WO2021005978A1 - 演算装置およびデータ送信方法 - Google Patents
演算装置およびデータ送信方法 Download PDFInfo
- Publication number
- WO2021005978A1 WO2021005978A1 PCT/JP2020/023640 JP2020023640W WO2021005978A1 WO 2021005978 A1 WO2021005978 A1 WO 2021005978A1 JP 2020023640 W JP2020023640 W JP 2020023640W WO 2021005978 A1 WO2021005978 A1 WO 2021005978A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- application
- operating system
- low
- data
- communication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/84—Protecting input, output or interconnection devices output devices, e.g. displays or monitors
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
Definitions
- Patent Document 1 discloses an in-vehicle device having two platforms. Platforms that are software are often referred to as operating systems.
- an operating system having a relatively high security level is referred to as a high operating system for convenience of explanation, and an operating system having a relatively low security level is hereinafter referred to as a low operating system for convenience.
- Examples of high operating systems include AGL and QNX (registered trademark). Examples of low operating systems include general-purpose operating systems such as ANDROID®.
- Various application software runs on a general-purpose operating system.
- application software that operates on a general-purpose operating system there is one that uses a hardware part (hereinafter, user interface mechanism) of a user interface such as a display or an input device.
- user interface mechanism a hardware part of a user interface such as a display or an input device.
- High OS side application Application software running on a high operating system
- the high OS side application may also use the user interface mechanism.
- the high OS side application does not directly control the user interface mechanism in order to achieve uniformity of mediation and display mode, but sends data to the user interface mechanism. , It is possible to send to the low operating system side.
- a user interface application that runs on a low operating system and controls the user interface mechanism is provided.
- the present disclosure has been made based on this circumstance, and an object thereof is to provide an arithmetic unit and a data transmission method capable of suppressing the leakage of data handled on an operating system having a high security level. To do.
- An arithmetic unit that runs multiple operating systems with different levels of security.
- An operating system with a relatively low security level among multiple operating systems is defined as a low operating system.
- an operating system with a higher security level than a low operating system is regarded as a high operating system among multiple operating systems
- At least one high OS side application which is application software running on a high operating system
- Application software that runs on a low operating system and includes a low OS side communication application that communicates with a high OS side application.
- Data communication is performed between the high OS side application and the low OS side communication application by in-chip application communication or wired communication.
- the data transmitted from at least one high OS side application to the low OS side communication application is encrypted.
- At least one high OS side application encrypts data and sends it to a low OS side communication application.
- the low operating system is hacked, the data handled by the high OS side application is suppressed from being leaked.
- the data transmission method is Of multiple operating systems with different security levels, the operating system with the relatively low security level is defined as the low operating system.
- the operating system with the relatively low security level is defined as the low operating system.
- an operating system with a higher security level than a low operating system is regarded as a high operating system among multiple operating systems
- Data communication is performed between the high OS side application and the low OS side communication application by in-chip application communication or wired communication.
- At least one high OS side application generates the original data to be transmitted to the low OS side communication application, The data obtained by encrypting the generated original data is transmitted to the low OS side communication application.
- the in-vehicle system 1 shown in FIG. 1 is mounted on the vehicle C.
- the in-vehicle system 1 includes a user interface mechanism 20, a wireless communication device 30, and a computer 40 which is an arithmetic unit.
- the user interface mechanism 20 means a hardware configuration among the configurations for transmitting information between the user and the computer 40.
- FIG. 1 discloses a display 21 and an input device 22 as a user interface mechanism 20.
- the display 21 is arranged at a position that can be visually recognized by the occupant in the passenger compartment of the vehicle C.
- the display 21 can display various images.
- a liquid crystal display or an organic EL display can be used as the display 21, a liquid crystal display or an organic EL display can be used.
- the input device 22 is a part where the occupant of the vehicle C performs various input operations.
- the input device 22 is, for example, a touch panel and a mechanical switch superimposed on the display surface of the display 21. Further, a microphone for performing voice input can be provided as the input device 22.
- the wireless communication device 30 performs wireless communication with the outside of the vehicle C.
- the wireless communication device 30 communicates with, for example, a cloud server.
- the computer 40 is connected to the user interface mechanism 20 and to the in-vehicle LAN bus 50.
- the computer 40 can transmit and receive signals to and from various devices mounted on the vehicle C via the in-vehicle LAN bus 50.
- the computer 40 may be able to acquire control information of various in-vehicle devices requested by the input operation of the input device 22 and information outside the vehicle received by the wireless communication device 30.
- the computer 40 may acquire the information outside the vehicle received by the wireless communication device 30 via the ECU mounted on the vehicle C.
- the computer 40 includes a processor module 41, a RAM 42, a flash memory 43, a bus line 44, and the like.
- the processor module 41 includes a plurality of processor cores.
- the RAM 42 temporarily stores information or the like read from the flash memory 43.
- the flash memory 43 is a non-volatile memory and stores various software executed by the processor module 41.
- the processor module 41 executes the software shown in FIG. Therefore, each software shown in FIG. 2 is stored in the flash memory 43.
- the various software shown in FIG. 2 is stored in a non-volatile tangible storage medium other than the flash memory 43. It may have been.
- FIG. 2 also schematically shows a hierarchical structure between software when the computer 40 executes each software.
- the processor module 41 includes a hypervisor 60, a high operating system 61, a general-purpose operating system 62, a high OS side application 70, and a low OS side application 80.
- the application is also referred to as application software.
- the hypervisor 60 is software that creates a virtual environment on the computer 40. Specifically, the hypervisor 60 is software that creates an environment in which a high operating system 61 and a general-purpose operating system 62 can operate in parallel on one computer 40.
- the high operating system 61 is an operating system having a higher security level than the general-purpose operating system 62.
- the processor module 41 executes two types of operating systems, the first operating system 61a and the second operating system 61b, as the high operating system 61.
- the processor core that executes the first operating system 61a, the processor core that executes the second operating system 61b, and the processor core that executes the general-purpose operating system 62 can be different processor cores from each other.
- some or all of the processor cores included in the processor module 41 may be shared as processor cores that execute a plurality of operating systems. It should be noted that the processor module 41 may execute only one type of high operating system 61.
- the first operating system 61a can be, for example, a real-time operating system.
- a real-time operating system is an operating system that performs real-time processing. Real-time operating systems are characterized by their excellent stability.
- the real-time operating system is, for example, QNX.
- the second operating system 61b can be, for example, AGL.
- the security level between the first operating system 61a and the second operating system 61b may be higher.
- the general-purpose operating system 62 is an operating system having a lower security level than the high operating system 61.
- the general purpose operating system 62 is an example of a low operating system.
- the general-purpose operating system 62 is, for example, ANDROID.
- FIG. 2 shows a meter application 71, a cloud communication application 72, an in-vehicle communication application 73, and an encryption application 74.
- the meter application 71 operates on the first operating system 61a.
- the cloud communication application 72, the in-vehicle communication application 73, and the encryption application 74 operate on the second operating system 61b.
- the meter application 71 determines the vehicle speed and the like, which is information for determining the image of the vehicle instruments displayed on the display 21.
- the meter application 71 transmits data indicating the determined vehicle speed and the like to the user interface application (hereinafter, UI application) 83.
- UI application user interface application
- the cloud communication application 72 controls the wireless communication device 30 to send and receive data to and from the cloud server.
- the data that the cloud communication application 72 can acquire from the cloud server may include at least one of various information about the vehicle C or various information about the occupants of the vehicle C.
- the cloud communication application 72 converts the information acquired from the cloud server into information that can be provided to the UI application 83. Then, the converted information is sent to the UI application 83 via the encryption application 74.
- the in-vehicle communication application 73 communicates with various ECUs mounted on the vehicle C and acquires various in-vehicle information in accordance with the instruction from the UI application 83. Then, the in-vehicle communication application 73 changes the acquired in-vehicle information into a format that can be understood by the UI application 83.
- the UI application 83 sends the data after the format change to the UI application 83 via the encryption application 74.
- the encryption application 74 encrypts the data supplied from the cloud communication application 72 and the in-vehicle communication application 73, and transmits the data to the UI application 83.
- the cloud communication application 72 and the in-vehicle communication application 73 are original data creation applications that create original data to be transmitted to the UI application 83.
- the encryption application 74 and the UI application 83 can communicate using various communication methods such as a shared memory method and socket communication.
- Both the encryption application 74 and the UI application 83 are executed by the same processor module 41. Therefore, regardless of the communication method, the communication between the encryption application 74 and the UI application 83 is in-chip application communication.
- In-chip application communication means communication between applications executed by one or more processors included in one chip.
- the encryption method is not particularly limited. For example, SSH allows the encryption application 74 and the UI application 83 to communicate.
- the low OS side application 80 includes a multimedia application 81 and UI applications 82 and 83.
- FIG. 2 shows one multimedia application 81, the number of multimedia applications 81 may be plural.
- the multimedia application 81 is a navigation application, an audio application, or the like.
- the multimedia application 81 transmits various data to the UI application 82.
- the process according to the instruction from the UI application 82 is executed.
- the multimedia application 81 is a navigation application
- a route search instruction or the like is input from the UI application 82.
- the UI application 82 acquires a route search instruction and the like from the input device 22.
- the navigation application executes the route search process.
- the data indicating the route searched by executing the route search process is transmitted to the UI application 82.
- the communication between the multimedia application 81 and the UI application 82 is not encrypted.
- the UI application 82 is a software part of the interface between the multimedia application 81 and the user.
- the hardware portion of the interface between the multimedia application 81 and the user is the user interface mechanism 20.
- the UI application 82 outputs an instruction determined based on the signal input from the input device 22 to the multimedia application 81. Further, the UI application 82 determines the display content to be displayed on the display 21 based on the data input from the multimedia application 81, and displays the display content on the display 21.
- the UI application 83 corresponds to a low OS side communication application, and is a software part of the interface between the high OS side application 70 and the user.
- the UI application 83 transmits the instruction to the high OS side application 70 determined based on the instruction content.
- the UI application 83 decrypts the data and executes a process determined based on the decrypted data. For example, when the decoded data indicates the vehicle speed, the vehicle speed displayed on the display 21 is changed so as to represent the newly acquired vehicle speed.
- the UI application 83 transmits an instruction to acquire data from the cloud server to the cloud communication application 72 when there is a data acquisition request stored in the cloud server from the input device 22. Upon receiving this instruction, the cloud communication application 72 acquires data determined based on the instruction from the cloud server. Then, the data is transmitted to the UI application 83 via the encryption application 74. The UI application 83 decodes this data and outputs it to the user interface mechanism 20.
- FIG. 3 shows an example of processing when data is communicated between OSs as a flowchart.
- the data transmission method is described with reference to FIG. Steps (hereinafter, steps are omitted)
- S1 to S3 are executed by either the cloud communication application 72 or the in-vehicle communication application 73.
- the encryption application 74 executes S4 and S5.
- the UI application 83 executes S6 to S8.
- the trigger signal is acquired.
- the trigger signal is, for example, an instruction signal for acquiring information stored in the cloud server.
- the trigger signal is, for example, a signal indicating a setting state of an in-vehicle device.
- the original data determined by the trigger signal acquired in S1 is generated.
- the original data is data to be transmitted to the UI application 83 and is data before encryption.
- the original data generated in S2 is sent to the encryption application 74.
- the encryption application 74 encrypts the original data. Then, in S5, the encrypted data is transmitted to the UI application 83.
- the UI application 83 receives the data transmitted by the encryption application 74.
- the UI application 83 decodes the received data.
- a process determined by the data decoded in S7 is executed.
- the high operating system 61 and the general-purpose operating system 62 operate on the same processor module 41.
- the data is usually sent and received unencrypted.
- the security level of the high operating system 61 is high, if the general-purpose operating system 62 is hacked, there is a risk that the data handled by the application operating on the high operating system 61 side may be leaked or falsified.
- the high OS side application 70 encrypts the data and transmits it to the general-purpose operating system 62 side.
- the general-purpose operating system 62 is hacked, it is possible to prevent the data handled by the application 70 on the high OS side from being leaked or tampered with.
- the UI application 83 that communicates with the high OS side application 70 and controls the user interface mechanism 20 is an application that operates on the general-purpose operating system 62. As a result, it is possible to maintain the uniformity of arbitration and display mode between the high OS side application 70 and the low OS side application 80. Moreover, the data transmitted from the cloud communication application 72 and the in-vehicle communication application 73 to the UI application 83 is encrypted. Therefore, by transmitting data from the cloud communication application 72 and the in-vehicle communication application 73 to the UI application 83, it is possible to prevent the data from being leaked or falsified.
- the cloud communication application 72 is provided as the high OS side application 70.
- the cloud communication application 72 can acquire at least one of various information about the vehicle C or various information about the occupants of the vehicle C from the cloud server, and can provide the acquired information to the UI application 83. If various information about the vehicle C or various information about the occupants of the vehicle C is leaked or falsified, there is a possibility that problems beyond the hindrance to the running of the vehicle may occur.
- the data transmitted by the cloud communication application 72 to the UI application 83 is also encrypted. Therefore, it is possible to prevent various information about the vehicle C or various information about the occupants of the vehicle C from being leaked or falsified.
- the encryption application 74 acquires data from the cloud communication application 72 and the in-vehicle communication application 73, and encrypts the acquired data. Then, the encrypted data is transmitted to the UI application 83.
- the program of the entire high OS side application 70 can be made smaller than that of the plurality of high OS side applications 70 individually encrypting the data.
- one processor module 41 included in one computer 40 executes the high operating system 61 and the general-purpose operating system 62 in parallel.
- one computer may include a plurality of processor modules, and the processor module that executes the high operating system 61 and the processor module that executes the general-purpose operating system 62 may be different.
- each computer is connected by wire, and the computer that executes the high operating system 61 and the computer that executes the general-purpose operating system 62 may be different computers.
- data communication is performed between the high OS side application 70 and the low OS side communication application UI application 83 by wired communication.
- the cloud communication application 72 and the encryption application 74 that encrypts the data created by the in-vehicle communication application 73 are provided.
- the cloud communication application 72 and the in-vehicle communication application 73 may encrypt the data and transmit the data to the UI application 83, respectively.
- the UI application 83 that controls the user interface mechanism 20 is provided as the low OS side communication application.
- the low OS side communication application may have a function of communicating with the high OS side application 70, and may be an application having a function other than the function of controlling the user interface mechanism 20.
- the data transmitted from the high OS side application 70 to the UI application 83 is encrypted.
- the data transmitted from the UI application 83 to the high OS side application 70 may be encrypted.
- the meter application 71 transmits the data to the UI application 83 without encrypting it.
- the meter application 71 may also encrypt the data and send it to the UI application 83.
- the meter application 71 may encrypt the data.
- an encryption application running on the first operating system 61a may be provided.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Mathematical Physics (AREA)
- Stored Programmes (AREA)
- Storage Device Security (AREA)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US17/563,917 US12079354B2 (en) | 2019-07-09 | 2021-12-28 | Computing device and data transmission method |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2019-127855 | 2019-07-09 | ||
| JP2019127855A JP7131498B2 (ja) | 2019-07-09 | 2019-07-09 | 演算装置およびデータ送信方法 |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US17/563,917 Continuation US12079354B2 (en) | 2019-07-09 | 2021-12-28 | Computing device and data transmission method |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2021005978A1 true WO2021005978A1 (ja) | 2021-01-14 |
Family
ID=74115259
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/JP2020/023640 Ceased WO2021005978A1 (ja) | 2019-07-09 | 2020-06-16 | 演算装置およびデータ送信方法 |
Country Status (3)
| Country | Link |
|---|---|
| US (1) | US12079354B2 (https=) |
| JP (1) | JP7131498B2 (https=) |
| WO (1) | WO2021005978A1 (https=) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP7131498B2 (ja) * | 2019-07-09 | 2022-09-06 | 株式会社デンソー | 演算装置およびデータ送信方法 |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2011074168A1 (ja) * | 2009-12-14 | 2011-06-23 | パナソニック株式会社 | 情報処理装置 |
| WO2018008605A1 (ja) * | 2016-07-04 | 2018-01-11 | 株式会社Seltech | 人工知能を有するシステム |
| WO2019012956A1 (ja) * | 2017-07-11 | 2019-01-17 | 株式会社Seltech | センシング装置、センシングシステム、およびサーバ |
| JP2019066995A (ja) * | 2017-09-29 | 2019-04-25 | 株式会社Seltech | セキュアモードとノンセキュアモードとを選択的に切り替え可能なシステム |
Family Cites Families (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20070067826A1 (en) * | 2005-09-19 | 2007-03-22 | Texas Instruments Incorporated | Method and system for preventing unsecure memory accesses |
| US8959339B2 (en) * | 2005-12-23 | 2015-02-17 | Texas Instruments Incorporated | Method and system for preventing unauthorized processor mode switches |
| EP1865435A1 (en) * | 2006-06-06 | 2007-12-12 | Texas Instruments France | Enhanced exception handling |
| JP5758914B2 (ja) * | 2010-12-21 | 2015-08-05 | パナソニック インテレクチュアル プロパティ コーポレーション オブアメリカPanasonic Intellectual Property Corporation of America | 仮想計算機システム及び仮想計算機システム制御方法 |
| US20120166746A1 (en) * | 2010-12-26 | 2012-06-28 | Nissim Amar | Security Device |
| KR20130101632A (ko) * | 2012-02-16 | 2013-09-16 | 삼성전자주식회사 | 콘텐츠 보안 장치 및 방법 |
| JP6032176B2 (ja) | 2012-12-19 | 2016-11-24 | 株式会社デンソー | 車両用表示制御装置 |
| JP6171549B2 (ja) | 2013-05-14 | 2017-08-02 | 株式会社デンソー | 表示制御装置、及び、プログラム |
| US9210179B2 (en) * | 2014-03-17 | 2015-12-08 | Saudi Arabian Oil Company | Systems, methods, and computer medium to securely transfer business transactional data between networks having different levels of network protection using barcode technology with data diode network security appliance |
| GB2539657B (en) * | 2015-06-22 | 2018-03-07 | Advanced Risc Mach Ltd | Tracing Processing Activity |
| KR101816650B1 (ko) * | 2017-02-21 | 2018-01-09 | 주식회사 코인플러그 | 계정 등록의 간소화 서비스 및 사용자 인증 서비스를 제공하는 방법 및 이를 이용한 인증 서버 |
| EP3710975B1 (en) * | 2017-11-13 | 2024-09-11 | High Sec Labs Ltd. | Secure red-black air-gapped portable computer |
| JP7131498B2 (ja) * | 2019-07-09 | 2022-09-06 | 株式会社デンソー | 演算装置およびデータ送信方法 |
-
2019
- 2019-07-09 JP JP2019127855A patent/JP7131498B2/ja active Active
-
2020
- 2020-06-16 WO PCT/JP2020/023640 patent/WO2021005978A1/ja not_active Ceased
-
2021
- 2021-12-28 US US17/563,917 patent/US12079354B2/en active Active
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2011074168A1 (ja) * | 2009-12-14 | 2011-06-23 | パナソニック株式会社 | 情報処理装置 |
| WO2018008605A1 (ja) * | 2016-07-04 | 2018-01-11 | 株式会社Seltech | 人工知能を有するシステム |
| WO2019012956A1 (ja) * | 2017-07-11 | 2019-01-17 | 株式会社Seltech | センシング装置、センシングシステム、およびサーバ |
| JP2019066995A (ja) * | 2017-09-29 | 2019-04-25 | 株式会社Seltech | セキュアモードとノンセキュアモードとを選択的に切り替え可能なシステム |
Also Published As
| Publication number | Publication date |
|---|---|
| JP2021012653A (ja) | 2021-02-04 |
| US20220121759A1 (en) | 2022-04-21 |
| US12079354B2 (en) | 2024-09-03 |
| JP7131498B2 (ja) | 2022-09-06 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP7139424B2 (ja) | 車両搭載機器アップグレード方法および関連機器 | |
| US11611433B2 (en) | Secure memory arrangements | |
| CN111356114A (zh) | 车内电子控制单元升级方法、装置、设备和车辆系统 | |
| CN114154174A (zh) | 后量子签名设施的状态同步 | |
| CN108927808B (zh) | 一种ros节点的通信方法、认证方法及装置 | |
| CN105453034A (zh) | 在管理器控制的系统中处理客户事件 | |
| US20220245252A1 (en) | Seamless firmware update mechanism | |
| US20180191721A1 (en) | Mechanisms to enable secure virtual namespaces in disaggregated storage targets | |
| US20180253155A1 (en) | Private access to human interface devices | |
| JP7464013B2 (ja) | センタ、otaマスタ、方法、プログラム、及び車両 | |
| CN111475869B (zh) | 通信方法、装置、介质、安全计算模块和安全芯片 | |
| US20120144500A1 (en) | Method and apparatus for protecting data using a virtual environment | |
| JP7131498B2 (ja) | 演算装置およびデータ送信方法 | |
| CN115967905A (zh) | 一种数据传输系统及方法 | |
| US10810327B2 (en) | Enforcing secure display view for trusted transactions | |
| CN115756314B (zh) | Nvram数据处理方法、电子设备和可读存储介质 | |
| CN120731417A (zh) | 用于由触笔安全着墨的中介层 | |
| CN117278280A (zh) | 一种智能座舱域控制器信息的传输方法及装置 | |
| US10638313B2 (en) | Systems and methods for confirming a cryptographic key | |
| US12306767B2 (en) | Data transfer encryption mechanism | |
| CN117176852B (zh) | 车辆控制方法、装置、设备及存储介质 | |
| JP2021012653A5 (https=) | ||
| JP5989192B1 (ja) | プログラム更新システム | |
| KR102549385B1 (ko) | 데이터 액세스 제어 제공 방법 및 시스템 | |
| US20250226971A1 (en) | Signal processing device, and vehicle display device having same |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20836120 Country of ref document: EP Kind code of ref document: A1 |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 20836120 Country of ref document: EP Kind code of ref document: A1 |