Signature process
First Claim
1. Process for ensuring data integrity of software for influencing operation of a control unit of a motor vehicle, which software can be stored in a memory of the control unit, said process comprising:
- providing first and second keys for encrypting and decrypting electronic data;
filing the first key for access by a control unit in the motor vehicle;
by means of the second key, signing software which is to be imported;
importing the signed software into the memory of the control unit;
checking the signature of the software by means of the first key; and
accepting the imported software when the checking has a positive result.
1 Assignment
0 Petitions
Accused Products
Abstract
In a process for ensuring the data integrity of software for influencing operation of a control unit of a motor vehicle, a pair of keys is provided for encrypting and decrypting electronic data. The first key is stored for access by a control unit in the motor vehicle, and software which is to be imported is signed by means of the second key. The signed software is imported into the memory of the control unit and the signature of the software is checked by means of the first key. The signature is accepted if the check has a positive result.
39 Citations
20 Claims
-
1. Process for ensuring data integrity of software for influencing operation of a control unit of a motor vehicle, which software can be stored in a memory of the control unit, said process comprising:
-
providing first and second keys for encrypting and decrypting electronic data;
filing the first key for access by a control unit in the motor vehicle;
by means of the second key, signing software which is to be imported;
importing the signed software into the memory of the control unit;
checking the signature of the software by means of the first key; and
accepting the imported software when the checking has a positive result. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
the public key is filed for access by the control unit; and
the software is signed by means of the secret key.
-
-
5. The process according to claim 3, wherein:
-
a control unit in the vehicle generates an asynchronous pair of keys;
the secret key is filed in the vehicle, particularly in a control unit; and
the public key can be read out of the vehicle for signing software.
-
-
6. The process according to claim 1, wherein the key filed in the control unit is filed in a boot sector thereof.
-
7. The process according to claim 6, wherein after inscribing and input of the key, the boot sector is blocked and is thus protected against further access, including a writing access.
-
8. The process according to claim 1, wherein:
-
the software is first imaged on an information having a defined length; and
said information is then signed.
-
-
9. The process according to claim 8, wherein a hash function is selected as the imagining function.
-
10. The process according to claim 1, wherein:
-
at least one vehicle-individual information of a vehicle containing the control unit is added to the software;
at least one vehicle-individual information is signed by means of the software;
in addition to checking the signature of the software, the vehicle-individual information is also checked; and
the software is accepted in the control unit only when the vehicle-individual information of the software also corresponds to that of the vehicle.
-
-
11. The process according to claim 10, wherein:
-
for checking the vehicle-individual information, a vehicle-specific pair of keys is produced, in a vehicle security unit, the vehicle-individual information and a first key of the pair of keys being present, in addition to the vehicle-individual information, the second key of the pair of keys being filed in the software; and
in a separate routine, a check is made in the vehicle whether the two keys of the pair of keys match, in order to accept the imported software if the answer is affirmative.
-
-
12. The process according to claim 1, wherein the software is tested at least during a first running-up of the control unit, and is then correspondingly marked.
-
13. The process according to claim 1, wherein in the event of an external access to the control unit, an access unit checks whether an authorization exists for the access.
-
14. The process according to claim 13, wherein a code is requested by a control unit and the code is checked for validity.
-
15. The process according to claim 13, wherein:
-
a control unit supplies a random number which is to be signed by the accessing party; and
the signature is checked in the control unit, by means of an authentication key.
-
-
16. The process according to claim 13, wherein:
-
when access authorization is queried, an authorization stage is determined; and
access actions are accepted or not accepted as a function of the authorization stage.
-
-
17. The process according to claim 1, wherein a security device in a vehicle at least aperiodically carries out an authentication test of a control unit and registers the control unit in the event of a negative result.
-
18. The process according to claim 17, wherein a control-unit-specific secret code is filed in the control unit.
-
19. The process according to claim 17, wherein the security device queries a control-unit-specific characteristic and checks the latter with respect to authenticity.
-
20. The process according to claim 17, wherein during the authentication check, a key is used which is filed in at least one of the security device and in the control unit.
Specification