Global automotive safety system
First Claim
1. A system for providing security to an in-vehicle communication network, the system comprising:
- a data monitoring and processing hub external to the in-vehicle network, the in-vehicle network having a bus and at least one node connected to the bus; and
at least one module selectively operable in a standard protection mode or an override mode to monitor messages in communication traffic propagating in the vehicle'"'"'s in-vehicle network, the module comprising;
a memory having software comprising data characterizing messages that the at least one node transmits and receives during normal operation of the node;
at least one communication port via which the at least one module is configured to monitor the communication traffic, the port being configured to be connected to a portion of the in-vehicle network;
a communication interface configured to support communication with the hub directly or via the at least one communication port;
a processor configured to process, responsive to the software in the memory, messages received via the at least one communication port from the portion of the in-vehicle network to;
determine an operating context for the vehicle;
identify a message in the received messages that is propagating in the in-vehicle network as an anomalous message indicative of exposure of the in-vehicle network to damage from a cyber attack based on the determined operating context of the vehicle;
determine, if operating in the override mode, whether the message identified as anomalous is designated as particular traffic by the override mode, and if so, take no action that interferes with propagation of the message, and otherwise, if operating in either the standard protection mode or the override mode, undertake an action that affects the anomalous message in real time while it is propagating towards its destination; and
transmit data responsive to the anomalous message to the hub for processing by the hub via the communication interface;
whereinthe hub is configured to process the data it receives to determine if the in-vehicle network is under threat of an imminent cyber attack, is under a cyber attack, or has vulnerability to a cyber attack, and transmit information to configure the module in the vehicle to engage the cyber attack responsive to the determination.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for providing security to an in-vehicle communication network, the system comprising: a data monitoring and processing hub; and at least one module configured to monitor messages in communication traffic propagating in a vehicle'"'"'s in-vehicle network, the network having a bus and at least one node connected to the bus, the module comprising: a communication interface configured to support communication with the hub; a memory having software comprising data characterizing messages that the at least one node transmits and receives during normal operation of the node; at least one communication port via which the module receives and transmits messages configured to be connected to a portion of the in-vehicle network; a processor that processes messages received via the port from the portion of the in-vehicle network responsive to the software in the memory to: identify an anomalous message in the received messages indicative of exposure of the in-vehicle network to damage from a cyber attack; determine an action to be taken by the module that affects the anomalous message; and transmit data responsive to the anomalous message to the hub for processing by the hub via the communication interface.
83 Citations
19 Claims
-
1. A system for providing security to an in-vehicle communication network, the system comprising:
-
a data monitoring and processing hub external to the in-vehicle network, the in-vehicle network having a bus and at least one node connected to the bus; and at least one module selectively operable in a standard protection mode or an override mode to monitor messages in communication traffic propagating in the vehicle'"'"'s in-vehicle network, the module comprising; a memory having software comprising data characterizing messages that the at least one node transmits and receives during normal operation of the node; at least one communication port via which the at least one module is configured to monitor the communication traffic, the port being configured to be connected to a portion of the in-vehicle network; a communication interface configured to support communication with the hub directly or via the at least one communication port; a processor configured to process, responsive to the software in the memory, messages received via the at least one communication port from the portion of the in-vehicle network to; determine an operating context for the vehicle; identify a message in the received messages that is propagating in the in-vehicle network as an anomalous message indicative of exposure of the in-vehicle network to damage from a cyber attack based on the determined operating context of the vehicle; determine, if operating in the override mode, whether the message identified as anomalous is designated as particular traffic by the override mode, and if so, take no action that interferes with propagation of the message, and otherwise, if operating in either the standard protection mode or the override mode, undertake an action that affects the anomalous message in real time while it is propagating towards its destination; and transmit data responsive to the anomalous message to the hub for processing by the hub via the communication interface;
whereinthe hub is configured to process the data it receives to determine if the in-vehicle network is under threat of an imminent cyber attack, is under a cyber attack, or has vulnerability to a cyber attack, and transmit information to configure the module in the vehicle to engage the cyber attack responsive to the determination. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification