority level can be given to an unknown IP address telephone number or the like.
- the determination unit 28 uses the identification information (for example, IP address and telephone number), the information in the priority list storage area 70 and the corresponding priority in the priority level storage area 72. Compared with the level information, the priority level of the incoming call can be evaluated. Then, the determination unit 28 can determine whether the user should be allowed to receive or suppress the communication. For example, the determination unit 28 can compare the priority level associated with the incoming call with the calculated risk level. When the risk level is high, the determination unit 28 suppresses all incoming calls except for incoming calls having a very high priority level (for example, messages from spouses and supervisors, emergency messages, etc.) (for example, directly sent to voice mail). Or to the inbox without notification of receipt). Thereby, the determination part 28 can provide a message with a high priority level to a user. On the other hand, when the risk level is low, the determination unit 28 can operate to provide the user with an incoming call with a low priority.
- the identification information for example, IP address and telephone number
- the unreliable signature identification / report section 64 of the determination unit 28 can identify a suspicious or unreliable incoming call. That is, the content of the received message or communication may be inaccurate due to, for example, a malfunction of the system of the sending remote vehicle 14 or an intentional attempt to send an incorrect message or information, or It may be false. For example, the information contained in the incoming call appears to be suspicious or unreliable (eg, the information indicates that the speed of the remote vehicle 14 exceeds a predetermined threshold level or the remote vehicle 14 is The untrusted signature identification and reporting section 64 may identify the communication, information identifying the source (eg, IP address, telephone number, etc.) and the security signature of the communication. Are flagged as unreliable.
- information identifying the source eg, IP address, telephone number, etc.
- the untrusted signature identification / report section 64 can store this untrusted identification information in the untrusted signature storage area 78 located in the data storage unit 30 for reference later, for example.
- the determiner 28 can compare the received communication signature or other identification information with information in the untrusted signature storage area 78 to determine whether this information should be ignored or suppressed.
- the decision unit 28 can also control the communication unit 26 to communicate to report an unreliable signature to the authority responsible for evaluating and managing the record of fraud.
- the controller 22 evaluates the validity of the received external information based on the information included in the received external information and determines that the received external information may be invalid, the controller 22 Control to provide an indication of invalidity for external destinations to receive.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Traffic Control Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (20)
- 車載用通信システムであって、
複数のセキュリティ証明書を格納するように構成された記憶装置と、
前記車載用通信システムを搭載したホスト車両の外部にある外部情報を受信するように構成された通信装置と、
前記記憶装置に格納されているセキュリティ証明書の量が第1の所定の閾値よりも少なくなったら、前記ホスト車両の外部にある少なくとも1つのソースから追加のセキュリティ証明書を受信するためにセキュリティ証明書補充プロセスを開始するべきかどうかを前記受信した外部情報に基づいて判断するように構成されたコントローラと
を備えた車載用通信システム。 - 前記コントローラがさらに、前記受信した外部情報に基づいてリスクファクターを求め、前記リスクファクターに基づいて、前記セキュリティ証明書補充プロセスを開始するべきかどうかを判断するように構成されている請求項1に記載の車載用通信システム。
- 前記コントローラがさらに、前記リスクファクターをリスク閾値と比較して、前記セキュリティ証明書補充プロセスを開始するべきかどうかを判断するように構成されている請求項2に記載の車載用通信システム。
- 前記コントローラがさらに、前記リスクファクターが前記リスク閾値よりも低いと判断すると、前記セキュリティ証明書補充プロセスを開始するように構成されている請求項3に記載の車載用通信システム。
- 前記コントローラがさらに、前記受信した外部情報に基づいて交通環境を判断し、前記交通環境に基づいて前記リスクファクターを求めるように構成されている請求項2~4のいずれか一項に記載の車載用通信システム。
- 前記コントローラがさらに、前記交通情報が高交通レベルを示していると判断すると、前記リスクファクターを高リスクファクターレベルに設定し、前記交通情報が、前記高交通レベルを示す交通量よりもまばらな交通量を示す低交通レベルを示していると判断すると、前記リスクファクターを前記高リスクファクターレベルよりも低い低リスクファクターレベルに設定するように構成されている請求項5に記載の車載用通信システム。
- 前記コントローラがさらに、前記外部情報が前記ホスト車両が外部物体と接触する第1の確率を示していると判断すると、前記リスクファクターを高リスクファクターレベルに設定し、前記外部情報が前記第1の確率よりも低い前記ホスト車両が外部物体に接触する第2の確率を示していると判断すると、前記リスクファクターを前記高リスクファクターレベルよりも低い低リスクファクターレベルに設定するように構成されている請求項2~4のいずれか一項に記載の車載用通信システム。
- 前記コントローラが、前記セキュリティ証明書補充プロセスにおいて、セキュリティ証明書補充通知を出すように構成されている請求項1~7のいずれか一項に記載の車載用通信システム。
- 前記コントローラが、前記セキュリティ証明書補充プロセスにおいて、追加のセキュリティ証明書を前記ソースから取得するように前記通信装置を制御するように構成されている請求項1~8のいずれか一項に記載の車載用通信システム。
- 前記記憶装置が、複数のセキュリティ証明書を複数の記憶段に格納するように構成されている請求項1~9のいずれか一項に記載の車載用通信システム。
- 前記複数の記憶段が第1の記憶段と第2の記憶段とを備え、前記コントローラが、第1の記憶段の前記セキュリティ証明書が使い果たされると、前記第2の記憶段の前記セキュリティ証明書を前記第1の記憶段へ移動するように構成されている請求項10に記載の車載用通信システム。
- 前記コントローラが、前記ホスト車両のユーザインタフェースを制御して、少なくとも1つの前記ソースの少なくとも1つの特性に関する情報を提示するように構成されている請求項1~11のいずれか一項に記載の車載用通信システム。
- 前記少なくとも1つの特性が、ホスト車両の現在位置に対する前記少なくとも1つのソースの少なくとも1つの位置に関する情報を含む請求項12に記載の車載用通信システム。
- 前記少なくとも1つの特性が、前記ホスト車両の前記現在位置に最も近い前記ソースに関する情報を含む請求項13に記載の車載用通信システム。
- 前記少なくとも1つの特性が、前記少なくとも1つのソースの少なくとも1つの接続方式に関する情報を含む請求項12に記載の車載用通信システム。
- 前記少なくとも1つの特性が、前記少なくとも1つのソースにおいて利用可能な他の接続方式よりもセキュリティレベルが高い前記接続方式に関する情報を含む請求項15に記載の車載用通信システム。
- 前記記憶装置が、複数の外部ソース識別子と、前記外部ソース識別子のそれぞれに関連付けられた優先レベルとを格納するように構成され、
前記コントローラがさらに、前記受信した外部情報に含まれる識別情報を前記外部ソース識別子と比較して、前記受信した外部情報を処理する方法を前記比較に基づいて決定するように構成されている
請求項1~16のいずれか一項に記載の車載用通信システム。 - 前記コントローラがさらに、前記識別情報が前記外部ソース識別子の1つに対応していると判断すると、前記受信した外部情報に含まれる前記識別情報を前記1つの外部ソース識別子と関連付けられた前記優先レベルと比較して、前記受信した外部情報を処理する方法を前記識別情報と前記優先レベルとの前記比較に基づいて決定するように構成されている請求項17に記載の車載用通信システム。
- 前記コントローラがさらに、前記受信した外部情報の有効性を前記受信した外部情報に含まれる情報に基づいて評価し、前記受信した外部情報が無効である可能性があると判断すると、前記通信装置を制御して、外部の送信先が受信するための無効性の指標を提供するように構成されている請求項1~18のいずれか一項に記載の車載用通信システム。
- 複数のセキュリティ証明書をホスト車両の車載記憶装置に格納することと、
前記ホスト車両において、前記ホスト車両の外部にある外部情報を受信することと、
前記記憶装置に格納されているセキュリティ証明書の量が第1の所定の閾値よりも少なくなったら、前記ホスト車両の外部にある少なくとも1つのソースから追加のセキュリティ証明書を受信するためにセキュリティ証明書補充プロセスを開始するべきかどうかを前記ホスト車両上の車載コントローラを介して前記受信した外部情報に基づいて判断することと
を含む車載用通信方法。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201580011443.3A CN106063184B (zh) | 2014-03-04 | 2015-01-29 | 车载用通信系统以及车载用通信方法 |
JP2016506178A JP6137403B2 (ja) | 2014-03-04 | 2015-01-29 | 車載用通信システム及び車載用通信方法 |
EP15758185.1A EP3116158B1 (en) | 2014-03-04 | 2015-01-29 | In-vehicle communication system and in-vehicle communication method |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/197,132 US9485247B2 (en) | 2014-03-04 | 2014-03-04 | On-board vehicle communication system and method |
US14/197132 | 2014-03-04 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015133207A1 true WO2015133207A1 (ja) | 2015-09-11 |
Family
ID=54018591
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2015/052458 WO2015133207A1 (ja) | 2014-03-04 | 2015-01-29 | 車載用通信システム及び車載用通信方法 |
Country Status (5)
Country | Link |
---|---|
US (1) | US9485247B2 (ja) |
EP (1) | EP3116158B1 (ja) |
JP (1) | JP6137403B2 (ja) |
CN (1) | CN106063184B (ja) |
WO (1) | WO2015133207A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2018148285A (ja) * | 2017-03-01 | 2018-09-20 | ソフトバンク株式会社 | 基地局及び通信システム |
Families Citing this family (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3056394B1 (en) * | 2013-10-08 | 2022-11-30 | ICTK Holdings Co., Ltd. | Vehicle security network device and design method therefor |
US10103889B2 (en) * | 2014-09-26 | 2018-10-16 | Intel Corporation | Securely exchanging vehicular sensor information |
JP6365410B2 (ja) * | 2015-05-22 | 2018-08-01 | 株式会社デンソー | 車両用通信システム |
CN107027159B (zh) * | 2016-01-29 | 2022-05-20 | 中兴通讯股份有限公司 | 一种按需加入车联网的方法及终端 |
JP6756168B2 (ja) * | 2016-06-28 | 2020-09-16 | 株式会社オートネットワーク技術研究所 | 通信システム |
US10297147B2 (en) | 2016-12-06 | 2019-05-21 | Flir Commercial Systems, Inc. | Methods and apparatus for monitoring traffic data |
CN106681873B (zh) * | 2016-12-23 | 2023-05-02 | 鸿秦(北京)科技有限公司 | 一种识别纯电动汽车数据存储装置异常开启的系统及方法 |
US10192437B1 (en) | 2017-07-17 | 2019-01-29 | Here Global B.V. | Method and apparatus for selectively using different types of networks to obtain information regarding one or more traffic signals and intersections |
US10708808B2 (en) * | 2018-05-14 | 2020-07-07 | Denso International America, Inc. | Systems and methods for receiving/transmitting basic safety messages and IP communications with a DSRC radio |
JP6756783B2 (ja) * | 2018-08-09 | 2020-09-16 | トヨタ自動車株式会社 | 車載制御システム及び車両 |
DE102018215141A1 (de) * | 2018-09-06 | 2020-03-12 | Continental Teves Ag & Co. Ohg | Verfahren zur Verbesserung des Nutzungsgrades einer Fahrzeug-zu-X Kommunikationsvorrichtung sowie Fahrzeug-zu-X Kommunikationsvorrichtung |
US11863546B2 (en) * | 2018-11-09 | 2024-01-02 | Eberle Design, Inc. | Method for secure communications and structure therefor |
US11280622B2 (en) | 2019-03-13 | 2022-03-22 | Here Global B.V. | Maplets for maintaining and updating a self-healing high definition map |
US11402220B2 (en) | 2019-03-13 | 2022-08-02 | Here Global B.V. | Maplets for maintaining and updating a self-healing high definition map |
US11287267B2 (en) | 2019-03-13 | 2022-03-29 | Here Global B.V. | Maplets for maintaining and updating a self-healing high definition map |
US11255680B2 (en) | 2019-03-13 | 2022-02-22 | Here Global B.V. | Maplets for maintaining and updating a self-healing high definition map |
US11096026B2 (en) * | 2019-03-13 | 2021-08-17 | Here Global B.V. | Road network change detection and local propagation of detected change |
US11287266B2 (en) | 2019-03-13 | 2022-03-29 | Here Global B.V. | Maplets for maintaining and updating a self-healing high definition map |
US11001200B2 (en) * | 2019-05-30 | 2021-05-11 | Nissan North America, Inc. | Vehicle occupant warning system |
WO2021083557A1 (en) * | 2019-10-31 | 2021-05-06 | Eberle Design, Inc. | Method for secure vehicular communications and methods for pedestrian and vehicle location validation |
US11520926B2 (en) | 2020-07-09 | 2022-12-06 | Toyota Motor North America, Inc. | Variable transport data retention and deletion |
US11610448B2 (en) * | 2020-07-09 | 2023-03-21 | Toyota Motor North America, Inc. | Dynamically adapting driving mode security controls |
EP4183074A4 (en) | 2020-07-09 | 2024-10-09 | Toyota Motor North America Inc | DYNAMIC ADAPTATION OF DRIVING MODE SAFETY COMMANDS |
US12033192B2 (en) | 2020-10-30 | 2024-07-09 | Toyota Motor North America, Inc. | Transport use determination |
US11673570B2 (en) * | 2021-04-26 | 2023-06-13 | Nissan North America, Inc. | Vehicle driving behavior monitoring and warning system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004165955A (ja) * | 2002-11-13 | 2004-06-10 | Nissan Motor Co Ltd | 狭域通信車載器 |
JP2006340291A (ja) * | 2005-06-06 | 2006-12-14 | Denso Corp | 車載デジタル放送受信装置および車載デジタル放送受信装置用のプログラム |
JP2011033361A (ja) * | 2009-07-30 | 2011-02-17 | Sanyo Electric Co Ltd | ナビゲーション装置 |
Family Cites Families (53)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS5614397A (en) | 1979-07-16 | 1981-02-12 | Nissan Motor | Audio information apparatus for vehicle |
US4644327A (en) | 1982-07-30 | 1987-02-17 | National Research Development Corp. | Methods for generating auditory indicators |
JPS59102634A (ja) | 1982-12-02 | 1984-06-13 | Matsushita Electric Ind Co Ltd | 車輛用警報装置 |
FR2555522A1 (fr) | 1983-11-30 | 1985-05-31 | Aisin Seiki | Appareil de controle de l'etat d'une personne et de commande de la securite d'un vehicule automobile |
JPS61253238A (ja) | 1985-04-15 | 1986-11-11 | Stanley Electric Co Ltd | 音声合成を用いた速度警報装置 |
US5788336A (en) | 1993-07-14 | 1998-08-04 | Philips Electronics North America Corporation | Anti-lock brake warning system |
DE69609926T2 (de) | 1995-06-02 | 2001-03-15 | Koninklijke Philips Electronics N.V., Eindhoven | Vorrichtung zur erzeugung kodierter sprachelemente in einem fahrzeug |
US7426437B2 (en) | 1997-10-22 | 2008-09-16 | Intelligent Technologies International, Inc. | Accident avoidance systems and methods |
US5979586A (en) | 1997-02-05 | 1999-11-09 | Automotive Systems Laboratory, Inc. | Vehicle collision warning system |
JPH1153686A (ja) | 1997-07-31 | 1999-02-26 | Toyota Motor Corp | 交差点警報装置 |
JP3592043B2 (ja) | 1997-07-31 | 2004-11-24 | トヨタ自動車株式会社 | 交差点警報装置 |
JP3687306B2 (ja) | 1997-09-30 | 2005-08-24 | トヨタ自動車株式会社 | 車載交差点情報提供装置 |
US8255144B2 (en) | 1997-10-22 | 2012-08-28 | Intelligent Technologies International, Inc. | Intra-vehicle information conveyance system and method |
US8000897B2 (en) | 1997-10-22 | 2011-08-16 | Intelligent Technologies International, Inc. | Intersection collision avoidance techniques |
JP2000127796A (ja) | 1998-10-21 | 2000-05-09 | Matsushita Electric Ind Co Ltd | 車内警報装置及び車内警報方法 |
JP3584810B2 (ja) | 1999-10-18 | 2004-11-04 | 日本電気株式会社 | 交差点衝突危険警報方法、そのシステム、車載装置、交通管制装置及び記録媒体 |
US6366207B1 (en) | 2000-02-04 | 2002-04-02 | Michael Murphy | Device for modifying vehicle operator driving behavior |
US6700504B1 (en) | 2000-11-01 | 2004-03-02 | Navigation Technologies Corp. | Method and system for safe emergency vehicle operation using route calculation |
US6615137B2 (en) | 2001-06-26 | 2003-09-02 | Medius, Inc. | Method and apparatus for transferring information between vehicles |
JP2003051099A (ja) | 2001-08-07 | 2003-02-21 | Matsushita Electric Ind Co Ltd | 交通管制システム |
AU2002328072A1 (en) | 2002-04-24 | 2003-11-10 | Mohammed El Ouakifi | Remote-controlled intelligent traffic signalling |
US20040078563A1 (en) * | 2002-09-09 | 2004-04-22 | John Kimes | Remotely programmable electronic lock and process ASP software to generate and track key activity |
US6791471B2 (en) | 2002-10-01 | 2004-09-14 | Electric Data Systems | Communicating position information between vehicles |
US6810328B2 (en) | 2002-11-23 | 2004-10-26 | Alpine Electronics, Inc | Navigation method and system for indicating area-specific traffic information |
US6720898B1 (en) | 2003-04-10 | 2004-04-13 | Maxim Integrated Products, Inc. | Current source array for high speed, high resolution current steering DACs |
US20050038573A1 (en) * | 2003-08-11 | 2005-02-17 | Goudy Roy Wesley | Vehicle information/task manager |
JP2006019908A (ja) | 2004-06-30 | 2006-01-19 | Denso Corp | 車両用報知音出力装置及びプログラム |
US7433773B2 (en) * | 2005-10-11 | 2008-10-07 | Nissan Technical Center North America, Inc. | Vehicle on-board unit |
US20080085687A1 (en) * | 2006-10-04 | 2008-04-10 | Brekke Bobbi A | Method and system for assigning call waiting priorities to phone numbers |
DE102007008259A1 (de) | 2007-02-20 | 2008-08-21 | Robert Bosch Gmbh | Steuergerät und Verfahren zur Abgabe eines akustischen Warnsignals |
US20090140887A1 (en) | 2007-11-29 | 2009-06-04 | Breed David S | Mapping Techniques Using Probe Vehicles |
JP4582154B2 (ja) | 2008-02-04 | 2010-11-17 | 株式会社デンソー | 車車間通信装置 |
US8175796B1 (en) | 2008-09-25 | 2012-05-08 | The United States Of America As Represented By The Secretary Of The Navy | Method for vehicle collision avoidance |
JP2010267341A (ja) * | 2009-05-15 | 2010-11-25 | Renesas Electronics Corp | 半導体装置 |
US8233389B2 (en) * | 2009-08-19 | 2012-07-31 | Mitsubishi Electric Research Laboratories, Inc. | Method and protocol for congestion control in a vehicular network |
US8577550B2 (en) | 2009-10-05 | 2013-11-05 | Ford Global Technologies, Llc | System for vehicle control to mitigate intersection collisions and method of using the same |
US8340894B2 (en) | 2009-10-08 | 2012-12-25 | Honda Motor Co., Ltd. | Method of dynamic intersection mapping |
JP5407764B2 (ja) | 2009-10-30 | 2014-02-05 | トヨタ自動車株式会社 | 運転支援装置 |
JP2011129106A (ja) | 2009-11-19 | 2011-06-30 | Sanyo Electric Co Ltd | 無線装置 |
US8627073B2 (en) * | 2010-03-24 | 2014-01-07 | GM Global Technology Operations LLC | Adaptive certificate distribution mechanism in vehicular networks using forward error correcting codes |
US8499155B2 (en) * | 2010-03-24 | 2013-07-30 | GM Global Technology Operations LLC | Adaptive certificate distribution mechanism in vehicular networks using variable inter-certificate refresh period |
US9026354B1 (en) * | 2010-03-30 | 2015-05-05 | Sprint Communications Company L.P. | Determining optimal map downloading locations |
US8639426B2 (en) | 2010-07-15 | 2014-01-28 | George C Dedes | GPS/IMU/video/radar absolute/relative positioning communication/computation sensor platform for automotive safety applications |
EP2593932B1 (en) | 2010-07-16 | 2021-08-25 | Carnegie Mellon University | Methods and systems for coordinating vehicular traffic using in-vehicle virtual traffic control signals enabled by vehicle-to-vehicle communications |
US9177477B2 (en) | 2010-07-19 | 2015-11-03 | Honda Motor Co., Ltd. | Collision warning system using driver intention estimator |
US8587418B2 (en) | 2010-07-28 | 2013-11-19 | Honda Motor Co., Ltd. | Method of controlling a collision warning system using right of way |
US20120041633A1 (en) * | 2010-08-16 | 2012-02-16 | Ford Global Technologies, Llc | Systems and methods for regulating control of a vehicle infotainment system |
US8717192B2 (en) | 2010-10-08 | 2014-05-06 | Navteq B.V. | Method and system for using intersecting electronic horizons |
US8466807B2 (en) | 2011-06-01 | 2013-06-18 | GM Global Technology Operations LLC | Fast collision detection technique for connected autonomous and manual vehicles |
US8706393B2 (en) | 2012-01-10 | 2014-04-22 | Ford Global Technologies, Llc | Intersection collision avoidance with adaptable vehicle dimensions |
US20130278441A1 (en) | 2012-04-24 | 2013-10-24 | Zetta Research and Development, LLC - ForC Series | Vehicle proxying |
FR2993695B1 (fr) * | 2012-07-20 | 2014-08-29 | Realisations Tech Francaises En Comm Et Positionnement De Mobiles Ertf Et | Procede d'aide au depassement mettant en oeuvre un dispositif integrant un module gps couple a un module radiofrequence |
US8930041B1 (en) * | 2013-06-27 | 2015-01-06 | GM Global Technology Operations LLC | Methods of operation for plug-in wireless safety device |
-
2014
- 2014-03-04 US US14/197,132 patent/US9485247B2/en active Active
-
2015
- 2015-01-29 EP EP15758185.1A patent/EP3116158B1/en active Active
- 2015-01-29 WO PCT/JP2015/052458 patent/WO2015133207A1/ja active Application Filing
- 2015-01-29 JP JP2016506178A patent/JP6137403B2/ja active Active
- 2015-01-29 CN CN201580011443.3A patent/CN106063184B/zh active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004165955A (ja) * | 2002-11-13 | 2004-06-10 | Nissan Motor Co Ltd | 狭域通信車載器 |
JP2006340291A (ja) * | 2005-06-06 | 2006-12-14 | Denso Corp | 車載デジタル放送受信装置および車載デジタル放送受信装置用のプログラム |
JP2011033361A (ja) * | 2009-07-30 | 2011-02-17 | Sanyo Electric Co Ltd | ナビゲーション装置 |
Non-Patent Citations (2)
Title |
---|
JOSEPH BENIN ET AL.: "Vehicular network pseudonym distribution in congested urban environments, Southeastcon", 2012 PROCEEDINGS OF IEEE, 2012, pages 1 - 5, XP032179524 * |
ZHENDONG MA ET AL.: "Pseudonym-On-Demand: A New Pseudonym Refill Strategy for Vehicular Communications", VEHICULAR TECHNOLOGY CONFERENCE, 2008. VTC 2008-FALL., vol. 68th, 2008, pages 1 - 5, XP032547794, ISSN: 1550-2252 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2018148285A (ja) * | 2017-03-01 | 2018-09-20 | ソフトバンク株式会社 | 基地局及び通信システム |
Also Published As
Publication number | Publication date |
---|---|
US20150256534A1 (en) | 2015-09-10 |
CN106063184A (zh) | 2016-10-26 |
EP3116158A1 (en) | 2017-01-11 |
EP3116158A4 (en) | 2017-03-15 |
JPWO2015133207A1 (ja) | 2017-04-06 |
CN106063184B (zh) | 2019-02-05 |
JP6137403B2 (ja) | 2017-05-31 |
EP3116158B1 (en) | 2018-12-05 |
US9485247B2 (en) | 2016-11-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6137403B2 (ja) | 車載用通信システム及び車載用通信方法 | |
CN105792201B (zh) | 颁发用于车辆对外界通信的csr证书的方法和系统 | |
US10272793B2 (en) | System and method for determining availability of vehicle charging stations | |
US12101702B2 (en) | Flexible security rating and decision mechanism for machine type communications | |
EP2831858B1 (en) | Service of an emergency event based on proximity | |
US8729857B2 (en) | System, device and method for data transfer to a vehicle and for charging said vehicle | |
EP3198227B1 (en) | Technologies for route navigation sharing in a community cloud | |
US20190044738A1 (en) | Mobile device certificate distribution | |
US11244565B2 (en) | Method and system for traffic behavior detection and warnings | |
US9432828B1 (en) | Vehicle emergency dialing system | |
CN109413618B (zh) | 用于车载网络的多对多文件分发协议 | |
CN105704794B (zh) | 远程信息处理控制系统和方法 | |
CN109152088B (zh) | 无线装置连接管理方法 | |
US10178709B2 (en) | Remotely triggering calls to a PSAP | |
CN110858959B (zh) | 一种管理车辆处的短程无线通信srwc的方法 | |
CN101946490A (zh) | 经由移动网络提供通信信息服务 | |
US20140269466A1 (en) | Controlling wi-fi service in a vehicle | |
US9299250B1 (en) | Processing requests to establish communication sessions in a mobile vehicle communication system | |
CN111246420A (zh) | 用于蜂窝网络的用户设备(ue)黑名单覆盖 | |
CN107454567B (zh) | 将车辆位置传递给外部人员的方法、服务器设备和机动车 | |
FR3102965A1 (fr) | Procédé et dispositif de sélection de certificat pseudonyme pour véhicule | |
JP2016101006A (ja) | 電気自動車判別方法及び電気自動車判別システム | |
JP2024505423A (ja) | 協調型高度道路交通システムのためのローカル誤動作防止システム | |
US20170230286A1 (en) | Method for handling a received vehicle-to-X message in a vehicle, vehicle-to-X communications module and storage medium | |
FR3140235A1 (fr) | Procédé et dispositif de communication de données d’identification de véhicule |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15758185 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2016506178 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REEP | Request for entry into the european phase |
Ref document number: 2015758185 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2015758185 Country of ref document: EP |