Control area network authentication
First Claim
Patent Images
1. A computer-implemented method for authenticating messages, comprising:
- receiving, by a receiving device, a data message from a sending device, wherein each receiving and sending device is assigned one of two or more trust levels;
receiving, by the receiving device, an authentication message from the sending device, the authentication message comprising an authentication code;
determining a message identifier for the data transmission, wherein each receiving device is associated with at least one of two or more message identifiers, the two or more message identifiers being assigned to one of two or more message groups, wherein a particular message identifier is assigned to one of the two or more message groups based on a device with the lowest trust level among the receiving and sending devices that use that particular message identifier;
authenticating the received data message by using a group key assigned to the receiving device to verify the authentication code.
6 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method for authenticating messages in a control area network is described. In one embodiment, a message identifier for a data message is ascertained. Each device is associated with one or more message identifiers. The data message is sent from a first device to a second device. The data message is associated with the ascertained message identifier. An authentication code computed by the first device is sent to the second device. The authentication code is sent by the first device in the data message or in an authentication message.
52 Citations
18 Claims
-
1. A computer-implemented method for authenticating messages, comprising:
-
receiving, by a receiving device, a data message from a sending device, wherein each receiving and sending device is assigned one of two or more trust levels; receiving, by the receiving device, an authentication message from the sending device, the authentication message comprising an authentication code; determining a message identifier for the data transmission, wherein each receiving device is associated with at least one of two or more message identifiers, the two or more message identifiers being assigned to one of two or more message groups, wherein a particular message identifier is assigned to one of the two or more message groups based on a device with the lowest trust level among the receiving and sending devices that use that particular message identifier; authenticating the received data message by using a group key assigned to the receiving device to verify the authentication code. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer-implemented method for authenticating messages, comprising:
-
ascertaining a message identifier for a data message, wherein each receiving and sending device is associated with at least one of two or more message identifiers, wherein each receiving and sending device is assigned one of two or more trust levels; assigning each of the two or more message identifiers to one of two or more message groups, wherein a particular message identifier is assigned to one of the two or more message groups based on a device with the lowest trust level among the receiving and sending devices that use that particular message identifier; sending the data message from a first device to a second device, the data message being associated with the ascertained message identifier; and sending, to the second device, an authentication code computed by the first device, the authentication code being sent by the first device in the data message or in an authentication message. - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
-
13. A computing device configured to authenticate messages, comprising:
-
a processor; memory in electronic communication with the processor; instructions stored in the memory, the instructions being executable by the processor to; ascertain a message identifier for a data message, wherein each receiving and sending device is associated with at least one of two or more message identifiers, wherein each receiving and sending device is assigned one of two or more trust levels; assign each of the two or more message identifiers to one of two or more message groups, wherein a particular message identifier is assigned to one of the two or more message groups based on a device with the lowest trust level among the receiving and sending devices that use that particular message identifier; send the data message from a first device to a second device, the data message being associated with the ascertained message identifier; and send, to the second device, an authentication code computed by the first device, the authentication code being sent by the first device in the data message or in an authentication message. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification