CN206865493U - Information of vehicles security alarm device - Google Patents
Information of vehicles security alarm device Download PDFInfo
- Publication number
- CN206865493U CN206865493U CN201621380561.XU CN201621380561U CN206865493U CN 206865493 U CN206865493 U CN 206865493U CN 201621380561 U CN201621380561 U CN 201621380561U CN 206865493 U CN206865493 U CN 206865493U
- Authority
- CN
- China
- Prior art keywords
- control unit
- electronic control
- message
- alarm
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Alarm Systems (AREA)
Abstract
The utility model discloses a kind of information of vehicles security alarm device.The information of vehicles security alarm device includes authentication device, alarm, message sends electronic control unit and message sink electronic control unit, the message sends electronic control unit, message sink electronic control unit and alarm are all connected to authentication device, message, which is sent between electronic control unit and authentication device, has the first connection, message, which is sent between electronic control unit and message sink electronic control unit, has the second connection, there is the 3rd connection between message sink electronic control unit and authentication device, there is the 4th connection between authentication device and alarm.The utility model is used for information security.The utility model, which provides, a kind of to be connected into uncommitted ECU in vehicle interior electronic control unit network and can find this potential safety hazard in time, improve the mechanism of information of vehicles security when the uncommitted ECU will access the ECU authorized in network.
Description
Technical field
The disclosure relates generally to computer realm, and in particular to information processing security fields, more particularly to a kind of vehicle letter
Cease security alarm device.
Background technology
The electronic control unit (ECU) of one chassis has up to a hundred.ECU is as common computer, by microprocessor
(CPU), memory (ROM, RAM), input/output interface (I/O), analog-digital converter (A/D) and shaping, driving etc. are extensive
Integrated circuit forms.
By the way that multiple ECU on vehicle are connected with each other via network, the information (car that ECU has can be exchanged
Information).In the system that this is formed by connecting by ECU, information of vehicles can be easily exchanged via the ECU of network connection.
But also easily dismantle the ECU for being connected to network, or a uncommitted ECU is mistakenly attached to network.When one
When individual uncommitted new access or the ECU that mistakenly accesses attempt to access that existing ECU, existing ECU safety will be by
Influence, easily reveal information of vehicles.
Lack in the prior art and be connected into uncommitted ECU in a network and the uncommitted ECU will access network
In authorized ECU when can find in time such case, improve information of vehicles security mechanism.
Utility model content
In view of drawbacks described above of the prior art or deficiency, it is uncommitted it is expected that offer one kind has been connected into a network
ECU and this potential safety hazard can be found when the uncommitted ECU will access the ECU authorized in network in time, improves car
The mechanism of Information Security.
The embodiment of the present application provides a kind of information of vehicles security alarm device, the information of vehicles security alarm device bag
Include authentication device, alarm, message and send electronic control unit and message sink electronic control unit, the message sends electronics
Control unit, message sink electronic control unit and alarm are all connected to authentication device, message send electronic control unit and
There is the first connection, message, which is sent between electronic control unit and message sink electronic control unit, to be had between authentication device
Second connection, there is the 3rd connection, between authentication device and alarm between message sink electronic control unit and authentication device
With the 4th connection.
In the embodiment of the present application, information of vehicles security alarm device not only includes message transmission electronic control unit and disappeared
Breath receives electronic control unit, in addition to authentication device, the message for being received to message sink electronic control unit are come
From message send electronic control unit whether be that the electronic control unit authorized is authenticated.In addition, information of vehicles is safe
Warning device also includes alarm.In authentication device authentification failure, authentication device sends warning message alarm to alarm.
Message, which is sent, the first connection between electronic control unit and authentication device, message transmission electronic control unit wants transmission and disappeared
Breath, can be by the first connection authentication request device to its authentication.By rear, authentication device sends electronics to message for certification
Control unit sends authentication token.Message, which is sent between electronic control unit and authentication device, the second connection.Message sends electricity
Message is sent sub-control unit into the mark of electronic control unit and the authentication token is connect by the second linkup transmit to message
Receive electronic control unit.There is the 3rd connection between message sink electronic control unit and authentication device.Message sink Electronic Control
The message received is sent unit into the mark of electronic control unit and the authentication token is forwarded to authentication device and is authenticated.
Authentication device is authenticated according to the authentication token record provided to message transmission electronic control unit.When one it is uncommitted
New access or the ECU that mistakenly accesses when attempting to access that existing ECU, the uncommitted new access or mistakenly access
ECU identity can not possibly be by certification, so as to can not possibly obtain authentication token in authentication device, and at this moment authentication device can be by the
Four connect to alarm and send warning message, make alarm equipment alarm, so that relevant staff is handled, investigation safety is hidden
Suffer from.In addition, even if the uncommitted new access or the ECU mistakenly accessed forge authentication token and message transmission Electronic Control
The mark of unit is sent to message sink electronic control unit, and electronic control unit is sent due to being connected to authentication token and message
Message sink electronic control unit will also forward it to authentication device and be authenticated after mark.The authentication token of forgery and disappear
The mark that breath sends electronic control unit can not equally pass through certification.At this moment authentication device can be equally connected to alarm by the 4th
Device sends warning message, makes alarm equipment alarm, so that relevant staff is handled.So, allow in vehicle interior
Be connected into uncommitted ECU in ECU networks and when the uncommitted ECU will access the ECU authorized in network can and
This potential safety hazards of Shi Faxian, improve information of vehicles security.
Brief description of the drawings
By reading the detailed description made to non-limiting example made with reference to the following drawings, the application's is other
Feature, objects and advantages will become more apparent upon:
Fig. 1 shows the exemplary hardware configuration frame of the information of vehicles security alarm device according to the application one embodiment
Figure;
Fig. 2 is shown according to one of illustrated inside hardware block diagram of the authentication device of the application one embodiment.
Fig. 3 shows two of the illustrated inside hardware block diagram according to the authentication device of the application one embodiment.
Embodiment
The application is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched
The specific embodiment stated is used only for explaining relevant utility model, rather than the restriction to the utility model.Further need exist for illustrating
, for the ease of description, the part related to utility model is illustrate only in accompanying drawing.
It should be noted that in the case where not conflicting, the feature in embodiment and embodiment in the application can phase
Mutually combination.Describe the application in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 1 is refer to, it illustrates the exemplary of the information of vehicles security alarm device 1 according to the application one embodiment
Hardware block diagram.
As shown in figure 1, information of vehicles safety control device 1, which can include authentication device 11, alarm 17, message, sends electricity
Sub-control unit (ECU) 13 and message sink electronic control unit 12.
As stated in the Background Art, the electronic control unit (ECU) of a chassis has up to a hundred.By that will be arranged on vehicle
Multiple ECU be connected with each other via network, the information (information of vehicles) that ECU has can be exchanged.Wherein, these Electronic Control lists
Attempt in member send message electronic control unit be referred to as message send electronic control unit 13 (it is probably to have authorized electronics control
Unit processed, it is also possible to unauthorized electronic control unit), the electronic control unit of message is received in these electronic control units
Referred to as message sink electronic control unit 12.Authentication device 11 is disappeared for what is received to message sink electronic control unit
Breath from message send whether electronic control unit is device that the electronic control unit authorized is authenticated.Certification fills
The hardware configuration for putting 11 combines Fig. 2-3 detailed descriptions below.Alarm 17 is to send alarm according to the instruction of authentication device 11,
So that relevant staff carries out the device of potential safety hazard investigation.Alarm 17 can be buzzer, loudspeaker, display etc.
In any one.In the case of loudspeaker or display, can by voice or video notification relevant staff which
Individual electronic control unit is probably that unauthorized but attempts to access that other electronic control units for having authorized electronic control unit, is helped
The object of investigation is locked in relevant staff.
Message sends electronic control unit 13, message sink electronic control unit 12, alarm 17 and is all connected to certification dress
Put 11.
Message, which sends between electronic control unit 13 and authentication device 11 to have, is used for message transmission electronic control unit 13
Message, which is sent, to authentication device 11 sends the mark of electronic control unit, authentication device 11 to message transmission electronic control unit
Identity verification pass through it is rear to message send electronic control unit send authentication token first connection 14.Message sends electronics control
Unit 13 processed wants to send message, and its identity is verified by the request authentication device 11 of the first connection 14 first, that is, passed through
First connection 14 sends the request for verifying its identity to authentication device 11.After authentication device 11 receives the request, active inquiry
Message sends the mark of electronic control unit 13.The method of active inquiry is for example directly read by the specific fields in the request
The message sends the mark of electronic control unit.In the communication protocol that message sends electronic control unit 13 and authentication device 11
Regulation, the specific fields that message is sent in the message that electronic control unit 13 is sent to authentication device 11 are automatically put into message transmission
The mark of electronic control unit.The specific fields can not artificially be manipulated and changed.So, if message sends electronic control unit
It is that a uncommitted new access or the ECU mistakenly accessed, the message that the specific fields are read send electronic control unit
Mark be exactly the uncommitted ECU mark without able person for change, so necessarily can't pass checking in authentication device.If
Not by the way of active inquiry, but allow message to send electronic control unit 13 and report its mark, message sends Electronic Control
Unit 13 is probably a uncommitted electronic control unit in itself, but it knows another Electronic Control list authorized
The mark of member so as to which the mark of the electronic control unit authorized the mark of oneself that disguises oneself as is sent into authentication device so that
Pass through checking.
If authentication is by the way that authentication device 11 sends electronic control unit 13 to message by the first connection 14 and sent out
Send authentication token.Authentication token can be presented as that one includes numeral, the sequence of letter.In one embodiment, in not homogeneous
Checking in, authentication device 11 provide authentication token it is different.
There is the 4th connection between authentication device 11 and alarm 17.If authentication fails, authentication authorization and accounting device is to message
The identity verification failure of electronic control unit is sent, then authentication device 11 sends alarm to alarm 17 by the 4th connection 18 and disappeared
Breath.If alarm is loudspeaker or display, warning message may carry the mark that message sends electronic control unit 13.Report
Alert device can be by the mark voice broadcast or display, so that relevant staff preferably excludes potential safety hazard.
Message, which sends between electronic control unit 13 and message sink electronic control unit 12 to have, is used for message transmission electricity
Sub-control unit 13 transmits message to message sink electronic control unit 12 and sends the mark of electronic control unit and the certification
Second connection 15 of token.
After message transmission electronic control unit 13 receives authentication token, message is sent to the mark of electronic control unit 13
With the authentication token, may also have the message package to be sent 15 be sent to message sink electronic control unit by the second connection
12。
Have between message sink electronic control unit 12 and authentication device 11 and be used for message sink electronic control unit 12
The message for forwarding message sink electronic control unit 12 to receive to authentication device 11 sends mark and the institute of electronic control unit
State the 3rd connection 16 of authentication token.
Message sink electronic control unit 12 receives message and sends its mark that electronic control unit 13 sends, described recognizes
After demonstrate,proving token, message package, message package is not opened first, but forward message sink electronic control unit 12 to receive to authentication device 11
The message arrived sends the mark of electronic control unit and the authentication token.Because authentication device 11 is sending electronics control to message
Unit 13 processed often provides one piece of authentication token, can all send authentication token and the message as the object for providing the authentication token
The mark of electronic control unit accordingly records.So, when authentication device 11 receives message sink electronic control unit 12
After the authentication token and message of forwarding send the mark of electronic control unit, using its with the authentication token once provided with as certification
The corresponding record for the mark that the message that token provides object sends electronic control unit is compared.If in corresponding record,
Then certification to the return authentication of message sink electronic control unit 12 by the 3rd connection 16 by passing through message.Message sink electricity
Sub-control unit 12 can open message package.Otherwise, then authentification failure, authentication device 11 connect 18 to alarm 17 by the 4th
Send warning message.If alarm is loudspeaker or display, warning message may carry message and send electronic control unit
13 mark.Alarm can be by the mark voice broadcast or display, so that relevant staff preferably excludes potential safety hazard.
First connection, the second connection, the 3rd connection, the 4th connection all both can be wired connection or nothing
Line connects.
As shown in Fig. 2 in one embodiment, the authentication device 11 includes transceiver 111, authenticator 113.The receipts
Hair device 111 is connected to authenticator 113.Transceiver 111 can use in general transceiver, such as in the case of wireless communication,
Antenna can be used.Authenticator can use the form of processor.
During above-mentioned message sends electronic control unit 13 to the request authentication token of authentication device 11, transceiver
111 receive message by the described first connection 14 sends the request of electronic control unit transmission (containing its mark in specific fields
Know).Authenticator 11 is stored with the list for having authorized electronic control unit.If the message contained in the request received sends electronics
For the mark of control unit not in the list, it is uncommitted new access or mistake to illustrate that the message sends electronic control unit
The ECU of access by mistake, it is impossible to provide authentication token, warning message is sent to alarm 17 by the 4th connection 18.If receive
Request in the message that contains send the mark of electronic control unit in the list, then authenticator 113 generates authentication token,
And authentication token is sent via the described first connection 14 by transceiver 111.
Authenticator 113 can also be not stored in by having authorized the list of electronic control unit, and is stored in and authenticator phase
In the database 114 of connection, as shown in Figure 3.After receiving message and sending the request of electronic control unit 13, authenticator is from number
The list is transferred according to storehouse 114.
After authenticator 113 provides authentication token, also the targeted message of the authentication token of granting and the authentication token is sent out
The mark of power transmission sub-control unit is accordingly recorded in itself.Alternatively, it is also possible to by the authentication token of granting and the certification
The mark that the targeted message of token sends electronic control unit is accordingly recorded in database 114, as shown in Figure 3.
Message is sent to the mark and authentication token of electronic control unit 13 in above-mentioned message sink electronic control unit 12
It is sent to during authentication device 11 is authenticated, transceiver 111 also passes through the described 3rd connection 16 and receives message sinks electricity
The message that sub-control unit 12 forwards sends the mark of electronic control unit and the authentication token.Authenticator 113 is based on message
The mark and the authentication token for sending electronic control unit are authenticated, i.e., by itself and itself storage (as shown in Figure 2) or number
The mark of electronic control unit is sent according to the message that storehouse 114 stores its authentication token provided of (as shown in Figure 3) and is directed to
Corresponding record is compared.If the mark of the message transmission electronic control unit received and the authentication token be not described right
In should recording, authentification failure.This very possible description messages sends the Electronic Control list that electronic control unit is a unauthorized
Member, it forges its mark in order to access message sink electronic control unit and/or authentication token is sent to message sink electronics
Control unit.Authenticator 113 sends warning message by the 4th connection 18 to alarm 17.Authenticator 11 can also pass through the 3rd
The authentication result of authentification failure is returned to message sink electronic control unit by connection 16.Message sink electronic control unit can not
Open message package.If in the corresponding record, the authentication result that authenticator 11 is passed through certification by the 3rd connection 16 is returned
Back to message sink electronic control unit.Message sink electronic control unit can open message package.
Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.People in the art
Member should be appreciated that utility model scope involved in the application, however it is not limited to what the particular combination of above-mentioned technical characteristic formed
Technical scheme, while should also cover in the case where not departing from utility model design, by above-mentioned technical characteristic or its be equal
Other technical schemes that feature is combined and formed.Such as features described above has with (but not limited to) disclosed herein
The technical scheme that the technical characteristic for having similar functions is replaced mutually and formed.
Claims (6)
1. a kind of information of vehicles security alarm device, it is characterised in that the information of vehicles security alarm device fills including certification
Put, alarm, message send electronic control unit and message sink electronic control unit, the message transmission Electronic Control list
Member, message sink electronic control unit and alarm are all connected to authentication device, and message sends electronic control unit and certification dress
There is the first connection, message, which is sent between electronic control unit and message sink electronic control unit, has second to connect between putting
Connect, there is the 3rd connection between message sink electronic control unit and authentication device, have the between authentication device and alarm
Four connections.
2. information of vehicles security alarm device according to claim 1, it is characterised in that the authentication device includes transmitting-receiving
Device and authenticator, wherein, the transceiver is connected to authenticator.
3. information of vehicles security alarm device according to claim 2, it is characterised in that the authentication device also includes number
According to storehouse, the database is connected to the authenticator.
4. information of vehicles security alarm device according to claim 1, it is characterised in that the alarm is buzzer.
5. information of vehicles security alarm device according to claim 1, it is characterised in that the alarm is loudspeaker.
6. information of vehicles security alarm device according to claim 1, it is characterised in that the alarm is display.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201621380561.XU CN206865493U (en) | 2016-12-15 | 2016-12-15 | Information of vehicles security alarm device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201621380561.XU CN206865493U (en) | 2016-12-15 | 2016-12-15 | Information of vehicles security alarm device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN206865493U true CN206865493U (en) | 2018-01-09 |
Family
ID=60815084
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201621380561.XU Active CN206865493U (en) | 2016-12-15 | 2016-12-15 | Information of vehicles security alarm device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN206865493U (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111077873A (en) * | 2019-02-07 | 2020-04-28 | 卡巴斯基实验室股份公司 | System and method for controlling access to an information-physical system |
-
2016
- 2016-12-15 CN CN201621380561.XU patent/CN206865493U/en active Active
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111077873A (en) * | 2019-02-07 | 2020-04-28 | 卡巴斯基实验室股份公司 | System and method for controlling access to an information-physical system |
CN111077873B (en) * | 2019-02-07 | 2023-09-22 | 卡巴斯基实验室股份公司 | System and method for controlling access to an information-physical system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11564088B2 (en) | Vehicular communication of emergency information | |
US20210342965A1 (en) | Computing devices and methods for exchanging identity data | |
US8973091B2 (en) | Secure authentication using mobile device | |
EP3036926B1 (en) | Authorized access to vehicle data | |
US20190342096A1 (en) | Online identity and credential verification systems and methods protecting user data | |
KR100705325B1 (en) | RF-ID tag reading system for using password and method thereof | |
US8730033B2 (en) | Method and system for sending information from a user device to a car | |
CN104517338B (en) | Distance entrance and its implementation based on wireless network | |
US20160183092A1 (en) | Online account access control by mobile device | |
US11521450B2 (en) | Physical access control system and method | |
US11836242B2 (en) | Controlled identity credential release | |
EP3716819B1 (en) | Systems, methods, and apparatuses for securing deliveries | |
US10789386B2 (en) | Dispatching identity information from secure hardware appliance | |
CN107465649A (en) | Control method of electronic device, terminal and control system | |
CN106971094B (en) | Software digital permits transfer method and system | |
CN206865493U (en) | Information of vehicles security alarm device | |
JP2019192256A (en) | Authentication information issuing device and delivery system | |
US11037264B2 (en) | Selective arrival notification system | |
US20220089120A1 (en) | Concept for Provision of a Key Signal or an Immobilizer Signal for a Vehicle | |
KR20210075076A (en) | Methods and systems for single-purpose public keys for public ledgers | |
CN206350026U (en) | Information of vehicles safety control device | |
EP4050923A1 (en) | Systems and methods of access validation using distributed ledger identity management | |
WO2022109752A1 (en) | Identification tag, identification tag accessory, and methods and systems for using an identification tag and identification tag accessory | |
CN106534156B (en) | Identity identifying method and device and equipment between Vehicle Electronic Control Unit | |
CN109669958A (en) | Block chain manages marriage certificate archives method, apparatus, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant | ||
GR01 | Patent grant |