This application claims priority from German Patent Application No. DE 10 2005 039 128.1, which was filed on Aug. 18, 2005, and is incorporated herein by reference in its entirety.
The invention relates to a safety device for electronic devices in a vehicle.
Electronic devices, in particular control devices for motors or gears, often have safety-related functions, which must be protected against unauthorized access, for example before allowed changes of control characteristics, mileage readings or program codes. For detecting such illegal accesses and blocking the function of the relevant device, diagnostic queries are known, for example security access according to ISO 14229. This technology offers only a limited security, as such systems are easy to circumvent and manipulations are ultimately not traceable.
It is therefore the object of the invention to enable secure detection of manipulations. This object is achieved with the safety device according to the invention in that a security module with a data memory is only accessible after prior authentication; in that signatures of data of the devices are stored in the data memory; and in that means are provided for comparing the stored data with the data respectively read out from the devices.
The invention permits numerous embodiments. One of these is schematically represented in the drawing by way of several figures, and subsequently described.
Security modules are known per se and generally contain a processor and suitable memory as well as interfaces for external communication. The access to the data memory is controlled by the processor according to security algorithms known per se. The security module is preferably executed as an integrated circuit and can be arranged in a control device, for example.
In the security module—subsequently also called a trustbox—any data at all can be stored for the devices, but it is preferably provided that the data of the devices is typical data for the devices. This could for example include version identifiers or hash files of programs used in the devices.
It can further be provided in the invention that a time stamp can be stored together with the data. This enables documentation of when a change was made, for example the integration or exchange of a device or a software version.
In some devices, data is generated or changed which is important for a subsequent diagnosis. Such data is the mileage, for example, or characteristics that are optimized either automatically or during maintenance work. It is therefore provided in a development that data which is present in the devices and changeable per se can further be stored in the data memory. Thus for example during maintenance the current mileage can be stored, and can be read out during a later access to the security module and checked for plausibility.
In an advantageous design it is provided that the security module has an interface to a computer. With the computer, the necessary data for authentication can be created and transferred to the security module, and the signatures stored there can be read out and compared with signatures of the devices present in each case. In particular, for various authorizations it is advantageous if the security module further has an interface for a smart card. Each authorized user can then authenticate himself with his smart card.
Another advantageous design consists in the fact that the security module can be connected to the devices via a bus system. It is then possible that when the security module is accessed, for example in the aforementioned computer, there can be a communication with the devices at the same time. Means for signing data that is queried by the devices can then be provided in particular in the security module. No program for data signing is needed here in the computer to be connected. The creation of the signatures of the “original devices”, which are then stored in the security module, and the creation of the signatures for the devices to be compared, occur automatically with identical algorithms.
In practical operation, for example in workshops or technical monitoring facilities, it can be necessary for otherwise unauthorized persons to read out data. It is therefore provided in a development of the invention that a restricted function of the security module is also possible without authentication.
One way of granting different access rights is for various authentication features to be provided for various devices.
The security module's capability for checking authorizations can be used, in addition to device monitoring, for further purposes, in that further functions are implemented in the security module which require a high degree of data protection. In this development, it can be provided for example that the further functions include a check of encrypted vehicle access signals and/or that the further functions include an engine immobilizer.
The device shown in
The trustbox 1 further has an interface 8 for connection to a computer and an interface 9 for connection to a smart card, for example by means of a plug-in connection or smart card plug-in unit.
Number | Date | Country | Kind |
---|---|---|---|
10 2005 039 128.1 | Aug 2005 | DE | national |