摘要:
An anomaly detection electronic control unit (ECU) that detects unauthorized messages on a communication path is provided. An ECU that periodically transmits a first-type message including data to be monitored, and an ECU that periodically transmits a second-type message including data for comparison, are connected to the communication path. The anomaly detection ECU includes: a receiver that successively receives first-type and second-type messages; a processor that determines whether a first-type message received is normal or anomalous; and a transmitter that transmits a predetermined message in accordance with results of the determining. The determining is performed based on content of the first-type message, content of a second-type message last received at the time of receiving this first-type message, and at least one of content of a first-type message received further in the past than this first-type message, and content of a second-type message received further in the past than the second-type message last received.
摘要:
An evaluation device for evaluating security of an electronic control system in which a plurality of electronic control units are connected to a bus used for communication includes a recording medium that holds attack procedure information indicative of contents and a transmission order of a plurality of frames, a transmitter that transmits the plurality of frames to the bus in the transmission order indicated by the attack procedure information, a monitor that monitors an actuator unit controlled by any of the plurality of electronic control units, and an evaluator that makes the evaluation on basis of a monitoring result obtained by the monitor when the transmitter transmits the plurality of frames to the bus.
摘要:
An unauthorized control suppression method for use in a network system is provided. The network system includes a plurality of electronic controllers that exchange, via a communication channel, a plurality of frames The plurality of frames includes at least one control frame that instructs predetermined control to an object of control. The method receives, sequentially, the plurality of frames from the communication channel, and determines whether the predetermined control, instructed by the control frame received in the receiving, is to be suppressed, based on a set of frames received in the receiving. The set of frames is received in the receiving within a predetermined period preceding a time of reception of the control frame.
摘要:
Disclosed is a method for controlling a cordless telephone device for use in a system that allows remote control of a home electric appliance. The method includes a first generation step of causing a first generation unit in a handset to encode audio input via a sound receiving unit in the handset to generate a first stream, and a first transmission step of transmitting the first stream to a base unit. The first generation step includes causing the first generation unit to generate instruction bit information and a first instruction stream when a first trigger indicating a request to start the remote control is given to the first generation unit. The first transmission step includes transmitting the instruction bit information and the first instruction stream to the base unit through a multiplexing scheme that is common to transmission of a first stream generated when the first trigger is not given.
摘要:
A gateway device for a vehicle network system installed in a vehicle is provided. The vehicle network system includes a network, an electronic control unit connected to the network, and the gateway device connected to the first network and configured to communicate outside the vehicle. The gateway device receives a first frame from outside the vehicle; determines whether or not the first frame is appropriate; generates a second frame when the first frame is not determined to be appropriate; and transmits the second frame to the network. The second frame includes control information and additional information based on content of the first frame. The control information restricts processing of the additional information included in the second frame by the electronic control unit, after the second frame is received by the electronic control unit.
摘要:
Disclosed is a method for controlling a cordless telephone device for use in a system that allows remote control of a home electric appliance. The method includes a first generation step of causing a first generation unit in a handset to encode audio input via a sound receiving unit in the handset to generate a first stream, and a first transmission step of transmitting the first stream to a base unit. The first generation step includes causing the first generation unit to generate instruction bit information and a first instruction stream when a first trigger indicating a request to start the remote control is given to the first generation unit. The first transmission step includes transmitting the instruction bit information and the first instruction stream to the base unit through a multiplexing scheme that is common to transmission of a first stream generated when the first trigger is not given.
摘要:
Disclosed is a method for controlling a cordless telephone device for use in a system that allows remote control of a home electric appliance. The method includes a first generation step of causing a first generation unit in a handset to encode audio input via a sound receiving unit in the handset to generate a first stream, and a first transmission step of transmitting the first stream to a base unit. The first generation step includes causing the first generation unit to generate instruction bit information and a first instruction stream when a first trigger indicating a request to start the remote control is given to the first generation unit. The first transmission step includes transmitting the instruction bit information and the first instruction stream to the base unit through a multiplexing scheme that is common to transmission of a first stream generated when the first trigger is not given.
摘要:
A gateway device for a vehicle network system is provided. The vehicle network system includes a first network, a second network, a first electronic control unit connected to the first network, a second electronic control unit connected to the second network, and the gateway device connected to the first network and the second network. The gateway device receives a first frame transmitted to the first network by the first electronic control unit; determines whether or not the first frame is appropriate; generates a second frame when the first frame is not determined to be appropriate; and transmits the second frame to the second network. The second frame includes control information and additional information based on content of the first frame. The control information restricts processing of the additional information included in the second frame by the second electronic control unit.
摘要:
A risk information processing method is used in a risk information processing system that manages a degree of risk at a target spot at which a moving object is located. The method includes: receiving sensor data collected at each of two spots different from the target spot; determining a degree of risk of an event at each of the two spots from the sensor data collected at each of the two spots; storing, as risk information the determined degree of risk associated with each of the two spots; estimating first risk information associated with the target spot without sensor data of first event at the target spot, by using the stored risk information, the first risk information being a degree of risk of the first event at the target spot; and outputting information for the target spot based on the estimated first risk information.
摘要:
A risk information processing method used in a risk information processing system that manages a degree of risk at a spot where a moving object is located includes: storing, as risk information in a storage, a degree of risk for a combination of spot and situation; and estimating first risk information for a first combination for which a degree of risk has not been input by using three or more pieces of risk information including degrees of risk for a second combination whose spot is the same as the first combination and whose situation is different from the first combination, for a third combination whose situation is the same as the first combination and whose spot is different from the first combination, and for a fourth combination whose situation is the same as the second combination and whose spot is the same as the third combination.