Authentication of control units in a vehicle
First Claim
1. A method for authenticating control units in a bus system of a motor vehicle, the method comprising the acts of:
- transmitting, by a first control unit, an authentication request to an authentication device via the bus system, signing, by the authentication device, the authentication request using a first symmetric key and transmitting the signed authentication request or only the signature to the first control unit, wherein the first control unit compares the transmitted signature of the authentication request with a signature, which is determined by the first control unit by applying the symmetric key to the authentication request, or the first control unit decodes the transmitted signature of the authentication request using the first symmetric key, and a first hash value is obtained; and
the first control unit applies a hash algorithm to the authentication request, whereby a second hash value is obtained, and wherein the first control unit is rendered operational if the comparison of the signatures and/or the hash values is positive or if the signatures and/or the hash values match.
1 Assignment
0 Petitions
Accused Products
Abstract
A control unit transmits an authentication request to an authentication device via the bus system. The authentication device signs the authentication request using a first symmetric key and transmits the signed authentication request or only the signature to the control unit. The control unit compares the transmitted signature of the authentication request with a signature, which is determined by the control unit by applying the symmetric key to the authentication request, and/or the control unit decodes the transmitted signature of the authentication request using the first symmetric key to obtain a first hash value; and the control unit applies a hash algorithm to the authentication request to obtain a second hash value. The control unit is rendered operational if the comparison of the signatures and/or the hash values is positive or if the signatures and/or the hash values match.
34 Citations
12 Claims
-
1. A method for authenticating control units in a bus system of a motor vehicle, the method comprising the acts of:
-
transmitting, by a first control unit, an authentication request to an authentication device via the bus system, signing, by the authentication device, the authentication request using a first symmetric key and transmitting the signed authentication request or only the signature to the first control unit, wherein the first control unit compares the transmitted signature of the authentication request with a signature, which is determined by the first control unit by applying the symmetric key to the authentication request, or the first control unit decodes the transmitted signature of the authentication request using the first symmetric key, and a first hash value is obtained; and
the first control unit applies a hash algorithm to the authentication request, whereby a second hash value is obtained, andwherein the first control unit is rendered operational if the comparison of the signatures and/or the hash values is positive or if the signatures and/or the hash values match. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for authenticating control units in a bus system of a motor vehicle, the method comprising the acts of:
-
transmitting, by an authentication device, an authentication request to a first control unit via the bus system, signing, by the first control unit, the authentication request using a first symmetric key and transmitting the signed authentication request or only the signature to the authentication device, wherein the authentication device compares the transmitted signature of the authentication request with a signature, which is determined by the authentication device by applying the symmetric key to the authentication request, or the authentication device decodes the transmitted signature of the authentication request using the first symmetric key, and a first hash value is obtained; and
the authentication device applies a hash algorithm to the authentication request, whereby a second hash value is obtained, andwherein the first control unit is rendered operational if the comparison of the signatures and/or the hash values is positive or if the signatures and/or the hash values match. - View Dependent Claims (8, 9, 10)
-
-
11. A bus system of a motor vehicle, the bus system comprising:
-
control units; and
an authentication device, wherein a first control unit of the control units transmits an authentication request to the authentication device via the bus system, the authentication device signs the authentication request using a first symmetric key and transmitting the signed authentication request or only the signature to the first control unit, wherein the first control unit compares the transmitted signature of the authentication request with a signature, which is determined by the first control unit by applying the symmetric key to the authentication request, or the first control unit decodes the transmitted signature of the authentication request using the first symmetric key, and a first hash value is obtained; and
the first control unit applies a hash algorithm to the authentication request, whereby a second hash value is obtained, andwherein the first control unit is rendered operational if the comparison of the signatures and/or the hash values is positive or if the signatures and/or the hash values match.
-
-
12. A bus system of a motor vehicle, the bus system comprising:
-
control units; and
an authentication device, wherein the authentication device and a first one of the control units includes computer program products for performing the acts of transmitting, by a first control unit, an authentication request to an authentication device via the bus system, signing, by the authentication device, the authentication request using a first symmetric key and transmitting the signed authentication request or only the signature to the first control unit, wherein the first control unit compares the transmitted signature of the authentication request with a signature, which is determined by the first control unit by applying the symmetric key to the authentication request, or the first control unit decodes the transmitted signature of the authentication request using the first symmetric key, and a first hash value is obtained; and
the first control unit applies a hash algorithm to the authentication request, whereby a second hash value is obtained, andwherein the first control unit is rendered operational if the comparison of the signatures and/or the hash values is positive or if the signatures and/or the hash values match.
-
Specification