WO2018100789A1 - Système de distribution, dispositif de génération de clé, ordinateur embarqué, dispositif de sécurité de données, procédé de distribution, et programme informatique - Google Patents

Système de distribution, dispositif de génération de clé, ordinateur embarqué, dispositif de sécurité de données, procédé de distribution, et programme informatique Download PDF

Info

Publication number
WO2018100789A1
WO2018100789A1 PCT/JP2017/025898 JP2017025898W WO2018100789A1 WO 2018100789 A1 WO2018100789 A1 WO 2018100789A1 JP 2017025898 W JP2017025898 W JP 2017025898W WO 2018100789 A1 WO2018100789 A1 WO 2018100789A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
vehicle
unit
security device
data security
Prior art date
Application number
PCT/JP2017/025898
Other languages
English (en)
Japanese (ja)
Inventor
竹森 敬祐
誠一郎 溝口
歩 窪田
Original Assignee
Kddi株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from JP2016233016A external-priority patent/JP6218914B1/ja
Priority claimed from JP2016239649A external-priority patent/JP6174229B1/ja
Application filed by Kddi株式会社 filed Critical Kddi株式会社
Publication of WO2018100789A1 publication Critical patent/WO2018100789A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • H04L9/16Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation

Definitions

  • the present invention relates to a distribution system, a key generation device, an in-vehicle computer, a data security device, a distribution method, and a computer program.
  • This application claims priority based on Japanese Patent Application No. 2016-2333016 filed in Japan on November 30, 2016 and Japanese Patent Application No. 2016-239649 filed in Japan on December 9, 2016, The contents are incorporated here.
  • Non-Patent Document 1 discloses a security technique for an in-vehicle control system configured by connecting a plurality of ECUs to a CAN (Controller Area Network).
  • Keisuke Takemori “Protection of in-vehicle control systems based on secure elements-Organizing and considering elemental technologies”, IEICE, IEICE Technical Report, vol.vol114, no. 508, pp. 73-78, 2015 March Japanese Industrial Standard, JIS D4901, “Vehicle Identification Number (VIN)” STMicroelectronics, “AN4240 Application note”, [October 5, 2016 search], Internet ⁇ URL: http://www.st.com/web/en/resource/technical/document/application_note/DM00075575.pdf>
  • the present invention has been made in view of such circumstances, a distribution system that can improve the efficiency of key distribution applied to an in-vehicle computer such as an ECU mounted on a vehicle such as an automobile, It is an object to provide a key generation device, an in-vehicle computer, a data security device, a distribution method, and a computer program.
  • One aspect of the present invention includes a key generation device and an in-vehicle computer mounted on a vehicle, and the key generation device uses a master key and a vehicle identifier of the vehicle to connect to the in-vehicle computer.
  • a first key distribution unit that transmits a one-key update request message to the in-vehicle computer, wherein the in-vehicle computer is an interface unit that transmits / receives data to / from an external device of the in-vehicle computer, and a memory that stores the initial key.
  • a key update unit that updates the initial key to the first key and generates a first update completion message using the first key, and the interface unit sends the first update completion message to the key. It is a distribution system which transmits to a production
  • the key generation unit uses the master key and a vehicle identifier of the vehicle to generate a second key to be supplied to the in-vehicle computer.
  • the first key distribution unit generates a second key update request message using the second key and the first key, and transmits the second key update request message to the in-vehicle computer.
  • the key update unit uses the first key stored in the storage unit and the second key update request message received from the key generation device by the interface unit to store the second key in the storage unit. Storing and generating a second update completion message using the second key, wherein the in-vehicle computer transmits the second update completion message to the key generation device by the interface unit, and the first key distribution unit Before The second update completion message received from the onboard computer, for verifying based on said second key has been supplied to the vehicle computer, a distribution system.
  • One aspect of the present invention includes a key generation device, an in-vehicle computer mounted on a vehicle, and a data security device mounted on the vehicle.
  • the key generation device includes a master key and a vehicle of the vehicle.
  • a key generation unit that generates a first key to be supplied to the in-vehicle computer and the data security device using an identifier; the first key, the in-vehicle computer, and the data security device stored in advance in the data security device;
  • a first key update request message is generated using a common initial key, first verification data is generated using the first key, and the first key update request message and the first verification data are
  • a first key distribution unit that transmits data to the data security device, wherein the data security device stores a first interface unit that transmits / receives data to / from an external device of the data security device, and stores the initial key.
  • a second key distribution unit that transmits the first key update request message received from the key generation device by the first interface unit to the in-vehicle computer by the first interface unit, and the first storage unit.
  • the initial key stored in the first storage unit using the stored initial key and the first key update request message received from the key generation device by the first interface unit as the first key.
  • a second key update unit that updates the initial key stored in the storage unit to a first key and generates a first update completion message using the first key
  • the second interface unit causes the second key update unit to generate a first update completion message.
  • the first update completion message is transmitted to the data security device
  • the second key distribution unit sends the first update completion message received from the in-vehicle computer by the first interface unit to the key by the first interface unit.
  • the distribution system performs verification using the first verification data received from the generation device.
  • the key generation unit supplies the in-vehicle computer and the data security device using the master key and the vehicle identifier of the vehicle.
  • the first key distribution unit generates a second key update request message using the second key and the first key supplied to the in-vehicle computer and the data security device.
  • the second key is used to generate second verification data, the second key update request message and the second verification data are transmitted to the data security device, and the second key distribution unit
  • the second key update request message received from the key generation device by one interface unit is transmitted to the in-vehicle computer by the first interface unit, and the first key update unit is stored in the first storage unit.
  • the second key is stored in the first storage unit using the first key to be received and the second key update request message received from the key generation device by the first interface unit, and the second key
  • the update unit uses the first key stored in the second storage unit and the second key update request message received from the data security device by the second interface unit to update the second key to the second key.
  • the in-vehicle computer transmits the second update completion message to the data security device by the second interface unit
  • the second key distribution unit receives the second update completion message received from the in-vehicle computer by the first interface unit from the key generation device by the first interface unit. It verified using the second verification data signal, a distribution system.
  • One aspect of the present invention includes a key generation device, an in-vehicle computer mounted on a vehicle, and a data security device mounted on the vehicle.
  • the key generation device includes a master key and a vehicle of the vehicle.
  • a key generation unit that generates a first key to be supplied to the in-vehicle computer and the data security device using an identifier; and a first key distribution unit that transmits the first key to the data security device.
  • the data security device stores a first interface unit that transmits / receives data to / from an external device of the data security device, and a common initial key of the vehicle stored in advance in the in-vehicle computer and the data security device.
  • a second key update unit that updates the initial key stored in the storage unit to the first key and generates a first update completion message using the first key.
  • the second interface unit transmits the first update completion message to the data security device, and the distribution processing unit receives the first update completion message received from the in-vehicle computer by the first interface unit.
  • verification is performed based on the first key received from the key generation device by one interface unit.
  • the key generation unit supplies the in-vehicle computer and the data security device using the master key and a vehicle identifier of the vehicle.
  • a second key is further generated, the first key distribution unit transmits the second key to the data security device, and the first key update unit is received from the key generation device by the first interface unit.
  • the second key is stored in the first storage unit, and the distribution processing unit receives the first key stored in the first storage unit and the first interface received from the key generation device by the first interface unit.
  • a second key update request message is generated using two keys, and the second key distribution unit transmits the second key update request message to the in-vehicle computer by the first interface unit, and Key renewal part
  • the second key is stored in the second storage unit using the first key stored in the second storage unit and the second key update request message received from the data security device by the second interface unit.
  • the in-vehicle computer transmits the second update completion message to the data security device by the second interface unit
  • the distribution processing unit Is a distribution system that verifies the second update completion message received from the in-vehicle computer by the first interface unit based on the second key received from the key generation device by the first interface unit.
  • One aspect of the present invention includes an in-vehicle computer mounted on a vehicle and a data security device mounted on the vehicle, and the data security device uses a master key and a vehicle identifier of the vehicle.
  • a key generation unit that generates a first key to be supplied to the in-vehicle computer and the data security device, a first interface unit that transmits / receives data to / from an external device of the data security device, the in-vehicle computer, and the data security
  • a first storage unit that stores a common initial key of the vehicle stored in advance in a device; a first key update unit that updates the initial key stored in the first storage unit to the first key;
  • a distribution processing unit that generates a first key update request message using the first key and the initial key stored in the first storage unit, and generates first verification data using the first key;
  • the first key update A second key distribution unit that transmits a request message to the in-vehicle computer by the first interface unit, wherein the in-vehicle computer transmit
  • the first update completion message signal is verified using the first verification data, a distribution system.
  • the key generation unit supplies the in-vehicle computer and the data security device using the master key and the vehicle identifier of the vehicle.
  • the distribution processing unit generates a second key update request message using the second key and the first key, and performs a second verification using the second key.
  • Data is generated, the second key distribution unit transmits the second key update request message to the in-vehicle computer by the first interface unit, and the first key update unit transmits the second key to the second key.
  • the second key update unit stores the first key stored in the second storage unit and the second key update request message received from the data security device by the second interface unit.
  • the second key distribution unit is a distribution system that verifies the second update completion message received from the in-vehicle computer by the first interface unit using the second verification data.
  • a key generation unit that generates a first key to be supplied to an in-vehicle computer mounted on the vehicle using a master key and a vehicle identifier of the vehicle, the first key, A first key update request message is generated using a common initial key of the vehicle stored in advance in the in-vehicle computer, and the first key update request message is transmitted to the in-vehicle computer and received from the in-vehicle computer.
  • a first key distribution unit that verifies a first update completion message based on the first key supplied to the in-vehicle computer.
  • One aspect of the present invention is the key generation device according to (9), wherein the key generation unit uses a master key and a vehicle identifier of the vehicle to supply a second key to be supplied to the in-vehicle computer. Further, the first key distribution unit generates a second key update request message using the second key and the first key, and transmits the second key update request message to the in-vehicle computer. The first key distribution unit is a key generation device that verifies a second update completion message received from the in-vehicle computer based on the second key supplied to the in-vehicle computer.
  • an interface unit that transmits / receives data to / from an external device of the in-vehicle computer, and a common initial key of the vehicle stored in the in-vehicle computer in advance
  • the initial key stored in the storage unit using the storage unit storing the initial key stored in the storage unit and the first key update request message received from the key generation device by the interface unit.
  • a key update unit that updates to one key and generates a first update completion message using the first key, and transmits the first update completion message to the key generation device by the interface unit. It is a computer.
  • One aspect of the present invention is the in-vehicle computer according to (11), wherein the key update unit receives the second key received from the key generation device by the first key and the interface unit stored in the storage unit.
  • the second key is stored in the storage unit using the key update request message, and a second update completion message is generated using the second key.
  • the in-vehicle computer uses the interface unit to perform the second update An in-vehicle computer that transmits a completion message to the key generation device.
  • a key generation unit that generates a first key to be supplied to an in-vehicle computer and a data security device mounted on the vehicle using a master key and a vehicle identifier of the vehicle, A first key update request message is generated using one key and a common initial key of the vehicle stored in advance in the in-vehicle computer and the data security device, and the first verification data is generated using the first key. And a first key distribution unit that transmits the first key update request message and the first verification data to the data security device.
  • One aspect of the present invention is the key generation device according to (13), wherein the key generation unit supplies the in-vehicle computer and the data security device using the master key and a vehicle identifier of the vehicle.
  • a second key to be generated, and the first key distribution unit generates a second key update request message using the second key and the first key, and uses the second key to generate a second key.
  • a key generation device that generates verification data and transmits the second key update request message and the second verification data to the data security device.
  • a first interface unit that transmits / receives data to / from an external device of the data security device, an in-vehicle computer mounted on the vehicle, and the data
  • a first storage unit storing a common initial key of the vehicle stored in advance in a security device; and a first key update request message received from a key generation device by the first interface unit by the first interface unit.
  • the first update completion message received from the onboard computer by parts, verified using the first verification data received from the key generating device by said first interface unit is a data security device.
  • One aspect of the present invention is the data security device according to (15), wherein the second key distribution unit receives the second key update request message received from the key generation device by the first interface unit, The first interface unit transmits to the in-vehicle computer, and the first key update unit receives the first key stored in the first storage unit and the second interface received from the key generation device by the first interface unit. The second key is stored in the first storage unit using the key update request message, and the second key distribution unit receives the second update completion message received from the in-vehicle computer by the first interface unit, A data security device that verifies using second verification data received from the key generation device by a first interface unit.
  • a second interface unit that transmits / receives data to / from an external device of the vehicle-mounted computer, the vehicle-mounted computer, and a data security device mounted on the vehicle
  • a second storage unit storing a common initial key of the vehicle stored in advance, the initial key stored in the second storage unit, and a first key received from the data security device by the second interface unit
  • a second key update unit that updates the initial key stored in the second storage unit to a first key using an update request message and generates a first update completion message using the first key;
  • the second interface unit transmits the first update completion message to the data security device.
  • One aspect of the present invention is the in-vehicle computer according to (17), wherein the second key update unit includes the first key stored in the second storage unit and the second interface unit.
  • the second key is stored in the second storage unit using the second key update request message received from the device, and a second update completion message is generated using the second key.
  • the in-vehicle computer transmits the second update completion message to the data security device by the second interface unit.
  • a key generation unit that generates a first key to be supplied to an in-vehicle computer and a data security device mounted on the vehicle using a master key and a vehicle identifier of the vehicle, And a first key distribution unit that transmits one key to the data security device.
  • One aspect of the present invention is the key generation device according to (19), wherein the key generation unit supplies the in-vehicle computer and the data security device using the master key and a vehicle identifier of the vehicle. A second key to be generated, and the first key distribution unit transmits the second key to the data security device.
  • a first interface unit that transmits / receives data to / from an external device of the data security device, an in-vehicle computer mounted on the vehicle, and the data
  • a first storage unit storing a common initial key of the vehicle stored in advance in a security device, and the initial key stored in the first storage unit received from the key generation device by the first interface unit.
  • a first key update unit using a first key update unit updated to one key, the initial key stored in the first storage unit, and the first key received from the key generation device by the first interface unit;
  • a distribution processing unit that generates an update request message; and a second key distribution unit that transmits the first key update request message to the in-vehicle computer through the first interface unit,
  • a data processing device that verifies a first update completion message received from the in-vehicle computer by the first interface unit based on the first key received from the key generation device by the first interface unit; It is.
  • One aspect of the present invention is the data security device according to (21), wherein the first key update unit stores the second key received from the key generation device by the first interface unit in the first storage.
  • the distribution processing unit uses the first key stored in the first storage unit and the second key received from the key generation device by the first interface unit.
  • An update request message is generated, and the second key distribution unit transmits the second key update request message to the in-vehicle computer by the first interface unit, and the distribution processing unit transmits the second key update request message by the first interface unit.
  • a data security device that verifies a second update completion message received from an in-vehicle computer based on the second key received from the key generation device by the first interface unit.
  • a second interface unit that transmits / receives data to / from an external device of the vehicle-mounted computer, the vehicle-mounted computer, and a data security device mounted on the vehicle
  • a second storage unit storing a common initial key of the vehicle stored in advance, the initial key stored in the second storage unit, and a first key received from the data security device by the second interface unit
  • a second key update unit that updates the initial key stored in the second storage unit to a first key using an update request message and generates a first update completion message using the first key;
  • the second interface unit transmits the first update completion message to the data security device.
  • One aspect of the present invention is the in-vehicle computer according to (23), wherein the second key update unit includes the first key stored in the second storage unit and the second interface unit.
  • the second key is stored in the second storage unit using the second key update request message received from the device, and a second update completion message is generated using the second key.
  • the in-vehicle computer transmits the second update completion message to the data security device by the second interface unit.
  • a master key and a vehicle identifier of the vehicle are used to supply the vehicle-mounted computer mounted on the vehicle and the data security device.
  • a key generation unit that generates one key
  • a first interface unit that transmits and receives data to and from an external device of the data security device, and a common initial key of the vehicle that is stored in advance in the in-vehicle computer and the data security device
  • a first storage unit for storing, a first key updating unit for updating the initial key stored in the first storage unit to the first key, and the first key and the first storage unit stored in the first storage unit.
  • a distribution processing unit that generates a first key update request message using an initial key and generates first verification data using the first key; and the first key update request message that is transmitted to the first interface.
  • a second key distribution unit for transmitting to the in-vehicle computer, wherein the second key distribution unit uses the first verification data for the first update completion message received from the in-vehicle computer by the first interface unit.
  • This is a data security device to be verified.
  • One aspect of the present invention is the data security device according to (25), wherein the key generation unit supplies the in-vehicle computer and the data security device using the master key and the vehicle identifier of the vehicle.
  • the distribution processing unit generates a second key update request message using the second key and the first key, and performs a second verification using the second key. Data is generated, the second key distribution unit transmits the second key update request message to the in-vehicle computer by the first interface unit, and the first key update unit transmits the second key to the second key.
  • a data security device for storing the second update completion message received from the in-vehicle computer by the first interface unit using the second verification data. is there.
  • a second interface unit that transmits / receives data to / from an external device of the vehicle-mounted computer, the vehicle-mounted computer, and a data security device mounted on the vehicle
  • a second storage unit storing a common initial key of the vehicle stored in advance, the initial key stored in the second storage unit, and a first key received from the data security device by the second interface unit
  • a second key update unit that updates the initial key stored in the second storage unit to a first key using an update request message and generates a first update completion message using the first key;
  • the second interface unit transmits the first update completion message to the data security device.
  • One aspect of the present invention is the in-vehicle computer according to (27), wherein the second key update unit includes the data security by the first key stored in the second storage unit and the second interface unit.
  • the second key is stored in the second storage unit using the second key update request message received from the device, and a second update completion message is generated using the second key.
  • the in-vehicle computer transmits the second update completion message to the data security device by the second interface unit.
  • a key generation device generates a first key to be supplied to an in-vehicle computer mounted on the vehicle using a master key and a vehicle identifier of the vehicle, and the key generation device Generates a first key update request message using the first key and a common initial key of the vehicle stored in advance in the in-vehicle computer, and transmits the first key update request message to the in-vehicle computer.
  • the in-vehicle computer receives the first key update request received from the key generation device by the interface unit that transmits and receives the initial key stored in the storage unit of the in-vehicle computer and a device external to the in-vehicle computer.
  • the computer transmits the first update completion message to the key generation device by the interface unit, and the key generation device supplies the first update completion message received from the in-vehicle computer to the in-vehicle computer.
  • This is a distribution method for verifying based on one key.
  • One aspect of the present invention is the distribution method according to (29), wherein the key generation device uses the master key and a vehicle identifier of the vehicle to supply a second key to be supplied to the in-vehicle computer.
  • the key generation device further generates a second key update request message using the second key and the first key, and transmits the second key update request message to the in-vehicle computer.
  • the in-vehicle computer further uses the first key stored in the storage unit and the second key update request message received from the key generation device by the interface unit to store the second key in the storage unit.
  • the second update completion message is generated using the second key, and the in-vehicle computer further sends the second update completion message to the key generation device by the interface unit. Sent, the key generation device, further wherein the second update completion message received from the onboard computer, for verifying based on said second key has been supplied to the vehicle computer, a delivery method.
  • the key generation device uses the master key and the vehicle identifier of the vehicle to generate a first key to be supplied to the in-vehicle computer and the data security device mounted on the vehicle,
  • the key generation device generates a first key update request message using the first key and a common initial key of the vehicle stored in advance in the in-vehicle computer and the data security device, and the first key To generate first verification data, and transmit the first key update request message and the first verification data to the data security device.
  • the data security device and a device outside the data security device and data The first interface unit that transmits and receives the first key update request message received from the key generation device is transmitted to the in-vehicle computer by the first interface unit, and the data storage The device uses the initial key stored in the first storage unit of the data security device and the first key update request message received from the key generation device by the first interface unit in the first storage unit.
  • the stored initial key is updated to the first key, and the in-vehicle computer transmits / receives data to / from the initial key stored in the second storage unit of the in-vehicle computer and a device external to the in-vehicle computer.
  • One aspect of the present invention is the distribution method according to (31), wherein the key generation device supplies the in-vehicle computer and the data security device using the master key and the vehicle identifier of the vehicle.
  • a second key to be generated, and the key generation device further generates a second key update request message using the second key and the first key, and uses the second key to generate a second key.
  • 2 verification data is generated, the second key update request message and the second verification data are transmitted to the data security device, and the data security device is further received from the key generation device by the first interface unit.
  • the second key update request message is transmitted to the in-vehicle computer by the first interface unit, and the data security device further includes the first key stored in the first storage unit and the The second key is stored in the first storage unit using the second key update request message received from the key generation device by one interface unit, and the in-vehicle computer further stores in the second storage unit Storing the second key in the second storage unit using the stored first key and the second key update request message received from the data security device by the second interface unit;
  • a second update completion message is generated using a key, and the in-vehicle computer further transmits the second update completion message to the data security device by the second interface unit, and the data security device further includes:
  • the second update completion message received from the in-vehicle computer by the first interface unit is transmitted to the key generation device by the first interface unit. It verified using the second verification data received from a distribution method.
  • the key generation device uses the master key and the vehicle identifier of the vehicle to generate a first key to be supplied to the in-vehicle computer and the data security device mounted on the vehicle, The key generation device transmits the first key to the data security device, and the data security device is stored in the first storage unit of the data security device, “pre-stored in the in-vehicle computer and the data security device.
  • the vehicle initial common key is updated to the first key received from the key generation device by the first interface unit that transmits and receives data to and from an external device of the data security device, and the data security device Generating a first key update request message using the initial key stored in the first storage unit and the first key received from the key generation device by the first interface unit;
  • the security device transmits the first key update request message to the in-vehicle computer by the first interface unit, and the in-vehicle computer stores the initial key stored in the second storage unit of the in-vehicle computer, The initial key stored in the second storage unit using the first key update request message received from the data security device by a second interface unit that transmits and receives data to and from an external device of the in-vehicle computer.
  • Update to one key generate a first update completion message using the first key
  • the in-vehicle computer transmits the first update completion message to the data security device by the second interface unit
  • the data security device receives the first update completion message received from the in-vehicle computer by the first interface unit, Verifying based by serial first interface unit to the first key received from the key generation apparatus, a distribution method.
  • One aspect of the present invention is the distribution method according to (33), wherein the key generation device supplies the in-vehicle computer and the data security device using the master key and the vehicle identifier of the vehicle. A second key to be generated, and the key generation device further transmits the second key to the data security device, and the data security device further receives the key from the key generation device by the first interface unit.
  • the second key is stored in the first storage unit, and the data security device is further received from the key generation device by the first key and the first interface unit stored in the first storage unit.
  • the second key update request message is generated using the second key, and the data security device further transmits the second key update request message to the vehicle by the first interface unit.
  • the vehicle-mounted computer further uses the first key stored in the second storage unit and the second key update request message received from the data security device by the second interface unit.
  • the second key is stored in the second storage unit, a second update completion message is generated using the second key, and the in-vehicle computer further completes the second update by the second interface unit.
  • a message is transmitted to the data security device, and the data security device further receives the second update completion message received from the in-vehicle computer by the first interface unit from the key generation device by the first interface unit.
  • the distribution method verifies based on the second key.
  • a data security device mounted on a vehicle supplies a vehicle-mounted computer mounted on the vehicle and the data security device using a master key and a vehicle identifier of the vehicle.
  • a first key is generated, and the data security device stores a "common initial key for the vehicle stored in advance in the in-vehicle computer and the data security device" stored in the first storage unit of the data security device, Updating to the first key, the data security device generates a first key update request message using the first key and the initial key stored in the first storage unit, and the first key is First verification data is generated, and the data security device sends the first key update request message to the in-vehicle computer by a first interface unit that transmits and receives data to and from a device external to the data security device.
  • the vehicle-mounted computer receives the initial key stored in the second storage unit of the vehicle-mounted computer and the data security device received from the data security device by a second interface unit that transmits / receives data to / from an external device of the vehicle-mounted computer. Updating the initial key stored in the second storage unit using the first key update request message to the first key, generating a first update completion message using the first key, and The in-vehicle computer transmits the first update completion message to the data security device by the second interface unit, and the data security device receives the first update completion message received from the in-vehicle computer by the first interface unit. And a delivery method for performing verification using the first verification data.
  • the data security device supplies the in-vehicle computer and the data security device using the master key and the vehicle identifier of the vehicle.
  • a second key to be generated and the data security device further generates a second key update request message using the second key and the first key, and uses the second key to generate a second key.
  • 2 verification data is generated, the data security device further transmits the second key update request message to the in-vehicle computer by the first interface unit, and the data security device further transmits the second key.
  • the second in-vehicle computer stored in the first storage unit and further received from the data security device by the first key and the second interface unit stored in the second storage unit.
  • the second key is stored in the second storage unit using an update request message, a second update completion message is generated using the second key, and the in-vehicle computer further includes the second interface.
  • the second update completion message is transmitted to the data security device by the unit, and the data security device further transmits the second update completion message received from the in-vehicle computer by the first interface unit to the second verification data. It is a delivery method to verify using.
  • a first key to be supplied to an in-vehicle computer mounted on the vehicle is generated in a computer using a master key and a vehicle identifier of the vehicle, and the first key and the A first key update request message is generated using a common initial key of the vehicle stored in advance in the in-vehicle computer, and the first key update request message is transmitted to the in-vehicle computer and received from the in-vehicle computer. It is a computer program for realizing a process of verifying a first update completion message based on the first key supplied to the in-vehicle computer.
  • the generation further generates a second key to be supplied to the in-vehicle computer using the master key and a vehicle identifier of the vehicle.
  • the verification generates a second key update request message using the second key and the first key, and transmits the second key update request message to the in-vehicle computer.
  • an in-vehicle computer mounted on a vehicle stores an initial key common to the vehicle stored in advance in the in-vehicle computer, and the stored initial key and the in-vehicle computer Update the stored initial key to the first key using the first key update request message received from the key generation device by the interface unit that transmits and receives data to and from the external device, and uses the first key.
  • a first update completion message is generated, and the first update completion message is transmitted to the key generation device by the interface unit.
  • the generation includes: the first key stored; and the second key update request message received from the key generation device by the interface unit. Using the second key to generate a second update completion message using the second key, and transmitting the second update completion message to the key generation device by the interface unit; It is a computer program.
  • a first key to be supplied to an in-vehicle computer and a data security device mounted on the vehicle is generated in a computer using a master key and a vehicle identifier of the vehicle.
  • a first key update request message is generated using one key and a common initial key of the vehicle stored in advance in the in-vehicle computer and the data security device, and the first verification data is generated using the first key. Is generated, and the first key update request message and the first verification data are transmitted to the data security device.
  • One aspect of the present invention is the computer program according to (41), wherein the generation is supplied to the in-vehicle computer and the data security device using the master key and a vehicle identifier of the vehicle. Further generating a key, wherein the transmission generates a second key update request message using the second key and the first key, and generates second verification data using the second key; A computer program for transmitting the second key update request message and the second verification data to the data security device.
  • a computer of a data security device mounted on a vehicle stores an in-vehicle computer mounted on the vehicle and a common initial key of the vehicle stored in advance in the data security device.
  • a first key update request message received from a key generation device by a first interface unit that transmits and receives data to and from an external device of the data security device is transmitted to the in-vehicle computer by the first interface unit and stored.
  • the chromatography di, verified using the first verification data received from the key generating device by said first interface unit is a computer program.
  • the transmission includes sending a second key update request message received from the key generation device by the first interface unit using the first interface unit.
  • the update is transmitted to the in-vehicle computer, and the update stores the second key using the stored first key and the second key update request message received from the key generation device by the first interface unit.
  • the transmission verifies the second update completion message received from the in-vehicle computer by the first interface unit using the second verification data received from the key generation device by the first interface unit. It is.
  • an in-vehicle computer mounted on a vehicle stores a common initial key of the vehicle stored in advance in the in-vehicle computer and a data security device mounted on the vehicle, and the storage The initial key stored using the first key update request message received from the data security device by the second interface unit that transmits and receives data to and from an external device of the in-vehicle computer.
  • One aspect of the present invention is the computer program according to (45), wherein the generation is a second key update request received from the data security device by the stored first key and the second interface unit.
  • a second key is stored using the message
  • a second update completion message is generated using the second key
  • the second update completion message is transmitted to the data security by the second interface unit.
  • a first key to be supplied to an in-vehicle computer and a data security device mounted on the vehicle is generated in a computer using a master key and a vehicle identifier of the vehicle, It is a computer program for realizing processing of transmitting one key to the data security device.
  • the generation is supplied to the in-vehicle computer and the data security device using the master key and a vehicle identifier of the vehicle.
  • a key is further generated, and the transmission is a computer program for transmitting the second key to the data security device.
  • a computer of a data security device mounted on a vehicle stores an in-vehicle computer mounted on the vehicle and a common initial key of the vehicle stored in advance in the data security device.
  • the stored initial key is updated to a first key received from a key generation device by a first interface unit that transmits and receives data to and from an external device of the data security device, and the stored initial key and the first key are updated.
  • a first key update request message is generated by using the first key received from the key generation apparatus by one interface unit, and the first key update request message is transmitted to the in-vehicle computer by the first interface unit. And the generation is received from the in-vehicle computer by the first interface unit.
  • the first update completion message verifies based on the first key received from the key generating device by said first interface unit is a computer program.
  • the update stores a second key received from the key generation device by the first interface unit, and the generation is stored in the computer program
  • the second key update request message is generated using the first key and the second key received from the key generation device by the first interface unit, and the transmission includes the second key update request message.
  • the first interface unit transmits the second update completion message received from the in-vehicle computer by the first interface unit from the key generation device by the first interface unit.
  • a computer program for verifying based on the second key is a computer program.
  • an in-vehicle computer mounted on a vehicle stores a common initial key of the vehicle stored in advance in the on-vehicle computer and a data security device mounted on the vehicle, and the storage The initial key stored using the first key update request message received from the data security device by the second interface unit that transmits and receives data to and from an external device of the in-vehicle computer.
  • One aspect of the present invention is the computer program according to (51), wherein the generation is a second key update request received from the data security device by the stored first key and the second interface unit.
  • a second key is stored using the message
  • a second update completion message is generated using the second key
  • the second update completion message is transmitted to the data security by the second interface unit.
  • a computer of a data security device mounted on a vehicle uses a master key and a vehicle identifier of the vehicle, and the computer mounted on the vehicle and the data security device Generating a first key to be supplied, storing a common initial key of the vehicle stored in advance in the in-vehicle computer and the data security device, updating the stored initial key to the first key, A first key update request message is generated using the first key and the stored initial key, first verification data is generated using the first key, and the first key update request message is , A computer program for realizing processing, which is transmitted to the in-vehicle computer by a first interface unit that transmits and receives data to and from an external device of the data security device, The first update completion message received from the onboard computer by the interface unit, is verified using the first verification data is a computer program.
  • One aspect of the present invention is the computer program according to (53), wherein the generation of the first key uses the master key and a vehicle identifier of the vehicle, and uses the in-vehicle computer and the data security.
  • a second key to be supplied to the apparatus, and the generation of the first verification data is performed by generating a second key update request message using the second key and the first key, and the second key
  • the transmission transmits the second key update request message to the in-vehicle computer by the first interface unit, the update stores the second key
  • the transmission is a computer program for verifying a second update completion message received from the in-vehicle computer by the first interface unit using the second verification data.
  • an in-vehicle computer mounted in a vehicle stores a common initial key of the vehicle stored in advance in the in-vehicle computer and a data security device mounted in the vehicle, and the storage The initial key stored using the first key update request message received from the data security device by the second interface unit that transmits and receives data to and from an external device of the in-vehicle computer.
  • One aspect of the present invention is the computer program according to (55), wherein the generation is a second key update request received from the data security device by the stored first key and the second interface unit.
  • a second key is stored using the message
  • a second update completion message is generated using the second key
  • the second update completion message is transmitted to the data security by the second interface unit.
  • One aspect of the present invention includes an in-vehicle computer mounted on a vehicle and a data security device mounted on the vehicle, and the data security device transmits and receives data to and from a device outside the data security device
  • a first storage unit storing a common initial key of the vehicle, a designation of a master key which is a message authentication code generation key, and a notification of first message authentication code generation target information including a vehicle correspondence identifier corresponding to the vehicle Control that is performed on the second arithmetic processing unit and requests the second arithmetic processing unit to generate a message authentication code of the first message authentication code generation target information And a message for generating a first key update request message using the initial key and the first key that is the message authentication code of the first message authentication code generation target information generated by the second arithmetic processing unit.
  • a master key storage unit that stores the master key; and a generation unit; and a key distribution unit that transmits the first key update request message to the in-vehicle computer through the first interface unit. And generating the message authentication code of the first message authentication code generation target information notified from the first arithmetic processing device by using the message authentication code generation key specified by the first arithmetic processing device.
  • a message authentication code generation unit wherein the in-vehicle computer transmits and receives data to and from a device external to the in-vehicle computer.
  • a second storage unit for storing the initial key, the initial key stored in the second storage unit, and the first key update request message received from the data security device by the second interface unit; And a key update unit that updates the initial key stored in the second storage unit to the first key using a distribution system.
  • the message generation unit generates first verification data using the first key supplied to the in-vehicle computer, and the key update unit is stored in the second storage unit.
  • the first update completion message is generated using the stored first key, and the in-vehicle computer transmits the first update completion message to the data security device by the second interface unit, and the key distribution unit Is a distribution system that verifies the first update completion message received from the in-vehicle computer by the first interface unit using the first verification data.
  • the control unit in the distribution system according to any one of (57) and (58), the control unit generates a second message authentication code including the designation of the master key and the vehicle correspondence identifier. Notification of target information is performed on the second arithmetic processing unit, the second arithmetic processing unit is requested to generate a message authentication code of the second message authentication code generation target information, and the message generation unit includes: Second key update using the first key supplied to the in-vehicle computer and the second key that is the message authentication code of the second message authentication code generation target information generated by the second arithmetic processing unit Generate a request message, the key distribution unit transmits the second key update request message to the in-vehicle computer by the first interface unit, the key update unit, The second key is stored in the second storage unit using the first key stored in the second storage unit and the second key update request message received from the data security device by the second interface unit.
  • One aspect of the present invention is the distribution system according to (59), wherein the message generation unit generates second verification data using the second key supplied to the in-vehicle computer, and updates the key The unit generates a second update completion message using the second key stored in the second storage unit, and the in-vehicle computer transmits the second update completion message to the data security by the second interface unit.
  • the key distribution unit is a distribution system that verifies the second update completion message received from the in-vehicle computer by the first interface unit using the second verification data.
  • One aspect of the present invention includes an in-vehicle computer mounted on a vehicle and a data security device mounted on the vehicle, and the data security device transmits and receives data to and from a device external to the data security device.
  • the two arithmetic processing units include a master key storage unit that stores the master key, a first storage unit that stores the initial key, and the first message authentication code generation target information notified from the first arithmetic processing unit.
  • the in-vehicle computer includes a second interface unit that transmits / receives data to / from an external device of the in-vehicle computer, a second storage unit that stores the initial key, the initial key stored in the second storage unit, and the first A key updating unit that updates the initial key stored in the second storage unit to the first key using the first key update request message received from the data security device by the two interface unit; , Distribution system.
  • One aspect of the present invention is the distribution system according to (61), wherein the message generation unit encrypts when generating the first verification data using the first key supplied to the in-vehicle computer.
  • Data generation processing and message authentication code generation processing are executed using the second arithmetic processing unit, and the key update unit performs first update using the first key stored in the second storage unit A completion message is generated, and the in-vehicle computer transmits the first update completion message to the data security device by the second interface unit, and the key distribution unit receives from the in-vehicle computer by the first interface unit.
  • the distribution system verifies the first update completion message using the first verification data.
  • One aspect of the present invention is the distribution system according to any one of (61) and (62), wherein the control unit generates a second message authentication code including the designation of the master key and the vehicle correspondence identifier. Notification of target information is performed on the second arithmetic processing unit, the second arithmetic processing unit is requested to generate a message authentication code of the second message authentication code generation target information, and the message generation unit includes: A second key update request using the first key supplied to the in-vehicle computer and a second key that is a message authentication code of the second message authentication code generation target information generated by the second arithmetic processing unit Encrypted data generation processing and message authentication code generation processing for generating a message are executed using the second arithmetic processing unit, and the key distribution unit updates the second key update The request message is transmitted to the in-vehicle computer by the first interface unit, and the key update unit is received from the data security device by the first key stored in the second storage unit and the second interface unit.
  • the distribution system stores the second key in the second storage unit using a second key update request message.
  • One aspect of the present invention is the distribution system according to (63), wherein the message generation unit encrypts the second verification data using the second key supplied to the in-vehicle computer. Data generation processing and message authentication code generation processing are executed using the second arithmetic processing unit, and the key update unit performs second update using the second key stored in the second storage unit A completion message is generated, and the in-vehicle computer transmits the second update completion message to the data security device by the second interface unit, and the key distribution unit receives from the in-vehicle computer by the first interface unit. The distribution system verifies the second update completion message using the second verification data.
  • One aspect of the present invention is a data security device mounted on a vehicle, and includes a first interface unit that transmits / receives data to / from an external device of the data security device, a first arithmetic processing device, and a secure element.
  • a first memory that stores a common initial key of the vehicle that is stored in advance in the in-vehicle computer mounted in the vehicle and the data security device.
  • a second key processing unit a master key that is a message authentication code generation key, and a notification of first message authentication code generation target information including a vehicle correspondence identifier corresponding to the vehicle, Generated by the control unit that requests the second arithmetic processing unit to generate the message authentication code of the first message authentication code generation target information, the initial key, and the second arithmetic processing unit
  • a message generation unit that generates a first key update request message using the first key that is the message authentication code of the first message authentication code generation target information, and the first key update request message is
  • the second arithmetic processing unit includes a master key storage unit that stores the master key, and the first arithmetic unit that is notified from the first arithmetic processing unit.
  • a message authentication code generation unit configured to generate the message authentication code of one message authentication code generation target information using the message authentication code generation key specified by the first arithmetic processing device. is there.
  • the control unit performs designation of the master key and notification of second message authentication code generation target information including the vehicle correspondence identifier.
  • the second processing unit is requested to generate a message authentication code of the second message authentication code generation target information to the second processing unit, and the message generation unit supplies the on-board computer.
  • the key distribution unit is a data security device that transmits the second key update request message to the in-vehicle computer through the first interface unit.
  • One aspect of the present invention is a data security device mounted on a vehicle, and includes a first interface unit that transmits / receives data to / from an external device of the data security device, a first arithmetic processing device, and a secure element.
  • a first arithmetic processing unit wherein the first arithmetic processing unit specifies first message authentication code generation target information including a designation of a master key that is a message authentication code generation key and a vehicle correspondence identifier corresponding to the vehicle.
  • a control unit that requests the second arithmetic processing unit to generate a message authentication code for the first message authentication code generation target information, and is mounted on the vehicle.
  • Encrypted data generation processing and message authentication code generation processing when generating a first key update request message using the first key that is the message authentication code of the target information is performed using the second arithmetic processing unit.
  • a message distribution unit that transmits the first key update request message to the in-vehicle computer through the first interface unit, and the second arithmetic processing unit stores the master key.
  • a master key storage unit, a first storage unit for storing the initial key, and the message authentication code of the first message authentication code generation target information notified from the first arithmetic processing unit are used as the first arithmetic processing unit.
  • the encrypted data of the information, and a encrypted data generation unit that generates with the specified encryption key from the first processing unit is a data security device.
  • control unit performs designation of the master key and notification of second message authentication code generation target information including the vehicle correspondence identifier.
  • the second processing unit is requested to generate a message authentication code of the second message authentication code generation target information to the second processing unit, and the message generation unit supplies the on-board computer.
  • a data security device mounted on a vehicle includes a first arithmetic processing device and a second arithmetic processing device that is a secure element, and the first arithmetic processing device
  • An in-vehicle computer mounted on a vehicle and a common initial key of the vehicle stored in advance in the data security device are stored in a first storage unit, and the first arithmetic processing unit is a master key that is a message authentication code generation key
  • the notification of the first message authentication code generation target information including the vehicle correspondence identifier corresponding to the vehicle is performed to the second arithmetic processing unit, and the message authentication of the first message authentication code generation target information is performed.
  • the second arithmetic processing device is requested to generate a code, and the first arithmetic processing device generates the first message authentication code generated by the initial key and the second arithmetic processing device.
  • a first key update request message is generated using the first key which is the message authentication code of the information, and the first arithmetic processing unit sends the first key update request message to the outside of the data security device.
  • the data is transmitted to the in-vehicle computer by a first interface unit that transmits and receives data to and from the device, the second arithmetic processing unit stores the master key in a master key storage unit, and the second arithmetic processing unit is configured to transmit the first arithmetic unit.
  • the message authentication code of the first message authentication code generation target information notified from the processing device is generated using the message authentication code generation key specified by the first arithmetic processing device, and the in-vehicle computer is
  • the initial key is stored in a second storage unit, and the in-vehicle computer includes the initial key stored in the second storage unit, and an external device of the in-vehicle computer. Updating the initial key stored in the second storage unit to the first key using the first key update request message received from the data security device by the second interface unit that transmits and receives data; Distribution method.
  • One aspect of the present invention is the distribution method according to (69), wherein the first arithmetic processing device further includes second master authentication key generation and second message authentication code generation target information including the vehicle correspondence identifier. Is sent to the second arithmetic processing unit, the second arithmetic processing unit is requested to generate a message authentication code of the second message authentication code generation target information, and the first arithmetic processing unit, Further, the second key using the first key supplied to the in-vehicle computer and the second key that is the message authentication code of the second message authentication code generation target information generated by the second arithmetic processing unit is used.
  • a key update request message is generated, and the first processing unit further transmits the second key update request message to the in-vehicle computer by the first interface unit,
  • the in-vehicle computer further uses the second key by using the first key stored in the second storage unit and the second key update request message received from the data security device by the second interface unit. Is a distribution method for storing the information in the second storage unit.
  • a data security device mounted on a vehicle includes a first arithmetic processing device and a second arithmetic processing device that is a secure element, and the first arithmetic processing device is a message.
  • Designation of a master key that is an authentication code generation key and notification of first message authentication code generation target information including a vehicle correspondence identifier corresponding to the vehicle are performed on the second arithmetic processing unit, and the first message
  • the vehicle that requests generation of the message authentication code of the authentication code generation target information from the second arithmetic processing unit, and the first arithmetic processing unit is stored in advance in the in-vehicle computer and the data security device installed in the vehicle.
  • the first key that is the message authentication code of the first message authentication code generation target information generated by the second arithmetic processing unit.
  • Encrypted data generation processing and message authentication code generation processing when generating the update request message are executed using the second arithmetic processing device, and the first arithmetic processing device transmits the first key update request message.
  • the first interface unit that transmits and receives data to and from an external device of the data security device, and the second arithmetic processing unit stores the master key in a master key storage unit, and the second arithmetic unit
  • a processing device stores the initial key in the first storage unit
  • the second arithmetic processing device stores the message authentication code of the first message authentication code generation target information notified from the first arithmetic processing device, Generated using the message authentication code generation key specified by the first arithmetic processing unit, and the second arithmetic processing unit is notified from the first arithmetic processing unit
  • a second storage step in which encrypted data of the encoding target information is generated using an encryption key designated by the first arithmetic processing unit, and the in-vehicle computer stores the initial key in a second storage unit;
  • the first key update request received from the data security device by the in-vehicle computer by the second interface unit that transmits and receives data with the initial key stored in the second storage unit and a device external
  • One aspect of the present invention is the distribution method according to (71), wherein the first arithmetic processing device further includes second master authentication key generation and second message authentication code generation target information including the vehicle correspondence identifier. Is sent to the second arithmetic processing unit, the second arithmetic processing unit is requested to generate a message authentication code of the second message authentication code generation target information, and the first arithmetic processing unit, Furthermore, a second key is used by using the first key supplied to the in-vehicle computer and a second key that is a message authentication code of the second message authentication code generation target information generated by the second arithmetic processing unit.
  • Encrypted data generation processing and message authentication code generation processing when generating the update request message are executed using the second arithmetic processing device, and the first arithmetic processing device further includes:
  • the second key update request message is transmitted to the in-vehicle computer by the first interface unit, and the in-vehicle computer further transmits the data by the first key and the second interface unit stored in the second storage unit.
  • the second key is stored in the second storage unit using the second key update request message received from a security device.
  • a computer of a data security device mounted on a vehicle stores an in-vehicle computer mounted on the vehicle and a common initial key of the vehicle stored in advance in the data security device.
  • the second arithmetic processing unit which is a secure element of the data security device, designates a master key that is a message authentication code generation key and notification of first message authentication code generation target information including a vehicle correspondence identifier corresponding to the vehicle And requesting the second arithmetic processing unit to generate a message authentication code of the first message authentication code generation target information, and the first message generated by the initial key and the second arithmetic processing unit.
  • a first key update request message is generated using the first key that is the message authentication code of the authentication code generation target information, and the first key update request is required.
  • the message is transmitted by the first interface unit which transmits and receives an external device and the data of the data security device in the vehicle computer, a computer program for realizing the process.
  • the request includes designation of the master key and notification of second message authentication code generation target information including the vehicle correspondence identifier.
  • the first key to be supplied to the in-vehicle computer which is requested to the second arithmetic processing device to generate a message authentication code of the second message authentication code generation target information.
  • a second key update request message using the second key that is the message authentication code of the second message authentication code generation target information generated by the second arithmetic processing unit, and the transmission includes: A computer program for transmitting the second key update request message to the in-vehicle computer through the first interface unit.
  • a first message authentication code including a designation of a master key that is a message authentication code generation key and a vehicle correspondence identifier corresponding to the vehicle in a computer of a data security device mounted on the vehicle.
  • the generation target information is notified to the second arithmetic processing unit which is a secure element of the data security device, and the message authentication code of the first message authentication code generation target information is generated in the second arithmetic processing unit.
  • the first message authentication code generation target information generated by the second arithmetic processing unit and the common initial key of the vehicle stored in advance in the in-vehicle computer and the data security device mounted on the vehicle.
  • Encrypted data generation process and message when generating first key update request message using first key which is message authentication code An authentication code generation process is executed using the second arithmetic processing unit, and the first key update request message is transmitted to the in-vehicle computer by a first interface unit that transmits / receives data to / from an external device of the data security device. It is a computer program that realizes processing to be transmitted.
  • the request includes designation of the master key and notification of second message authentication code generation target information including the vehicle correspondence identifier.
  • the second key is supplied to the in-vehicle computer, and is requested to the second arithmetic processing device to generate a message authentication code of the second message authentication code generation target information.
  • the generation processing and the message authentication code generation processing are executed using the second arithmetic processing unit, and the transmission transmits the second key update request message to the first input Transmitting to the vehicle computer by interface unit is a computer program.
  • an in-vehicle computer such as an ECU mounted on a vehicle such as an automobile.
  • FIG. 1 is a diagram illustrating a configuration example of a distribution system and an automobile 11001 according to the first embodiment.
  • an ECU electronic control unit mounted on an automobile 11001 will be described as an example of an in-vehicle computer.
  • the automobile 11001 includes a data security device 11010 and a plurality of ECUs 11020.
  • the ECU 11020 is an in-vehicle computer provided in the automobile 11001.
  • ECU 11020 has a control function such as engine control of automobile 11001.
  • Examples of the ECU 11020 include an ECU having an engine control function, an ECU having a handle control function, and an ECU having a brake control function.
  • the data security device 11010 has a data security (security) function applied to the ECU 11020 mounted on the automobile 11001. Note that any ECU mounted on the automobile 11001 may function as the data security device 11010.
  • the data security device 11010 and the plurality of ECUs 11020 are connected to a CAN (Controller Area Network) 11030 provided in the automobile 11001.
  • CAN 11030 is a communication network.
  • CAN is known as one of communication networks mounted on vehicles.
  • the data security device 11010 exchanges data with each ECU 11020 via the CAN 11030.
  • ECU 11020 exchanges data with another ECU 11020 via CAN 11030.
  • a communication network other than CAN is provided in the automobile 11001, exchange of data between the data security device 11010 and the ECU 11020, and communication between the ECUs 11020 via the communication network other than CAN. Data exchanges between them may be performed.
  • the automobile 11001 may be provided with LIN (Local Interconnect Network).
  • CAN and LIN may be provided in the automobile 11001.
  • the automobile 11001 may be provided with an ECU 11020 connected to the LIN.
  • the data security device 11010 may be connected to CAN and LIN.
  • the data security device 11010 exchanges data with the ECU 11020 connected to the CAN via the CAN, and exchanges data with the ECU 11020 connected to the LIN via the LIN. Also good. Further, the ECUs 11020 may exchange data via the LIN.
  • the in-vehicle computer system 11002 provided in the automobile 11001 is configured by connecting a data security device 11010 and a plurality of ECUs 11020 to a CAN 11030.
  • the in-vehicle computer system 11002 functions as an in-vehicle control system for the automobile 11001.
  • the data security device 11010 monitors communication between the inside and outside of the in-vehicle computer system 11002.
  • the data security device 11010 is connected to an infotainment device 11040, a TCU (Tele Communication Unit) 1050, and a diagnostic port 11060 as an example of a device external to the in-vehicle computer system 11002.
  • the ECU 11020 communicates with a device external to the in-vehicle computer system 11002 via the data security device 11010.
  • the CAN 11030 may include a plurality of buses (communication lines), and the plurality of buses may be connected to the data security device 11010.
  • the plurality of buses may be connected to the data security device 11010.
  • one ECU 11020 or a plurality of ECUs 11020 are connected to one bus.
  • the car 11001 has a diagnostic port 11060.
  • the diagnostic port 11060 for example, an OBD (On-board Diagnostics) port may be used.
  • a device outside the automobile 11001 can be connected to the diagnostic port 11060.
  • the data security device 11010 and a device connected to the diagnostic port 11060, for example, the maintenance tool 12100 exchange data via the diagnostic port 11060.
  • the maintenance tool 12100 may have a function of a conventional diagnostic terminal connected to the OBD port.
  • the automobile 11001 includes an infotainment device 11040.
  • infotainment device 11040 examples include a navigation function, a location information service function, a multimedia playback function such as music and video, a voice communication function, a data communication function, and an Internet connection function.
  • the automobile 11001 includes a TCU 11050.
  • the TCU 11050 is a communication device.
  • the TCU 11050 includes a communication module 11051.
  • the communication module 11051 performs wireless communication using a wireless communication network.
  • the communication module 11051 includes a SIM (Subscriber Identity Module) 11052.
  • the SIM 11052 is a SIM in which information for using the wireless communication network is written.
  • the communication module 11051 can perform wireless communication by connecting to the wireless communication network by using the SIM 11052.
  • an eSIM Embedded Subscriber Identity Module
  • SIM and eSIM are examples of secure elements (SE).
  • SIM and eSIM have tamper resistant properties.
  • the data security device 11010 exchanges data with the TCU 11050.
  • the TCU 11050 may be connected to the infotainment device 11040, and the data security device 11010 may exchange data with the TCU 11050 via the infotainment device 11040.
  • the TCU 11050 may be connected to the diagnostic port 11060, and the data security device 11010 may exchange data with the TCU 11050 connected to the diagnostic port 11060 via the diagnostic port 11060.
  • the data security device 11010 may include a communication module 11051 including a SIM 11052. When the data security device 11010 includes the communication module 11051 including the SIM 11052, the automobile 11001 may not include the TCU 11050.
  • the data security device 11010 includes a main computing unit 11011 and an HSM (Hardware Security Module) 1012.
  • the main computing unit 11011 executes a computer program for realizing the functions of the data security device 11010.
  • the HSM 11012 has a cryptographic processing function and the like.
  • HSM11012 has tamper resistance.
  • HSM 11012 is an example of a secure element.
  • the HSM 11012 includes a storage unit 11013 that stores data.
  • the main computing unit 11011 uses HSM11012.
  • the ECU 11020 includes a main computing unit 11021 and a SHE (Secure Hardware Extension) 11022.
  • the main computing unit 11021 executes a computer program for realizing the functions of the ECU 11020.
  • the SHE 11022 has a cryptographic processing function and the like.
  • SHE11022 has tamper resistance.
  • SHE 11022 is an example of a secure element.
  • the SHE 11022 includes a storage unit 11023 that stores data.
  • the main computing unit 11021 uses SHE11022. In addition, about SHE, it describes in the nonpatent literature 3, for example.
  • the server apparatus 12000 transmits / receives data to / from the communication module 11051 of the TCU 11050 of the automobile 11001 via the communication line.
  • Server apparatus 12000 transmits / receives data to / from communication module 11051 via a wireless communication network used by communication module 11051 of TCU 11050 of automobile 11001.
  • the server apparatus 12000 may transmit / receive data to / from the communication module 11051 via a communication network such as the Internet and the wireless communication network.
  • the server apparatus 12000 and the communication module 11051 may be connected by a dedicated line such as a VPN (Virtual Private Network) line, and data may be transmitted and received through the dedicated line.
  • a dedicated line such as a VPN line may be provided by a wireless communication network corresponding to the SIM 11052.
  • the server apparatus 12000 communicates with the TCU 11050 of the automobile 11001 and transmits / receives data to / from the data security apparatus 11010 of the automobile 11001 via the TCU 11050.
  • An encrypted communication path may be used as a communication path between the server apparatus 12000 and the data security apparatus 11010.
  • the server apparatus 12000 and the data security apparatus 11010 may perform https (hypertext transfer transfer protocol secure) communication as an example of an encrypted communication path.
  • server device 12000 and the automobile 11001 may be connected by a communication cable.
  • the server device 12000 and the data security device 11010 of the automobile 11001 may be configured to be connected by a communication cable.
  • the server apparatus 12000 and the automobile 11001 may be configured to communicate via a wired or wireless communication network.
  • the server device 12000 and the automobile 11001 may be connected by a wired or wireless LAN (Local Area Network).
  • FIG. 2 is a diagram illustrating a configuration example of the key generation device 110 according to the first embodiment.
  • the key generation device 110 includes a storage unit 112, a key generation unit 115, an encryption processing unit 116, and a first key distribution unit 117.
  • the storage unit 112 stores data.
  • the key generation unit 115 generates a key.
  • the encryption processing unit 116 encrypts data and decrypts encrypted data.
  • the first key distribution unit 117 performs processing related to key distribution.
  • the function of the key generation device 110 is realized by a CPU (Central Processing Unit) provided in the key generation device 110 executing a computer program.
  • the key generation device 110 may be configured using a general-purpose computer device, or may be configured as a dedicated hardware device.
  • a device outside the automobile 11001 may have the function of the key generation device 110.
  • a device mounted on the automobile 11001 for example, the TCU 11050 or the data security device 11010 may have the function of the key generation device 110.
  • the function of the key generation device 110 is preferably realized using a secure element.
  • the secure element preferably has tamper resistance. Examples of the secure element include an IC (IntegratedIntegrCircuit) chip, SIM, eSIM, HSM, and SHE.
  • FIG. 3 is a diagram illustrating a configuration example of the data security device 11010 according to the first embodiment.
  • the data security device 11010 includes a main computing unit 11011, an HSM 11012, and an interface unit 120.
  • the main computing unit 11011 includes a control unit 121, a storage unit 122, and a second key distribution unit 123.
  • the HSM 11012 includes a storage unit 11013, an encryption processing unit 132, a key update unit 135, and a distribution processing unit 136.
  • the interface unit 120 transmits / receives data to / from an external device of the own data security device 11010.
  • the interface unit 120 includes an interface for transmitting / receiving data via the CAN 11030, an interface for transmitting / receiving data to / from the infotainment device 11040, an interface for transmitting / receiving data to / from the TCU 11050, and an interface for transmitting / receiving data via the diagnostic port 11060.
  • the main computing unit 11011 transmits and receives data to and from devices other than the data security device 11010 via the interface unit 120.
  • the control unit 121 controls the data security device 11010.
  • the storage unit 122 stores data.
  • the second key distribution unit 123 performs processing related to key distribution.
  • the storage unit 11013 stores data.
  • the encryption processing unit 132 encrypts data and decrypts encrypted data.
  • the key update unit 135 performs processing related to key update.
  • the distribution processing unit 136 performs processing related to key distribution.
  • the HSM is used for the data security device 11010.
  • the data security device 11010 may use SHE instead of the HSM.
  • FIG. 4 is a diagram illustrating a configuration example of the ECU 11020 according to the first embodiment.
  • the ECU 11020 includes a main computing unit 11021, a SHE 11022, and an interface unit 140.
  • the main computing unit 11021 includes a control unit 141 and a storage unit 142.
  • the SHE 11022 includes a storage unit 11023, an encryption processing unit 152, and a key update unit 155.
  • the interface unit 140 transmits / receives data to / from an external device of the ECU 11020 itself.
  • the interface unit 140 includes an interface that transmits and receives data via the CAN 11030.
  • the main computing unit 11021 transmits / receives data to / from other devices other than the own ECU 11020 via the interface unit 140.
  • the control unit 141 controls the ECU 11020.
  • the storage unit 142 stores data.
  • the storage unit 11023 stores data.
  • the encryption processing unit 152 encrypts data and decrypts encrypted data.
  • the key update unit 155 performs processing related to key update.
  • VIN vehicle identification number
  • vehicle identifier vehicle identifier
  • VIN vehicle identification number
  • the MEK key corresponds to a key called “MASTER_ECU_KEY” in SHE.
  • the MAC key corresponds to a key used for generation and verification of CMAC (Cipher-based Message Authentication Code) among keys called “KEY_n, where n is any integer from 1 to 10” in SHE.
  • the ENC key corresponds to a key used for data encryption and decryption of encrypted data among keys called “KEY_n, where n is any integer from 1 to 10” in SHE.
  • Example 1 of the distribution method according to the first embodiment will be described with reference to FIG.
  • FIG. 5 is a sequence chart illustrating Example 1 of the distribution method according to the first embodiment.
  • the key generation device 110 stores a master key Master_Secret, a MEK key K_mek_oem, a MAC key K_mac_oem, and an ENC key K_enc_oem in the storage unit 112 in advance.
  • Each ECU 11020 mounted on a certain automobile 11001 stores the same MEK key K_mek_oem, MAC key K_mac_oem, and ENC key K_enc_oem in the storage unit 11023 of the SHE 11022 in advance.
  • the MEK key K_mek_oem, the MAC key K_mac_oem, and the ENC key K_enc_oem are stored in the storage unit 11023 of the SHE 11022 at the manufacturing factory of the ECU 11020.
  • the same MEK key K_mek_oem, MAC key K_mac_oem, and ENC key K_enc_oem may be used for each automobile 11001 manufactured by the same automobile manufacturer.
  • the same MEK key K_mek_oem, MAC key K_mac_oem, and ENC key K_enc_oem may be used for each ECU 11020 manufactured by the same ECU manufacturer.
  • the MEK key K_mek_oem, the MAC key K_mac_oem, and the ENC key K_enc_oem may be changed at a constant cycle.
  • the MEK key K_mek_oem, MAC key K_mac_oem, and ENC key K_enc_oem stored in the storage unit 112 by the key generation device 110 are the same as the MEK key K_mek_oem, MAC key K_mac_oem, and ENC key K_en_e__ that the ECU 11020 stores in the storage unit 11023 of the SHE 11022. is there.
  • the MEK key K_mek_oem, the MAC key K_mac_oem, and the ENC key K_enc_oem are keys stored in advance in the ECU 11020 and are common initial keys of the automobile 11001.
  • the key generation device 110 communicates with the ECU 11020 via the CAN 11030.
  • the server apparatus 12000 functions as the key generation apparatus 110
  • the server apparatus 12000 accesses the CAN 11030 via the TCU 11050 and the data security apparatus 11010 of the automobile 11001, and communicates with the ECU 11020 via the CAN 11030.
  • the maintenance tool 12100 functions as the key generation device 110
  • the maintenance tool 12100 accesses the CAN 11030 via the diagnostic port 11060 and the data security device 11010 of the automobile 11001, and communicates with the ECU 11020 via the CAN 11030.
  • the TCU 11050 accesses the CAN 11030 via the data security device 11010, and communicates with the ECU 11020 via the CAN 11030.
  • the data security device 11010 of the automobile 11001 functions as the key generation device 110
  • the data security device 11010 communicates with the ECU 11020 via the CAN 11030.
  • the key generation device 110 acquires the vehicle identification number VIN of the automobile 11001.
  • the vehicle identification number VIN of the automobile 11001 may be stored in the key generation device 110 in advance, or may be stored in the key generation device 110 when there is a request for distributing the key to the ECU 11020.
  • the ECU 11020 having the engine control function of the automobile 11001 stores the vehicle identification number VIN of the automobile 11001
  • the ECU 11020 notifies the key generation apparatus 110 of the vehicle identification number VIN of the automobile 11001 after the ECU 11020 is activated. May be.
  • the startup time of the ECU 11020 having the engine control function is often longer than the startup times of the other ECUs 11020. For this reason, when the ECU 11020 having the engine control function is activated to notify the key generation device 110 of the vehicle identification number VIN, many other ECUs 11020 are already activated.
  • the ECU 11020 having the engine control function notifies the key generation device 110 of the vehicle identification number VIN after activation
  • distributing the key from the key generation device 110 to the plurality of ECUs 11020 increases the success probability of key distribution. This is preferable.
  • the key is distributed from the key generation device 110 to all the ECUs 11020 to be distributed by CAN 11030 broadcast. Also good.
  • the vehicle identification number VIN of the automobile 11001 for example, the vehicle identification number VIN managed by the automobile manufacturer of the automobile 11001 may be supplied to the key generation device 110.
  • the automobile manufacturer of the automobile 11001 may be provided with a database of vehicle identification numbers VIN, and the vehicle identification numbers VIN may be transmitted from the database to the key generation apparatus 110 by communication.
  • Step S102 The key generation unit 115 of the key generation device 110 generates the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen to be supplied to the ECU 11020 of the automobile 11001.
  • the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen correspond to the first key.
  • the digest (Master_Secret, VIN, Key_ID (Nk)) is a digest value generated from the master key Master_Secret, the vehicle identification number VIN, and the key type identifier Key_ID (Nk).
  • the digest value include a value calculated by a hash function or a value calculated by an exclusive OR operation.
  • the common key is a hash function value calculated using the master key Master_Secret, the vehicle identification number VIN, and the key type identifier Key_ID (Nk) as input values.
  • the digest value is different.
  • different common keys can be generated from the combination of the same master key Master_Secret and the vehicle identification number VIN.
  • the key type identifier of the MEK key is Key_ID (mek)
  • the key type identifier of the MAC key is Key_ID (mac)
  • the key type identifier of the ENC key is Key_ID (enc).
  • the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen supplied to the ECU 11020 of the automobile 11001 can be generated as different keys.
  • the MEK key K_mek_gen, MAC key K_mac_gen, and ENC key K_enc_gen are common to each ECU 11020 mounted on one automobile 11001.
  • the storage unit 112 stores the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen.
  • the first key distribution unit 117 of the key generation device 110 uses the MEK key K_mek_oem, the MAC key K_mac_oem, and the ENC key K_enc_oem to update each key update request message of the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen.
  • MES_K_mek_oem K_mek_gen
  • MES_K_mac_oem K_mac_gen
  • MES_K_enc_oem K_enc_gen
  • the key update request message MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), and MES_K_enc_oem (K_enc_gen) correspond to the first key update request message.
  • the key update request message includes an M1 parameter, an M2 parameter, and an M3 parameter, which are parameters used for registering the SHE key.
  • the M1 parameter, the M2 parameter, and the M3 parameter are described in Non-Patent Document 3, for example.
  • the key K_AuthID is used to generate the M2 parameter and the M3 parameter.
  • the key K_AuthID related to the key update request message MES_K_mek_oem (K_mek_gen) of the MEK key K_mek_gen is the MEK key K_mek_oem.
  • the key K_AuthID related to the key update request message MES_K_mac_oem (K_mac_gen) of the MAC key K_mac_gen is the MAC key K_mac_oem.
  • the key K_AuthID related to the key update request message MES_K_enc_oem (K_enc_gen) of the ENC key K_enc_gen is the ENC key K_enc_oem.
  • the first key distribution unit 117 uses the MEK key K_mek_oem to generate an M1 parameter, an M2 parameter, and an M3 parameter used for registration of the MEK key K_mek_gen.
  • the first key distribution unit 117 includes the M1 parameter, the M2 parameter, and the M3 parameter used for registration of the MEK key K_mek_gen in the key update request message MES_K_mek_oem (K_mek_gen).
  • the first key distribution unit 117 uses the MAC key K_mac_oem to generate an M1 parameter, an M2 parameter, and an M3 parameter used for registration of the MAC key K_mac_gen.
  • the first key distribution unit 117 includes the M1 parameter, the M2 parameter, and the M3 parameter used for registration of the MAC key K_mac_gen in the key update request message MES_K_mac_oem (K_mac_gen).
  • the first key distribution unit 117 uses the ENC key K_enc_oem to generate an M1 parameter, an M2 parameter, and an M3 parameter used for registration of the ENC key K_enc_gen.
  • the first key distribution unit 117 includes the M1 parameter, the M2 parameter, and the M3 parameter used for registration of the ENC key K_enc_gen in the key update request message MES_K_enc_oem (K_enc_gen).
  • Step S104 The first key distribution unit 117 of the key generation device 110 transmits a key update request message MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), and MES_K_enc_oem (K_enc_gen) to the ECU 11020.
  • Key update request messages MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), and MES_K_enc_oem (K_enc_gen) are common to each ECU 11020 of the automobile 11001.
  • a key update request message transmission method As an example of a key update request message transmission method, a key update request message MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), and MES_K_enc_oem (K_enc_gen) may be transmitted by broadcasting of CAN 11030.
  • CAN distribution CANID an identifier of a CAN for key distribution
  • the key distribution CANID is a different value for each data security device 11010 and ECU 11020.
  • the CAN identifier is an identifier for identifying a transmission source device.
  • the data security device 11010 transmits the key update request message MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), and MES_K_enc_oem (K_enc_gen) received from the first key distribution unit 117 to the CAN 11030, the key is updated.
  • the CAN distribution key ID of the own data security device 11010 is attached as the CAN identifier.
  • the key update request messages MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), and MES_K_enc_oem (K_enc_gen) transmitted from the key generation device 110 to the CAN 11030 via the data security device 11010 are the data for each of the ECU 11020 for each key of the ECU 110N. Identified by and received.
  • the key update request messages MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), and MES_K_enc_oem (K_enc_gen) can be transmitted to the ECUs 11020 connected to the CAN 11030 all at once.
  • MES_K_mek_oem K_mek_gen
  • MES_K_mac_oem K_mac_gen
  • MES_K_enc_oem K_enc_gen
  • Step S105 The control unit 141 of the ECU 11020 receives the key update request message MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), and MES_K_enc_oem (K_enc_gen) through the interface unit 140.
  • MES_K_mek_oem K_mek_gen
  • MES_K_mac_oem K_mac_gen
  • MES_K_enc_oem K_enc_gen
  • the control unit 141 passes the M1 parameter, the M2 parameter, and the M3 parameter included in the key update request message MES_K_mek_oem (K_mek_gen) to the SHE 11022 to request a key update.
  • the key update unit 155 of the SHE 11022 registers the MEK key K_mek_gen using the M1 parameter, the M2 parameter, the M3 parameter, and the MEK key K_mek_oem stored in the storage unit 11023. Thereby, the MEK key stored in the storage unit 11023 is updated from the MEK key K_mek_oem to the MEK key K_mek_gen.
  • the control unit 141 passes the M1 parameter, the M2 parameter, and the M3 parameter included in the key update request message MES_K_mac_oem (K_mac_gen) to the SHE 11022 to request a key update.
  • the key update unit 155 of the SHE 11022 registers the MAC key K_mac_gen using the M1 parameter, the M2 parameter, the M3 parameter, and the MAC key K_mac_oem stored in the storage unit 11023.
  • the MAC key stored in the storage unit 11023 is updated from the MAC key K_mac_oem to the MAC key K_mac_gen.
  • the control unit 141 passes the M1 parameter, the M2 parameter, and the M3 parameter included in the key update request message MES_K_enc_oem (K_enc_gen) to the SHE 11022 to request a key update.
  • the key update unit 155 of the SHE 11022 registers the ENC key K_enc_gen using the M1 parameter, the M2 parameter, the M3 parameter, and the ENC key K_enc_oem stored in the storage unit 11023.
  • the ENC key stored in the storage unit 11023 is updated from the ENC key K_enc_oem to the ENC key K_enc_gen.
  • Step S106 The control unit 141 of the ECU 11020 generates update completion messages for the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen.
  • each update completion message of the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen corresponds to the first update completion message.
  • the update completion message includes an M4 parameter and an M5 parameter, which are parameters used for verifying the SHE key.
  • the M4 parameter and the M5 parameter are described in Non-Patent Document 3, for example.
  • the key update unit 155 of the SHE 11022 uses the MEK key K_mek_gen to generate the M4 parameter and the M5 parameter of the MEK key K_mek_gen.
  • the SHE 11022 passes the M4 parameter and M5 parameter of the MEK key K_mek_gen to the control unit 141.
  • the control unit 141 includes the M4 parameter and M5 parameter of the MEK key K_mek_gen in the update completion message of the MEK key K_mek_gen.
  • the key update unit 155 of the SHE 11022 uses the MAC key K_mac_gen to generate the M4 parameter and the M5 parameter of the MAC key K_mac_gen.
  • the SHE 11022 passes the M4 parameter and M5 parameter of the MAC key K_mac_gen to the control unit 141.
  • the control unit 141 includes the M4 parameter and the M5 parameter of the MAC key K_mac_gen in the update completion message of the MAC key K_mac_gen.
  • the key update unit 155 of the SHE 11022 uses the ENC key K_enc_gen to generate the M4 parameter and the M5 parameter of the ENC key K_enc_gen.
  • the SHE 11022 passes the M4 parameter and M5 parameter of the ENC key K_enc_gen to the control unit 141.
  • the control unit 141 includes the M4 parameter and the M5 parameter of the ENC key K_enc_gen in the update completion message of the ENC key K_enc_gen.
  • Step S107 The control unit 141 of the ECU 11020 transmits the update completion messages of the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen to the key generation device 110 through the interface unit 140.
  • the control unit 141 attaches the key distribution CANID of the own ECU 11020 to each update completion message of the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen.
  • the update completion message transmitted from the ECU 11020 to the CAN 11030 is identified and received by the data security device 11010 by the key distribution CANID of the ECU 11020.
  • the data security device 11010 transfers the received update completion message to the key generation device 110.
  • the first key distribution unit 117 of the key generation device 110 receives the update completion messages of the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen received from the ECU 11020, the MEK key K_mek_gen, and the MAC key K_mac_gen supplied to the ECU 11020. And verification based on the ENC key K_enc_gen.
  • the MEK key K_mek_gen, MAC key K_mac_gen, and ENC key K_enc_gen supplied to the ECU 11020 are stored in the storage unit 112.
  • the first key distribution unit 117 uses the MEK key K_mek_gen supplied to the ECU 11020 to generate an M4 parameter and an M5 parameter to be compared with the MEK key K_mek_gen.
  • the first key distribution unit 117 compares the M4 parameter and the M5 parameter included in the update completion message of the MEK key K_mek_gen with the M4 parameter and the M5 parameter to be compared with the MEK key K_mek_gen, and determines whether or not they match. to decide. If the result of this determination is that they match, the MEK key has been successfully updated. On the other hand, if the two do not match, the MEK key update has failed.
  • the first key distribution unit 117 uses the MAC key K_mac_gen supplied to the ECU 11020 to generate an M4 parameter and an M5 parameter to be compared with the MAC key K_mac_gen.
  • the first key distribution unit 117 compares the M4 parameter and M5 parameter included in the MAC key K_mac_gen update completion message with the M4 parameter and M5 parameter to be compared with the MAC key K_mac_gen, and determines whether or not they match. to decide. If the result of this determination is that they match, the MAC key has been successfully updated. On the other hand, if the two do not match, the MAC key update has failed.
  • the first key distribution unit 117 uses the ENC key K_enc_gen supplied to the ECU 11020 to generate an M4 parameter and an M5 parameter to be compared with the ENC key K_enc_gen.
  • the first key distribution unit 117 compares the M4 parameter and the M5 parameter included in the update completion message of the ENC key K_enc_gen with the comparison target M4 parameter and the M5 parameter of the ENC key K_enc_gen, and determines whether or not they match. to decide. If the result of this determination is that they match, the ENC key has been successfully updated. On the other hand, if the two do not match, the ENC key update has failed.
  • the first key distribution unit 117 may execute predetermined error processing when the update of the MEK key K_mek_gen, the MAC key K_mac_gen, or the ENC key K_enc_gen is unsuccessful. As the predetermined error processing, the first key distribution unit 117 may retransmit the key update request message of the key that has failed to update among the key update request messages transmitted in step S104. In addition, the first key distribution unit 117 may execute a predetermined error process if any update completion message is not received even after a predetermined time has elapsed since the transmission of each key update request message in step S104. . As the predetermined error processing, the first key distribution unit 117 may retransmit a key update request message of a key that does not receive an update completion message among the key update request messages transmitted in step S104.
  • the MEK key K_mek_oem, the MAC key K_mac_oem, and the ENC key K_enc_oem common to the automobile 11001 are stored in advance for each ECU 11020 mounted on the same automobile 11001.
  • a key update request message (first key update request message) for each key (first key) is generated from the master key Master_Secret and the common key, and the key update request message is commonly used by the ECUs 11020.
  • the key of each ECU 11020 can be updated. As a result, an effect of improving the efficiency of key distribution applied to the ECU 11020 can be obtained.
  • the key update request message can be transmitted simultaneously to each ECU 11020 connected to the CAN 11030 by broadcast of the CAN 11030, so that the time required for key distribution can be shortened.
  • FIG. 6 is a sequence chart illustrating a second example of the distribution method according to the first embodiment. In FIG. 6, parts corresponding to the respective steps in FIG.
  • the key generation device 110 stores the master key Master_Secret and the MEK key K_mek_oem in the storage unit 112 in advance.
  • Each ECU 11020 mounted on a certain automobile 11001 stores the same MEK key K_mek_oem in the storage unit 11023 of the SHE 11022 in advance.
  • the MEK key K_mek_oem is stored in the storage unit 11023 of the SHE 11022 at the manufacturing factory of the ECU 11020.
  • the same MEK key K_mek_oem may be used for each automobile 11001 manufactured by the same automobile manufacturer.
  • the same MEK key K_mek_oem may be used for each ECU 11020 manufactured by the same ECU manufacturing company.
  • the MEK key K_mek_oem may be changed at a constant cycle.
  • the MEK key K_mek_oem stored in the storage unit 112 by the key generation device 110 is the same as the MEK key K_mek_oem stored in the storage unit 11023 of the SHE 11022 by the ECU 11020.
  • the MEK key K_mek_oem is a key stored in advance in the ECU 11020, and is a common initial key for the automobile 11001.
  • the communication method between the key generation device 110 and the ECU 11020 is the same as the delivery method example 1.
  • step S101 and step S102 are executed. Steps S101 and S102 are the same as those in the delivery method example 1.
  • the MEK key K_mek_gen corresponds to the first key
  • the MAC key K_mac_gen and the ENC key K_enc_gen correspond to the second key.
  • Step S103a The first key distribution unit 117 of the key generation device 110 generates a key update request message MES_K_mek_oem (K_mek_gen) of the MEK key K_mek_gen using the MEK key K_mek_oem.
  • the key update request message MES_K_mek_oem corresponds to the first key update request message.
  • the first key distribution unit 117 uses the MEK key K_mek_oem to generate an M1 parameter, an M2 parameter, and an M3 parameter used for registration of the MEK key K_mek_gen.
  • the first key distribution unit 117 includes the M1 parameter, the M2 parameter, and the M3 parameter used for registration of the MEK key K_mek_gen in the key update request message MES_K_mek_oem (K_mek_gen).
  • Step S104a The first key distribution unit 117 of the key generation device 110 transmits a key update request message MES_K_mek_oem (K_mek_gen) to the ECU 11020. That is, the first key distribution unit 117 transmits a first key update request message to the ECU 11020.
  • Key update request message MES_K_mek_oem (K_mek_gen) is common to each ECU 11020 of automobile 11001.
  • the key update request message may be transmitted by broadcasting of CAN 11030.
  • Step S105a The control unit 141 of the ECU 11020 receives the key update request message MES_K_mek_oem (K_mek_gen) through the interface unit 140.
  • the control unit 141 passes the M1 parameter, the M2 parameter, and the M3 parameter included in the key update request message MES_K_mek_oem (K_mek_gen) to the SHE 11022 to request a key update.
  • the key update unit 155 of the SHE 11022 registers the MEK key K_mek_gen using the M1 parameter, the M2 parameter, the M3 parameter, and the MEK key K_mek_oem stored in the storage unit 11023. Thereby, the MEK key stored in the storage unit 11023 is updated from the MEK key K_mek_oem to the MEK key K_mek_gen.
  • Step S106a The control unit 141 of the ECU 11020 generates an update completion message for the MEK key K_mek_gen.
  • the generation method of the update completion message is the same as that of the delivery method example 1.
  • the update completion message of the MEK key K_mek_gen corresponds to the first update completion message.
  • Step S107a The control unit 141 of the ECU 11020 transmits an update completion message of the MEK key K_mek_gen to the key generation device 110 through the interface unit 140. That is, the control unit 141 transmits a first update completion message to the key generation device 110.
  • Step S108a The first key distribution unit 117 of the key generation device 110 verifies the update completion message of the MEK key K_mek_gen received from the ECU 11020 based on the MEK key K_mek_gen supplied to the ECU 11020.
  • the MEK key K_mek_gen supplied to the ECU 11020 is stored in the storage unit 112.
  • the method for verifying the update completion message is the same as that in the delivery method example 1.
  • the first key distribution unit 117 may execute a predetermined error process when the update of the MEK key K_mek_gen is unsuccessful.
  • the first key distribution unit 117 may retransmit the key update request message MES_K_mek_oem (K_mek_gen) transmitted in step S104a as the predetermined error process.
  • the first key distribution unit 117 performs a predetermined error process when an update completion message for the MEK key K_mek_gen is not received even after a predetermined time has elapsed after the transmission of the key update request message MES_K_mek_oem (K_mek_gen) in step S104a. May be.
  • the first key distribution unit 117 may retransmit the key update request message MES_K_mek_oem (K_mek_gen) transmitted in step S104a as the predetermined error process.
  • the ECU 11020 for which the MEK key has been successfully updated is controlled to proceed to step S108a.
  • the ECU 11020 that has not successfully updated the MEK key is not controlled to proceed to step S108a until the MEK key is successfully updated. Note that control may be performed so that the process proceeds to step S108a after the MEK key update of all ECUs 11020 to be distributed is successful.
  • Step S103b The first key distribution unit 117 of the key generation device 110 uses the MEK key K_mek_gen to generate each key update request message MES_K_mek_gen (K_mac_gen) and MES_K_mek_gen (K_enc_gen) for the MAC key K_mac_gen and ENC key K_enc_gen. .
  • the key update request message includes an M1 parameter, an M2 parameter, and an M3 parameter, which are parameters used for registering the SHE key.
  • the key K_AuthID is used to generate the M2 parameter and the M3 parameter.
  • the key K_AuthID related to the key update request message MES_K_mek_gen (K_mac_gen) of the MAC key K_mac_gen is the MEK key K_mek_gen.
  • the key K_AuthID related to the key update request message MES_K_mek_gen (K_enc_gen) of the ENC key K_enc_gen is the MEK key K_mek_gen.
  • the key update request messages MES_K_mek_gen (K_mac_gen) and MES_K_mek_gen (K_enc_gen) correspond to the second key update request message.
  • the first key distribution unit 117 uses the MEK key K_mek_gen to generate an M1 parameter, an M2 parameter, and an M3 parameter used for registration of the MAC key K_mac_gen.
  • the first key distribution unit 117 includes the M1 parameter, the M2 parameter, and the M3 parameter used for registration of the MAC key K_mac_gen in the key update request message MES_K_mek_gen (K_mac_gen).
  • the first key distribution unit 117 uses the MEK key K_mek_gen to generate an M1 parameter, an M2 parameter, and an M3 parameter used for registration of the ENC key K_enc_gen.
  • the first key distribution unit 117 includes the M1 parameter, the M2 parameter, and the M3 parameter used for registration of the ENC key K_enc_gen in the key update request message MES_K_mek_gen (K_enc_gen).
  • Step S104b The first key distribution unit 117 of the key generation device 110 transmits a key update request message MES_K_mek_gen (K_mac_gen) and MES_K_mek_gen (K_enc_gen) to the ECU 11020. That is, the first key distribution unit 117 transmits a second key update request message to the ECU 11020.
  • the key update request messages MES_K_mek_gen (K_mac_gen) and MES_K_mek_gen (K_enc_gen) are common to each ECU 11020 of the automobile 11001.
  • the key update request message may be transmitted by broadcasting of CAN 11030.
  • Step S105b The control unit 141 of the ECU 11020 receives the key update request message MES_K_mek_gen (K_mac_gen) and MES_K_mek_gen (K_enc_gen) through the interface unit 140.
  • MES_K_mek_gen K_mac_gen
  • MES_K_mek_gen K_enc_gen
  • the control unit 141 passes the M1 parameter, the M2 parameter, and the M3 parameter included in the key update request message MES_K_mek_gen (K_mac_gen) to the SHE 11022 to request a key update.
  • the key update unit 155 of the SHE 11022 registers the MAC key K_mac_gen using the M1 parameter, the M2 parameter, the M3 parameter, and the MEK key K_mek_gen stored in the storage unit 11023. As a result, the MAC key K_mac_gen is stored in the storage unit 11023.
  • the control unit 141 passes the M1 parameter, the M2 parameter, and the M3 parameter included in the key update request message MES_K_mek_gen (K_enc_gen) to the SHE 11022 to request a key update.
  • the key update unit 155 of the SHE 11022 registers the ENC key K_enc_gen using the M1 parameter, the M2 parameter, the M3 parameter, and the MEK key K_mek_gen stored in the storage unit 11023. As a result, the ENC key K_enc_gen is stored in the storage unit 11023.
  • Step S106b The control unit 141 of the ECU 11020 generates each update completion message for the MAC key K_mac_gen and the ENC key K_enc_gen.
  • the generation method of the update completion message is the same as that of the delivery method example 1.
  • each update completion message of the MAC key K_mac_gen and the ENC key K_enc_gen corresponds to a second update completion message.
  • Step S ⁇ b> 107 b The control unit 141 of the ECU 11020 transmits each update completion message of the MAC key K_mac_gen and the ENC key K_enc_gen to the key generation device 110 through the interface unit 140. That is, the control unit 141 transmits a second update completion message to the key generation device 110.
  • Step S108b The first key distribution unit 117 of the key generation device 110 verifies each update completion message of the MAC key K_mac_gen and ENC key K_enc_gen received from the ECU 11020 based on the MAC key K_mac_gen and ENC key K_enc_gen supplied to the ECU 11020. To do.
  • the MAC key K_mac_gen and ENC key K_enc_gen supplied to the ECU 11020 are stored in the storage unit 112.
  • the method for verifying the update completion message is the same as that in the delivery method example 1.
  • the first key distribution unit 117 may execute a predetermined error process when the update of the MAC key K_mac_gen or the ENC key K_enc_gen is unsuccessful. As the predetermined error processing, the first key distribution unit 117 may retransmit the key update request message of the update failure key among the key update request messages transmitted in step S104b. In addition, the first key distribution unit 117 may execute a predetermined error process if any update completion message is not received even after a predetermined time has elapsed since the transmission of each key update request message in step S104b. . As the predetermined error processing, the first key distribution unit 117 may retransmit the key update request message of the key that does not receive the update completion message among the key update request messages transmitted in step S104b.
  • the MEK key K_mek_oem common to the automobile 11001 is stored in advance for each ECU 11020 mounted in the same automobile 11001.
  • a key update request message (first key update request message) of the MEK key K_mek_gen (first key) is generated from the master key Master_Secret and the common key, and the key update request message is shared by the ECUs 11020.
  • the MEK key of each ECU 11020 can be updated by using it.
  • each key update request message (second key update request message) of the MAC key K_mac_gen (second key) and the ENC key K_enc_gen (second key) is generated, It is possible to update the MAC key and ENC key of each ECU 11020 by using the key update request message in common to each ECU 11020. As a result, an effect of improving the efficiency of key distribution applied to the ECU 11020 can be obtained.
  • the MEK key K_mek_oem is the only common initial key for the automobile 11001 stored in advance in the ECU 11020. As a result, for example, an effect is obtained that can contribute to simplification of the initial key writing process of the ECU 11020 in the manufacturing factory of the ECU 11020.
  • the key update request message can be transmitted simultaneously to each ECU 11020 connected to the CAN 11030 by broadcast of the CAN 11030, so that the time required for key distribution can be shortened.
  • FIG. 7 is a sequence chart illustrating a third example of the distribution method according to the first embodiment. In FIG. 7, parts corresponding to the respective steps in FIG.
  • the key generation device 110 stores a master key Master_Secret, MEK key K_mek_oem, MAC key K_mac_oem, and ENC key K_enc_oem in the storage unit 112 in advance.
  • the data security device 11010 and each ECU 11020 mounted on a certain automobile 11001 store the same MEK key K_mek_oem, MAC key K_mac_oem, and ENC key K_enc_oem in advance.
  • the data security device 11010 stores the MEK key K_mek_oem, the MAC key K_mac_oem, and the ENC key K_enc_oem in the storage unit 11013 of the HSM 11012.
  • the ECU 11020 stores the MEK key K_mek_oem, the MAC key K_mac_oem, and the ENC key K_enc_oem in the storage unit 11023 of the SHE 11022.
  • the data security device 11010 and the ECU 11020 store, for example, the MEK key K_mek_oem, the MAC key K_mac_oem, and the ENC key K_enc_oem at the manufacturing factory.
  • MEK key K_mek_oem, MAC key K_mac_oem and ENC key K_enc_oem stored in the key generation device 110 MEK key K_mek_oem, MAC key K_mac_oem and ENC key K_enc_oem stored in the data security device 11010, and MEK key stored in the ECU 11020 K_mac_oem and ENC key K_enc_oem are the same.
  • the MEK key K_mek_oem, the MAC key K_mac_oem, and the ENC key K_enc_oem are keys stored in advance in the data security device 11010 and the ECU 11020, and are common initial keys of the automobile 11001.
  • the key generation device 110 communicates with the data security device 11010.
  • the server apparatus 12000 functions as the key generation apparatus 110
  • the server apparatus 12000 communicates with the data security apparatus 11010 via the TCU 11050 of the automobile 11001.
  • the maintenance tool 12100 functions as the key generation device 110
  • the maintenance tool 12100 communicates with the data security device 11010 via the diagnostic port 11060 of the automobile 11001.
  • the TCU 11050 of the automobile 11001 functions as the key generation device 110
  • the TCU 11050 communicates with the data security device 11010.
  • the data security device 11010 communicates with the ECU 11020 via the CAN 11030.
  • step S101 and step S102 are executed. Steps S101 and S102 are the same as those in the delivery method example 1.
  • the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen correspond to the first key.
  • the first key distribution unit 117 of the key generation device 110 generates a key update processing message.
  • the key update processing message includes key update request messages MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), MES_K_en_K, and MES_K_enK_meK
  • the M5 parameter, the M4 parameter and the M5 parameter to be compared with the MAC key K_mac_gen, and the M4 parameter and the M5 parameter to be compared with the ENC key K_enc_gen are included.
  • Each key update request message and each M4 parameter and M5 parameter to be compared are the same as those in the delivery method example 1.
  • the key update request message MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), and MES_K_enc_oem (K_enc_gen) correspond to the first key update request message.
  • the M4 parameter and M5 parameter to be compared with the MEK key K_mek_gen correspond to the first verification data
  • the M4 parameter and M5 parameter to be compared with the MAC key K_mac_gen correspond to the first verification data
  • ENC The M4 parameter and the M5 parameter to be compared with the key K_enc_gen correspond to the first verification data.
  • Step S202 The first key distribution unit 117 of the key generation device 110 transmits a key update processing message to the data security device 11010.
  • the control unit 121 of the data security device 11010 receives the key update processing message from the first key distribution unit 117 of the key generation device 110 via the interface unit 120.
  • the control unit 121 of the data security device 11010 stores the key update processing message received from the first key distribution unit 117 of the key generation device 110 in the storage unit 122.
  • the key update processing message is common to each ECU 11020 of the automobile 11001.
  • the second key distribution unit 123 of the data security device 11010 acquires the key update request message MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), and MES_K_enc_oem (K_enc) from the storage unit 122. .
  • the second key distribution unit 123 transmits the key update request message MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), and MES_K_enc_oem (K_enc_gen) to the ECU 11020 via the interface unit 120.
  • Key update request messages MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), and MES_K_enc_oem (K_enc_gen) are common to each ECU 11020 of the automobile 11001.
  • the key update request message may be transmitted by broadcasting of CAN 11030.
  • Step S105 and Step S106 are executed. Steps S105 and S106 are the same as those in the delivery method example 1.
  • each update completion message of the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen corresponds to the first update completion message.
  • Step S204 The control unit 141 of the ECU 11020 transmits the update completion messages of the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen to the data security device 11010 through the interface unit 140.
  • the second key distribution unit 123 of the data security device 11010 receives each update completion message of the MEK key K_mek_gen, MAC key K_mac_gen, and ENC key K_enc_gen received from the ECU 11020, and the first key distribution unit 117 of the key generation device 110.
  • M4 parameter and M5 parameter to be compared with ENC key K_enc_gen Validate using
  • the key update processing message received from the first key distribution unit 117 of the key generation device 110 is stored in the storage unit 122.
  • the second key distribution unit 123 acquires the M4 parameter and the M5 parameter to be compared with the MEK key K_mek_gen included in the key update processing message from the storage unit 122.
  • the second key distribution unit 123 compares the M4 parameter and the M5 parameter included in the update completion message of the MEK key K_mek_gen with the M4 parameter and the M5 parameter to be compared with the MEK key K_mek_gen, and determines whether or not they match. to decide. If the result of this determination is that they match, the MEK key has been successfully updated. On the other hand, if the two do not match, the MEK key update has failed.
  • the second key distribution unit 123 acquires the M4 parameter and the M5 parameter to be compared with the MAC key K_mac_gen included in the key update processing message from the storage unit 122.
  • the second key distribution unit 123 compares the M4 parameter and M5 parameter included in the MAC key K_mac_gen update completion message with the M4 parameter and M5 parameter to be compared with the MAC key K_mac_gen, and determines whether or not they match. to decide. If the result of this determination is that they match, the MAC key has been successfully updated. On the other hand, if the two do not match, the MAC key update has failed.
  • the second key distribution unit 123 acquires the M4 parameter and the M5 parameter to be compared with the ENC key K_enc_gen included in the key update processing message from the storage unit 122.
  • the second key distribution unit 123 compares the M4 parameter and M5 parameter included in the update completion message of the ENC key K_enc_gen with the M4 parameter and M5 parameter to be compared with the ENC key K_enc_gen, and determines whether or not they match. to decide. If the result of this determination is that they match, the ENC key has been successfully updated. On the other hand, if the two do not match, the ENC key update has failed.
  • the second key distribution unit 123 may execute a predetermined error process when the update of the MEK key K_mek_gen, the MAC key K_mac_gen, or the ENC key K_enc_gen fails. As the predetermined error process, the second key distribution unit 123 may retransmit the key update request message of the key that has failed to update among the key update request messages transmitted in step S203. In addition, the second key distribution unit 123 may execute a predetermined error process when any update completion message is not received even after a predetermined time has elapsed since the transmission of each key update request message in step S203. . As the predetermined error process, the second key distribution unit 123 may retransmit the key update request message of the key that does not receive the update completion message among the key update request messages transmitted in step S203.
  • control may be performed so that the processing proceeds to step S206 after the MEK key, the MAC key, and the ENC key have been successfully updated for all the ECUs 11020 targeted for key distribution.
  • Step S206 The control unit 121 of the data security device 11010 acquires the key update request message MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), and MES_K_enc_oem (K_enc_gen) included in the key update processing message from the storage unit 122.
  • MES_K_mek_oem K_mek_gen
  • MES_K_mac_oem K_mac_gen
  • K_enc_gen MES_K_enc_oem
  • the control unit 121 requests the key update by passing the M1 parameter, the M2 parameter, and the M3 parameter included in the key update request message MES_K_mek_oem (K_mek_gen) to the HSM 11012.
  • the key update unit 135 of the HSM 11012 registers the MEK key K_mek_gen using the M1 parameter, the M2 parameter, the M3 parameter, and the MEK key K_mek_oem stored in the storage unit 11013. Accordingly, the MEK key stored in the storage unit 11013 is updated from the MEK key K_mek_oem to the MEK key K_mek_gen.
  • the control unit 121 requests the key update by passing the M1 parameter, the M2 parameter, and the M3 parameter included in the key update request message MES_K_mac_oem (K_mac_gen) to the HSM 11012.
  • the key update unit 135 of the HSM 11012 registers the MAC key K_mac_gen using the M1 parameter, the M2 parameter, the M3 parameter, and the MAC key K_mac_oem stored in the storage unit 11013.
  • the MAC key stored in the storage unit 11013 is updated from the MAC key K_mac_oem to the MAC key K_mac_gen.
  • the control unit 121 requests the key update by passing the M1 parameter, the M2 parameter, and the M3 parameter included in the key update request message MES_K_enc_oem (K_enc_gen) to the HSM 11012.
  • the key update unit 135 of the HSM 11012 registers the ENC key K_enc_gen using the M1 parameter, the M2 parameter, the M3 parameter, and the ENC key K_enc_oem stored in the storage unit 11013.
  • the ENC key stored in the storage unit 11013 is updated from the ENC key K_enc_oem to the ENC key K_enc_gen.
  • the key update unit 135 of the HSM 11012 generates the M4 parameter and the M5 parameter of the MEK key K_mek_gen using the MEK key K_mek_gen.
  • the HSM 11012 passes the M4 parameter and M5 parameter of the MEK key K_mek_gen to the control unit 121.
  • the control unit 121 acquires, from the storage unit 122, the M4 parameter and the M5 parameter to be compared with the MEK key K_mek_gen included in the key update processing message.
  • the control unit 121 compares the M4 parameter and M5 parameter of the MEK key K_mek_gen received from the HSM 11012 with the M4 parameter and M5 parameter to be compared with the MEK key K_mek_gen, and determines whether or not they match. If the result of this determination is that they match, the MEK key has been successfully updated. On the other hand, if the two do not match, the MEK key update has failed.
  • the key update unit 135 of the HSM 11012 uses the MAC key K_mac_gen to generate the M4 parameter and the M5 parameter of the MAC key K_mac_gen.
  • the HSM 11012 passes the M4 parameter and M5 parameter of the MAC key K_mac_gen to the control unit 121.
  • the control unit 121 acquires, from the storage unit 122, the M4 parameter and the M5 parameter to be compared with the MAC key K_mac_gen included in the key update processing message.
  • the control unit 121 compares the M4 parameter and M5 parameter of the MAC key K_mac_gen received from the HSM 11012 with the M4 parameter and M5 parameter to be compared with the MAC key K_mac_gen, and determines whether or not they match. If the result of this determination is that they match, the MAC key has been successfully updated. On the other hand, if the two do not match, the MAC key update has failed.
  • the key update unit 135 of the HSM 11012 generates the M4 parameter and the M5 parameter of the ENC key K_enc_gen using the ENC key K_enc_gen.
  • the HSM 11012 passes the M4 parameter and M5 parameter of the ENC key K_enc_gen to the control unit 121.
  • the control unit 121 acquires from the storage unit 122 the M4 parameter and M5 parameter to be compared with the ENC key K_enc_gen included in the key update processing message.
  • the control unit 121 compares the M4 parameter and M5 parameter of the ENC key K_enc_gen received from the HSM 11012 with the M4 parameter and M5 parameter to be compared of the ENC key K_enc_gen, and determines whether or not they match. If the result of this determination is that they match, the ENC key has been successfully updated. On the other hand, if the two do not match, the ENC key update has failed.
  • the control unit 121 may execute a predetermined error process when the update of the MEK key K_mek_gen, the MAC key K_mac_gen, or the ENC key K_enc_gen of the HSM 11012 is unsuccessful.
  • the control unit 121 may report a key update failure to the key generation device 110 as the predetermined error processing. Further, the control unit 121 may report the key update failure of the ECU 11020 to the key generation device 110. Further, the control unit 121 may report the key update success of the ECU 11020 and the data security device 11010 to the key generation device 110.
  • the data security device 11010 may update the key in step S206 at any timing after the reception of the key update processing message in step S202. For example, the data security device 11010 may update the key in step S206 before receiving the update completion message in step S204.
  • the MEK key K_mek_oem, MAC key K_mac_oem, and ENC key K_enc_oem common to the automobile 11001 are stored in advance for each ECU 11020 mounted on the same automobile 11001.
  • a key update request message (first key update request message) for each key (first key) is generated from the master key Master_Secret and the common key, and the key update request message is commonly used by the ECUs 11020.
  • the key of each ECU 11020 can be updated.
  • an effect of improving the efficiency of key distribution applied to the ECU 11020 can be obtained.
  • the key update request message can be transmitted simultaneously to each ECU 11020 connected to the CAN 11030 by broadcast of the CAN 11030, so that the time required for key distribution can be shortened.
  • the processing load of the key generation device 110 can be reduced. Therefore, for example, when the key generation device 110 executes key distribution processing for a plurality of automobiles 11001, it is possible to contribute to shortening of processing time.
  • FIG. 8 is a sequence chart illustrating a fourth example of the distribution method according to the first embodiment.
  • parts corresponding to the steps in FIGS. 5 and 6 are given the same reference numerals.
  • the key generation device 110 stores the master key Master_Secret and the MEK key K_mek_oem in the storage unit 112 in advance.
  • the data security device 11010 and each ECU 11020 mounted on a certain automobile 11001 store the same MEK key K_mek_oem in advance.
  • the data security device 11010 stores the MEK key K_mek_oem in the storage unit 11013 of the HSM 11012.
  • the ECU 11020 stores the MEK key K_mek_oem in the storage unit 11023 of the SHE 11022.
  • the MEK key K_mek_oem is stored at the manufacturing factory.
  • the MEK key K_mek_oem stored in the key generation device 110, the MEK key K_mek_oem stored in the data security device 11010, and the MEK key K_mek_oem stored in the ECU 11020 are the same.
  • the MEK key K_mek_oem is a key stored in advance in the data security device 11010 and the ECU 11020, and is a common initial key for the automobile 11001.
  • the communication method between the key generation device 110 and the data security device 11010 is the same as the delivery method example 3.
  • the communication method between the data security device 11010 and the ECU 11020 is the same as that of the delivery method example 3.
  • step S101 and step S102 are executed. Steps S101 and S102 are the same as those in the delivery method example 1.
  • the MEK key K_mek_gen corresponds to the first key
  • the MAC key K_mac_gen and the ENC key K_enc_gen correspond to the second key.
  • the first key distribution unit 117 of the key generation device 110 generates a key update processing message.
  • the key update process message includes a key update request message MES_K_mek_oem (K_mek_gen) of the MEK key K_mek_gen, a key update request message MES_K_mek_gen (K_mac_gen) of the MAC key K_mac_gen, and a key update request message mecgen_Ken_Ken_en_en.
  • K_mek_gen key update request message MES_K_mek_gen
  • K_mac_gen key update request message
  • Each key update request message is the same as Example 2 of the distribution method.
  • the M4 parameter and M5 parameter to be compared are the same as those in the delivery method example 1.
  • the key update request message MES_K_mek_oem corresponds to the first key update request message.
  • the key update request messages MES_K_mek_gen K_mac_gen
  • MES_K_mek_gen K_enc_gen
  • the M4 parameter and the M5 parameter to be compared with the MEK key K_mek_gen correspond to the first verification data.
  • the M4 parameter and the M5 parameter to be compared with the MAC key K_mac_gen correspond to the second verification data.
  • the M4 parameter and the M5 parameter to be compared with the ENC key K_enc_gen correspond to the second verification data.
  • Step S202a The first key distribution unit 117 of the key generation device 110 transmits a key update processing message to the data security device 11010.
  • the control unit 121 of the data security device 11010 stores the key update processing message received from the first key distribution unit 117 of the key generation device 110 in the storage unit 122.
  • the key update processing message is common to each ECU 11020 of the automobile 11001.
  • Step S203a The second key distribution unit 123 of the data security device 11010 acquires the key update request message MES_K_mek_oem (K_mek_gen) included in the key update processing message from the storage unit 122.
  • the second key distribution unit 123 transmits the key update request message MES_K_mek_oem (K_mek_gen) to the ECU 11020. That is, the second key distribution unit 123 transmits a first key update request message to the ECU 11020.
  • Key update request message MES_K_mek_oem (K_mek_gen) is common to each ECU 11020 of automobile 11001.
  • the key update request message may be transmitted by broadcasting of CAN 11030.
  • Step S105a and Step S106a are executed. Steps S105a and S106a are the same as those in the delivery method example 2.
  • the update completion message of the MEK key K_mek_gen corresponds to the first update completion message.
  • Step S204a The control unit 141 of the ECU 11020 transmits an update completion message of the MEK key K_mek_gen to the data security device 11010 through the interface unit 140. That is, the control unit 141 transmits a first update completion message to the data security device 11010.
  • the second key distribution unit 123 of the data security device 11010 includes the MEK key K_mek_gen update completion message received from the ECU 11020 in the key update processing message received from the first key distribution unit 117 of the key generation device 110. Verification using the M4 parameter and the M5 parameter to be compared with the MEK key K_mek_gen to be compared.
  • the key update processing message received from the first key distribution unit 117 of the key generation device 110 is stored in the storage unit 122.
  • the verification method of the update completion message is the same as that of the delivery method example 3.
  • the second key distribution unit 123 may execute a predetermined error process when the update of the MEK key K_mek_gen is unsuccessful. The second key distribution unit 123 may retransmit the key update request message transmitted in step S203a as the predetermined error process. In addition, the second key distribution unit 123 may execute a predetermined error process when the update completion message is not received even after a predetermined time has elapsed since the transmission of the key update request message in step S203a. The second key distribution unit 123 may retransmit the key update request message transmitted in step S203a as the predetermined error process.
  • control may be performed so that the process proceeds to step S206a after the MEK key has been successfully updated for all the ECUs 11020 to be distributed.
  • Step S206a The control unit 121 of the data security device 11010 acquires the key update request message MES_K_mek_oem (K_mek_gen) included in the key update processing message from the storage unit 122.
  • the control unit 121 requests the key update by passing the M1 parameter, the M2 parameter, and the M3 parameter included in the key update request message MES_K_mek_oem (K_mek_gen) to the HSM 11012.
  • the key update unit 135 of the HSM 11012 registers the MEK key K_mek_gen using the M1 parameter, the M2 parameter, the M3 parameter, and the MEK key K_mek_oem stored in the storage unit 11013. Accordingly, the MEK key stored in the storage unit 11013 is updated from the MEK key K_mek_oem to the MEK key K_mek_gen.
  • the key update unit 135 of the HSM 11012 generates the M4 parameter and the M5 parameter of the MEK key K_mek_gen using the MEK key K_mek_gen.
  • the HSM 11012 passes the M4 parameter and M5 parameter of the MEK key K_mek_gen to the control unit 121.
  • the control unit 121 acquires, from the storage unit 122, the M4 parameter and the M5 parameter to be compared with the MEK key K_mek_gen included in the key update processing message.
  • the control unit 121 compares the M4 parameter and M5 parameter of the MEK key K_mek_gen received from the HSM 11012 with the M4 parameter and M5 parameter to be compared with the MEK key K_mek_gen, and determines whether or not they match. If the result of this determination is that they match, the MEK key has been successfully updated. On the other hand, if the two do not match, the MEK key update has failed.
  • control part 121 may perform a predetermined
  • the control unit 121 may report a key update failure to the key generation device 110 as the predetermined error processing. Further, the control unit 121 may report the key update failure of the ECU 11020 to the key generation device 110. Further, the control unit 121 may report the key update success of the ECU 11020 and the data security device 11010 to the key generation device 110.
  • Step S203b The second key distribution unit 123 of the data security device 11010 acquires the key update request message MES_K_mek_gen (K_mac_gen) and MES_K_mek_gen (K_enc_gen) included in the key update processing message from the storage unit 122.
  • the second key distribution unit 123 transmits the key update request message MES_K_mek_gen (K_mac_gen) and MES_K_mek_gen (K_enc_gen) to the ECU 11020. That is, the second key distribution unit 123 transmits a second key update request message to the ECU 11020.
  • the key update request messages MES_K_mek_gen (K_mac_gen) and MES_K_mek_gen (K_enc_gen) are common to each ECU 11020 of the automobile 11001.
  • the key update request message may be transmitted by broadcasting of CAN 11030.
  • Step S105b and Step S106b are executed. Steps S105b and S106b are the same as those in the delivery method example 2.
  • each update completion message of the MAC key K_mac_gen and the ENC key K_enc_gen corresponds to a second update completion message.
  • Step S204b The control unit 141 of the ECU 11020 transmits each update completion message of the MAC key K_mac_gen and the ENC key K_enc_gen to the data security device 11010 through the interface unit 140. That is, the control unit 141 transmits a second update completion message to the data security device 11010.
  • Step S205b The second key distribution unit 123 of the data security device 11010 receives each update completion message of the MAC key K_mac_gen and ENC key K_enc_gen received from the ECU 11020 from the first key distribution unit 117 of the key generation device 110. Verification is performed using the M4 parameter and M5 parameter to be compared with the MAC key K_mac_gen included in the update processing message, and the M4 parameter and M5 parameter to be compared with the ENC key K_enc_gen.
  • the key update processing message received from the first key distribution unit 117 of the key generation device 110 is stored in the storage unit 122.
  • the verification method of the update completion message is the same as that of the delivery method example 3.
  • the second key distribution unit 123 may execute a predetermined error process when the update of the MAC key K_mac_gen or the ENC key K_enc_gen is unsuccessful. As the predetermined error processing, the second key distribution unit 123 may retransmit the key update request message of the key with the update failure among the key update request messages transmitted in step S203b. In addition, the second key distribution unit 123 may execute a predetermined error process if any update completion message is not received even after a predetermined time has elapsed since the transmission of each key update request message in step S203b. . As the predetermined error process, the second key distribution unit 123 may retransmit the key update request message of the key that does not receive the update completion message among the key update request messages transmitted in step S203b.
  • control may be performed so that the process proceeds to step S206b after the MAC key and ENC key have been successfully updated for all the ECUs 11020 targeted for key distribution.
  • Step S206b The control unit 121 of the data security device 11010 acquires from the storage unit 122 a key update request message MES_K_mek_gen (K_mac_gen) and MES_K_mek_gen (K_enc_gen) included in the key update processing message.
  • MES_K_mek_gen K_mac_gen
  • K_enc_gen MES_K_mek_gen
  • the control unit 121 requests the key update by passing the M1 parameter, the M2 parameter, and the M3 parameter included in the key update request message MES_K_mek_gen (K_mac_gen) to the HSM 11012.
  • the key update unit 135 of the HSM 11012 registers the MAC key K_mac_gen using the M1 parameter, the M2 parameter, the M3 parameter, and the MEK key K_mek_gen stored in the storage unit 11013.
  • the MAC key K_mac_gen is stored in the storage unit 11013.
  • the control unit 121 sends the M1 parameter, the M2 parameter, and the M3 parameter included in the key update request message MES_K_mek_gen (K_enc_gen) to the HSM 11012 to request a key update.
  • the key update unit 135 of the HSM 11012 registers the ENC key K_enc_gen using the M1 parameter, the M2 parameter, the M3 parameter, and the MEK key K_mek_gen stored in the storage unit 11013. As a result, the ENC key K_enc_gen is stored in the storage unit 11013.
  • the key update unit 135 of the HSM 11012 uses the MAC key K_mac_gen to generate the M4 parameter and the M5 parameter of the MAC key K_mac_gen.
  • the HSM 11012 passes the M4 parameter and M5 parameter of the MAC key K_mac_gen to the control unit 121.
  • the control unit 121 acquires, from the storage unit 122, the M4 parameter and the M5 parameter to be compared with the MAC key K_mac_gen included in the key update processing message.
  • the control unit 121 compares the M4 parameter and M5 parameter of the MAC key K_mac_gen received from the HSM 11012 with the M4 parameter and M5 parameter to be compared with the MAC key K_mac_gen, and determines whether or not they match. If the result of this determination is that they match, the MAC key has been successfully updated. On the other hand, if the two do not match, the MAC key update has failed.
  • the key update unit 135 of the HSM 11012 generates the M4 parameter and the M5 parameter of the ENC key K_enc_gen using the ENC key K_enc_gen.
  • the HSM 11012 passes the M4 parameter and M5 parameter of the ENC key K_enc_gen to the control unit 121.
  • the control unit 121 acquires from the storage unit 122 the M4 parameter and M5 parameter to be compared with the ENC key K_enc_gen included in the key update processing message.
  • the control unit 121 compares the M4 parameter and M5 parameter of the ENC key K_enc_gen received from the HSM 11012 with the M4 parameter and M5 parameter to be compared of the ENC key K_enc_gen, and determines whether or not they match. If the result of this determination is that they match, the ENC key has been successfully updated. On the other hand, if the two do not match, the ENC key update has failed.
  • the control unit 121 may execute a predetermined error process when the update of the MAC key K_mac_gen or the ENC key K_enc_gen of the HSM 11012 is unsuccessful.
  • the control unit 121 may report a key update failure to the key generation device 110 as the predetermined error processing. Further, the control unit 121 may report the key update failure of the ECU 11020 to the key generation device 110. Further, the control unit 121 may report the key update success of the ECU 11020 and the data security device 11010 to the key generation device 110.
  • the data security device 11010 may update the keys in steps S206a and S206b at an arbitrary timing after the reception of the key update processing message in step S202a. For example, the data security device 11010 may update the keys in steps S206a and S206b before receiving the update completion message in step S204a. Alternatively, the data security device 11010 may update the keys in steps S206a and S206b after receiving the update completion message in step S204b.
  • the MEK key K_mek_oem common to the automobile 11001 is stored in advance for each ECU 11020 mounted on the same automobile 11001.
  • a key update request message (first key update request message) of the MEK key K_mek_gen (first key) is generated from the master key Master_Secret and the common key, and the key update request message is shared by the ECUs 11020.
  • the MEK key of each ECU 11020 can be updated by using it.
  • each key update request message (second key update request message) of the MAC key K_mac_gen (second key) and the ENC key K_enc_gen (second key) is generated, It is possible to update the MAC key and ENC key of each ECU 11020 by using the key update request message in common to each ECU 11020. As a result, an effect of improving the efficiency of key distribution applied to the ECU 11020 can be obtained.
  • the MEK key K_mek_oem is the only common initial key for the automobile 11001 stored in advance in the ECU 11020. As a result, for example, an effect is obtained that can contribute to simplification of the initial key writing process of the ECU 11020 in the manufacturing factory of the ECU 11020.
  • the key update request message can be transmitted simultaneously to each ECU 11020 connected to the CAN 11030 by broadcast of the CAN 11030, so that the time required for key distribution can be shortened.
  • the processing load of the key generation device 110 can be reduced. Therefore, for example, when the key generation device 110 executes key distribution processing for a plurality of automobiles 11001, it is possible to contribute to shortening of processing time.
  • FIG. 9 is a sequence chart illustrating a fifth example of the distribution method according to the first embodiment. 9, parts corresponding to the respective steps in FIG. 5 are denoted by the same reference numerals.
  • the key generation device 110 stores a master key Master_Secret, a MEK key K_mek_oem, a MAC key K_mac_oem, and an ENC key K_enc_oem in the storage unit 112 in advance.
  • the data security device 11010 and each ECU 11020 mounted on a certain automobile 11001 store the same MEK key K_mek_oem, MAC key K_mac_oem, and ENC key K_enc_oem in advance as in the third example of the distribution method.
  • the data security device 11010 stores the key in the storage unit 11013 of the HSM 11012.
  • ECU 11020 stores the key in storage unit 11023 of SHE 11022.
  • MEK key K_mek_oem, MAC key K_mac_oem and ENC key K_enc_oem stored in the key generation device 110 MEK key K_mek_oem, MAC key K_mac_oem and ENC key K_enc_oem stored in the data security device 11010, and MEK key stored in the ECU 11020 K_mac_oem and ENC key K_enc_oem are the same.
  • the MEK key K_mek_oem, the MAC key K_mac_oem, and the ENC key K_enc_oem are keys stored in advance in the data security device 11010 and the ECU 11020, and are common initial keys of the automobile 11001.
  • the communication method between the key generation device 110 and the data security device 11010 is the same as the delivery method example 3.
  • the communication method between the data security device 11010 and the ECU 11020 is the same as that of the delivery method example 3.
  • step S101 and step S102 are executed. Steps S101 and S102 are the same as those in the delivery method example 1.
  • the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen correspond to the first key.
  • the first key distribution unit 117 of the key generation device 110 transmits the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen to the data security device 11010.
  • the control unit 121 of the data security device 11010 receives the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen from the first key distribution unit 117 of the key generation device 110 via the interface unit 120.
  • the control unit 121 of the data security device 11010 passes the MEK key K_mek_gen, MAC key K_mac_gen, and ENC key K_enc_gen received from the first key distribution unit 117 of the key generation device 110 to the HSM 11012 and stores them in the storage unit 11013.
  • the key generation device 110 may encrypt the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen and transmit them to the data security device 11010.
  • a case where the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen are encrypted will be described below.
  • the encryption processing unit 116 of the key generation device 110 encrypts the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen with the ENC key K_enc_oem stored in the storage unit 112, and encrypts the encryption keys K_enc_oem (K_mek_gen) and K_enc_ome K_mac_gen) and K_enc_oem (K_enc_gen) are generated.
  • the first key distribution unit 117 transmits the encryption keys K_enc_oem (K_mek_gen), K_enc_oem (K_mac_gen), and K_enc_oem (K_enc_gen) to the data security device 11010.
  • the control unit 121 of the data security device 11010 receives the encryption keys K_enc_oem (K_mek_gen), K_enc_oem (K_mac_gen), and K_enc_oem (K_enc_gen) from the first key distribution unit 117 of the key generation device 110 via the interface unit 120.
  • the control unit 121 of the data security device 11010 passes the encryption keys K_enc_oem (K_mek_gen), K_enc_oem (K_mac_gen), and K_enc_oem (K_enc_gen) received from the first key distribution unit 117 of the key generation device 110 to the HSM 11012 for decryption.
  • the encryption processing unit 132 of the HSM 11012 decrypts the encryption keys K_enc_oem (K_mek_gen), K_enc_oem (K_mac_gen), and K_enc_oem (K_enc_gen) with the ENC key K_enc_oem stored in the storage unit 11013.
  • the HSM 11012 stores the MEK key K_mek_gen, MAC key K_mac_gen, and ENC key K_enc_gen acquired by the decryption in the storage unit 11013.
  • the encryption key used for encryption of the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen may be a common key K_com other than the above-described ENC key K_enc_oem.
  • the key generation device 110 and the data security device 11010 share a common key K_com in advance. The above is a description of the case where the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen are encrypted.
  • Step S302 The distribution processing unit 136 of the HSM 11012 of the data security device 11010 uses the MEK key K_mek_oem, the MAC key K_mac_oem, and the ENC key K_enc_oem to update each key request of the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen.
  • MES_K_mek_oem K_mek_gen
  • MES_K_mac_oem K_mac_gen
  • MES_K_enc_oem K_enc_gen
  • the key update request message MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), and MES_K_enc_oem (K_enc_gen) correspond to the first key update request message.
  • the second key distribution unit 123 of the data security device 11010 transmits a key update request message MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), and MES_K_enc_oem (K_enc_gen) to the ECU 11020 by the interface unit 120.
  • Key update request messages MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), and MES_K_enc_oem (K_enc_gen) are common to each ECU 11020 of the automobile 11001.
  • the key update request message may be transmitted by broadcasting of CAN 11030.
  • Step S105 and Step S106 are executed. Steps S105 and S106 are the same as those in the delivery method example 1.
  • each update completion message of the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen corresponds to the first update completion message.
  • Step S304 The control unit 141 of the ECU 11020 transmits the update completion messages of the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen to the data security device 11010 through the interface unit 140.
  • the control unit 121 of the data security device 11010 receives update completion messages of the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen from the ECU 11020 via the interface unit 120.
  • Step S305 The control unit 121 of the data security device 11010 passes each update completion message of the MEK key K_mek_gen, MAC key K_mac_gen, and ENC key K_enc_gen received from the ECU 11020 to the HSM 11012 for verification.
  • the distribution processing unit 136 of the HSM 11012 verifies each update completion message based on the MEK key K_mek_gen, MAC key K_mac_gen, and ENC key K_enc_gen received from the first key distribution unit 117 of the key generation device 110.
  • the MEK key K_mek_gen, MAC key K_mac_gen, and ENC key K_enc_gen received from the first key distribution unit 117 of the key generation device 110 are stored in the storage unit 11013.
  • the distribution processing unit 136 uses the MEK key K_mek_gen received from the first key distribution unit 117 of the key generation device 110 to generate the M4 parameter and the M5 parameter to be compared with the MEK key K_mek_gen.
  • the distribution processing unit 136 compares the M4 parameter and M5 parameter included in the update completion message of the MEK key K_mek_gen with the M4 parameter and M5 parameter to be compared with the MEK key K_mek_gen, and determines whether or not they match. . If the result of this determination is that they match, the MEK key has been successfully updated. On the other hand, if the two do not match, the MEK key update has failed.
  • the distribution processing unit 136 uses the MAC key K_mac_gen received from the first key distribution unit 117 of the key generation device 110 to generate the M4 parameter and the M5 parameter to be compared with the MAC key K_mac_gen.
  • the distribution processing unit 136 compares the M4 parameter and M5 parameter included in the MAC key K_mac_gen update completion message with the M4 parameter and M5 parameter to be compared with the MAC key K_mac_gen, and determines whether or not they match. . If the result of this determination is that they match, the MAC key has been successfully updated. On the other hand, if the two do not match, the MAC key update has failed.
  • the distribution processing unit 136 uses the ENC key K_enc_gen received from the first key distribution unit 117 of the key generation device 110 to generate the M4 parameter and the M5 parameter to be compared with the ENC key K_enc_gen.
  • the distribution processing unit 136 compares the M4 parameter and M5 parameter included in the update completion message of the ENC key K_enc_gen with the M4 parameter and M5 parameter to be compared with the ENC key K_enc_gen, and determines whether or not they match. . If the result of this determination is that they match, the ENC key has been successfully updated. On the other hand, if the two do not match, the ENC key update has failed.
  • the second key distribution unit 123 of the data security device 11010 may perform predetermined error processing when the update of the MEK key K_mek_gen, the MAC key K_mac_gen, or the ENC key K_enc_gen fails.
  • the second key distribution unit 123 may retransmit the key update request message of the key with the update failure among the key update request messages transmitted in step S303.
  • the second key distribution unit 123 may execute a predetermined error process if any update completion message is not received even after a predetermined time has elapsed since the transmission of each key update request message in step S303. .
  • the second key distribution unit 123 may retransmit the key update request message of the key that does not receive the update completion message among the key update request messages transmitted in step S303.
  • control may be performed so that the process proceeds to step S306 after the MEK key, the MAC key, and the ENC key have been successfully updated for all the ECUs 11020 targeted for key distribution.
  • Step S306 The control unit 121 of the data security device 11010 requests the HSM 11012 to update the key.
  • the key update unit 135 of the HSM 11012 updates the registration to the storage unit 11013 from the MEK key K_mek_oem, the MAC key K_mac_oem, and the ENC key K_enc_oem to the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen.
  • the MEK key stored in the storage unit 11013 is updated from the MEK key K_mek_oem to the MEK key K_mek_gen.
  • the MAC key stored in the storage unit 11013 is updated from the MAC key K_mac_oem to the MAC key K_mac_gen.
  • the ENC key stored in the storage unit 11013 is updated from the ENC key K_enc_oem to the ENC key K_enc_gen.
  • the MEK key K_mek_oem, the MAC key K_mac_oem, and the ENC key K_enc_oem common to the automobile 11001 are stored in advance for each ECU 11020 mounted on the same automobile 11001.
  • a key update request message (first key update request message) for each key (first key) is generated from the master key Master_Secret and the common key, and the key update request message is commonly used by the ECUs 11020.
  • the key of each ECU 11020 can be updated. As a result, an effect of improving the efficiency of key distribution applied to the ECU 11020 can be obtained.
  • the key update request message can be transmitted simultaneously to each ECU 11020 connected to the CAN 11030 by broadcast of the CAN 11030, so that the time required for key distribution can be shortened.
  • the processing load of the key generation device 110 can be reduced. Therefore, for example, when the key generation device 110 executes key distribution processing for a plurality of automobiles 11001, it is possible to contribute to shortening of processing time.
  • FIG. 10 is a sequence chart illustrating a sixth example of the distribution method according to the first embodiment.
  • the same reference numerals are given to the portions corresponding to the steps in FIGS. 5, 6, and 9.
  • the key generation device 110 stores a master key Master_Secret and an ENC key K_enc_oem in the storage unit 112 in advance.
  • the data security device 11010 and each ECU 11020 mounted on a certain automobile 11001 store the same MEK key K_mek_oem in advance, as in the delivery method example 4.
  • the data security device 11010 further stores an ENC key K_enc_oem in advance.
  • the data security device 11010 stores the MEK key K_mek_oem and the ENC key K_enc_oem in the storage unit 11013 of the HSM 11012.
  • the ECU 11020 stores the MEK key K_mek_oem in the storage unit 11023 of the SHE 11022.
  • the ENC key K_enc_oem stored in the key generation device 110 and the ENC key K_enc_oem stored in the data security device 11010 are the same.
  • the MEK key K_mek_oem is a key stored in advance in the data security device 11010 and the ECU 11020, and is a common initial key for the automobile 11001.
  • the communication method between the key generation device 110 and the data security device 11010 is the same as the delivery method example 3.
  • the communication method between the data security device 11010 and the ECU 11020 is the same as that of the delivery method example 3.
  • step S101 and step S102 are executed. Steps S101 and S102 are the same as those in the delivery method example 1.
  • the MEK key K_mek_gen corresponds to the first key
  • the MAC key K_mac_gen and the ENC key K_enc_gen correspond to the second key.
  • Step S301 is executed.
  • Step S301 is the same as that of the delivery method example 5.
  • the key generation device 110 may encrypt the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen with the own ENC key K_enc_oem and transmit the encrypted data to the data security device 11010.
  • the data security device 11010 decrypts the encryption keys K_enc_oem (K_mek_gen), K_enc_oem (K_mac_gen), and K_enc_oem (K_enc_gen) with its own ENC key K_enc_oem.
  • the encryption key used for encryption of the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen may be a common key K_com other than the above-described ENC key K_enc_oem.
  • the key generation device 110 and the data security device 11010 share a common key K_com in advance.
  • Step S302a The distribution processing unit 136 of the HSM 11012 of the data security device 11010 uses the MEK key K_mek_oem to generate a key update request message MES_K_mek_oem (K_mek_gen) for the MEK key K_mek_gen.
  • the key update request message is the same as that in the delivery method example 1.
  • the key update request message MES_K_mek_oem corresponds to the first key update request message.
  • Step S303a The second key distribution unit 123 of the data security device 11010 transmits a key update request message MES_K_mek_oem (K_mek_gen) to the ECU 11020 via the interface unit 120. That is, the second key distribution unit 123 transmits a first key update request message to the ECU 11020.
  • Key update request message MES_K_mek_oem (K_mek_gen) is common to each ECU 11020 of automobile 11001.
  • the key update request message may be transmitted by broadcasting of CAN 11030.
  • Step S105a and Step S106a are executed. Steps S105a and S106a are the same as those in the delivery method example 2.
  • the update completion message of the MEK key K_mek_gen corresponds to the first update completion message.
  • Step S304a The control unit 141 of the ECU 11020 transmits an update completion message of the MEK key K_mek_gen to the data security device 11010 through the interface unit 140. That is, the control unit 141 transmits a first update completion message to the data security device 11010.
  • the control unit 121 of the data security device 11010 receives an update completion message for the MEK key K_mek_gen from the ECU 11020 via the interface unit 120.
  • Step S305a The control unit 121 of the data security device 11010 passes the update completion message of the MEK key K_mek_gen received from the ECU 11020 to the HSM 11012 for verification.
  • the distribution processing unit 136 of the HSM 11012 verifies the update completion message for the MEK key K_mek_gen based on the MEK key K_mek_gen received from the first key distribution unit 117 of the key generation device 110.
  • the MEK key K_mek_gen received from the first key distribution unit 117 of the key generation device 110 is stored in the storage unit 11013.
  • the verification method of the update completion message is the same as that of the delivery method example 5.
  • the second key distribution unit 123 may execute a predetermined error process when the update of the MEK key K_mek_gen is unsuccessful. The second key distribution unit 123 may retransmit the key update request message transmitted in step S303a as the predetermined error process. In addition, the second key distribution unit 123 may execute a predetermined error process when the update completion message is not received even after a predetermined time has elapsed since the transmission of the key update request message in step S303a. The second key distribution unit 123 may retransmit the key update request message transmitted in step S303a as the predetermined error process.
  • control may be performed so that the processing proceeds to step S306a after the MEK key has been successfully updated for all the ECUs 11020 to be distributed.
  • Step S306a The control unit 121 of the data security device 11010 requests the HSM 11012 to update the key.
  • the key update unit 135 of the HSM 11012 updates the registration from the MEK key K_mek_oem to the MEK key K_mek_gen to the storage unit 11013.
  • the MEK key stored in the storage unit 11013 is updated from the MEK key K_mek_oem to the MEK key K_mek_gen.
  • Step S302b The distribution processing unit 136 of the HSM 11012 of the data security device 11010 uses the MEK key K_mek_gen to generate each key update request message MES_K_mek_gen (K_mac_gen) and MES_K_men_gen_K_gen_Ken_gen_ .
  • the key update request message is the same as that of the delivery method example 2.
  • Step S303b The second key distribution unit 123 of the data security device 11010 transmits a key update request message MES_K_mek_gen (K_mac_gen) and MES_K_mek_gen (K_enc_gen) to the ECU 11020. That is, the second key distribution unit 123 transmits a second key update request message to the ECU 11020.
  • the key update request messages MES_K_mek_gen (K_mac_gen) and MES_K_mek_gen (K_enc_gen) are common to each ECU 11020 of the automobile 11001.
  • the key update request message may be transmitted by broadcasting of CAN 11030.
  • Step S105b and Step S106b are executed. Steps S105b and S106b are the same as those in the delivery method example 2.
  • each update completion message of the MAC key K_mac_gen and the ENC key K_enc_gen corresponds to a second update completion message.
  • Step S304b The control unit 141 of the ECU 11020 transmits each update completion message of the MAC key K_mac_gen and the ENC key K_enc_gen to the data security device 11010 through the interface unit 140. That is, the control unit 141 transmits a second update completion message to the data security device 11010.
  • the control unit 121 of the data security device 11010 receives the update completion messages for the MAC key K_mac_gen and the ENC key K_enc_gen from the ECU 11020 via the interface unit 120.
  • Step S305b The control unit 121 of the data security device 11010 passes each update completion message of the MAC key K_mac_gen and ENC key K_enc_gen received from the ECU 11020 to the HSM 11012 for verification.
  • the distribution processing unit 136 of the HSM 11012 verifies each update completion message based on the MAC key K_mac_gen and ENC key K_enc_gen received from the first key distribution unit 117 of the key generation device 110.
  • the MAC key K_mac_gen and ENC key K_enc_gen received from the first key distribution unit 117 of the key generation device 110 are stored in the storage unit 11013.
  • the verification method of the update completion message is the same as that of the delivery method example 5.
  • the second key distribution unit 123 of the data security device 11010 may execute a predetermined error process when the update of the MAC key K_mac_gen or the ENC key K_enc_gen is unsuccessful. As the predetermined error process, the second key distribution unit 123 may retransmit the key update request message of the key that has failed to update among the key update request messages transmitted in step S303b. In addition, the second key distribution unit 123 may execute a predetermined error process if any update completion message is not received even after a predetermined time has elapsed since the transmission of each key update request message in step S303b. . As the predetermined error process, the second key distribution unit 123 may retransmit the key update request message of the key that does not receive the update completion message among the key update request messages transmitted in step S303b.
  • control may be performed so that the process proceeds to step S306b after the MAC key and ENC key have been successfully updated for all the ECUs 11020 to be distributed.
  • Step S306b The control unit 121 of the data security device 11010 requests the HSM 11012 to update the key.
  • the key update unit 135 of the HSM 11012 registers the MAC key K_mac_gen in the storage unit 11013.
  • the MAC key K_mac_gen is stored in the storage unit 11013.
  • the key update unit 135 updates the registration from the ENC key K_enc_oem to the ENC key K_enc_gen to the storage unit 11013.
  • the ENC key stored in the storage unit 11013 is updated from the ENC key K_enc_oem to the ENC key K_enc_gen.
  • the MEK key K_mek_oem common to the automobile 11001 is stored in advance for each ECU 11020 mounted in the same automobile 11001.
  • a key update request message (first key update request message) of the MEK key K_mek_gen (first key) is generated from the master key Master_Secret and the common key, and the key update request message is shared by the ECUs 11020.
  • the MEK key of each ECU 11020 can be updated by using it.
  • each key update request message (second key update request message) of the MAC key K_mac_gen (second key) and the ENC key K_enc_gen (second key) is generated, It is possible to update the MAC key and ENC key of each ECU 11020 by using the key update request message in common to each ECU 11020. As a result, an effect of improving the efficiency of key distribution applied to the ECU 11020 can be obtained.
  • the MEK key K_mek_oem is the only common initial key for the automobile 11001 stored in advance in the ECU 11020. As a result, for example, an effect is obtained that can contribute to simplification of the initial key writing process of the ECU 11020 in the manufacturing factory of the ECU 11020.
  • the key update request message can be transmitted simultaneously to each ECU 11020 connected to the CAN 11030 by broadcast of the CAN 11030, so that the time required for key distribution can be shortened.
  • the processing load of the key generation device 110 can be reduced. Therefore, for example, when the key generation device 110 executes key distribution processing for a plurality of automobiles 11001, it is possible to contribute to shortening of processing time.
  • FIG. 11 is a diagram illustrating another configuration example of the data security device 11010 according to the first embodiment.
  • FIG. 12 is a sequence chart illustrating a seventh example of the distribution method according to the first embodiment.
  • the same reference numerals are given to portions corresponding to the respective portions in FIG. 3.
  • parts corresponding to the steps in FIGS. 5 and 9 are given the same reference numerals.
  • the HSM 11012 of the data security device 11010 further includes a key generation unit 137 with respect to the HSM 11012 described in FIG.
  • the key generation unit 137 has a key generation function similar to that of the key generation unit 115 of the key generation device 110.
  • the HSM 11012 of the data security device 11010 stores the master key Master_Secret, the MEK key K_mek_oem, the MAC key K_mac_oem, and the ENC key K_enc_oem in the storage unit 11013 in advance.
  • the data security device 11010 and each ECU 11020 mounted on a certain automobile 11001 store the same MEK key K_mek_oem, MAC key K_mac_oem, and ENC key K_enc_oem in advance as in the third example of the distribution method.
  • ECU 11020 stores the key in storage unit 11023 of SHE 11022.
  • the MEK key K_mek_oem, the MAC key K_mac_oem, and the ENC key K_enc_oem are keys stored in advance in the data security device 11010 and the ECU 11020, and are common initial keys of the automobile 11001.
  • the communication method between the data security device 11010 and the ECU 11020 is the same as that of the delivery method example 3.
  • the control unit 121 of the data security device 11010 acquires the vehicle identification number VIN of the automobile 11001 on which the data security device 11010 is mounted.
  • the vehicle identification number VIN of the automobile 11001 may be stored in the data security device 11010 in advance, or may be stored in the data security device 11010 when there is a request for distributing a key to the ECU 11020.
  • the data security from the ECU 11020 is started after the ECU 11020 is started.
  • the vehicle identification number VIN of the automobile 11001 may be notified to the device 11010.
  • the vehicle identification number VIN of the automobile 11001 for example, the vehicle identification number VIN managed by the automobile manufacturer of the automobile 11001 may be supplied to the data security device 11010.
  • Step S402 In the data security device 11010, the control unit 121 passes the vehicle identification number VIN of the automobile 11001 to the HSM 11012 and requests generation of a message.
  • the HSM 11012 executes steps S403, S404, and S405 in response to a message generation request from the control unit 121.
  • Step S403 The key generation unit 137 of the HSM 11012 generates a key using the vehicle identification number VIN of the automobile 11001 received from the control unit 121. This key generation is the same as that in step S102 of the delivery method example 1.
  • the key generation unit 137 generates the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen by the same key generation method as that in step S102 of the delivery method example 1.
  • the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen are common to each ECU 11020 mounted on the automobile 11001 on which the data security device 11010 is mounted.
  • the storage unit 11013 stores the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen.
  • the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen correspond to the first key.
  • the distribution processing unit 136 of the HSM 11012 generates a key update processing message.
  • the key update processing message includes key update request messages MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), MES_K_en_K, and MES_K_enK_meK
  • the M5 parameter, the M4 parameter and the M5 parameter to be compared with the MAC key K_mac_gen, and the M4 parameter and the M5 parameter to be compared with the ENC key K_enc_gen are included.
  • Each key update request message and each M4 parameter and M5 parameter to be compared are the same as those in the delivery method example 1.
  • the key update request message MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), and MES_K_enc_oem (K_enc_gen) correspond to the first key update request message.
  • the M4 parameter and the M5 parameter to be compared with the MEK key K_mek_gen correspond to the first verification data
  • the M4 parameter and the M5 parameter to be compared with the MAC key K_mac_gen correspond to the first verification data
  • ENC The M4 parameter and the M5 parameter to be compared with the key K_enc_gen correspond to the first verification data.
  • Step S405 The HSM 11012 sends a key update processing message to the control unit 121.
  • the control unit 121 stores the key update processing message in the storage unit 122.
  • Step S303, Step S105, Step S106, and Step S304 are executed.
  • Steps S105 and S106 are the same as those in the delivery method example 1.
  • Steps S303 and S304 are the same as those in the delivery method example 5.
  • the second key distribution unit 123 acquires the key update request message MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), and MES_K_enc_oem (K_enc_gen) included in the key update processing message from the storage unit 122.
  • each update completion message of the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen corresponds to the first update completion message.
  • the second key distribution unit 123 of the data security device 11010 includes each update completion message of the MEK key K_mek_gen, MAC key K_mac_gen, and ENC key K_enc_gen received from the ECU 11020 in the key update processing message received from the HSM 11012. Verification is performed using the M4 and M5 parameters to be compared with the MEK key K_mek_gen, the M4 and M5 parameters to be compared with the MAC key K_mac_gen, and the M4 and M5 parameters to be compared with the ENC key K_enc_gen.
  • the key update processing message received from the HSM 11012 is stored in the storage unit 122.
  • the method for verifying each update completion message is the same as that in step S205 of the delivery method example 3.
  • the second key distribution unit 123 may execute a predetermined error process when the update of the MEK key K_mek_gen, the MAC key K_mac_gen, or the ENC key K_enc_gen fails. As the predetermined error process, the second key distribution unit 123 may retransmit the key update request message of the key with the update failure among the key update request messages transmitted in step S303. In addition, the second key distribution unit 123 may execute a predetermined error process if any update completion message is not received even after a predetermined time has elapsed since the transmission of each key update request message in step S303. . As the predetermined error processing, the second key distribution unit 123 may retransmit the key update request message of the key that does not receive the update completion message among the key update request messages transmitted in step S303.
  • control may be performed so that the process proceeds to step S407 after the MEK key, MAC key, and ENC key have been successfully updated for all ECUs 11020 to be distributed.
  • Step S407 The control unit 121 of the data security device 11010 requests the HSM 11012 to update the key.
  • the HSM 11012 executes steps S408 and S409 in response to a key update request from the control unit 121.
  • the key update unit 135 of the HSM 11012 updates the storage unit 11013 from the MEK key K_mek_oem, the MAC key K_mac_oem, and the ENC key K_enc_oem to the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen. Accordingly, the MEK key stored in the storage unit 11013 is updated from the MEK key K_mek_oem to the MEK key K_mek_gen. Also, the MAC key stored in the storage unit 11013 is updated from the MAC key K_mac_oem to the MAC key K_mac_gen. Also, the ENC key stored in the storage unit 11013 is updated from the ENC key K_enc_oem to the ENC key K_enc_gen.
  • the key update unit 135 of the HSM 11012 similarly to the key update of the SHE 11022 in step S105, performs a key update request message MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), and MES_K_enc_oem (K_enc_gen and parameters included in the M_2 parameter, M1).
  • the registration may be updated using the M3 parameter and the MEK key K_mek_oem, MAC key K_mac_oem, and ENC key K_enc_oem stored in the storage unit 11013.
  • the key update unit 135 updates the storage unit 11013 from the MEK key K_mek_oem, the MAC key K_mac_oem, and the ENC key K_enc_oem to the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen.
  • the key update request message MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), and MES_K_enc_oem (K_enc_gen) may be passed from the control unit 121 to the HSM 11012, or may be stored in the storage unit 11013 of the HSM 11012.
  • Step S409 When the update of each key in the storage unit 11013 is completed, the HSM 11012 responds to the control unit 121 with the completion of the key update.
  • the MEK key K_mek_oem, the MAC key K_mac_oem, and the ENC key K_enc_oem common to the automobile 11001 are stored in advance for each ECU 11020 mounted on the same automobile 11001.
  • a key update request message (first key update request message) for each key (first key) is generated from the master key Master_Secret and the common key, and the key update request message is commonly used by the ECUs 11020.
  • the key of each ECU 11020 can be updated. As a result, an effect of improving the efficiency of key distribution applied to the ECU 11020 can be obtained.
  • the key update request message can be transmitted simultaneously to each ECU 11020 connected to the CAN 11030 by broadcast of the CAN 11030, so that the time required for key distribution can be shortened.
  • the processing efficiency can be improved as compared with the case where the key generation device 110 is provided separately from the data security device 11010.
  • FIG. 13 is a sequence chart illustrating an eighth example of the distribution method according to the first embodiment.
  • the same reference numerals are given to the portions corresponding to the steps in FIGS.
  • the data security device 11010 shown in FIG. 11 is applied.
  • the HSM 11012 of the data security device 11010 stores the master key Master_Secret and the MEK key K_mek_oem in the storage unit 11013 in advance.
  • the data security device 11010 and each ECU 11020 mounted on a certain automobile 11001 store the same MEK key K_mek_oem in advance, as in the delivery method example 4.
  • ECU 11020 stores the key in storage unit 11023 of SHE 11022.
  • the MEK key K_mek_oem is a key stored in advance in the data security device 11010 and the ECU 11020, and is a common initial key for the automobile 11001.
  • the communication method between the data security device 11010 and the ECU 11020 is the same as that of the delivery method example 3.
  • steps S401, S402 and S403 are executed. Steps S401, S402, and S403 are the same as those in Example 7 of the distribution method.
  • the MEK key K_mek_gen corresponds to the first key
  • the MAC key K_mac_gen and the ENC key K_enc_gen correspond to the second key.
  • the distribution processing unit 136 of the HSM 11012 generates a key update processing message.
  • the key update process message includes a key update request message MES_K_mek_oem (K_mek_gen) of the MEK key K_mek_gen, a key update request message MES_K_mek_gen (K_mac_gen) of the MAC key K_mac_gen, and a key update request message mecgen_Ken_Ken_en_en.
  • K_mek_gen key update request message MES_K_mek_gen
  • K_mac_gen key update request message
  • Each key update request message is the same as Example 2 of the distribution method.
  • the M4 parameter and M5 parameter to be compared are the same as those in the delivery method example 1.
  • the key update request message MES_K_mek_oem corresponds to the first key update request message.
  • the key update request messages MES_K_mek_gen (K_mac_gen) and MES_K_mek_gen (K_enc_gen) correspond to the second key update request message.
  • the M4 parameter and the M5 parameter to be compared with the MEK key K_mek_gen correspond to the first verification data.
  • the M4 parameter and the M5 parameter to be compared with the MAC key K_mac_gen correspond to the second verification data.
  • the M4 parameter and M5 parameter to be compared with the ENC key K_enc_gen correspond to the second verification data.
  • Step S405a The HSM 11012 sends a key update processing message to the control unit 121.
  • the control unit 121 stores the key update processing message in the storage unit 122.
  • Step S303a, Step S105a, Step S106a, and Step S304a are executed.
  • Steps S105a and S106a are the same as those in the delivery method example 2.
  • Steps S303a and S304a are the same as those in the delivery method example 6.
  • the second key distribution unit 123 acquires the key update request message MES_K_mek_oem (K_mek_gen) included in the key update processing message from the storage unit 122.
  • the update completion message of the MEK key K_mek_gen corresponds to the first update completion message.
  • Step S406a The second key distribution unit 123 of the data security device 11010 receives the update completion message for the MEK key K_mek_gen received from the ECU 11020, and the M4 parameter to be compared with the MEK key K_mek_gen included in the key update processing message received from the HSM 11012. And verify using the M5 parameter.
  • the key update processing message received from the HSM 11012 is stored in the storage unit 122.
  • the verification method of the update completion message is the same as that in step S205 of the delivery method example 3.
  • the second key distribution unit 123 may execute a predetermined error process when the update of the MEK key K_mek_gen is unsuccessful. The second key distribution unit 123 may retransmit the key update request message transmitted in step S303a as the predetermined error process. In addition, the second key distribution unit 123 may execute a predetermined error process when the update completion message is not received even after a predetermined time has elapsed since the transmission of the key update request message in step S303a. The second key distribution unit 123 may retransmit the key update request message transmitted in step S303a as the predetermined error process.
  • control may be performed so that the processing proceeds to step S407a after the MEK key has been successfully updated for all the ECUs 11020 to be distributed.
  • Step S407a The control unit 121 of the data security device 11010 makes a first key update request to the HSM 11012.
  • the HSM 11012 executes Steps S408a and S409a in response to the first key update request from the control unit 121.
  • Step S408a The key update unit 135 of the HSM 11012 updates the registration from the MEK key K_mek_oem to the MEK key K_mek_gen to the storage unit 11013. Accordingly, the MEK key stored in the storage unit 11013 is updated from the MEK key K_mek_oem to the MEK key K_mek_gen.
  • the key update unit 135 of the HSM 11012 is stored in the storage unit 11013 in the same manner as the key update of the SHE 11022 in step S105a, the M1 parameter, the M2 parameter, and the M3 parameter included in the key update request message MES_K_mek_oem (K_mek_gen).
  • the registration from the MEK key K_mek_oem to the MEK key K_mek_gen may be updated in the storage unit 11013 using the MEK key K_mek_oem.
  • the key update request message MES_K_mek_oem (K_mek_gen) may be passed from the control unit 121 to the HSM 11012 or may be stored in the storage unit 11013 of the HSM 11012.
  • Step S409a When the update of the MEK key in the storage unit 11013 is completed, the HSM 11012 responds to the control unit 121 with the completion of the first key update.
  • Step S303b, Step S105b, Step S106b, and Step S304b are executed.
  • Steps S105b and S106b are the same as those in the delivery method example 2.
  • Steps S303b and S304b are the same as those in Example 6 of the distribution method.
  • the second key distribution unit 123 acquires the key update request message MES_K_mek_gen (K_mac_gen) and MES_K_mek_gen (K_enc_gen) included in the key update processing message from the storage unit 122.
  • each update completion message of the MAC key K_mac_gen and the ENC key K_enc_gen corresponds to a second update completion message.
  • Step S406b The second key distribution unit 123 of the data security device 11010 receives each update completion message of the MAC key K_mac_gen and ENC key K_enc_gen received from the ECU 11020, and the MAC key K_mac_gen included in the key update processing message received from the HSM 11012. Verification is performed using the M4 and M5 parameters to be compared, and the M4 and M5 parameters to be compared with the ENC key K_enc_gen.
  • the key update processing message received from the HSM 11012 is stored in the storage unit 122.
  • the method for verifying each update completion message is the same as that in step S205 of the delivery method example 3.
  • the second key distribution unit 123 of the data security device 11010 may execute a predetermined error process when the update of the MAC key K_mac_gen or the ENC key K_enc_gen is unsuccessful. As the predetermined error process, the second key distribution unit 123 may retransmit the key update request message of the key that has failed to update among the key update request messages transmitted in step S303b. In addition, the second key distribution unit 123 may execute a predetermined error process if any update completion message is not received even after a predetermined time has elapsed since the transmission of each key update request message in step S303b. . As the predetermined error process, the second key distribution unit 123 may retransmit the key update request message of the key that does not receive the update completion message among the key update request messages transmitted in step S303b.
  • control may be performed so that the process proceeds to step S407b after the MAC key and ENC key have been successfully updated for all the ECUs 11020 to be distributed.
  • Step S407b The control unit 121 of the data security device 11010 makes a second key update request to the HSM 11012.
  • the HSM 11012 executes steps S408b and S409b in response to the second key update request from the control unit 121.
  • Step S408b The key update unit 135 of the HSM 11012 registers the MAC key K_mac_gen in the storage unit 11013. As a result, the MAC key K_mac_gen is stored in the storage unit 11013. In addition, the key update unit 135 registers the ENC key K_enc_gen in the storage unit 11013. As a result, the ENC key K_enc_gen is stored in the storage unit 11013.
  • the key update unit 135 of the HSM 11012 stores the M1 parameter, the M2 parameter, and the M3 parameter included in the key update request messages MES_K_mek_gen (K_mac_gen) and MES_K_mek_gen (K_enc_gen), respectively, similarly to the key update of the SHE 11022 in step S105b. Registration may be updated using the MEK key K_mek_gen stored in the unit 11013.
  • the key update unit 135 updates the registration from the MAC key K_mac_oem and the ENC key K_enc_oem to the MAC key K_mac_gen and the ENC key K_enc_gen to the storage unit 11013.
  • the key update request messages MES_K_mek_gen (K_mac_gen) and MES_K_mek_gen (K_enc_gen) may be passed from the control unit 121 to the HSM 11012, or may be stored in the storage unit 11013 of the HSM 11012.
  • Step S409b When the registration of the MAC key and ENC key in the storage unit 11013 is completed, the HSM 11012 responds to the control unit 121 with the completion of the second key update.
  • the MEK key K_mek_oem common to the automobile 11001 is stored in advance for each ECU 11020 mounted in the same automobile 11001.
  • a key update request message (first key update request message) of the MEK key K_mek_gen (first key) is generated from the master key Master_Secret and the common key, and the key update request message is shared by the ECUs 11020.
  • the MEK key of each ECU 11020 can be updated by using it.
  • each key update request message (second key update request message) of the MAC key K_mac_gen (second key) and the ENC key K_enc_gen (second key) is generated, It is possible to update the MAC key and ENC key of each ECU 11020 by using the key update request message in common to each ECU 11020. As a result, an effect of improving the efficiency of key distribution applied to the ECU 11020 can be obtained.
  • the MEK key K_mek_oem is the only common initial key for the automobile 11001 stored in advance in the ECU 11020. As a result, for example, an effect is obtained that can contribute to simplification of the initial key writing process of the ECU 11020 in the manufacturing factory of the ECU 11020.
  • the key update request message can be transmitted simultaneously to each ECU 11020 connected to the CAN 11030 by broadcast of the CAN 11030, so that the time required for key distribution can be shortened.
  • the processing efficiency can be improved as compared with the case where the key generation device 110 is provided separately from the data security device 11010.
  • FIG. 14 is a diagram illustrating a configuration example of a distribution system and an automobile 21001 according to the second embodiment.
  • an ECU electronic control unit mounted on an automobile 21001 will be described as an example of an in-vehicle computer.
  • the automobile 21001 includes a data security device 21010 and a plurality of ECUs 21020.
  • the data security device 21010 and the plurality of ECUs 21020 are as described as the data security device 11010 and the plurality of ECUs 11020 in the first embodiment. Note that any ECU mounted on the automobile 21001 may function as the data security device 21010.
  • the data security device 21010 and the plurality of ECUs 21020 are connected to a CAN 21030 provided in the automobile 21001.
  • the CAN 21030 is as described as the CAN 11030 in the first embodiment.
  • the data security device 21010 exchanges data with each ECU 21020 via the CAN 21030.
  • ECU 21020 exchanges data with other ECU 21020 via CAN 21030.
  • a communication network other than CAN is provided in the automobile 21001 as a communication network mounted on the vehicle, and the data security device 21010 and the ECU 21020 are connected via the communication network other than CAN.
  • the exchange of data and the exchange of data between the ECUs 21020 may be performed.
  • the LIN may be provided in the automobile 21001.
  • the automobile 21001 may include CAN and LIN.
  • the automobile 21001 may include an ECU 21020 connected to the LIN.
  • the data security device 21010 may be connected to CAN and LIN.
  • the data security device 21010 exchanges data with the ECU 21020 connected to the CAN via the CAN, and exchanges data with the ECU 21020 connected to the LIN via the LIN. Also good. Further, the ECUs 21020 may exchange data via the LIN.
  • the in-vehicle computer system 21002 provided in the automobile 21001 is configured by connecting a data security device 21010 and a plurality of ECUs 21020 to a CAN 21030.
  • the in-vehicle computer system 21002 functions as an in-vehicle control system for the automobile 21001.
  • the data security device 21010 monitors communication between the inside and outside of the in-vehicle computer system 21002.
  • the data security device 21010 is connected to an infotainment device 21040 and a diagnostic port 21060 as an example of a device external to the in-vehicle computer system 21002.
  • the ECU 21020 communicates with a device external to the in-vehicle computer system 21002 via the data security device 21010.
  • the CAN 21030 may include a plurality of buses (communication lines), and the plurality of buses may be connected to the data security device 21010.
  • the plurality of buses may be connected to the data security device 21010.
  • one ECU 21020 or a plurality of ECUs 21020 is connected to one bus.
  • the automobile 21001 has a diagnostic port 21060.
  • the diagnosis port 21060 is as described as the diagnosis port 11060 in the first embodiment.
  • the data security device 21010 and a device connected to the diagnostic port 21060, for example, the maintenance tool 22100 exchange data via the diagnostic port 21060.
  • the maintenance tool 22100 may have a function of a conventional diagnostic terminal connected to the OBD port.
  • the automobile 21001 includes an infotainment device 21040.
  • the infotainment device 21040 is as described for the infotainment device 11040 in the first embodiment.
  • the infotainment device 21040 is generally referred to as an in-vehicle infotainment (IVI) system.
  • the infotainment device 21040 may include a communication module including a SIM.
  • the SIM has information for using the wireless communication network.
  • the communication module can perform wireless communication by connecting to the wireless communication network by using its own SIM.
  • the infotainment device 21040 may communicate with a device outside the automobile 21001 using its own communication module. Further, the data security device 21010 may communicate with a device outside the automobile 21001 via a communication module of the infotainment device 21040.
  • the automobile 21001 may be provided with a TCU.
  • the TCU is a communication device.
  • the TCU includes a communication module including a SIM.
  • the TCU may communicate with a device outside the automobile 21001 using its own communication module.
  • the data security device 21010 may communicate with a device outside the automobile 21001 via a communication module of the TCU of the automobile 21001.
  • the data security device 21010 may include a communication module including a SIM.
  • the data security device 21010 may communicate with a device outside the automobile 21001 using its own communication module.
  • eSIM may be used as the SIM.
  • SIM and eSIM are examples of secure elements.
  • SIM and eSIM have tamper resistance.
  • the data security device 21010 includes a main computing unit 21011 and a SHE 21022a.
  • the main computing unit 21011 executes a computer program for realizing the functions of the data security device 21010.
  • the SHE 21022a has a cryptographic processing function and the like.
  • SHE21022a has tamper resistance.
  • SHE 21022a is an example of a secure element.
  • the SHE 21022a includes a storage unit 21023a that stores data.
  • the main calculator 21011 uses the SHE 21022a. In addition, about SHE, it describes in the nonpatent literature 3, for example.
  • the ECU 21020 includes a main calculator 21021 and a SHE 21022.
  • the main computing unit 21021 executes a computer program for realizing the functions of the ECU 21020.
  • the SHE 21022 has a cryptographic processing function and the like.
  • SHE21022 has tamper resistance.
  • SHE 21022 is an example of a secure element.
  • the SHE 21022 includes a storage unit 21023 that stores data.
  • the main calculator 21021 uses SHE 21022.
  • FIG. 15 is a diagram illustrating a configuration example of the data security device 21010 according to the second embodiment.
  • the data security device 21010 includes a main computing unit 21011, a SHE 21022a, and an interface unit 220.
  • the main computing unit 21011 includes a control unit 221, a storage unit 222, a key distribution unit 223, and a message generation unit 224.
  • the SHE 21022a includes a storage unit 21023a, an encryption processing unit 232, a CMAC processing unit 234, and a key update unit 235.
  • the interface unit 220 transmits / receives data to / from an external device of the own data security device 21010.
  • the interface unit 220 includes an interface that transmits / receives data via the CAN 21030, an interface that transmits / receives data to / from the infotainment device 21040, and an interface that transmits / receives data via the diagnostic port 21060.
  • the main computing unit 21011 transmits and receives data to and from devices other than the data security device 21010 via the interface unit 220.
  • the control unit 221 controls the data security device 21010.
  • the storage unit 222 stores data.
  • the key distribution unit 223 performs processing related to key distribution.
  • the message generator 224 generates a message related to key distribution.
  • the storage unit 21023a stores data.
  • the encryption processing unit 232 performs data encryption and decryption of the encrypted data.
  • the CMAC processing unit 234 generates and verifies CMAC.
  • the key update unit 235 performs processing related to key update.
  • FIG. 16 is a diagram illustrating a configuration example of the ECU 21020 according to the second embodiment.
  • the ECU 21020 includes a main calculator 21021, a SHE 21022, and an interface unit 240.
  • the main computing unit 21021 includes a control unit 241 and a storage unit 242.
  • the SHE 21022 includes a storage unit 21023, an encryption processing unit 252, a CMAC processing unit 254, and a key update unit 255.
  • the interface unit 240 transmits / receives data to / from an external device of the own ECU 21020.
  • the interface unit 240 includes an interface that transmits and receives data via the CAN 21030.
  • the main computing unit 21021 transmits and receives data to and from devices other than the ECU 21020 via the interface unit 240.
  • the control unit 241 controls the ECU 21020.
  • the storage unit 242 stores data.
  • the storage unit 21023 stores data.
  • the encryption processing unit 252 performs data encryption and decryption of the encrypted data.
  • the CMAC processing unit 254 generates and verifies CMAC.
  • the key update unit 255 performs processing related to key update.
  • the vehicle correspondence identifier is an identifier corresponding to the automobile 21001. Note that the vehicle correspondence identifier according to the second embodiment may be used as the vehicle identification number in the first embodiment.
  • the vehicle correspondence identifier is configured using the vehicle identification number (VIN) of the automobile 21001.
  • the vehicle-corresponding identifier may be a vehicle identification number, or may be information composed of a vehicle identification number and other information.
  • the vehicle identification number (VIN) is described in Non-Patent Document 2, for example.
  • the vehicle correspondence identifier is configured using an IMSI (International Mobile Subscriber Identity) or ICCID (Integrated Circuit Card ID) stored in a SIM mounted on the automobile 21001.
  • the vehicle correspondence identifier may be IMSI, or may be information configured by IMSI and other information.
  • the vehicle correspondence identifier may be ICCID, or may be information composed of ICCID and other information.
  • the vehicle correspondence identifier may be information including a plurality of IMSI, ICCID, and vehicle identification number.
  • the vehicle correspondence identifier is configured using identification information (in-vehicle device identification information) of a device (in-vehicle device) mounted on the automobile 21001.
  • In-vehicle device identification information used for the vehicle-compatible identifier includes, for example, identification information of infotainment device 21040, identification information of data security device 21010, identification information of communication module, identification information of TCU, etc. Can be applied.
  • compatible identifier may be comprised using one or several vehicle equipment identification information among the vehicle equipment identification information of each of these vehicle equipment.
  • the vehicle-corresponding identifier may be in-vehicle device identification information, or may be information composed of the in-vehicle device identification information and other information.
  • the vehicle correspondence identifier may be information including one or more of IMSI, ICCID, and vehicle identification number, and in-vehicle device identification information.
  • Example of key generation method An example of a key generation method according to the second embodiment will be described. Also in the second embodiment, three types of keys, MEK key, MAC key, and ENC key, will be described as examples of keys. The MEK key, MAC key, and ENC key are as described in the first embodiment.
  • a common key is generated using a predetermined key generation function.
  • An example of the key generation function will be described below.
  • CMAC is generated as a common key.
  • CMAC is a kind of message authentication code.
  • Common key CMAC (Master_Secret; V_ID, Key_ID (Nk))
  • Master_Secret is a master key.
  • V_ID is a vehicle correspondence identifier.
  • Key_ID (Nk) is a key type identifier.
  • Nk is a variable representing the type of key.
  • the key “A” is a key (message authentication code generation key) used to generate CMAC
  • data “B” is data to be generated by CMAC (message authentication code generation target information). It is.
  • the common key is “CMAC of message authentication code generation target information B (ie, data“ B ”)” generated using the message authentication code generation key A (ie, key “A”). It is.
  • CMAC Master_Secret; V_ID, Key_ID (Nk)
  • the master key Master_Secret is a message authentication code generation key (key “A”)
  • the concatenated data between the vehicle correspondence identifier V_ID and the key type identifier Key_ID (Nk) is message authentication.
  • This is code generation target information (data “B”).
  • the common key is “CMAC of the concatenated data of the vehicle correspondence identifier V_ID and the key type identifier Key_ID (Nk)” generated using the master key Master_Secret.
  • the CMAC is different.
  • the key type identifier Key_ID (Nk)
  • different common keys can be generated from the combination of the same master key Master_Secret and the vehicle corresponding identifier V_ID.
  • the key type identifier of the MEK key is Key_ID (mek)
  • the key type identifier of the MAC key is Key_ID (mac)
  • the key type identifier of the ENC key is Key_ID (enc).
  • a vehicle identification number is used as an example of a vehicle correspondence identifier.
  • the vehicle correspondence identifier of the automobile 21001 is the vehicle identification number VIN of the automobile 21001.
  • FIG. 17 is a sequence chart illustrating a ninth example of the distribution method according to the second embodiment.
  • the SHE 21022a of the data security device 21010 stores the master key Master_Secret in the storage unit 21023a in advance.
  • the master key Master_Secret is stored in the storage unit 21023a, for example, at the manufacturing plant of the SHE 21022a, the manufacturing plant of the data security device 21010, or the manufacturing plant of the automobile 21001.
  • the data security device 21010 and each ECU 21020 mounted on a certain automobile 21001 store the same MEK key K_mek_oem, MAC key K_mac_oem, and ENC key K_enc_oem in advance.
  • the data security device 21010 stores the MEK key K_mek_oem, the MAC key K_mac_oem, and the ENC key K_enc_oem in the storage unit 222 of the main computing unit 21011.
  • the ECU 21020 stores the MEK key K_mek_oem, the MAC key K_mac_oem, and the ENC key K_enc_oem in the storage unit 21023 of the SHE 21022.
  • the data security device 21010 and the ECU 21020 store the MEK key K_mek_oem, the MAC key K_mac_oem, and the ENC key K_enc_oem at the manufacturing factory or the manufacturing factory of the automobile 21001, for example.
  • the same MEK key K_mek_oem, MAC key K_mac_oem, and ENC key K_enc_oem may be used for each automobile 21001 manufactured by the same automobile manufacturer.
  • the same MEK key K_mek_oem, MAC key K_mac_oem, and ENC key K_enc_oem may be used for each ECU 21020 manufactured by the same ECU manufacturing company.
  • the MEK key K_mek_oem, the MAC key K_mac_oem, and the ENC key K_enc_oem may be changed at a constant cycle.
  • the MEK key K_mek_oem, the MAC key K_mac_oem, and the ENC key K_enc_oem are keys stored in advance in the data security device 21010 and the ECU 21020, and are common initial keys of the automobile 21001.
  • the data security device 21010 communicates with the ECU 21020 via the CAN 21030.
  • Step S1101 The control unit 221 of the main computing unit 21011 of the data security device 21010 acquires the vehicle identification number VIN of the automobile 21001 on which the own data security device 21010 is mounted.
  • the vehicle identification number VIN of the automobile 21001 may be stored in the data security device 21010 in advance, or may be stored in the data security device 21010 when a request for distributing a key is made to the ECU 21020.
  • the ECU 21020 having the engine control function of the automobile 21001 stores the vehicle identification number VIN of the automobile 21001
  • the ECU 21020 notifies the data security device 21010 of the vehicle identification number VIN of the automobile 21001 after the ECU 21020 is activated. May be.
  • the activation time of ECU 21020 having an engine control function is often longer than the activation times of other ECUs 21020. For this reason, when the ECU 21020 having the engine control function is activated and notifies the data security device 21010 of the vehicle identification number VIN, many other ECUs 21020 have already been activated.
  • the key delivery from the data security device 21010 to the plurality of ECUs 21020 increases the success probability of the key delivery. This is preferable. For example, after the ECU 21020 having the engine control function notifies the data security device 21010 of the vehicle identification number VIN after the activation, the key is distributed from the data security device 21010 to all the ECUs 21020 to be distributed by the broadcast of the CAN 21030. Also good.
  • the vehicle identification number VIN managed by the automobile manufacturing company of the automobile 21001 may be supplied to the data security device 21010 of the automobile 21001.
  • the automobile manufacturing company of the automobile 21001 may be provided with a database of the vehicle identification number VIN, and the vehicle identification number VIN may be transmitted to the automobile 21001 by communication from the database and supplied to the data security device 21010.
  • Step S1102 The control unit 221 of the main computing unit 21011 of the data security device 21010 notifies the vehicle identification number VIN of the automobile 21001 to the SHE 21022a and requests generation of CMAC.
  • the control unit 221 CMAC (Master_Secret; VIN, Key_ID (mek)), CMAC (Master_Secret; VIN, Key_ID (mac)), CMAC (Master_Secret; VIN, Key_ID (enc)), Request the generation of three CMACs.
  • CMAC Master_Secret; VIN, Key_ID (mek)
  • Master_Secret messages authentication code generation key
  • Concatenated data (message authentication) between the vehicle correspondence identifier V_ID and the key type identifier Key_ID (mek) CMAC ”of the code generation target information).
  • CMAC (Master_Secret; VIN, Key_ID (mac)) is generated by using a master key Master_Secret (message authentication code generation key).
  • Consage authentication between vehicle-specific identifier V_ID and key type identifier Key_ID (mac)) CMAC CMAC ”of the code generation target information).
  • CMAC Master_Secret; VIN, Key_ID (enc)
  • Master_Secret messages authentication code generation key
  • CMAC Cost authentication target information
  • Step S1103 The CMAC processing unit 234 of the SHE 21022a of the data security device 21010 generates a CMAC in response to a CMAC generation request from the control unit 221 of the main computing unit 21011.
  • Step S1104 The SHE 21022a of the data security device 21010 sends the CMAC generated by the CMAC processing unit 234 to the main computing unit 21011.
  • the main computing unit 21011 includes CMAC (Master_Secret; VIN, Key_ID (mek)), CMAC (Master_Secret; VIN, Key_ID (mac)), and CMAC (Master_Secret; VIN, Key_ID (enc)). Get CMACs.
  • the storage unit 222 stores CMAC (Master_Secret; VIN, Key_ID (mek)) as the MEK key K_mek_gen.
  • the storage unit 222 stores CMAC (Master_Secret; VIN, Key_ID (mac)) as a MAC key K_mac_gen.
  • the storage unit 222 stores CMAC (Master_Secret; VIN, Key_ID (enc)) as the ENC key K_enc_gen.
  • Step S1105) The message generator 224 of the main computing unit 21011 of the data security device 21010 generates a key update process message.
  • the message generation unit 224 CMAC (Master_Secret; VIN, Key_ID (mek)) is used as the MEK key K_mek_gen, CMAC (Master_Secret; VIN, Key_ID (mac)) is used as the MAC key K_mac_gen, CMAC (Master_Secret; VIN, Key_ID (enc)) is used as the ENC key K_enc_gen.
  • the key update processing message includes the key update request messages MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen) and MES_K_mek_Meg_MegK A parameter, an M4 parameter and an M5 parameter to be compared with the MAC key K_mac_gen, and an M4 parameter and an M5 parameter to be compared with the ENC key K_enc_gen.
  • the key update request message includes an M1 parameter, an M2 parameter, and an M3 parameter, which are parameters used for registering the SHE key.
  • the M1 parameter, the M2 parameter, and the M3 parameter are described in Non-Patent Document 3, for example.
  • the key K_AuthID is used to generate the M2 parameter and the M3 parameter.
  • the key K_AuthID related to the key update request message MES_K_mek_oem (K_mek_gen) of the MEK key K_mek_gen is the MEK key K_mek_oem.
  • the key K_AuthID related to the key update request message MES_K_mac_oem (K_mac_gen) of the MAC key K_mac_gen is the MAC key K_mac_oem.
  • the key K_AuthID related to the key update request message MES_K_enc_oem (K_enc_gen) of the ENC key K_enc_gen is the ENC key K_enc_oem.
  • the message generation unit 224 generates an M1 parameter, an M2 parameter, and an M3 parameter used for registration of the MEK key K_mek_gen.
  • the MEK key K_mek_oem and the MEK key K_mek_gen stored in the storage unit 222 are used.
  • the message generation unit 224 includes the M1 parameter, the M2 parameter, and the M3 parameter used for registration of the MEK key K_mek_gen in the key update request message MES_K_mek_oem (K_mek_gen).
  • the message generation unit 224 generates an M1 parameter, an M2 parameter, and an M3 parameter that are used for registering the MAC key K_mac_gen.
  • the MAC key K_mac_oem and the MAC key K_mac_gen stored in the storage unit 222 are used.
  • the message generation unit 224 includes the M1 parameter, the M2 parameter, and the M3 parameter used for registration of the MAC key K_mac_gen in the key update request message MES_K_mac_oem (K_mac_gen).
  • the message generation unit 224 generates an M1 parameter, an M2 parameter, and an M3 parameter used for registration of the ENC key K_enc_gen.
  • the ENC key K_enc_oem and the ENC key K_enc_gen stored in the storage unit 222 are used.
  • the message generation unit 224 includes the M1 parameter, the M2 parameter, and the M3 parameter used for registration of the ENC key K_enc_gen in the key update request message MES_K_enc_oem (K_enc_gen).
  • the message generation unit 224 uses the MEK key K_mek_gen to generate an M4 parameter and an M5 parameter to be compared with the MEK key K_mek_gen.
  • the message generation unit 224 uses the MAC key K_mac_gen to generate an M4 parameter and an M5 parameter to be compared with the MAC key K_mac_gen.
  • the message generator 224 uses the ENC key K_enc_gen to generate an M4 parameter and an M5 parameter to be compared with the ENC key K_enc_gen.
  • the storage unit 222 stores the key update processing message generated by the message generation unit 224.
  • Example 9 of the distribution method the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen correspond to the first key.
  • the key update request message MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), and MES_K_enc_oem (K_enc_gen) correspond to the first key update request message.
  • Example 9 of the distribution method the comparison target M4 parameter and M5 parameter of the MEK key K_mek_gen correspond to the first verification data
  • the comparison target M4 parameter and M5 parameter of the MAC key K_mac_gen corresponds to the first verification data
  • ENC The M4 parameter and the M5 parameter to be compared with the key K_enc_gen correspond to the first verification data.
  • Step S1106 The key distribution unit 223 of the main computing unit 21011 of the data security device 21010 transmits the key update request message MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), and MES_K_enc_oem (K_enc_gen) to the interface unit 220 by the ECU 220.
  • Key update request messages MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), and MES_K_enc_oem (K_enc_gen) are common to each ECU 21020 of the automobile 21001.
  • a key update request message transmission method As an example of a key update request message transmission method, a key update request message MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), and MES_K_enc_oem (K_enc_gen) may be transmitted by broadcasting of CAN 21030.
  • a key distribution CAN identifier (key distribution CANID) is set.
  • the key distribution CANID is a different value for each of the data security device 21010 and the ECU 21020.
  • the CAN identifier is an identifier for identifying a transmission source device.
  • the data security device 21010 transmits the key update request message MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), and MES_K_enc_oem (K_enc_gen) to the CAN 21030, the data security device 21010 receives the data of the key security request device 10 The CANID for key distribution is attached.
  • the key update request messages MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), and MES_K_enc_oem (K_enc_gen) are identified and received by each ECU 21020 by the key distribution CANID of the data security device 21010.
  • the key update request messages MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), and MES_K_enc_oem (K_enc_gen) can be transmitted to the ECUs 21020 connected to the CAN 21030 all at once.
  • the above is the description of an example of the transmission method of the key update request message.
  • Step S1107 The control unit 241 of the ECU 21020 receives the key update request message MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), and MES_K_enc_oem (K_enc_gen) through the interface unit 240.
  • MES_K_mek_oem K_mek_gen
  • MES_K_mac_oem K_mac_gen
  • MES_K_enc_oem K_enc_gen
  • the control unit 241 passes the M1 parameter, the M2 parameter, and the M3 parameter included in the key update request message MES_K_mek_oem (K_mek_gen) to the SHE 21022 to request a key update.
  • the key update unit 255 of the SHE 21022 registers the MEK key K_mek_gen using the M1 parameter, the M2 parameter, the M3 parameter, and the MEK key K_mek_oem stored in the storage unit 21023. Accordingly, the MEK key stored in the storage unit 21023 is updated from the MEK key K_mek_oem to the MEK key K_mek_gen.
  • the control unit 241 passes the M1 parameter, the M2 parameter, and the M3 parameter included in the key update request message MES_K_mac_oem (K_mac_gen) to the SHE 21022 and requests a key update.
  • the key update unit 255 of the SHE 21022 registers the MAC key K_mac_gen using the M1 parameter, the M2 parameter, the M3 parameter, and the MAC key K_mac_oem stored in the storage unit 21023. As a result, the MAC key stored in the storage unit 21023 is updated from the MAC key K_mac_oem to the MAC key K_mac_gen.
  • the control unit 241 passes the M1 parameter, the M2 parameter, and the M3 parameter included in the key update request message MES_K_enc_oem (K_enc_gen) to the SHE 21022 and requests a key update.
  • the key update unit 255 of the SHE 21022 registers the ENC key K_enc_gen using the M1 parameter, the M2 parameter, the M3 parameter, and the ENC key K_enc_oem stored in the storage unit 21023. As a result, the ENC key stored in the storage unit 21023 is updated from the ENC key K_enc_oem to the ENC key K_enc_gen.
  • Step S1108 The control unit 241 of the ECU 21020 generates update completion messages for the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen.
  • each update completion message of the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen corresponds to the first update completion message.
  • the update completion message includes an M4 parameter and an M5 parameter, which are parameters used for SHE key verification.
  • the M4 parameter and the M5 parameter are described in Non-Patent Document 3, for example.
  • the key update unit 255 of the SHE 21022 uses the MEK key K_mek_gen to generate the M4 parameter and the M5 parameter of the MEK key K_mek_gen.
  • the SHE 21022 passes the M4 parameter and M5 parameter of the MEK key K_mek_gen to the control unit 241.
  • the control unit 241 includes the M4 parameter and the M5 parameter of the MEK key K_mek_gen in the update completion message of the MEK key K_mek_gen.
  • the key update unit 255 of the SHE 21022 generates the M4 parameter and the M5 parameter of the MAC key K_mac_gen using the MAC key K_mac_gen.
  • the SHE 21022 passes the M4 parameter and the M5 parameter of the MAC key K_mac_gen to the control unit 241.
  • the control unit 241 includes the M4 parameter and the M5 parameter of the MAC key K_mac_gen in the update completion message of the MAC key K_mac_gen.
  • the key update unit 255 of the SHE 21022 generates the M4 parameter and the M5 parameter of the ENC key K_enc_gen using the ENC key K_enc_gen.
  • the SHE 21022 passes the M4 parameter and M5 parameter of the ENC key K_enc_gen to the control unit 241.
  • the control unit 241 includes the M4 parameter and the M5 parameter of the ENC key K_enc_gen in the update completion message of the ENC key K_enc_gen.
  • Step S1109) The control unit 241 of the ECU 21020 transmits the update completion messages of the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen to the data security device 21010 through the interface unit 240.
  • the control unit 221 of the data security device 21010 receives update completion messages for the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen from the ECU 21020 via the interface unit 220.
  • the control unit 241 of the ECU 21020 attaches the key distribution CANID of the own ECU 21020 to each update completion message of the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen. .
  • the update completion message transmitted from the ECU 21020 to the CAN 21030 is identified by the data security device 21010 by the key distribution CANID of the ECU 21020 and received.
  • Step S1110 The key distribution unit 223 of the main computing unit 21011 of the data security device 21010 receives each update completion message of the MEK key K_mek_gen, MAC key K_mac_gen, and ENC key K_enc_gen received from the ECU 21020, and performs a key update process in the storage unit 222. Verification is performed using the M4 and M5 parameters to be compared with the MEK key K_mek_gen included in the message, the M4 and M5 parameters to be compared with the MAC key K_mac_gen, and the M4 and M5 parameters to be compared with the ENC key K_enc_gen. .
  • the key distribution unit 223 acquires the M4 parameter and M5 parameter to be compared with the MEK key K_mek_gen from the storage unit 222.
  • the key distribution unit 223 compares the M4 parameter and M5 parameter included in the update completion message of the MEK key K_mek_gen with the M4 parameter and M5 parameter to be compared with the MEK key K_mek_gen, and determines whether or not they match. . If the result of this determination is that they match, the MEK key has been successfully updated. On the other hand, if the two do not match, the MEK key update has failed.
  • the key distribution unit 223 acquires the M4 parameter and the M5 parameter to be compared with the MAC key K_mac_gen from the storage unit 222.
  • the key distribution unit 223 compares the M4 parameter and M5 parameter included in the MAC key K_mac_gen update completion message with the M4 parameter and M5 parameter to be compared with the MAC key K_mac_gen, and determines whether or not they match. . If the result of this determination is that they match, the MAC key has been successfully updated. On the other hand, if the two do not match, the MAC key update has failed.
  • the key distribution unit 223 acquires from the storage unit 222 the M4 parameter and the M5 parameter to be compared with the ENC key K_enc_gen.
  • the key distribution unit 223 compares the M4 parameter and the M5 parameter included in the update completion message of the ENC key K_enc_gen with the M4 parameter and the M5 parameter to be compared with the ENC key K_enc_gen, and determines whether or not they match. . If the result of this determination is that they match, the ENC key has been successfully updated. On the other hand, if the two do not match, the ENC key update has failed.
  • the key distribution unit 223 may execute a predetermined error process when the update of the MEK key K_mek_gen, the MAC key K_mac_gen, or the ENC key K_enc_gen fails. As the predetermined error processing, the key distribution unit 223 may retransmit the key update request message of the key that has failed to update among the key update request messages transmitted in step S1106. In addition, the key distribution unit 223 may execute a predetermined error process when no update completion message is received even after a predetermined time has elapsed since the transmission of each key update request message in step S1106. As the predetermined error processing, the key distribution unit 223 may retransmit a key update request message of a key that does not receive an update completion message among the key update request messages transmitted in step S1106.
  • the common MEK key K_mek_oem, MAC key K_mac_oem, and ENC key K_enc_oem are stored in advance for each ECU 21020 mounted on the same automobile 21001.
  • a key update request message (first key update request message) for each key (first key) is generated from the master key Master_Secret and the common key, and the key update request message is commonly used by the ECUs 21020.
  • the key of each ECU 21020 can be updated. Thereby, the effect of improving the efficiency of key distribution applied to ECU 21020 is obtained.
  • the key update request message is simultaneously transmitted to each ECU 21020 connected to the CAN 21030 by broadcast of the CAN 21030, so that the time required for key distribution can be shortened.
  • the data security device 21010 can generate a key (first key) using the CMAC generation function of the SHE 21022a.
  • Example 9 of the distribution method the main arithmetic unit 21011 corresponds to the first arithmetic processing device, and the SHE 21022a corresponds to the second arithmetic processing device.
  • FIG. 18 is a sequence chart illustrating a tenth example of a distribution method according to the second embodiment.
  • portions corresponding to the respective steps in FIG. 17 are denoted with the same reference numerals.
  • the SHE 21022a of the data security device 21010 stores the master key Master_Secret in the storage unit 21023a in advance as in the case of the delivery method example 9.
  • the data security device 21010 and each ECU 21020 mounted in a certain automobile 21001 store the same MEK key K_mek_oem in advance.
  • the data security device 21010 stores the MEK key K_mek_oem in the storage unit 222 of the main computing unit 21011.
  • the ECU 21020 stores the MEK key K_mek_oem in the storage unit 21023 of the SHE 21022.
  • the MEK key K_mek_oem is stored in the manufacturing factory or the manufacturing factory of the automobile 21001.
  • the same MEK key K_mek_oem may be used for each automobile 21001 manufactured by the same automobile manufacturer.
  • the same MEK key K_mek_oem may be used for each ECU 21020 manufactured by the same ECU manufacturing company.
  • the MEK key K_mek_oem may be changed at a constant cycle.
  • the MEK key K_mek_oem is a key stored in advance in the data security device 21010 and the ECU 21020, and is a common initial key of the automobile 21001.
  • the communication method between the data security device 21010 and the ECU 21020 is the same as that of the delivery method example 9.
  • steps S1101, S1102, S1103 and S1104 are executed.
  • Steps S1101, S1102, S1103, and S1104 are the same as those in Example 9 of the distribution method.
  • the MEK key K_mek_gen corresponds to the first key
  • the MAC key K_mac_gen and the ENC key K_enc_gen correspond to the second key.
  • Step S1201a The message generator 224 of the main computing unit 21011 of the data security device 21010 generates a key update request message MES_K_mek_oem (K_mek_gen) of the MEK key K_mek_gen, and M4 and M5 parameters to be compared with the MEK key K_mek_gen. To do.
  • the key update request message and the comparison target M4 parameter and M5 parameter are the same as those in Example 9 of the distribution method.
  • the storage unit 222 stores the key update request message MES_K_mek_oem (K_mek_gen) of the MEK key K_mek_gen generated by the message generation unit 224, and the M4 parameter and M5 parameter to be compared with the MEK key K_mek_gen.
  • the key update request message MES_K_mek_oem corresponds to the first key update request message.
  • the M4 parameter and M5 parameter to be compared with the MEK key K_mek_gen correspond to the first verification data.
  • Step S1202a The key distribution unit 223 of the main computing unit 21011 of the data security device 21010 transmits a key update request message MES_K_mek_oem (K_mek_gen) to the ECU 21020 via the interface unit 220. That is, the key distribution unit 223 transmits a first key update request message to the ECU 21020.
  • Key update request message MES_K_mek_oem (K_mek_gen) is common to each ECU 21020 of automobile 21001.
  • the key update request message may be transmitted by broadcasting of CAN 21030.
  • Step S1203a The control unit 241 of the ECU 21020 receives the key update request message MES_K_mek_oem (K_mek_gen) through the interface unit 240.
  • the control unit 241 passes the M1 parameter, the M2 parameter, and the M3 parameter included in the key update request message MES_K_mek_oem (K_mek_gen) to the SHE 21022 to request a key update.
  • the key update unit 255 of the SHE 21022 registers the MEK key K_mek_gen using the M1 parameter, the M2 parameter, the M3 parameter, and the MEK key K_mek_oem stored in the storage unit 21023. Accordingly, the MEK key stored in the storage unit 21023 is updated from the MEK key K_mek_oem to the MEK key K_mek_gen.
  • Step S1204a The control unit 241 of the ECU 21020 generates an update completion message for the MEK key K_mek_gen.
  • the update completion message is the same as that in the delivery method example 9.
  • the update completion message of the MEK key K_mek_gen corresponds to the first update completion message.
  • Step S1205a The control unit 241 of the ECU 21020 transmits an update completion message of the MEK key K_mek_gen to the data security device 21010 through the interface unit 240. That is, the control unit 241 transmits a first update completion message to the data security device 21010.
  • the control unit 221 of the data security device 21010 receives an update completion message for the MEK key K_mek_gen from the ECU 21020 via the interface unit 220.
  • Step S1206a The key distribution unit 223 of the main computing unit 21011 of the data security device 21010 receives the update completion message of the MEK key K_mek_gen received from the ECU 21020, the M4 parameter and the M5 parameter to be compared with the MEK key K_mek_gen in the storage unit 222 Validate using The verification method of the update completion message is the same as that of the delivery method example 9.
  • the key distribution unit 223 may execute a predetermined error process when the update of the MEK key K_mek_gen is unsuccessful. The key distribution unit 223 may retransmit the key update request message transmitted in step S1202a as the predetermined error processing. In addition, the key distribution unit 223 may execute a predetermined error process when the update completion message is not received even after a predetermined time has elapsed after the transmission of the key update request message in step S1202a. The key distribution unit 223 may retransmit the key update request message transmitted in step S1202a as the predetermined error processing.
  • control may be performed so that the processing proceeds to step S1201b after the MEK key has been successfully updated for all the ECUs 21020 targeted for key distribution.
  • Step S1201b The message generation unit 224 of the main computing unit 21011 of the data security device 21010 compares the MAC key K_mac_gen and the ENC key K_enc_gen with each key update request message MES_K_mek_gen (K_mac_gen) and MES_K_mek_gen (K_enc_gen), and the target_gen.
  • M4 parameter and M5 parameter, and M4 parameter and M5 parameter to be compared with the ENC key K_enc_gen are generated.
  • the M4 parameter and M5 parameter to be compared are the same as those in the delivery method example 9.
  • the key update request message includes an M1 parameter, an M2 parameter, and an M3 parameter, which are parameters used for registering the SHE key.
  • the key K_AuthID is used to generate the M2 parameter and the M3 parameter.
  • the key K_AuthID related to the key update request message MES_K_mek_gen (K_mac_gen) of the MAC key K_mac_gen is the MEK key K_mek_gen.
  • the key K_AuthID related to the key update request message MES_K_mek_gen (K_enc_gen) of the ENC key K_enc_gen is the MEK key K_mek_gen.
  • the message generation unit 224 generates an M1 parameter, an M2 parameter, and an M3 parameter that are used for registering the MAC key K_mac_gen.
  • the MEK key K_mek_gen and the MAC key K_mac_gen stored in the storage unit 222 are used.
  • the message generation unit 224 includes the M1 parameter, the M2 parameter, and the M3 parameter used for registration of the MAC key K_mac_gen in the key update request message MES_K_mek_gen (K_mac_gen).
  • the message generation unit 224 generates an M1 parameter, an M2 parameter, and an M3 parameter used for registration of the ENC key K_enc_gen.
  • the MEK key K_mek_gen and the ENC key K_enc_gen stored in the storage unit 222 are used.
  • the message generation unit 224 includes the M1 parameter, the M2 parameter, and the M3 parameter used for registration of the ENC key K_enc_gen in the key update request message MES_K_mek_gen (K_enc_gen).
  • the storage unit 222 includes the M4 parameter, the M4 parameter to be compared with the MAC key K_mac_gen, the M4 parameter of the MAC key K_mac_gen, the MES_K_mek_gen (K_mac_gen), the M4 parameter to be compared with the MAC key K_mac_gen.
  • the M4 parameter and M5 parameter to be compared with the ENC key K_enc_gen are stored.
  • Example 10 of the distribution method the key update request messages MES_K_mek_gen (K_mac_gen) and MES_K_mek_gen (K_enc_gen) correspond to the second key update request message.
  • the M4 parameter and the M5 parameter to be compared with the MAC key K_mac_gen correspond to the second verification data.
  • the M4 parameter and the M5 parameter to be compared with the ENC key K_enc_gen correspond to the second verification data.
  • Step S1202b The key distribution unit 223 of the main computing unit 21011 of the data security device 21010 transmits a key update request message MES_K_mek_gen (K_mac_gen) and MES_K_mek_gen (K_enc_gen) to the ECU 21020. That is, the key distribution unit 223 transmits a second key update request message to the ECU 21020.
  • Key update request messages MES_K_mek_gen (K_mac_gen) and MES_K_mek_gen (K_enc_gen) are common to each ECU 21020 of automobile 21001.
  • the key update request message may be transmitted by broadcasting of CAN 21030.
  • Step S1203b The control unit 241 of the ECU 21020 receives the key update request message MES_K_mek_gen (K_mac_gen) and MES_K_mek_gen (K_enc_gen) through the interface unit 240.
  • the control unit 241 passes the M1 parameter, the M2 parameter, and the M3 parameter included in the key update request message MES_K_mek_gen (K_mac_gen) to the SHE 21022 and requests a key update.
  • the key update unit 255 of the SHE 21022 registers the MAC key K_mac_gen using the M1 parameter, the M2 parameter, the M3 parameter, and the MEK key K_mek_gen stored in the storage unit 21023. As a result, the MAC key K_mac_gen is stored in the storage unit 21023.
  • the control unit 241 passes the M1 parameter, the M2 parameter, and the M3 parameter included in the key update request message MES_K_mek_gen (K_enc_gen) to the SHE 21022 to request a key update.
  • the key update unit 255 of the SHE 21022 registers the ENC key K_enc_gen using the M1 parameter, the M2 parameter, the M3 parameter, and the MEK key K_mek_gen stored in the storage unit 21023. As a result, the ENC key K_enc_gen is stored in the storage unit 21023.
  • Step S1204b The control unit 241 of the ECU 21020 generates update completion messages for the MAC key K_mac_gen and the ENC key K_enc_gen.
  • the update completion message is the same as that in the delivery method example 9.
  • each update completion message of the MAC key K_mac_gen and the ENC key K_enc_gen corresponds to a second update completion message.
  • Step S1205b The control unit 241 of the ECU 21020 uses the interface unit 240 to transmit update completion messages for the MAC key K_mac_gen and the ENC key K_enc_gen to the data security device 21010. That is, the control unit 241 transmits a second update completion message to the data security device 21010.
  • the control unit 221 of the main computing unit 21011 of the data security device 21010 receives update completion messages for the MAC key K_mac_gen and the ENC key K_enc_gen from the ECU 21020 via the interface unit 220.
  • Step S1206b The key distribution unit 223 of the main arithmetic unit 21011 of the data security device 21010 receives the update completion message of the MAC key K_mac_gen received from the ECU 21020, the M4 parameter to be compared with the MAC key K_mac_gen in the storage unit 222, and M5 Validate using parameters.
  • the key distribution unit 223 verifies the update completion message of the ENC key K_enc_gen received from the ECU 21020 using the M4 parameter and the M5 parameter to be compared with the ENC key K_enc_gen in the storage unit 222.
  • the verification method of the update completion message is the same as that of the delivery method example 9.
  • the key distribution unit 223 of the main computing unit 21011 of the data security device 21010 may execute predetermined error processing when the update of the MAC key K_mac_gen or the ENC key K_enc_gen is unsuccessful. As the predetermined error processing, the key distribution unit 223 may retransmit the key update request message of the update failure key among the key update request messages transmitted in step S1202b. In addition, the key distribution unit 223 may execute a predetermined error process when no update completion message is received even after a predetermined time has elapsed since the transmission of each key update request message in step S1202b. As the predetermined error processing, the key distribution unit 223 may retransmit the key update request message of the key that does not receive the update completion message among the key update request messages transmitted in step S1202b.
  • the MEK key K_mek_oem common to the automobile 21001 is stored in advance for each ECU 21020 mounted in the same automobile 21001. Accordingly, a key update request message (first key update request message) of the MEK key K_mek_gen (first key) is generated from the master key Master_Secret and the common key, and the key update request message is shared by the ECUs 21020.
  • the MEK key of each ECU 21020 can be updated by using it.
  • each key update request message (second key update request message) of the MAC key K_mac_gen (second key) and the ENC key K_enc_gen (second key) is generated, It is possible to update the MAC key and ENC key of each ECU 21020 by using the key update request message in common to each ECU 21020. Thereby, the effect of improving the efficiency of key distribution applied to ECU 21020 is obtained.
  • the MEK key K_mek_oem is the only common initial key for the automobile 21001 stored in advance in the ECU 21020. As a result, for example, an effect is obtained that can contribute to simplification of the initial key writing process of the ECU 21020 in the manufacturing factory of the ECU 21020.
  • the key update request message is simultaneously transmitted to each ECU 21020 connected to the CAN 21030 by broadcast of the CAN 21030, so that the time required for key distribution can be shortened.
  • the data security device 21010 can generate keys (first key and second key) using the CMAC generation function of the SHE 21022a.
  • Example 10 of the distribution method the main arithmetic unit 21011 corresponds to the first arithmetic processing device, and the SHE 21022a corresponds to the second arithmetic processing device.
  • FIG. 19 is a sequence chart illustrating an example 11 of a distribution method according to the second embodiment.
  • portions corresponding to the respective steps in FIG. 17 are denoted with the same reference numerals.
  • the SHE 21022a of the data security device 21010 stores the master key Master_Secret in the storage unit 21023a in advance, as in the case of the delivery method example 9.
  • the data security device 21010 and each ECU 21020 mounted on a certain automobile 21001 store the same MEK key K_mek_oem, MAC key K_mac_oem, and ENC key K_enc_oem in advance.
  • the data security device 21010 stores the MEK key K_mek_oem, the MAC key K_mac_oem, and the ENC key K_enc_oem in the storage unit 21023a of the SHE 21022a.
  • the ECU 21020 stores the MEK key K_mek_oem, the MAC key K_mac_oem, and the ENC key K_enc_oem in the storage unit 21023 of the SHE 21022.
  • the data security device 21010 and the ECU 21020 store the MEK key K_mek_oem, the MAC key K_mac_oem, and the ENC key K_enc_oem at the manufacturing factory or the manufacturing factory of the automobile 21001, for example.
  • the same MEK key K_mek_oem, MAC key K_mac_oem, and ENC key K_enc_oem may be used for each automobile 21001 manufactured by the same automobile manufacturer.
  • the same MEK key K_mek_oem, MAC key K_mac_oem, and ENC key K_enc_oem may be used for each ECU 21020 manufactured by the same ECU manufacturing company.
  • the MEK key K_mek_oem, the MAC key K_mac_oem, and the ENC key K_enc_oem may be changed at a constant cycle.
  • the MEK key K_mek_oem, the MAC key K_mac_oem, and the ENC key K_enc_oem are keys stored in advance in the data security device 21010 and the ECU 21020, and are common initial keys of the automobile 21001.
  • the communication method between the data security device 21010 and the ECU 21020 is the same as that of the delivery method example 9.
  • steps S1101, S1102, S1103 and S1104 are executed.
  • Steps S1101, S1102, S1103, and S1104 are the same as those in Example 9 of the distribution method.
  • the MEK key K_mek_gen, the MAC key K_mac_gen, and the ENC key K_enc_gen correspond to the first key.
  • Step S1301 The message generation unit 224 of the main computing unit 21011 of the data security device 21010 executes message generation processing using the SHE 21022a. In this message generation process, a key update process message is generated.
  • a method for generating a key update processing message according to Example 11 of the distribution method will be described.
  • the message generation unit 224 uses CMAC (Master_Secret; VIN, Key_ID (mek)) as the MEK key K_mek_gen and uses CMAC (Master_Secret; VIN, Key_ID (mac)) as the MAC key K_mac_gen in the key update processing message generation processing.
  • CMAC Master_Secret; VIN, Key_ID (enc)
  • ENC ENC key K_enc_gen.
  • the key update processing message includes the key update request messages MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen) and MES_K_mek_Meg_MegK A parameter, an M4 parameter and an M5 parameter to be compared with the MAC key K_mac_gen, and an M4 parameter and an M5 parameter to be compared with the ENC key K_enc_gen.
  • the key update request message includes an M1 parameter, an M2 parameter, and an M3 parameter, which are parameters used for registering the SHE key.
  • the M1 parameter, the M2 parameter, and the M3 parameter are described in Non-Patent Document 3, for example.
  • the key K_AuthID is used to generate the M2 parameter and the M3 parameter.
  • the key K_AuthID related to the key update request message MES_K_mek_oem (K_mek_gen) of the MEK key K_mek_gen is the MEK key K_mek_oem.
  • the key K_AuthID related to the key update request message MES_K_mac_oem (K_mac_gen) of the MAC key K_mac_gen is the MAC key K_mac_oem.
  • the key K_AuthID related to the key update request message MES_K_enc_oem (K_enc_gen) of the ENC key K_enc_gen is the ENC key K_enc_oem.
  • the message generation unit 224 generates an M1 parameter, an M2 parameter, and an M3 parameter used for registration of the MEK key K_mek_gen.
  • the MEK key K_mek_oem and the MEK key K_mek_gen stored in the storage unit 222 are used.
  • the MEK key K_mek_oem is a key K_AuthID.
  • the MEK key K_mek_gen is a registration target key.
  • the message generation unit 224 includes the M1 parameter, the M2 parameter, and the M3 parameter used for registration of the MEK key K_mek_gen in the key update request message MES_K_mek_oem (K_mek_gen).
  • the message generation unit 224 generates an M1 parameter, an M2 parameter, and an M3 parameter that are used for registering the MAC key K_mac_gen.
  • the MAC key K_mac_oem and the MAC key K_mac_gen stored in the storage unit 222 are used.
  • the MAC key K_mac_oem is a key K_AuthID.
  • the MAC key K_mac_gen is a registration target key.
  • the message generation unit 224 includes the M1 parameter, the M2 parameter, and the M3 parameter used for registration of the MAC key K_mac_gen in the key update request message MES_K_mac_oem (K_mac_gen).
  • the message generation unit 224 generates an M1 parameter, an M2 parameter, and an M3 parameter used for registration of the ENC key K_enc_gen.
  • the ENC key K_enc_oem and the ENC key K_enc_gen stored in the storage unit 222 are used.
  • the ENC key K_enc_oem is a key K_AuthID.
  • the ENC key K_enc_gen is a registration target key.
  • the message generation unit 224 includes the M1 parameter, the M2 parameter, and the M3 parameter used for registration of the ENC key K_enc_gen in the key update request message MES_K_enc_oem (K_enc_gen).
  • the M1 parameter used for registering the key KID is plaintext data including key identification information AuthID indicating the key K_AuthID used for registering the key KID.
  • the M2 parameter used for registration of the key KID is information including the key KID that is the registration target key, and is encrypted data encrypted with the encryption key K1.
  • the encryption key K1 is a key generated by a predetermined key generation method using the key K_AuthID used for registering the key KID.
  • the M3 parameter used for registration of the key KID is CMAC (K2; M1, M2).
  • the message authentication code generation key K2 is a key generated by a predetermined key generation method using the key K_AuthID used for registering the key KID.
  • the message authentication code generation target information “M1, M2” is concatenated data of the M1 parameter and the M2 parameter used for registering the key KID.
  • the M3 parameter used for registering the key KID is “CMAC of message authentication code generation target information“ M1, M2 ”” generated using the message authentication code generation key K2.
  • the message generation unit 224 When generating the M2 parameter used to register the key KID, the message generation unit 224 passes the M2 parameter encryption target information to the SHE 21022a, specifies the encryption key K1, and encrypts the M2 parameter. Request encryption of information to be encrypted. In response to the encryption request, the encryption processing unit 232 of the SHE 21022a encrypts the encryption target information of the M2 parameter using the specified encryption key K1, and encrypts the encryption target information of the M2 parameter Generate data. The SHE 21022a passes the encrypted data of the encryption target information of the M2 parameter to the main computing unit 21011. The message generator 224 uses the encrypted data of the encryption target information of the M2 parameter as the M2 parameter used for registering the key KID.
  • the message generation unit 224 When generating the M3 parameter used to register the key KID, the message generation unit 224 passes the message authentication code generation target information “M1, M2” to the SHE 21022a, and specifies the message authentication code generation key K2. Thus, a request is made to generate a CMAC of the message authentication code generation target information “M1, M2”.
  • the CMAC processing unit 234 of the SHE 21022a generates CMAC (K2; M1, M2) in response to the CMAC generation request.
  • the SHE 21022a passes the CMAC (K2; M1, M2) to the main computing unit 21011.
  • the message generation unit 224 uses the CMAC (K2; M1, M2) for the M3 parameter used for registration of the key KID.
  • the message generation unit 224 uses the MEK key K_mek_gen to generate an M4 parameter and an M5 parameter to be compared with the MEK key K_mek_gen.
  • the message generation unit 224 uses the MAC key K_mac_gen to generate an M4 parameter and an M5 parameter to be compared with the MAC key K_mac_gen.
  • the message generator 224 uses the ENC key K_enc_gen to generate an M4 parameter and an M5 parameter to be compared with the ENC key K_enc_gen.
  • the registration target key is referred to as KID
  • the M4 parameter and M5 parameter used for verification of the key KID will be described.
  • the method for generating the M4 parameter and the M5 parameter to be compared with the key KID is the same as the method for generating the M4 parameter and the M5 parameter used for verification of the key KID.
  • plaintext data including key identification information AuthID indicating the key K_AuthID used for registration of the key KID and encryption target information of the M4 parameter are encrypted with the encryption key K3.
  • the encryption key K3 is a key generated by a predetermined key generation method using the key KID.
  • the M5 parameter used for verification of the key KID is CMAC (K4; M4).
  • the message authentication code generation key K4 is a key generated by a predetermined key generation method using the key KID.
  • the message authentication code generation target information “M4” is an M4 parameter used for verification of the key KID.
  • the M5 parameter used for verification of the key KID is “CMAC of message authentication code generation target information“ M4 ”” generated using the message authentication code generation key K4.
  • the message generation unit 224 When generating the M4 parameter used for verification of the key KID, the message generation unit 224 passes the M4 parameter encryption target information to the SHE 21022a, specifies the encryption key K3, and encrypts the M4 parameter. Request encryption of information to be encrypted. In response to the encryption request, the encryption processing unit 232 of the SHE 21022a encrypts the encryption target information of the M4 parameter using the designated encryption key K3, and encrypts the encryption target information of the M4 parameter Generate data. The SHE 21022a passes the encrypted data of the encryption target information of the M4 parameter to the main computing unit 21011. The message generation unit 224 uses the encrypted data of the encryption target information of the M4 parameter as the M4 parameter used for verification of the key KID.
  • the message generator 224 When generating the M5 parameter used for verification of the key KID, the message generator 224 passes the message authentication code generation target information “M4” to the SHE 21022a, specifies the message authentication code generation key K4, A request is made to generate a CMAC for the message authentication code generation target information “M4”.
  • the CMAC processing unit 234 of the SHE 21022a generates CMAC (K4; M4) in response to the CMAC generation request.
  • the SHE 21022a passes the CMAC (K4; M4) to the main computing unit 21011.
  • the message generation unit 224 uses the CMAC (K4; M4) for the M5 parameter used for verification of the key KID.
  • Example 11 The above is the description of the key update processing message generation method according to the example 11 of the distribution method. It should be noted that the M1 parameter, M2 parameter, M3 parameter, M4 parameter, and M5 parameter generation processing described in Example 11 can be applied to the same parameter generation processing in the first embodiment.
  • the storage unit 222 stores the key update processing message generated by the message generation unit 224.
  • the key update request message MES_K_mek_oem (K_mek_gen), MES_K_mac_oem (K_mac_gen), and MES_K_enc_oem (K_enc_gen) correspond to the first key update request message.
  • the M4 parameter and the M5 parameter to be compared with the MEK key K_mek_gen correspond to the first verification data
  • the M4 parameter and the M5 parameter to be compared with the MAC key K_mac_gen correspond to the first verification data
  • ENC The M4 parameter and the M5 parameter to be compared with the key K_enc_gen correspond to the first verification data.
  • steps S1106, S1107, S1108, S1109 and S1110 are executed.
  • Steps S1106, S1107, S1108, S1109, and S1110 are the same as those in Example 9 of the distribution method.
  • the MEK key K_mek_oem, MAC key K_mac_oem, and ENC key K_enc_oem common to the automobile 21001 are stored in advance for each ECU 21020 mounted on the same automobile 21001.
  • a key update request message (first key update request message) for each key (first key) is generated from the master key Master_Secret and the common key, and the key update request message is commonly used by the ECUs 21020.
  • the key of each ECU 21020 can be updated. Thereby, the effect of improving the efficiency of key distribution applied to ECU 21020 is obtained.
  • the key update request message is simultaneously transmitted to each ECU 21020 connected to the CAN 21030 by broadcast of the CAN 21030, so that the time required for key distribution can be shortened.
  • the data security device 21010 can generate a key (first key) using the CMAC generation function of the SHE 21022a.
  • the data security device 21010 uses the encrypted data generation function and the CMAC generation function of the SHE 21022a, and the key update request message (first key update request message), and the M4 parameter and M5 parameter (the key comparison target) First verification data) can be generated.
  • Example 11 of the distribution method the main arithmetic unit 21011 corresponds to the first arithmetic processing device, and the SHE 21022a corresponds to the second arithmetic processing device.
  • FIG. 20 is a sequence chart illustrating a delivery method example 12 according to the second embodiment.
  • portions corresponding to the respective steps in FIG. 18 are denoted with the same reference numerals.
  • the SHE 21022a of the data security device 21010 stores the master key Master_Secret in the storage unit 21023a in advance as in the case of the delivery method example 9.
  • the data security device 21010 and each ECU 21020 mounted in a certain automobile 21001 store the same MEK key K_mek_oem in advance.
  • the data security device 21010 stores the MEK key K_mek_oem in the storage unit 21023a of the SHE 21022a.
  • the ECU 21020 stores the MEK key K_mek_oem in the storage unit 21023 of the SHE 21022.
  • the MEK key K_mek_oem is stored in the manufacturing factory or the manufacturing factory of the automobile 21001.
  • the same MEK key K_mek_oem may be used for each automobile 21001 manufactured by the same automobile manufacturer.
  • the same MEK key K_mek_oem may be used for each ECU 21020 manufactured by the same ECU manufacturing company.
  • the MEK key K_mek_oem may be changed at a constant cycle.
  • the MEK key K_mek_oem is a key stored in advance in the data security device 21010 and the ECU 21020, and is a common initial key of the automobile 21001.
  • the communication method between the data security device 21010 and the ECU 21020 is the same as that of the delivery method example 9.
  • steps S1101, S1102, S1103, and S1104 are executed. Steps S1101, S1102, S1103, and S1104 are the same as those in Example 9 of the distribution method.
  • the MEK key K_mek_gen corresponds to the first key
  • the MAC key K_mac_gen and the ENC key K_enc_gen correspond to the second key.
  • Step S1301a The message generation unit 224 of the main arithmetic unit 21011 of the data security device 21010 uses the SHE 21022a to execute message generation processing.
  • a key update request message MES_K_mek_oem (K_mek_gen) for the MEK key K_mek_gen, and M4 and M5 parameters to be compared with the MEK key K_mek_gen are generated.
  • the generation method of the key update request message and the comparison target M4 parameter and M5 parameter is the same as the method described in the delivery method example 11.
  • the storage unit 222 stores the key update request message MES_K_mek_oem (K_mek_gen) of the MEK key K_mek_gen generated by the message generation unit 224, and the comparison target M4 parameter and M5 parameter of the MEK key K_mek_gen.
  • the key update request message MES_K_mek_oem corresponds to the first key update request message.
  • the M4 parameter and the M5 parameter to be compared with the MEK key K_mek_gen correspond to the first verification data.
  • steps S1202a, S1203a, S1204a, S1205a and S1206a are executed.
  • Steps S1202a, S1203a, S1204a, S1205a, and S1206a are the same as those in Example 10 of the distribution method.
  • the update completion message of the MEK key K_mek_gen corresponds to the first update completion message.
  • Step S1301b The message generation unit 224 of the main arithmetic unit 21011 of the data security device 21010 uses the SHE 21022a to execute message generation processing.
  • each key update request message MES_K_mek_gen (K_mac_gen) and MES_K_mek_gen (K_enc_gen) of the MAC key K_mac_gen and the ENC key K_enc_gen, the M4 parameter of the MAC key K_mac_gen to be compared, the M5 parameter of the ENC key, and the comparison of the enC key M4 and M5 parameters are generated.
  • the generation method of the key update request message and the comparison target M4 parameter and M5 parameter is the same as the method described in the delivery method example 11.
  • the storage unit 222 includes the M4 parameter, M5 parameter of the MAC key K_mac_gen, the M4 parameter to be compared with the MES_K_mek_gen (K_mac_gen), the M4 parameter to be compared with the MAC key K_mac_gen, and the M4 parameter of the MAC key K_mac_gen.
  • the M4 parameter and M5 parameter to be compared with the ENC key K_enc_gen are stored.
  • steps S1202b, S1203b, S1204b, S1205b, and S1206b are executed.
  • Steps S1202b, S1203b, S1204b, S1205b, and S1206b are the same as those in Example 10 of the distribution method.
  • the key update request messages MES_K_mek_gen (K_mac_gen) and MES_K_mek_gen (K_enc_gen) correspond to the second key update request message.
  • the M4 parameter and the M5 parameter to be compared with the MAC key K_mac_gen correspond to the second verification data.
  • the M4 parameter and the M5 parameter to be compared with the ENC key K_enc_gen correspond to the second verification data.
  • the MEK key K_mek_oem common to the automobile 21001 is stored in advance for each ECU 21020 mounted on the same automobile 21001. Accordingly, a key update request message (first key update request message) of the MEK key K_mek_gen (first key) is generated from the master key Master_Secret and the common key, and the key update request message is shared by the ECUs 21020.
  • the MEK key of each ECU 21020 can be updated by using it.
  • each key update request message (second key update request message) of the MAC key K_mac_gen (second key) and the ENC key K_enc_gen (second key) is generated, It is possible to update the MAC key and ENC key of each ECU 21020 by using the key update request message in common to each ECU 21020. Thereby, the effect of improving the efficiency of key distribution applied to ECU 21020 is obtained.
  • the MEK key K_mek_oem is the only common initial key for the automobile 21001 stored in advance in the ECU 21020. As a result, for example, an effect is obtained that can contribute to simplification of the initial key writing process of the ECU 21020 in the manufacturing factory of the ECU 21020.
  • the key update request message is simultaneously transmitted to each ECU 21020 connected to the CAN 21030 by broadcast of the CAN 21030, so that the time required for key distribution can be shortened.
  • the data security device 21010 can generate a key (first key and second key) using the CMAC generation function of the SHE 21022a.
  • the data security device 21010 uses the encrypted data generation function and the CMAC generation function of the SHE 21022a to compare the key update request message (the first key update request message and the second key update request message) and the key comparison target.
  • M4 parameter and M5 parameter (first verification data and second verification data) can be generated.
  • Example 12 of the distribution method the main arithmetic unit 21011 corresponds to the first arithmetic processing device, and the SHE 21022a corresponds to the second arithmetic processing device.
  • HSM and SHE are used for the data security devices 11010 and 21010 and the ECUs 11020 and 21020, but secure elements and cryptographic processing chips other than HSM and SHE may be used.
  • a cryptographic processing chip called HSM may be used, and a function equivalent to SHE may be realized by a computer program executed by the HSM.
  • a cryptographic processing chip called “TPM (TrustedTrustPlatform Module) f” may be used. TPMf has tamper resistance. TPMf is an example of a secure element.
  • TPMt has tamper resistance.
  • TPMt is an example of a secure element.
  • the data security devices 11010 and 21010 include a debug port such as JTAG (Joint Test Action Group), an authentication function based on an ID (identifier) may be provided for the debug port. Thereby, it is possible to prevent the key from being leaked due to an attack such as a memory dump or a tapping attack on the data security devices 11010 and 21010.
  • JTAG Joint Test Action Group
  • the first and second embodiments described above may be applied to automobiles 11001 and 21001 in automobile manufacturing factories, maintenance factories, sales outlets, and the like.
  • an automobile is taken as an example of a vehicle, but the present invention can also be applied to vehicles other than automobiles such as a motorbike and a railway vehicle.
  • a computer program for realizing the functions of each device described above may be recorded on a computer-readable recording medium, and the program recorded on the recording medium may be read into a computer system and executed.
  • the “computer system” may include an OS and hardware such as peripheral devices.
  • “Computer-readable recording medium” refers to a flexible disk, a magneto-optical disk, a ROM, a writable nonvolatile memory such as a flash memory, a portable medium such as a DVD (Digital Versatile Disc), and a built-in computer system.
  • a storage device such as a hard disk.
  • the “computer-readable recording medium” means a volatile memory (for example, DRAM (Dynamic Random Access Memory)), etc. that hold a program for a certain period of time.
  • the program may be transmitted from a computer system storing the program in a storage device or the like to another computer system via a transmission medium or by a transmission wave in the transmission medium.
  • the “transmission medium” for transmitting the program refers to a medium having a function of transmitting information, such as a network (communication network) such as the Internet or a communication line (communication line) such as a telephone line.
  • the program may be for realizing a part of the functions described above. Furthermore, what can implement
  • an in-vehicle computer such as an ECU mounted on a vehicle such as an automobile.
  • DESCRIPTION OF SYMBOLS 110 ... Key generation apparatus, 112, 122, 142, 222, 242 ... Storage part, 115, 137 ... Key generation part, 116, 132, 152, 232, 252 ... Encryption processing part, 117 ... First key distribution part, 120 , 140, 220, 240 ... interface unit, 121, 141, 21241, 241 ... control unit, 123 ... second key distribution unit, 135, 155, 235, 255 ... key update unit, 136 ... distribution processing unit, 11001, 21001 ... Automobile, 11002, 21002 ... In-vehicle computer system, 11010, 21010 ...
  • Data security device 11011, 11021, 21101, 10221 ... Main arithmetic unit, 11012 ... HSM, 11013, 11023, 21023, 21023a ... Storage unit, 11020, 21020 ... ECU, 11022, 21022, 210 2a ... SHE, 11030, 21030 ... CAN, 11040, 21040 ... infotainment equipment, 11050 ... TCU, 11051 ... communication module, 11052 ... SIM, 11060, 21060 ... diagnostic port, 12000 ... server device, 12100, 22100 ... maintenance tool, 223 ... Key distribution unit, 224 ... Message generation unit, 234,254 ... CMAC processing unit

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Lock And Its Accessories (AREA)

Abstract

L'invention concerne un système de distribution comprenant un dispositif de génération de clé, et un ordinateur embarqué monté dans un véhicule. Le dispositif de génération de clé comprend : une unité de génération de clé qui utilise une clé maîtresse et un identificateur de véhicule du véhicule pour générer une première clé ; et une première unité de distribution de clé qui utilise une clé commune initiale du véhicule pour générer un premier message de demande de mise à jour de clé, et transmet le premier message de demande de mise à jour de clé à l'ordinateur embarqué. L'ordinateur embarqué comprend : une unité d'interface qui transmet des données à un dispositif externe à l'ordinateur embarqué et reçoit des données de celui-ci ; une unité de stockage qui stocke la clé initiale ; et une unité de mise à jour de clé qui utilise la clé initiale et le premier message de demande de mise à jour de clé reçu du dispositif de génération de clé pour mettre à jour la clé initiale à la première clé, et utilise la première clé pour générer un premier message d'accomplissement de mise à jour. Le premier message d'accomplissement de mise à jour est transmis au dispositif de génération de clé par l'unité d'interface, et la première unité de distribution de clé vérifie le premier message d'accomplissement de mise à jour reçu sur la base de la première clé.
PCT/JP2017/025898 2016-11-30 2017-07-18 Système de distribution, dispositif de génération de clé, ordinateur embarqué, dispositif de sécurité de données, procédé de distribution, et programme informatique WO2018100789A1 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
JP2016233016A JP6218914B1 (ja) 2016-11-30 2016-11-30 配信システム、データ保安装置、配信方法、及びコンピュータプログラム
JP2016-233016 2016-11-30
JP2016239649A JP6174229B1 (ja) 2016-12-09 2016-12-09 配信システム、データ保安装置、配信方法、及びコンピュータプログラム
JP2016-239649 2016-12-09

Publications (1)

Publication Number Publication Date
WO2018100789A1 true WO2018100789A1 (fr) 2018-06-07

Family

ID=62242364

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2017/025898 WO2018100789A1 (fr) 2016-11-30 2017-07-18 Système de distribution, dispositif de génération de clé, ordinateur embarqué, dispositif de sécurité de données, procédé de distribution, et programme informatique

Country Status (1)

Country Link
WO (1) WO2018100789A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114124578A (zh) * 2022-01-25 2022-03-01 湖北芯擎科技有限公司 一种通信方法、装置、车辆及存储介质
WO2022241799A1 (fr) * 2021-05-21 2022-11-24 华为技术有限公司 Procédé et appareil de génération de clé

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013138320A (ja) * 2011-12-28 2013-07-11 Denso Corp 車載システム及び通信方法
JP2016163265A (ja) * 2015-03-04 2016-09-05 Kddi株式会社 鍵管理システム、鍵管理方法およびコンピュータプログラム

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013138320A (ja) * 2011-12-28 2013-07-11 Denso Corp 車載システム及び通信方法
JP2016163265A (ja) * 2015-03-04 2016-09-05 Kddi株式会社 鍵管理システム、鍵管理方法およびコンピュータプログラム

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
"Introduction to the Cryptographic Service Engine (CSE) module for SPC56ECxx and SPC564Bxx devices", AN4240 APPLICATION NOTE, REVISION 2, STMICROELECTRONICS, 17 September 2013 (2013-09-17), pages 1 - 30, XP055606099, Retrieved from the Internet <URL:http://www.st.com/content/ccc/resource/technical/document/application_note/f6/9a/a2/ed/e5/3a/48/37/DM00075575.pdf/files/DM00075575.pdf/jcr:content/translations/en.DM00075575.pdf> [retrieved on 20171005] *
2017 SYMPOSIUM ON CRYPTOGRAPHY AND INFORMATION SECURITY, 24 January 2017 (2017-01-24), Naha, Japan, pages 1 - 7 *
KEISUKE TAKEEMORI: "In vehicle network security using secure elements: discussion of Security technologies", IEICE TECHNICAL REPORT, vol. 114, no. 508, 2 March 2015 (2015-03-02), pages 73 - 78, XP009508594 *
SUGASHIMA, T. ET AL.: "Approaches for Secure and Efficient In-Vehicle Key Management", DENSO TECHNICAL REVIE, vol. 21, 30 November 2016 (2016-11-30), pages 140 - 149, XP055361448 *
SYMPOSIUM ON CRYPTOGRAPHY AND INFORMATION SECURITY, 19 January 2016 (2016-01-19), Kumamoto, Japan, pages 1 - 7 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022241799A1 (fr) * 2021-05-21 2022-11-24 华为技术有限公司 Procédé et appareil de génération de clé
CN114124578A (zh) * 2022-01-25 2022-03-01 湖北芯擎科技有限公司 一种通信方法、装置、车辆及存储介质
CN114124578B (zh) * 2022-01-25 2022-04-15 湖北芯擎科技有限公司 一种通信方法、装置、车辆及存储介质

Similar Documents

Publication Publication Date Title
CN109314639B (zh) 管理系统、密钥生成装置、车载计算机、管理方法以及记录介质
JP6683588B2 (ja) 再利用システム、サーバ装置、再利用方法、及びコンピュータプログラム
WO2017217070A1 (fr) Système, autorité de certification, ordinateur monté dans un véhicule, véhicule, procédé d&#39;émission de certificat de clé publique et programme
JP6288219B1 (ja) 通信システム
CN109314640B (zh) 车辆信息收集系统、车载计算机、车辆信息收集装置、车辆信息收集方法以及记录介质
JP6174229B1 (ja) 配信システム、データ保安装置、配信方法、及びコンピュータプログラム
US11522685B2 (en) Key management system, communication device and key sharing method
JP6262681B2 (ja) 管理装置、車両、管理方法、及びコンピュータプログラム
JP6190443B2 (ja) 車載コンピュータシステム、車両、管理方法、及びコンピュータプログラム
WO2017033602A1 (fr) Système d&#39;ordinateur de bord, véhicule, procédé de gestion et programme d&#39;ordinateur
CN109314644B (zh) 数据提供系统、数据保护装置、数据提供方法以及存储介质
JP2018019415A (ja) システム、認証局、車載コンピュータ、公開鍵証明書発行方法、及びプログラム
WO2018100789A1 (fr) Système de distribution, dispositif de génération de clé, ordinateur embarqué, dispositif de sécurité de données, procédé de distribution, et programme informatique
JP6547180B2 (ja) 通信システム
JP6218914B1 (ja) 配信システム、データ保安装置、配信方法、及びコンピュータプログラム
JP6830877B2 (ja) 配信システム、鍵生成装置、配信方法、及びコンピュータプログラム
JP6476462B2 (ja) 車載コンピュータシステム、車両、管理方法、及びコンピュータプログラム
JP2018006782A (ja) データ提供システム、データ提供装置、車載コンピュータ、データ提供方法、及びコンピュータプログラム
JP6454919B2 (ja) 管理システム、データ提供装置、車載コンピュータ、管理方法、及びコンピュータプログラム
JP6554704B2 (ja) データ提供システム及びデータ提供方法
JP6672243B2 (ja) データ提供システム、データ提供装置、データ提供方法、及びデータ提供プログラム
JP2018098760A (ja) 配信システム、データ保安装置、配信方法、及びコンピュータプログラム
JP2017208731A (ja) 管理システム、管理装置、車載コンピュータ、管理方法、及びコンピュータプログラム
JP6519060B2 (ja) 管理装置、車両、管理方法、及びコンピュータプログラム
WO2018131270A1 (fr) Système de communication, véhicule, dispositif serveur, procédé de communication et programme informatique

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17876509

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17876509

Country of ref document: EP

Kind code of ref document: A1