摘要:
A vehicle communication network (200) includes a plurality of network elements (208-212) and a plurality of communication links (214-230) communicatively coupling the network elements in a point-to-point configuration. A portion of the communication capability is reserved according to a class of message traffic.
摘要:
A power, ground and communication architecture (100) utilizes hubs (105, 110, 115). Each hub (105, 110, 115) contains computing, communication and power management elements (135, 140). Hubs (105, 110, 115) may be connected to multiple other hubs (105, 110, 115) to distribute communication and power in a freeform web-type arrangement, specific tree, bus or star arrangements are not required. Standardized wiring harness segments (120) are used to join the hubs (105, 110, 115) and control elements. Each of the strands in the web may be an independent point-to-point bus and isolated power line.
摘要:
A component for use in a prospective vehicle obtains from a certification authority a certification that an authentic vehicle is associated with a cryptographic key. The certification certifies that the cryptographic key is bound to information identifying the authentic vehicle. The component utilizes the cryptographic key obtained from the certification authority in cryptographic communication with the prospective vehicle, and determines whether the prospective vehicle is the authentic vehicle based on whether the cryptographic key is successfully utilized in the cryptographic communication. Upon determining the prospective vehicle is the authentic vehicle, the component may allow the prospective vehicle to operate the component.
摘要:
A vehicle subassembly obtains a prospective component for use in the vehicle subassembly. The vehicle subassembly also obtains from a certification authority a certification that an authentic component is associated with a cryptographic key. The certification certifies that the cryptographic key is bound to information identifying the authentic component. The vehicle subassembly utilizes the cryptographic key obtained from the certification authority in cryptographic communication with the prospective component, and determines whether the prospective component is the authentic component based on whether the cryptographic key is successfully utilized in the cryptographic communication.
摘要:
A vehicle network and method for communicating information within a vehicle. The network includes a plurality of network elements joined by communication links. A data frame is provided for communicating information between a first device and a second device attached to the network. A network element in the network is capable of mapping a first resource on an incoming communication link of the network element to a second link resource of an outgoing communication link of the network element. The network element further has ports for receiving the data frame from the first link resource of the incoming communication link and for communicating the data frame to the second link resource of the outgoing communication link. The mapping may be done statically or dynamically such as based on information stored in the network element or based on information stored in the data frame.
摘要:
A vehicle authenticates a service technician and accesses a technician database to determine whether the service technician is indicated as authorized to perform the service operation. If the service technician is indicated as authorized to perform the service operation, the vehicle allows the service technician to perform the service operation.
摘要:
A vehicle accesses a configuration database to determine whether a reconfiguration function is authorized. The reconfiguration function may involve, for example, installing the component in the vehicle, removing the component from the vehicle, replacing the component with another component in the vehicle, replacing another component in the vehicle with the component, modifying the component, upgrading the component and rendering the component operable. Upon determining that the reconfiguration function is authorized, the vehicle allows the reconfiguration function to be performed. The reconfiguration function may be authorized based on a type of the vehicle, a type of the component or a combination of configuration elements in a current configuration of the vehicle.
摘要:
A system and method for tunneling standard bus protocol messages through an automotive switch fabric network. When a bus protocol message arrives on a connecting node in the network, a bus driver in the node will capture the message and store it into a message buffer where the message can be further processed by a tunneling application. Each received bus protocol message will be broken, or combined, to suit the available packet size of the underlying transmit layer of the switch fabric network. Data portions such as message identification, sequence number, port number, bus data type, and data length are reserved in each data packet. If the message is being broken down, the sequence number is used to differentiate the broken segments of the bus protocol message. The bus data type is used to indicate the type of protocol data being transmitted over the switch fabric. The same tunneling application may be used to reassemble the bus protocol message at a receiving node.
摘要:
The service technician accesses the prospective vehicle and obtains from a certification authority a certification that an authentic vehicle is associated with a cryptographic key. The service technician utilizes the cryptographic key in cryptographic communication with the prospective vehicle via a secure device having limited accessibility but being accessible by the service technician. The service technician determines whether the prospective vehicle is the authentic vehicle based on whether the cryptographic key is successfully utilized in the cryptographic communication with the prospective vehicle.
摘要:
A first vehicle obtains from a certification authority a certification that an authentic vehicle is associated with a cryptographic key. The certification certifies that the cryptographic key is bound to information identifying the authentic vehicle, and may be implemented. The first vehicle utilizes the cryptographic key obtained from the certification authority in cryptographic communication with a second vehicle, and determines whether the second vehicle is the authentic vehicle based on whether the cryptographic key is successfully utilized in the cryptographic communication. Upon determining the second vehicle is the authentic vehicle, the first vehicle may communicate further with the second vehicle.