×

Authentication of a vehicle-external device

  • US 8,886,943 B2
  • Filed: 10/27/2006
  • Issued: 11/11/2014
  • Est. Priority Date: 04/29/2004
  • Status: Active Grant
First Claim
Patent Images

1. A method for authenticating a vehicle-external device in a bus system of a motor vehicle comprising control units, the bus system including an authentication device, the method comprising the acts of:

  • transmitting, by the authentication device, an authentication request to the vehicle-external device;

    signing, by the vehicle-external device, the authentication request with a signature using a secret key of an asymmetric pair of keys;

    transmitting, by the vehicle-external device, only the signature to the authentication device;

    determining, by the authentication device, a signature of the authentication request using a same algorithm as the vehicle-external device;

    decoding the signature transmitted by the vehicle-external device using the public key, which is complementary to the secret key; and

    comparing the determined signature with the transmitted signature;

    wherein, when comparing the determined signature and the transmitted signature results in a positive comparison or match, the vehicle-external device obtains write and/or read access to a store of at least one of the control units by way of the authentication device,further wherein;

    a first control unit transmits an authentication request to the authentication device for authenticating the control units,the authentication device signs the authentication request using a first symmetric key and transmits only the signature to the first control unit,whereinthe first control unit compares the transmitted signature of the authentication request with a signature, which is determined by the first control unit by applying the symmetric key to the authentication request;

    orthe first control unit decodes the transmitted signature of the authentication request using the first symmetric key, and a first hash value is obtained, and the first control unit applies a hash algorithm to the authentication request, whereby a second hash value is obtained; and

    the first control unit is rendered operational if the comparison of the signatures and/or the hash values is positive and/or if the signatures and/or the hash values match, andthe motor vehicle may be started up only after all of the control units of the bus system have executed the method for authentication with positive results from the comparison.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×