Abstract:
A vehicle system and method of secure communication between a vehicle and an external device communicating with the vehicle in a diagnostics mode. The method includes the steps of: receiving a first diagnostic request at an electronic control unit (ECU) from the external device; determining an increased risk of security breach at the ECU based on the [nature of the] first request; and when it is determined that the increased risk exists, providing a misinformative response
Abstract:
A vehicle system and method of secure communication between a vehicle and an external device communicating with the vehicle in a diagnostics mode. The method includes the steps of: receiving a first diagnostic request at an electronic control unit (ECU) from the external device; determining an increased risk of security breach at the ECU based on the [nature of the] first request; and when it is determined that the increased risk exists, providing a misinformative response.
Abstract:
A communication system in a vehicle is described and various methods for securely providing diagnostic data between a vehicle and a remote server using a vehicle diagnostic tool. The method may include the steps of: receiving at the remote from the diagnostic tool both a challenge question and encrypted data acquired by the diagnostic tool from a vehicle electronic control unit; using the challenge question to determine how to decrypt the encrypted data; and decrypting the encrypted data at the remote server.
Abstract:
The present application relates to a method and apparatus for intelligent wireless protocol optimization including storing, in a memory, a first customer key and a second customer key, receiving, by a processor, a secret key, decrypting, by the processor, the secret key using a first customer key to extract a master key, provisioning, by the processor, an electronic control unit in response to the master key, and deleting, by the processor, the second customer key in response to the provisioning of electronic control unit in response to the master key.
Abstract:
A system and method of controlling access to electronic control units (ECUs) includes: receiving, at an ECU supplier computer, a supplier encryption key derived from a master encryption key using a supplier identifier that identifies an ECU supplier; issuing an ECU identifier that identifies an ECU and includes the supplier identifier; generating for the ECU an ECU unlock authorization key using the supplier encryption key and the ECU identifier; and storing the ECU unlock authorization key and the ECU identifier in the ECU.
Abstract:
A method provides secure communication between a first module and a second module within a vehicle communication network. A first anti-replay counter is provided within the first module, and a second anti-replay counter is provided within the second module. A message is transmitted from the first module to the second module over the vehicle communication network. The message includes a partial counter including only a portion of the contents of the first anti-replay counter, and the message is authenticated based on the partial counter.
Abstract:
A system and method of transmitting data within a vehicle over a vehicle bus includes: constructing at an electronic control unit (ECU) a serial bus message that includes a data message and a message authentication code (MAC) that is created using a secret key stored at the ECU, a MAC algorithm, and the data message; transmitting the serial bus message to a receiving ECU over the vehicle bus; and authenticating the serial bus message at the receiving ECU using a copy of the secret key stored at the receiving ECU by creating a copy of the MAC from the data message included in the serial bus message, the copy of the secret key, and the MAC algorithm; comparing the MAC included in the serial bus message with the copy of the MAC created at the receiving ECU; and rejecting or accepting the data message based on the comparison.
Abstract:
The present application relates to a method and apparatus for intelligent wireless protocol optimization including storing, in a memory, a first customer key and a second customer key, receiving, by a processor, a secret key, decrypting, by the processor, the secret key using a first customer key to extract a master key, provisioning, by the processor, an electronic control unit in response to the master key, and deleting, by the processor, the second customer key in response to the provisioning of electronic control unit in response to the master key.
Abstract:
A method of transmitting data within a vehicle includes: storing two copies of a data message; constructing at an electronic control unit (ECU) a serial bus message that includes one copy of the data message and a message authentication code (MAC) created using a secret key stored at the ECU, a MAC algorithm, and a different copy of the data message; transmitting the serial bus message to a receiving ECU over a vehicle bus; authenticating the serial bus message at the receiving ECU using a copy of the key stored at the receiving ECU by creating a copy of the MAC from the data message included in the serial bus message and the copy of the key; comparing the MAC from the serial bus message with the copy of the MAC created at the receiving ECU; and rejecting or accepting the data message based on the comparison.
Abstract:
A communication system in a vehicle is described and various methods for securely providing diagnostic data between a vehicle and a remote server using a vehicle diagnostic tool. The method may include the steps of: receiving at the remote from the diagnostic tool both a challenge question and encrypted data acquired by the diagnostic tool from a vehicle electronic control unit; using the challenge question to determine how to decrypt the encrypted data; and decrypting the encrypted data at the remote server.