Vehicle security system
09865108 ยท 2018-01-09
Assignee
Inventors
Cpc classification
B60R25/045
PERFORMING OPERATIONS; TRANSPORTING
H04L63/0428
ELECTRICITY
B60R25/307
PERFORMING OPERATIONS; TRANSPORTING
G07C9/00309
PHYSICS
B60R2325/20
PERFORMING OPERATIONS; TRANSPORTING
International classification
B60R25/30
PERFORMING OPERATIONS; TRANSPORTING
B60R25/045
PERFORMING OPERATIONS; TRANSPORTING
H04L9/08
ELECTRICITY
H04L9/32
ELECTRICITY
Abstract
A vehicle security system comprising a first interface, an immobilizer electronic control unit and an immobilizing electronic control unit, each of which is connected to a CAN bus. The security functions are installed on the immobilizer electronic control unit which can be accessed by a user using a vehicle access code. The information is communicated over the CAN bus in an encrypted format.
Claims
1. A vehicle security system comprising a first user interface, one or more electronic control units, connected through a communication channel, wherein vehicle functions related to said one or more electronic control units are accessible by using a first vehicle access code (VAC) or a second vehicle access code (VAC), wherein the first VAC defines a first level of access to the vehicle functions to which a user is allowed and the second VAC defines a second level of access to the vehicle functions to which a user is allowed, and wherein some or all information or data is communicated over said communication channel in an encrypted format, and wherein a secondary access code (SAC) is installed on said one or more control units and said first user interface, and said SAC is used to encrypt both the first and second VACs for at least the first time when installed on said one or more control units over said communication channel.
2. A system according to claim 1, wherein the first and second VACs are used in the encryption algorithm for encrypting the information communicated over the communication channel.
3. A system according to claim 1, wherein a second user interface can be temporarily connected to the system and some or all data communicated to or from the second user interface is encrypted using the first or second vehicle access code (VAC).
4. A system according to claim 3, wherein the second user interface device is a device that is connected to the system wirelessly.
5. A system according to claim 4, wherein the method of wireless connection comprises short-wave radio transmissions, a personal area network, infra-red, a local area network, or a mobile network.
6. A system according to claim 1, wherein the data comprises maintenance, security or activity information.
7. A system according to claim 1, wherein said first user interface is part of said one or more control units.
8. A system according to claim 1, wherein said SAC is a randomly generated code.
9. A method for secure transfer of information on a vehicle security system, the system comprising a first user interface, one or more electronic control units connected through a communication channel, wherein the method comprises the steps of: storing a first vehicle access code (VAC) and a second VAC in said first user interface, wherein the first VAC defines a first level of access to vehicle functions of said one or more electronic control units to which a user is allowed and the second VAC defines a second level of access to vehicle functions of said one or more electronic control units to which a user is allowed; storing said first and second VACs in said one or more electronic control units through said communication channel; communicating some or all information or data related to the vehicle functions of said one or more electronic control units over said communication channel to and from said electronic control units and said first user interface in an encrypted format; installing a secondary access code (SAC) on said one or more control units and said first user interface; and using said SAC to encrypt said first and second VACs when entered in said first user interface for at least the first time and to install said first and second VACs on said one or more electronic control units over said communication channel.
10. A method according to claim 9, said method further comprising the steps of: Connecting a further, second user interface temporarily to said communication channel; Communicating some or all information or data to or from said second user interface in an encrypted format using said first and second VACs.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) An embodiment of the invention will now be described, by way of example only, and with reference to the accompanying drawings, in which:
(2)
(3)
(4)
(5)
(6)
DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS
(7)
(8) During a first operation of the vehicle, whether at the production plant or at a dealer, the system 10 is provided with a vehicle access code (VAC). This code is programmed by the vehicle owner using the first user interface 12, installed in the first user interface 12 as 12V, and then copied and installed onto all relevant vehicle control units, e.g. the immobilizer unit 16 as 16V and the immobilizing unit 18 as 18V, using the CAN bus. The VAC is a code or number chosen by the owner of the vehicle so that they can gain access to the vehicle and its security information.
(9) During this first operation the VAC is communicated over the CAN bus in a non-encrypted way and therefore it should be performed at a location where it is impossible for 3rd parties to track communication on the CAN bus. As the VAC is only known to the vehicle owner all future communications over the CAN bus can be made in a secure way. The VAC may be used in the encryption algorithm for encrypting the information passed over a communication link, e.g. a CAN bus, for instance in order to gain access to the security information or the vehicle.
(10) If the vehicle owner wants to change the VAC he can copy this new VAC over the CAN bus in a secure way because the current VAC is used in the encryption algorithm.
(11) A second user interface device 24, shown in
(12) It is possible that HMI 12a of said first interface 12 is part of a single electronic control unit 12 connected to the CAN bus containing the VAC. This still allows the user to communicate in a secure, encrypted way over the CAN bus 14 with this single electronic control unit 12 using the second interface 24 and the VAC.
(13) To avoid the risk that a person illicitly gains access to the VAC a further level of security can be added.
(14) In
(15) As shown in
(16) Again a second user interface device 24, shown in
(17) It will be appreciated that the first interface may be used in combination with encoded key that contains the VAC. Furthermore, the key may be programmed by the user with a particular code and further keys may also be programmed in that manner. With such a system, the user does not need to enter a code to access the security functions because the code is installed on the encoded key and read automatically.
(18) The use of the SAC allows for different VACs to be used by different users and for the VACs to be passed along the CAN bus in an encrypted format. For example, one user may be allowed full access using a VAC and a second user allowed limited access using a second VAC. However, both VACs are encrypted using the SAC as the encryption key for transmission over the CAN bus such that neither VAC is communicated over the CAN bus without encryption.
(19) Clearly, the SAC may be installed on other units and modules of the security system and it may be desirable for a portable interface device to be loaded with the SAC. Such a device may be provided with the SAC during manufacture and set-up of the whole system.
(20) Where a portable device is connected to the CAN bus, upon inputting of the correct VAC, the system may teach the portable device the SAC with a time-to-live (TTL), such that the portable device can be used for a period as if it was a permanent part of the system and so all transmissions over the CAN bus use the SAC as the encryption code after the initial use of the VAC to authorise the portable device. However, the SAC on the portable device has a time-to-live and so after the device is disconnected from the system the SAC is forgotten or automatically removed from the device. Further connection of the portable device to the system will require use of the VAC to initiate communication again before the SAC is again taught to the portable device with a TTL.
(21) Where communication with the system is initiated using the portable device, limited information may be exchanged with the device, for example log records and maintenance information, but full access may be restricted when accessing the system from the portable device. As an example, the ability to change the VAC code may only be possible using the first, non-portable, interface so that the VAC cannot be changed using the second, portable interface.
(22) The second interface may be a smartphone, a tablet, a computer or other user interface.
(23) The CAN bus may be a wireless CAN bus operating using short-wave radio signals and/or a local area network. In such a situation, it is important to use the encryption method of the present invention to prevent theft of information over the wireless network.
(24) Information stored on the individual modules of the system may or may not be stored in an encrypted format using the SAC and/or the VAC as the encryption key. Regardless of their encryption state when stored, during transmission over the CAN bus, they will be encrypted.